Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments
IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies.
As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base.
Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: - Changes in warfare driven by IoT weapons, logistics, and systems - IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) - Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference - Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them - Adapting rapidly expanding commercial IoT to power IoT for defense
For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.
Table of Contents
List of Contributors xix
Introduction: IoT for Defense and National Security xxv
Robert Douglass
Section 1 Introduction: Vision, Applications, and Opportunities 1
Stephan Gerali
1 Internet of Battlefield Things: Challenges, Opportunities, and Emerging Directions 5
Maggie Wigness, Tarek Abdelzaher, Stephen Russell, and Ananthram Swami
1.1 IoBT Vision 5
1.2 IoBT vs. IoT 6
1.3 IoBT Operational Requirements 7
1.5 Performant and Resilient IoBTs 13
1.6 Future Directions 16
1.7 Conclusion 19
References 20
2 Sensorized Warfighter Weapon Platforms: IoT Making the Fog of War Obsolete 23
Kyle Broadway
2.1 Introduction 24
2.2 IoT for Firearms 26
2.3 New Insights into the Battlefield Provided by IoT 27
2.4 Challenges for IoT in Soldier Weapons 31
2.5 Battlefield Challenges to Aggregating and Exfiltrating Data 32
2.6 Protection and Security for IoT Data Communication 34
2.7 State of the Art 37
2.8 Conclusion 37
References 38
3 IoBT Resource Allocation via Mixed Discrete and Continuous Optimization 39
Jonathan Bunton and Paulo Tabuada
3.1 Introduction 39
3.2 Lattices and Submodular Functions 42
3.3 Problem Formulation 43
3.4 An Equivalent Parameterization 44
3.5 Returning to Constraints 47
3.6 Computational Examples 50
3.7 Conclusions 55
References 55
4 Operationalizing IoT Data for Defense and National Security 59
Steve Morgan and Jaime Wightman
4.1 Introduction 59
4.2 Problem Statement 60
4.3 Challenges 62
4.4 Security Considerations 64
4.5 Developing a Strategy for Operationalizing Data 65
4.6 Precedence 69
4.7 End State 70
4.8 Conclusion 71
References 71
5 Real Time Monitoring of Industrial Machines using AWS IoT 73
Stephan Gerali
5.1 Problem Statement 73
5.2 Solution Statement - Overview 74
5.3 Solution Statement - Edge Computing 74
5.4 Solution Statement - Cloud Connectivity 75
5.5 Solution Statement - Streaming Analytics and Data Storage 76
5.6 Solution Statement - Data Visualization 77
5.7 Solution Statement - Example Data Visualizations 78
5.8 Results 79
5.9 Next Steps 79
References 80
6 Challenges and Opportunities of IoT for Defense and National Security Logistics 83
Gisele Bennett, William Crowder, and Christina Baxter
6.1 Introduction 83
6.2 Linking Industry and DoD Uses of IoT 84
6.3 Situational Awareness 85
6.4 Applications for DoD 86
6.5 Observations on the Future 93
Acknowledgement 94
References 94
7 Digital Twins for Warship Systems: Technologies, Applications and Challenges 97
Sara Ferreno-Gonzalez, Alicia Munin-Doce, Marcos Míguez González, Lucía Santiago Caamaño, and Vicente Diaz-Casas
7.1 Introduction 97
7.2 A Digital Twin Architecture for Implementation 99
7.3 Ship Digital Twin Implementation 108
References 111
Section 2 Introduction: Artificial Intelligence and IoT for Defense and National Security 115
Robert Douglass
8 Principles of Robust Learning and Inference for IoBTs 119
Nathaniel D. Bastian, Susmit Jha, Paulo Tabuada, Venugopal Veeravalli, and Gunjan Verma
8.1 Internet of Battlefield Things and Intelligence 119
8.2 Dimensions of Responsible AI 120
8.3 Detecting Surprise: Adversarial Defense and Outlier Detection 123
8.4 Novel Deep Learning Representation: Dynamical System 124
8.5 Robust Secure State Estimation 125
8.6 Distributionally Robust Learning 126
8.7 Future Directions 127
8.8 Conclusion 128
References 128
9 AI at the Edge: Challenges, Applications, and Directions 133
Dhiraj Joshi, Nirmit Desai, Shyama Prosad Chowdhury, Wei-Han Lee, Luis Bathen, Shiqiang Wang, and Dinesh Verma
9.1 Introduction 133
9.2 IoT Applications 134
9.3 Distributed AI Architecture 138
9.4 Technology 143
9.5 Research Directions 152
9.6 Conclusions 155
References 155
10 AI Enabled Processing of Environmental Sounds in Commercial and Defense Environments 161
David Wood, Jae-wook Ahn, Seraphin Calo, Nancy Greco, Keith Grueneberg, Tadanobu Inoue, Dinesh Verma, and Shiqiang Wang
10.1 Introduction 161
10.2 Use Cases 166
10.3 System Architecture 169
10.4 Technology 171
10.5 Summary 182
References 183
Section 3 Introduction: Security, Resiliency, and Technology for Adversarial Environments 187
Ananthram Swami
11 Assurance by Design for Cyber-physical Data-driven Systems 191
Satish Chikkagoudar, Samrat Chatterjee, Ramesh Bharadwaj, Auroop Ganguly, Sastry Kompella, and Darlene Thorsen
11.1 Introduction 191
11.2 Methods for Assurance 196
11.3 Discussion and Conclusion 207
References 208
12 Vulnerabilities in IoT Systems 213
Zheng Fang and Prasant Mohapatra
12.1 Introduction 213
12.2 Firmware 217
12.3 Communication Protocols 219
12.4 IoT Apps 224
12.5 Physical Dependencies 226
12.6 Companion Mobile Apps 227
12.7 Hardware 228
12.8 IoT Platforms 229
12.9 Countermeasures 230
12.10 Conclusions 231
References 231
13 Intrusion Detection Systems for IoT 237
Hyunwoo Lee, Anand Mudgerikar, Ninghui Li, and Elisa Bertino
13.1 Introduction 237
13.2 Background 238
13.3 IoT Attack Scenarios 243
13.4 Proposed IDSes for IoT 245
13.5 Research Directions 252
Acknowledgement 254
References 255
14 Bringing Intelligence at the Network Data Plane for Internet of Things Security 259
Qiaofeng Qin, Konstantinos Poularakis, and Leandros Tassiulas
14.1 Introduction 259
14.2 Related Work 262
14.3 System Design 263
14.4 Problem Modeling 266
14.5 Algorithms and Learning Models 267
14.6 Evaluation Results 271
14.7 Conclusions and Future Challenges 280
Acknowledgment 281
References 281
15 Distributed Computing for Internet of Things Under Adversarial Environments 285
Gowri Sankar Ramachandran, Luis A. Garcia, and Bhaskar Krishnamachari
15.1 Introduction 285
15.2 Distributed Computing for IoT in Defense Applications 287
15.3 Threat Model 288
15.4 Frameworks for Distributed Computing 291
15.5 Establishing Trust in Adversarial Environments: Solutions and Open Opportunities 295
15.6 Summary 302
Acknowledgment 303
References 303
16 Ensuring the Security of Defense IoT Through Automatic Code Generation 307
M. Douglas Williams and Robert Douglass
16.1 The Challenge of IoT in Defense and National Security Applications: The Challenge 307
16.2 Solutions 308
16.3 Automatic Code Generation 312
16.4 IoT Interface-code Issuing Authority 319
16.5 Conclusions 321
References 322
Section 4 Introduction: Communications and Networking 325
Keith Gremban
17 Leveraging Commercial Communications for Defense IoT 327
Keith Gremban and Paul J. Kolodzy
17.1 Introduction 327
17.2 Key Differences Between Defense and Commercial Communications Requirements 329
17.2.1 Interoperability 329
17.2.2 Mobility 330
17.2.3 Security 330
17.2.4 Vulnerability 331
17.3 Key Differences Between Defense and Commercial Technology Development 332
17.4 Commercial Communications for Use in Defense and Homeland Security 334
17.5 Conclusion 337
References 337
18 Military IoT: Tactical Edge Clouds for Content Sharing Across Heterogeneous Networks 339
Tim Strayer, Sam Nelson, Dan Coffin, Bishal Thapa, Joud Khoury, Armando Caro, Michael Atighetchi, and Stephane Blais
18.1 Introduction 339
18.2 The Need for Tactical Edge Clouds 341
18.3 Two Architectures 342
18.4 Tactical Edge Cloud Architectural Insights 347
18.5 Summary 351
Acknowledgment 351
References 351
19 Spectrum Challenges in the Internet of Things: State of the Art and Next Steps 353
Francesco Restuccia, Tommaso Melodia, and Jonathan Ashdown
19.1 Introduction 353
19.2 Spectrum Bands of Interest in the Internet of Things 356
19.3 Spectrum Management in the Internet of Things: Requirements and Existing Work 358
19.4 Spectrum Management in the Internet of Things: The Way Ahead 360
19.5 Conclusions 366
References 367
20 Tactical Edge IoT in Defense and National Security 377
Paula Fraga-Lamas and Tiago M. Fernández-Caramés
20.1 Introduction 377
20.2 Background 378
20.3 Compelling COTS Edge IoT Applications 382
20.4 Target Scenarios for Tactical Edge IoT 382
20.5 Communications Architecture 386
20.6 Main Challenges and Recommendations 388
20.7 Conclusions 390
Acknowledgments 390
References 390
21 Use and Abuse of IoT: Challenges and Recommendations 397
Robert Douglass
21.1 The Elements of IoT and Their Nature 398
21.2 Preventing the Abuse of IoT While Enabling Its Benefits 433
21.3 Types of Abuse and Misuse, and Prevention Through Regulation 440
21.4 Concluding Remarks: A Call to Action 457
References 458
Index 467