|
|
| Activity title | Military Applications of Internet of Things | Activity Reference | IST-147 (COM) | Panel | IST | Security Classification | NATO UNCLASSIFIED | Status | Awaiting Publication | Activity type | RTG | Start date | 2016-04-19T00:00:00Z | End date | 2019-04-19T00:00:00Z | Keywords | Integration of Heterogeneous Networks, Internet of Things, MachinetoMachine Communications, Object Level Protection, Security in IoT, Situational Awareness, Trust Management | Background | The Internet of Things (IoT) is rapidly emerging world-wide technology with a focus on civilian applications. Equipment used by the military is expected to increasingly include processing and communication abilities. The military has plenty of sensors connected through an extensive network infrastructure, but few systems leverage the full IoT stack. The integration of heterogeneous sensors and systems diverse in technology, environmental constraints and levels of fidelity is a challenging issue. In order to accomplish full integration, the security risks and mitigation measures, including for example relevant security mechanisms, protocol adaptions and scalability properties, must be considered. | Objectives | 1. To demonstrate through proof of concept trials the value of application of the Internet of Things (IoT) in militarily significant situations.
2. To define an IoT architecture or architectures that might be used in military situations taking into account existing IoT architectures used in other domains.
3. To identify the risks associated with the use of commercial IoT technology in the military domain, and identify possible mitigations or open challenges.
4. To create a network on the topic of military aspects of IoT, including activities of other STO panels studying related topics, NATO bodies, academia, industries (including SMEs), and EU and nationally funded initiatives.
| Topics | 1. A scenario will be selected that will examine applicability of IoT to military topics, such as:
• base operations,
• situational awareness,
• boundary surveillance including harbour,
• energy management, and etc.
2. The risk of applying IoT technologies in the scenario will be assessed. Based on this risk assessment, models for security and trust management that address the most significant risks will be proposed. Mitigation measures may include:
• Managing identity, credentials and rights of IoT devices and users;
• Object level protection and trust; and
• Assessment of available or emerging commercial security solutions.
3. Communications requirements needed to support IoT will be identified. Proposals for communications architectures, including consideration of:
• Integration including machine-to-machine aspects,
• robustness, and
• scalability.
4. Technologies required to exploit IoT, such as data fusion, big data or other techniques will be considered as required to support the other topics
| | Contact Panel Office |
| |
|
|
|