Professional Documents
Culture Documents
Defence Technology Based On IOT
Defence Technology Based On IOT
Defence Technology Based On IOT
Abstract:
Military commanders have always lived and died by information—both quantity and
quality. Current military operations are focused at a difficult, multifaceted, deeply
distinctive, and challenging state – some with unanticipated accomplices and occasional
foes. Military commanders work at a solid time and high rhythms of operation. But the
IOT (Internet of Things) brings with it organizational and security challenges that
present both opportunities and obstacles. Internet of Things (IoT) describes the use of
connected sensors and actuators to control and monitor the environment, the things
that move within it, and the people that act within it. The military may become more
efficient and effective by integrating sensor systems, actuators, and control systems
with current military infrastructures.
Keywords: IOT (Internet of Things), Military, sensors, actuators, military
infrastructures.
INTRODUCTION:
IoT, with its ability to capture and analyse data to generate insights, is emerging as an enabling
technology for defence in Australia, which is currently undergoing the most significant re-equipment
since World War II. While defence was a driver of technological developments such as GPS up until
the 1960s and 1970s, private commerce is driving the development of technologies such as IoT, and
defence is positioning itself to leverage these technologies for its operations. This raises concerns
about reliability and security of commercially sourced devices and communications networks.
A major application is in national security, where defence will increasingly rely on IoT, and
advanced and autonomous systems to protect society from threats such as terrorism. Data and digital
warfare, intelligent bases, and maintaining the health and wellbeing of personnel are also areas where
IoT solutions could be beneficial.
In order for defence to take full advantage of IoT, it will need to update approaches to management
and acquisition frameworks as well as considering the technical aspects of solutions.
Fig.1:IOT in Defence
Researchers from all over the globe have proposed different methodology based on IoT as well as
considering different factors influencing the working of those application. This paper does the study
of this applications and their effectiveness in actual implementation.
Along with the applications, security issues of this application is also an important concern. The
protocols involved in such as -
• 6LOWPAN
• MQTT (Message Queue Telemetry Transport) COAP (Constrained Application Protocol)
• Bluetooth and Bluetooth Low Energy
• Wi-Fi Zigbee
• RFID
• LoRa
With the Connected Devices architecture or its autonomous presence within the closed loop network
of devices, IoT has already impacted several sectors. Many countries in military and defence
applications are seeking to use the IoT as a means of addressing various issues in war and fighting.
Below, there are distinct IoT defence and military applications areas that have been highlighted.
The Internet of Things (IoT) in the defence industry, also known as the Internet of Military Things
(IoMT) or Internet of Battlefield Things (IoBT), is in its early stages.
Below are some of the key technology trends impacting the IoMT theme over the next 12 to 24
months, as identified by GlobalData.
• AI and analytics:
AI is a key element for the optimal use of IoMT, as it allows for more efficient analysis of the vast
amounts of data that flow at a high rate from an increasingly large number of edge devices.
Big data analytics can scan through a larger volume of data and at the same time reduce the
associated noise using AI technologies, such as machine learning. Logistics, support and
maintenance hugely benefit from big data analytics.
Predictive or condition-based maintenance can reduce costs and increase the availability of
platforms. Depending on the customer and their security concerns, as well as the available industrial
capabilities IoMT, in conjunction with big data analytics and performance-based logistics (PBL), is a
highly-promising combination for the defence industry.
AI still experiences issues related to causality. For example, machines still cannot always tell the
difference between a man holding a baseball bat and a weapon, and, if it does come up with an
answer, it cannot always explain why. That is an extremely important aspect especially for the
security domain, where unmanned systems with AI technology, especially when operating in
swarms, could eventually carry out their missions near civilians and civilian assets.
In terms of the moral dilemmas posed, people are very reluctant to have in their vicinity an
unmanned system that could decide for itself what or who consists a threat, even if the accuracy rate
of the algorithm is the highest possible.
Many defence contractors already offer their solutions for OSINT analysis and systems’ health
monitoring, which are also available to the civilian market as well. Examples of such companies are
Northrop Grumman, Lockheed Martin, Boeing, ESRI, and Palantir Technologies.
• Sensors:
Sensor technology is evolving fast. EO/IR sensors, radar, sonars, motion or sound detectors have
their capabilities augmented as the technology they incorporate improves. For example, EO/IR can
see further, at much tougher climatic and atmospheric conditions, whether it is day or night,
compared to just a few years ago.
Phased-array radars can multi-task, simultaneously collecting intelligence in the land, maritime or air
domains without losing range coverage or accuracy. Moreover, subcomponent technology allows
those sensors to be manufactured in miniature, allowing their integration in a multitude of platforms.
The sensors domain does not only include the aforementioned examples (radar, sonar, etc.). During
the last few years, the defence industry has been developing highly technological sensors that are
able to monitor a system’s health status. These tools do more than simply alert the operator of a
platform to a malfunction. They combine sensor input and data analytics to offer predictive analytics
data for failures or malfunctions long before they appear.
Spending on logistics, in the form of spare parts and life-cycle costs, will be reduced as users will be
able to streamline their logistical supply chain, while at the same time increasing the availability of
systems and platforms.
Considering that IoMT is based on the existence of a safe, secure, and capable network, powerful
processors will remain a core component for processing big data at a fast pace. Moreover, with data
being transmitted wirelessly through radio communication systems, transmitters need to be capable
of transmitting larger volumes of data further and faster.
• Data storage:
The defence industry is working on a variety of solutions aimed at tackling the technical issues
related to the storage of large volumes of data. Many private companies, including Amazon, are
offering storage solutions to government users, including the US DoD. However, a data storage
capability for combat operations will have to comply with many technical specifications and would
probably have to be separate from purely COTS solutions.
In the civilian market, IoT is becoming the next cloud battleground. Amazon, Google, Microsoft,
Alibaba and IBM are vying with each other to provide the cloud infrastructure that will connect and
run the world’s connected things.
Various IoT-specific cloud services have been launched to enable fast and efficient data storage and
processing in the cloud, mainly on infrastructure as a service (IaaS), but also on platform as a service
(PaaS) solutions. Vendors are increasingly looking to verticalise these to attract industry-specific
workloads.
• Security:
Security presents one of the most critical obstacles to IoT deployment. However, in providing
security solutions, suppliers have had trouble going beyond their traditional domains. For example,
operators’ IoT security offers have mostly been about device authentication and network reliability.
Clearly, breaches can occur at the device level, network level, app-level, storage level, and data
level. There is some work in progress to help vendors and operators come together.
IOT PROTOCOLS:
The IoT system can only operate and transfer data online if the two devices are linked securely from
the communication network. Some of these protocols are namely 6LoWPAN, MQTT, COAP,
Bluetooth, Wi-Fi, LoRa, RFID etc that are included in IOMT.
• 6LoWPAN is a somewhat contorted acronym that combines the latest version of the Internet
Protocol (IPv6) and Low-power Wireless Personal Area Networks (LoWPAN). 6LoWPAN,
therefore, allows for the smallest devices with limited processing ability to transmit
information wirelessly using an internet protocol. It’s the newest competitor to ZigBee.
• MQTT is known as Message Queuing Telemetry Transport protocol. It is a lightweight
messaging protocol and helps resource constrained network clients with a simple
communication mechanism. Unlike, most messaging system, we don’t have to assign
addresses to MQTT clients. MQTT uses simple publish/subscribe communication based on a
topic.
• CoAP stands for Constrained Application Protocol, and it is defined in RFC 7252. CoAP is a
simple protocol with low overhead specifically designed for constrained devices (such as
microcontrollers) and constrained networks. This protocol is used in M2M data exchange and
is very similar to HTTP, ...etc.
• Bluetooth network technology connects mobile devices wirelessly over a short-range to form
a personal area network (PAN). The Bluetooth architecture has its own independent model
with a stack of protocols, instead of following the standard OSI model or TCP/IP model.
• Wi-Fi is a wireless networking protocol that allows devices to communicate without direct
cable connections. It's technically an industry term that represents a type of wireless local
area network protocol based on the 802.11 IEEE network standard.
• LoRa, essentially, is a clever way to get very good receiver sensitivity and low bit error rate
(BER) from inexpensive chips. That means low-data rate applications can get much longer
range using LoRa rather than using other comparably priced radio technologies.
• RFID stands for Radio Frequency Identification. It’s a system of data communication
whereby data stored in an RFID asset label is transferred to an RFID reader through radio
waves. Unique radio waves emitted by the tag allows the reader to identify individual assets.
Similarly, arms, ammunition, and unmanned equipment can also be tracked using sensors. Integrating
sensors into weapons can help the soldiers know when to reload. Unmanned equipment can be tracked
and monitored during spying and surveillance the enemy grounds.
5. Smart Bases:
Conclusion:
With the increasing anti-military activities, the use of IoT in the military and defence has become a
necessity. Integrating IoT into existing military and defence infrastructures can help them become
more efficient and effective and can significantly reduce combat losses in lives and equipment.
Incorporating IoT into any kind of operation such as battlefield combat, spying an enemy base, or
search and rescue. Combining IoT with Machine Learning can further help the military and defence
in getting critical insights into the battlefield in real-time, enabling them to carry out a successful
operation.