IoTforDefenseandNationalSecurity
Editedby
RobertDouglass AltaMontes,Inc.,USA
KeithGremban UniversityofColoradoSchoolofLaw,Boulder,CO,USA
AnanthramSwami ArmyResearchLaboratory,Adelphi,MD,USA
StephanGerali LockheedMartin,Inc.,Bethesda,MD,USA
Contents
ListofContributors xix
Introduction:IoTforDefenseandNationalSecurity xxv RobertDouglass
Section1Introduction:Vision,Applications,andOpportunities 1 StephanGerali
1InternetofBattlefieldThings:Challenges,Opportunities,andEmerging Directions 5 MaggieWigness,TarekAbdelzaher,StephenRussell,andAnanthramSwami
1.1IoBTVision 5
1.2IoBTvs.IoT 6
1.3IoBTOperationalRequirements 7
1.4AnOrganizingConcept 8
1.4.1TheMDOEffectLoop 9
1.4.2TechnicalChallenges 11
1.4.2.1CompositionalityandSynthesis 11
1.4.2.2TimelinessandEfficiency 12
1.4.2.3RobustnesstoAdversarialDisruption 12
1.4.2.4DeployabilityatthePointofNeed 12
1.5PerformantandResilientIoBTs 13
1.5.1CompositionalityandSynthesis 13
1.5.2TimelinessandEfficiency 14
1.5.3RobustnesstoAdversarialDisruption 15
1.5.4DeployabilityatthePointofNeed 16
1.6FutureDirections 16
1.6.1Multi-tenancyandMultiplicityofUse 17
1.6.2MultiplicityofFunction 17
1.6.3Non-stationarityandMultiplicityofPerturbations 18
1.6.4MultiplicityofSensingModalities 18
1.6.5MultiplicityofTime-scales 18
1.6.6Architecture 19
1.7Conclusion 19 References 20
2SensorizedWarfighterWeaponPlatforms:IoTMakingtheFogofWar
Obsolete 23
KyleBroadway
2.1Introduction 24
2.2 IoT forFirearms 26
2.3NewInsightsintotheBattlefieldProvidedby IoT 27
2.4Challengesfor IoT inSoldierWeapons 31
2.5BattlefieldChallengestoAggregatingandExfiltratingData 32
2.6ProtectionandSecurityfor IoT DataCommunication 34
2.7StateoftheArt 37
2.8Conclusion 37
References 38
3IoBTResourceAllocationviaMixedDiscreteandContinuous Optimization 39
JonathanBuntonandPauloTabuada
3.1Introduction 39
3.2LatticesandSubmodularFunctions 42
3.3ProblemFormulation 43
3.4AnEquivalentParameterization 44
3.5ReturningtoConstraints 47
3.5.1KnapsackConstraints 48
3.5.2ContinuousBudgetConstraints 49
3.6ComputationalExamples 50
3.6.1UnconstrainedOptimization 50
3.6.2Knapsack-ConstrainedAllocations 51
3.6.3ContinuousBudget-constrainedAllocations 54
3.7Conclusions 55 References 55
4OperationalizingIoTDataforDefenseandNationalSecurity 59
SteveMorganandJaimeWightman
4.1Introduction 59
4.2ProblemStatement 60
4.3Challenges 62
4.4SecurityConsiderations 64
4.5DevelopingaStrategyforOperationalizingData 65
4.6Precedence 69
4.7EndState 70
4.8Conclusion 71 References 71
5RealTimeMonitoringofIndustrialMachinesusingAWSIoT 73
StephanGerali
5.1ProblemStatement 73
5.2SolutionStatement–Overview 74
5.3SolutionStatement–EdgeComputing 74
5.4SolutionStatement–CloudConnectivity 75
5.5SolutionStatement–StreamingAnalyticsandDataStorage 76
5.6SolutionStatement–DataVisualization 77
5.7SolutionStatement–ExampleDataVisualizations 78
5.8Results 79
5.9NextSteps 79 References 80
6ChallengesandOpportunitiesofIoTforDefenseandNationalSecurity Logistics 83
GiseleBennett,WilliamCrowder,andChristinaBaxter
6.1Introduction 83
6.2LinkingIndustryandDoDUsesofIoT 84
6.3SituationalAwareness 85
6.3.1PolicyandLegalImplications 85
6.3.2ChallengesandConsiderations 86
6.4ApplicationsforDoD 86
6.4.1SituationalAwarenessofPeopleandEquipmentforMaintainabilityand Sustainability 86
6.4.2DataCollectionforReal-timeandPredictiveCBM 87
6.4.3PrepositioningandPlanningforPeopleandSupplies(Prepo-in-motion) 88
6.4.4IoTatDoDInstallations 90
6.4.4.1EnergyManagement 90
6.4.4.2InstallationsasTrainingPlatforms 91
6.4.5IoTandEmergencyResponse 91
6.4.6IoTandDisasterResponse 92
6.5ObservationsontheFuture 93 Acknowledgement 94 References 94
7DigitalTwinsforWarshipSystems:Technologies,Applicationsand Challenges 97
SaraFerreno-Gonzalez,AliciaMunin-Doce,MarcosMíguezGonzález,LucíaSantiago Caamaño,andVicenteDiaz-Casas
7.1Introduction 97
7.2ADigitalTwinArchitectureforImplementation 99
7.2.1PhysicalLevel 99
7.2.2PhysicalWorld/VirtualWorldInterface 101
7.2.3DigitalTwin 102
7.2.3.1IntegrationofFunctionalities:UserInterfaces 102
7.2.3.2SimulationModels 103
7.2.3.3DataStorageandDataLakes 106
7.2.3.4DataAnalysis,MachineLearning,andPredictiveAlgorithms 107
7.3ShipDigitalTwinImplementation 108
7.3.1PhysicalLevel 108
7.3.2PhysicalWorld/VirtualWorldInterface 109
7.3.3IntegrationofFunctionalitiesandtheUserInterface 110
7.3.4SimulationModels 110
7.3.5DataAnalysis,MachineLearning,andPredictiveAlgorithms 111 References 111
Section2Introduction:ArtificialIntelligenceandIoTforDefenseand NationalSecurity 115 RobertDouglass
8PrinciplesofRobustLearningandInferenceforIoBTs 119 NathanielD.Bastian,SusmitJha,PauloTabuada,VenugopalVeeravalli,andGunjanVerma
8.1InternetofBattlefieldThingsandIntelligence 119
8.2DimensionsofResponsibleAI 120
8.2.1ResearchChallengesinIoBTs 121
8.2.2Trust,ResilienceandInterpretability 122
8.3DetectingSurprise:AdversarialDefenseandOutlierDetection 123
8.4NovelDeepLearningRepresentation:DynamicalSystem 124
8.5RobustSecureStateEstimation 125
8.6DistributionallyRobustLearning 126
8.7FutureDirections 127
8.8Conclusion 128 References 128
9AIattheEdge:Challenges,Applications,andDirections 133 DhirajJoshi,NirmitDesai,ShyamaProsadChowdhury,Wei-HanLee,LuisBathen, ShiqiangWang,andDineshVerma
9.1Introduction 133
9.2IoTApplications 134
9.2.1VisualInspectionofAssets 135
9.2.1.1VisualRecognition 135
9.2.1.2AIOptimization 135
9.2.1.3FixedIoTSensorsvs.RIDs 135
9.2.2ThermalInspectionofAssets 135
9.2.2.1InspectionatElectricSubstations 136
9.2.2.2ProposedAutomation 136
9.2.3InspectionofAnalogMetersandGauges 137
9.2.3.1GaugeDetection 137
9.2.3.2PerspectiveCorrection 138
9.2.3.3PointerDetectionandTextRecognition 138
9.2.4OtherDefenseandCommercialUseCases 138
9.3DistributedAIArchitecture 138
9.3.1Background:CentralizedAIandEdgeAI 139
9.3.1.1CentralizedAI 139
9.3.1.2EdgeAI 140
9.3.2OpenChallengesinEdgeAI 141
9.3.3NewParadigm:DistributedAI 142
9.4Technology 143
9.4.1DataOps 143
9.4.1.1StatisticalSummaries 143
9.4.1.2DimensionalityReduction 144
9.4.1.3SamplingfromOriginalSpace 144
9.4.2ModelOps 144
9.4.2.1OODDetectionAlgorithm 145
9.4.2.2Experiments 147
9.4.3OptimizationandAdaptation 147
9.4.3.1ModelPruning 148
9.4.3.2ModelQuantization 148
9.4.3.3OtherSchemes 149
9.4.3.4Experiments:ModelOptimizationforAssetInspection 149
9.4.4FederatedLearning 149
9.4.4.1ResourceEfficiencyofFL 151
9.4.4.2PrivacyConsiderations 151
9.5ResearchDirections 152
9.5.1LearningwithResourceOptimization 152
9.5.2CollaborationAmongHumansandRobots 152
9.5.3Multi-modalLearning 153
9.5.3.1Context-basedMulti-modalSensing 153
9.5.3.2AdaptiveNavigationtoOptimizeSensing 154
9.6Conclusions 155 References 155
10AIEnabledProcessingofEnvironmentalSoundsinCommercialandDefense Environments 161
DavidWood,Jae-wookAhn,SeraphinCalo,NancyGreco,KeithGrueneberg, TadanobuInoue,DineshVerma,andShiqiangWang
10.1Introduction 161
10.1.1Challenges 162
10.1.2SystemOverview 165
10.1.3IoTAcousticsvs.SpeechRecognition 166
10.2UseCases 166
10.2.1DefenseUseCases 166
10.2.1.1PerimeterDefense 167
10.2.1.2VehicleClassification 167
10.2.1.3ActivationofOtherModalities 167
10.2.1.4FleetandFacilitiesMaintenance 168
10.2.2CommercialUseCases 168
10.2.2.1Manufacturing 168
10.2.2.2VehicleMonitoring 168
10.2.2.3AnimalHusbandry 169
10.2.2.4Healthcare 169
10.2.2.5Security 169
10.3SystemArchitecture 169
10.4Technology 171
10.4.1DataManagementandCuration 171
10.4.2ModelTrainingPipeline 173
x Contents
10.4.3Models 175
10.4.3.1ShallowModels 176
10.4.3.2DeepModels 176
10.4.3.3InferencePerformanceontheEdge 177
10.4.4AnomalyDetection 178
10.4.5ModelDrift 179
10.4.6ModelUpdate/Evolution 180
10.4.7ModelAdaptation 181
10.5Summary 182
References 183
Section3Introduction:Security,Resiliency,andTechnologyfor AdversarialEnvironments 187 AnanthramSwami
11AssurancebyDesignforCyber-physicalData-drivenSystems 191 SatishChikkagoudar,SamratChatterjee,RameshBharadwaj,AuroopGanguly, SastryKompella,andDarleneThorsen
11.1Introduction 191
11.1.1FormalMethodsforSoftwareIntensiveSystems 194
11.1.2AdaptingFormalMethodsforDataDrivenSystems 195
11.2MethodsforAssurance 196
11.2.1ToolsforInformationFreshness 196
11.2.2MethodsforDecisionAssurance 198
11.2.2.1ScenarioGenerationforCPDDSs 198
11.2.2.2ConsequenceAssessmentforCPDDSs 202
11.2.3AssuranceofInterconnectedNetworkedCPDDSs 202
11.2.3.1NetworkRepresentation 204
11.2.3.2DynamicCascadeModeling 205
11.2.3.3Multi-AgentDecisionOptimization 206
11.3DiscussionandConclusion 207 References 208
12VulnerabilitiesinIoTSystems 213 ZhengFangandPrasantMohapatra
12.1Introduction 213
12.1.1IoTSystemComponents 214
12.1.2VulnerabilitiesandThreats 215
12.1.2.1Devices 215
12.1.2.2CommunicationProtocols 216
12.1.2.3IoTApplications 216
12.1.2.4PhysicalMedium 216
12.1.2.5MobileApps 217
12.2Firmware 217
12.2.1UnprotectedNetworkServices 217
12.2.2UnprotectedFirmwareUpdating 218
12.2.3BufferOverflow 219
13.3.1.1PortScanning 243
13.3.1.2Telnet/SSH/HTTPBruteforce 244
13.3.1.3SYN/ACK/UDP/HTTPFlooding 244
13.3.2IoT-specificNetwork-layerAttacks 244
13.3.2.1HelloFloodAttack 244
13.3.2.2NeighborAttack 244
13.3.2.3DISAttack 244
13.3.2.4SinkholeAttack 244
13.3.2.5WormholeAttack 244
13.3.2.6Grayhole(orSelectiveForwarding)Attack 244
13.3.3IoT-specificApplication-layerAttacks 245
13.3.3.1CONNECT/CONNACKFlooding 245
13.3.3.2CoAPRequest/ACKFlooding 245
13.4ProposedIDSesforIoT 245
13.4.1DefinitionofNormal/AbnormalBehavior 245
13.4.1.1LegitimateIPAddresses 245
13.4.1.2Threshold 246
13.4.1.3Automata 247
13.4.1.4FederatedLearning 248
13.4.2EnhancementsofML-basedDetectors 249
13.4.2.1CompressionHeaderAnalyzerIntrusionDetectionSystem(CHA-IDS) 249
13.4.2.2E-Spion 249
13.4.2.3Deeplearning-basedIDS(DL-IDS) 249
13.4.2.4MulticlassClassificationProcedure 249
13.4.2.5Discussion 249
13.4.3LightweightDetectorImplementation 250
13.4.3.1RaspberryPiIDS(RPiDS) 250
13.4.3.2PassbanIDS 250
13.4.3.3Discussion 250
13.4.4CombinationofDiverseDetectors 250
13.4.4.1IDSwithGame-theoreticMethodology 251
13.4.4.2HybridIntrusionDetectionandPreventionSystem(IDPS) 251
13.4.4.3IDPS 251
13.4.4.4Discussion 251
13.4.5OptimalDetectorSelection 252
13.4.5.1Kalis 252
13.4.5.2Reinforcementlearning-basedIDS(RL-IDS) 252
13.4.5.3Discussion 252
13.5ResearchDirections 252
Acknowledgement 254 References 255
14BringingIntelligenceattheNetworkDataPlaneforInternetofThings Security 259
QiaofengQin,KonstantinosPoularakis,andLeandrosTassiulas
14.1Introduction 259
14.2RelatedWork 262
15.5.1.5OpenOpportunities 297
15.5.2ByzantineFault-tolerantDistributedComputing 298
15.5.2.1OpenOpportunities 299
15.5.3GreyResourceAccumulation 300
15.5.3.1OpenOpportunities 301
15.5.4CryptographicApproaches 301
15.5.4.1OpenOpportunities 302
15.5.5SecureComputationwithTrustedExecutionEnvironments 302
15.5.5.1OpenOpportunities 302
15.6Summary 302
Acknowledgment 303
References 303
16EnsuringtheSecurityofDefenseIoTThroughAutomaticCode Generation 307
M.DouglasWilliamsandRobertDouglass
16.1TheChallengeofIoTinDefenseandNationalSecurityApplications: TheChallenge 307
16.2Solutions 308
16.2.1ControltheInterfacesBetweenIoTElements 309
16.2.2ProblemswithTraditionalApproachestoMalwareProtection 309
16.2.3TraditionalApproachestoSecurity:Hardware 309
16.2.4TraditionalApproachestoSecurity:Simulation 310
16.2.5TraditionalApproachestoSecurity:Software 310
16.2.5.1CodingWeaknesses,SoftwareVulnerabilitiesandMalware 310
16.2.5.2TraditionalApproachesforProtectingIoTSoftware 311
16.2.5.3ImprovementsonTraditionalSoftwareApproaches 311
16.2.6Auto-codeGenerationforVulnerability-freeIoT 312
16.2.6.1ApplyingAuto-codeGenerationSelectivelyforIoTNetworkSecurity 312
16.2.6.2APracticalApproachtoGeneratingVulnerability-freeIoTNetworks 312
16.3AutomaticCodeGeneration 312
16.3.1CoreAuto-generationEngine 314
16.3.2SemanticDefinitionsofSoftwareFunctions 314
16.3.3FormalMethodsforVerifyingSemanticDefinitions 316
16.3.3.1StaticAnalysisforVerifyingCodeGeneratorProducesVulnerability-freeCode 317
16.3.4AnExtendedExample:AutomaticGenerationofRouterSoftware 319
16.4IoTInterface-codeIssuingAuthority 319
16.4.1RoleofIoTInterface-codeAuthority(IICA) 320
16.4.2PrecedentsandExamplesandaProposedIoTInterfaceCodeAuthority 320
16.5Conclusions 321
References 322
Section4Introduction:CommunicationsandNetworking 325 KeithGremban
17LeveragingCommercialCommunicationsforDefenseIoT 327 KeithGrembanandPaulJ.Kolodzy
17.1Introduction 327
17.2KeyDifferencesBetweenDefenseandCommercialCommunications Requirements 329
17.2.1Interoperability 329
17.2.2Mobility 330
17.2.3Security 330
17.2.4Vulnerability 331
17.3KeyDifferencesBetweenDefenseandCommercialTechnologyDevelopment 332
17.4CommercialCommunicationsforUseinDefenseandHomelandSecurity 334
17.5Conclusion 337
References 337
18MilitaryIoT:TacticalEdgeCloudsforContentSharingAcrossHeterogeneous Networks 339 TimStrayer,SamNelson,DanCoffin,BishalThapa,JoudKhoury,ArmandoCaro, MichaelAtighetchi,andStephaneBlais
18.1Introduction 339
18.2TheNeedforTacticalEdgeClouds 341
18.3TwoArchitectures 342
18.3.1ArchitectureParadigm1:DARPACBMEN 342
18.3.2ArchitectureParadigm2:DARPADyNAMO 345
18.4TacticalEdgeCloudArchitecturalInsights 347
18.4.1InformationGenerationandDiscovery 347
18.4.2InformationAvailability 349
18.4.3ControllingAccess 349
18.4.4InformationQualityofService 350
18.4.5InformationImportance 350
18.5Summary 351 Acknowledgment 351 References 351
19SpectrumChallengesintheInternetofThings:StateoftheArtand NextSteps 353 FrancescoRestuccia,TommasoMelodia,andJonathanAshdown
19.1Introduction 353
19.2SpectrumBandsofInterestintheInternetofThings 356
19.2.1Low-bandsandMid-bands 356
19.2.1.1Millimeter-WaveBands 357
19.2.1.2VisibleLightandCommunicationsAbove100GHz 357
19.3SpectrumManagementintheInternetofThings:RequirementsandExisting Work 358
19.4SpectrumManagementintheInternetofThings:TheWayAhead 360
19.4.1ProtectingPassiveandIncumbentUsersfromIoTInterferencein SharedBands 360
19.4.2ExperimentalSpectrumSharingatScaleThroughtheColosseumandNSFPAWR Testbeds 362
19.4.3RobustMachineLearningforEffective,ReliableandEfficientSpectrum Management 363
19.4.4TheRoleofO-RANinSpectrumSharing 365
21.2.1.1TheNeedandBasisforanIoTFrameworktoProtectHumanRights 433
21.2.1.2ConsentbythePublicandtheGoverned 434
21.2.1.3Transparency:TheFoundationofConsent 436
21.2.1.4AccountabilityandConsequences 437
21.2.1.5SecurityandIntegrity 439
21.3TypesofAbuseandMisuse,andPreventionThroughRegulation 440
21.3.1TypesofAbuseofIoT 440
21.3.1.1Type1Abuse:IllegalorUnethicalAbusebyIndividualsorOrganizations 440
21.3.1.2Type2Abuse:LegalAbuseofIoTWithoutConsentorBenefittoUsersorOwners 443
21.3.1.3Type3Abuse:GovernmentAbuseWhileUsingIoTforPublicDefense,Health,Safety, andWellbeing 449
21.3.1.4Type4Abuse:GovernmentUseofIoTtoEnhanceItsOwnPowerandEnrich Officials 453
21.3.2RegulatingIoTtoPreventAbuseWhileAdvancingItsBenefits 454
21.3.2.1TheRighttoLimitandRegulateIoT 454
21.3.2.2RegulatingIoT:ASummary 457
21.4ConcludingRemarks:ACalltoAction 457
References 458 Index 467
ListofContributors
TarekAbdelzaher DepartmentofElectricalandComputer Engineering
UniversityofIllinoisatUrbana-Champaign Urbana IL USA
Jae-wookAhn IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
JonathanAshdown AirForceResearchLaboratory Rome NY USA
MichaelAtighetchi RaytheonBBN Cambridge MA USA
NathanielD.Bastian ArmyCyberInstitute UnitedStatesMilitaryAcademy WestPoint NY USA
LuisBathen IBMResearch–Almaden IBM
SanJose CA USA
ChristinaBaxter EmergencyResponseTIPS LLC MelbourneBeach FL USA
GiseleBennett MEPSSLLC IndianHarbourBeach FL USA
ElisaBertino DepartmentofComputerScience PurdueUniversity WestLafayette IN USA
RameshBharadwaj InformationTechnologyDivision U.S.NavalResearchLaboratory Washington DC USA
xx ListofContributors
StephaneBlais RaytheonBBN
Cambridge MA
USA
KyleBroadway ChiefTechnologyOfficer ArmamentsResearchCompany UniversityofMissouri Columbia MO USA and JohnsHopkinsUniversity Baltimore USA
JonathanBunton DepartmentofElectricalandComputer Engineering UniversityofCalifornia LosAngeles CA USA
SeraphinCalo IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
ArmandoCaro RaytheonBBN Cambridge MA USA
SamratChatterjee
DataSciences&MachineIntelligenceGroup PacificNorthwestNationalLaboratory Richland WA
USA
SatishChikkagoudar InformationTechnologyDivision U.S.NavalResearchLaboratory Washington DC
USA
ShyamaProsadChowdhury IBMGBS
IBMIndia
Kolkata WB India
DanCoffin RaytheonBBN Cambridge MA USA
WilliamCrowder LogisticsManagementInstitute Tyson VA USA
NirmitDesai IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
VicenteDiaz-Casas GrupoIntegradodeIngenierÍa CITENI
CampusIndustrialdeFerrol UniversidadedaCoruña Ferrol Spain
RobertDouglass AltaMontes Sandy UT USA
TadanobuInoue
IBMResearch
IBMJapan Chuo-ku Tokyo Japan
SusmitJha Neuro-symbolicComputingandIntelligence CSL
SRIInternational MenloPark CA USA
DhirajJoshi IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
JoudKhoury RaytheonBBN Cambridge MA USA
PaulJ.Kolodzy KolodzyConsulting,LLC FallsChurch VA USA
SastryKompella InformationTechnologyDivision U.S.NavalResearchLaboratory Washington DC USA
BhaskarKrishnamachari DepartmentofElectricalandComputer Engineering UniversityofSouthernCalifornia LosAngeles CA USA HyunwooLee DepartmentofComputerScience PurdueUniversity WestLafayette IN USA
Wei-HanLee IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
NinghuiLi DepartmentofComputerScience PurdueUniversity WestLafayette IN USA
TommasoMelodia DepartmentofElectricalandComputer Engineering NortheasternUniversity Boston MA USA
SteveMorgan ChiefTechnologyOffice RaftLLC Herndon VA USA
PrasantMohapatra DepartmentofComputerScience UniversityofCalifornia Davis CA USA
AnandMudgerikar DepartmentofComputerScience
PurdueUniversity WestLafayette IN USA
AliciaMunin-Doce GrupoIntegradodeIngenierÍa CITENI
CampusIndustrialdeFerrol UniversidadedaCoruña Ferrol Spain
SamNelson RaytheonBBN Cambridge MA USA
KonstantinosPoularakis DepartmentofElectricalEngineering& InstituteforNetworkScience
YaleUniversity NewHaven CT USA
FrancescoRestuccia DepartmentofElectricalandComputer Engineering
NortheasternUniversity Boston MA USA
ListofContributors
StephenRussell DepartmentofResearchOpportunitiesand Innovation
JacksonHealthSystem Miami FL USA
QiaofengQin DepartmentofElectricalEngineering& InstituteforNetworkScience
YaleUniversity
NewHaven CT USA
GowriSankarRamachandran SchoolofComputerScience QueenslandUniversityofTechnology
Brisbane Queensland Australia
LucíaSantiagoCaamaño GrupoIntegradodeIngenierÍa CITENI
CampusIndustrialdeFerrol UniversidadedaCoruña Ferrol Spain
TimStrayer RaytheonBBN Cambridge MA USA
AnanthramSwami U.S.ArmyDEVCOMArmyResearch Laboratory
U.S.ArmyFuturesCommand Adelphi MD USA
PauloTabuada
DepartmentofElectricalandComputer
Engineering UniversityofCalifornia LosAngeles CA USA
LeandrosTassiulas
DepartmentofElectricalEngineering& InstituteforNetworkScience YaleUniversity NewHaven CT USA
BishalThapa RaytheonBBN Cambridge MA USA
DarleneThorsen
DataSciences&MachineIntelligenceGroup PacificNorthwestNationalLaboratory Richland WA USA
VenugopalVeeravalli
ECEDepartment UniversityofIllinoisatUrbana-Champaign Champaign IL USA
DineshVerma
IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
GunjanVerma
U.S.ArmyDEVCOMArmyResearch Laboratory
U.S.ArmyFuturesCommand Austin TX USA
ShiqiangWang
IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
JaimeWightman ChiefDataandAnalyticsOffice LockheedMartinCorporation
Bethesda MD USA
MaggieWigness
U.S.ArmyDEVCOMArmyResearch Laboratory
U.S.ArmyFuturesCommand Adelphi MD USA
DavidWood
IBMThomasJ.WatsonResearchCenter YorktownHeights NewYork USA
Introduction:IoTforDefenseandNationalSecurity
RobertDouglass
AltaMontes,Inc.,Sandy,Utah,USA
1AnIntroductiontotheTopicofIoTforDefenseandNational Security
TheInternetofThings,IoT,connectsphysicalobjectsthroughdigitalnetworks.Itfusessensors, processors,datastorage,smartalgorithms,andactuatorstoobserveandphysicallyaltertheworld andthepeopleinit.Inthewinterof2022,IoTweaponswieldedbybadlyoutnumberedbut determinedandcourageousUkrainianlightinfantrywonthebattleofKyiv,destroyinghundreds ofRussiantanksandperhapsthousandsofmilitaryvehiclesalongwiththeRussiansoldiersin them.Javelinanti-tankmissilesandSwitchbladeloiteringmissileswereinstrumentalinsecuring Ukraine’svictory.JavelinsarenascentIoTweaponswhileSwitchblademissilesarequintessential IoTsystems.Theymovetheirhumanoperatorsbackfromthemosthazardouscombatzones.They operatewithadiversecollectionofsensorsandactuators,wiredandwirelesstiedtogether.They coordinateandsharetheirattackacrossanetworkconnectingreconnaissancedrones,command nodes,andothersoldiers.Theyfunctionbothasweaponsreceivingoff-boardintelligenceandasa sourceofintelligence.Theyputsoldiersintop-levelsupervisorycontrolwhilemovingthemoutof thereal-timecontrolloop,allowingtheirweaponstofind,track,attack,anddestroytheirtargets inahighlyautonomousmanner.Theyturbochargethetempoofcombat.Theydispelthefogof war.Theysavethelivesoftheiroperators.InthebattleofKyiv,theyhelpwinthefightagainstlong oddsandanoverwhelmingweightofarmor.
IoTisnotnew.Morethanhalfacenturyago,theinternetprotocolswereconceivedastheglueof anIoTsystem,onethatwouldconnectearlywarningsensorsdetectingincomingintercontinental missileswithcommandnodesandsystemsofresponse.Whilethefirstinternetwasnotultimately usedforthisapplication,itsrationalewasclearlythecreationofanetworkofsystemstosenseand respondinanation’sdefense–itwasconceivedasanIoTsystemofsystemsforwar.Realizing thepowerofIoTrequireddecadesofmaturationinfivecoretechnologies:sensors,wireless networkingandcommunication,cloudordistributedcomputing,intelligentalgorithms,and digitallycontrolledactuators.LiketheInternetitself,defenseinvestmentlargelyinventedthese technologiesandtheirunderlyingconceptswhilethemuchgreatercommercialmarketpowered theirexpandedperformanceandreducedtheirsize,weight,power,andespeciallycost.These technologiescontinuetoadvance,buttheyalreadyenableemergingIoTsystemstorealizeavision anticipatedfordecades.Asdescribedbelow,IoTwillrevolutionizewarfare.Itwillrevolutionize hownationssecurethemselvesandmaintainpeace.Thetechnologyisalreadydoingso,although
xxvi Introduction:IoTforDefenseandNationalSecurity
itisnotoftenreferredtoasIoT.Despitetheirimpacttodateandtheirstillgreaterfuturepromise, IoTsystemsusedformilitaryaffairsstillfacemanychallenges–challengesnotfacedorfacedto thesamedegreebycommercialIoT.
Inthecommercialsector,hundredsofbookshavebeenwrittenonIoT.ArguablyIoTtechnology impactsdefenseandnationalsecuritymorethananycommercialdomain;however,notasingle bookexistsonthetopic.Thesubjectisshroudedinsecrecyandgovernmentrestrictions,isolating itfromthepublicrealm.ThisBookprovidesafirstlookatwhatcanbereleased.Leadingscientists andtechnologistsdescribetheirlatestresearchresults.TheyaddressawiderangeoftopicsincludingIoTsecurityinhostileenvironments,artificialintelligence(AI)inIoTfordefense,andtactical networksinadisrupted,intermittent,andlimited-bandwidthbattlefield.Forexample,thisBook explainsthatinsuchaworldIoTcanbesustainedinthecauldronofcombatusingcontent-based routing,configuredwithmobilead-hocnetworksthatridejam-defiantandintercept-resistant electronicallyformedbeams.
ThisbookofferssolutionstospecialchallengesofIoTfordefensethatsetitapartfromthecommercialenvironment.Itenumeratessomeoftheoutstandingandunsolvedtechnicalproblems. ItlooksatseveraldifferentvisionsforthefutureofIoTrangingfromIoT-enabledriflestoentire logisticssystemspoweredbyIoT.Itprovidesseveralcasestudiesbypractitionersinthefieldfrom defensemanufacturingtothedesignofwarships.Itprovidesaroadmapforpolicyandregulation ofgovernmentuseofIoT.ThisBookinnowaypurportstobeacomprehensivereviewofIoT fordefense,fortworeasons.First,noonevolumecanspansuchanextensivedomain.Second, governmentssequestermuchofthematerial.Thisbookpresentsanintroductiontothesubject–a samplingofitsmanyaspects.Thepublicremainslargelyunawareoftheseissues,buttheyare criticallyimportanttogovernmentsandindividualswhoareprotectedbyIoTsystemsandin placesoppressedbythem.
Sections1to4ofthisBookassumesomepriorknowledgeofIoT.ForIoTneophytesorthose whowantmorebackgroundandcontextontheelementsofIoTfordefenseandnationalsecurity, thefirstpartofChapter21providesthatintroduction,andthebeginnermightwanttostartthere. Section1ofthisBookpresentsasamplingofchallenges,applications,andopportunitiesforIoT usedfordefense.Section2reviewstheroleofAIinIoTfordefenseandaddressesselectedcase studiesandkeychallengesassociatedwithAI-basedIoT.Section3discussessecurityissuesand solutionsforoperatingdistributedIoTnetworksinadversarialenvironments.Section4addresses thekeychallengeofprovidingIoTsystemswithreliablecommunicationsandnetworkingin mobile,dynamic,andhostileenvironments.Ithighlightsdifferingrequirementsbetweendefense andcommercialIoTandsuggesthowonemightbuildontheother.ThefinalChapter,21, addressesissuesofregulatingIoTtoadvanceitsusewhileblockingitsmisuseandabuse.
2WhatIsIoT?
Asarevolutionintechnology,IoTrivalstheInternetonwhichitdepends.Itisnotjustanother applicationridingontheInternet,butafundamentaladvanceintechnology.Itcanautomateour world.IoTsensestheworld,analyzesthedatainthelightofmissionrequirements,andthentakes actionsthataffectthephysicalworld.Thisisunique–closingtheloopautomaticallyinthephysical world.Theonlysimilartechnologyconsistsofcontrolsystems.Insomesense,IoTisacontrolsystemfortheworld.IoTcombinesthreeelements–sensingandinformationextraction,processing, andaction.Theseelementsrideontopofdigitalcommunicationandnetworking,aninfrastructure thathasbecomecheaper,smaller,andevergreaterincapacity,especiallywiththeadventof5G wirelesstechnology.IoTgoesbeyondsensingandprocessinginformation.Itfusesthetechnology