RSS feed Add to your Facebook page LinkedIn Watch us on Youtube

Activity title

Military Applications of Internet of Things

Activity Reference

IST-147 (COM)

Panel

IST

Security Classification

NATO UNCLASSIFIED

Status

Awaiting Publication

Activity type

RTG

Start date

2016-04-19T00:00:00Z

End date

2019-04-19T00:00:00Z

Keywords

Integration of Heterogeneous Networks, Internet of Things, MachinetoMachine Communications, Object Level Protection, Security in IoT, Situational Awareness, Trust Management

Background

The Internet of Things (IoT) is rapidly emerging world-wide technology with a focus on civilian applications. Equipment used by the military is expected to increasingly include processing and communication abilities. The military has plenty of sensors connected through an extensive network infrastructure, but few systems leverage the full IoT stack. The integration of heterogeneous sensors and systems diverse in technology, environmental constraints and levels of fidelity is a challenging issue. In order to accomplish full integration, the security risks and mitigation measures, including for example relevant security mechanisms, protocol adaptions and scalability properties, must be considered.

Objectives

1. To demonstrate through proof of concept trials the value of application of the Internet of Things (IoT) in militarily significant situations. 2. To define an IoT architecture or architectures that might be used in military situations taking into account existing IoT architectures used in other domains. 3. To identify the risks associated with the use of commercial IoT technology in the military domain, and identify possible mitigations or open challenges. 4. To create a network on the topic of military aspects of IoT, including activities of other STO panels studying related topics, NATO bodies, academia, industries (including SMEs), and EU and nationally funded initiatives.

Topics

1. A scenario will be selected that will examine applicability of IoT to military topics, such as: • base operations, • situational awareness, • boundary surveillance including harbour, • energy management, and etc. 2. The risk of applying IoT technologies in the scenario will be assessed. Based on this risk assessment, models for security and trust management that address the most significant risks will be proposed. Mitigation measures may include: • Managing identity, credentials and rights of IoT devices and users; • Object level protection and trust; and • Assessment of available or emerging commercial security solutions. 3. Communications requirements needed to support IoT will be identified. Proposals for communications architectures, including consideration of: • Integration including machine-to-machine aspects, • robustness, and • scalability. 4. Technologies required to exploit IoT, such as data fusion, big data or other techniques will be considered as required to support the other topics

Contact Panel Office