Open Access Open Access  Restricted Access Subscription or Fee Access

A Review of the Internet of Military Things and its Transformative Potential Connected Warfare

Anjali Kiran Wasankar, Dr. Sushil Bakhtar

Abstract


The endeavour to create networked elements that can perform various military and security activities or missions is known as the Internet of Things (IoT) in the defence industry, also referred to as the Internet of Battlefield Things (IoBT) or the Internet of Military Things (IoMT). IoMT will facilitate a more intelligent interaction between people, networks, and interfaces in a battlespace that is becoming more dynamic. It will also revolutionise the flow, analysis, and gathering of information, which will in turn revolutionise decision-making. To analyse and distribute data, cutting-edge military forces have been investing in infrastructure and technologies related to command, control, communications,
computers, intelligence, surveillance, and reconnaissance (C4ISR). By more effectively using and optimising the usage of a greater volume of the acquired data, IoMT seeks to advance this process. What distinguishes the platforms and systems that are now in use and connected by different command and control (C2) backbones may be a question that some people have. The primary distinction is size:
IoMT will enable a far larger network with potentially revolutionary features. IoMT is currently in its
infancy because infrastructure design and the underlying technologies needed to facilitate its
application in actual combat situations are still being developed. The seamless integration of
commercially available technologies (COTS) and collaboration between the armed forces and private
enterprises, academic institutions, and research centres will facilitate the deployment of this
technology. The process of creating significant military enablers takes time. Unlike many IoT products
and solutions on the civilian market, IoMT has been awarded and is going to keep getting R&D
financing from the government with the goal of generating a product.


Keywords


IoT, IoMT, IoBT, military force, networks, communications, intelligence.

Full Text:

PDF

References


. Zheng DE, Carter WA. Leveraging the internet of things for a more efficient and effective military. Rowman &

Littlefield; 2015 Oct 7.

Yushi L, Fei J, Hui Y. Study on application modes of military Internet of Things (MIOT). In2012 IEEE

international conference on computer science and automation engineering (CSAE) 2012 May 25 (Vol. 3, pp. 630-

. IEEE.

. Kott, Alexander, David S. Alberts, and Cliff Wang. "Will Cybersecurity Dictate the Outcome of Future Wars?"

Computer 48.12 (2015): 98-101.

. Kranz, Matthias, Paul Holleis, and Albrecht Schmidt. "Embedded interaction: Interacting with the internet of

things." Internet Computing, IEEE 14.2 (2010): 46-53.

. Miorandi, Daniele, et al. "Internet of things: Vision, applications and research challenges." Ad Hoc Networks.

Volume 10, Issue 7, September 2012, Pages 1497-1516.

. B.J. West and P. Grigolini, Complex Webs; Anticipating the Improbable, Cambridge University Press,

Cambridge, UK (2011).

. B.J. West, M. Turalska and P. Grigolini, Network of Echoes; Imitation, Innovation and Invisible Leaders,

Springer, NY (2014).

Korzun, Dmitry G., Sergey I. Balandin, and Andrei V. Gurtov. "Deployment of Smart Spaces in Internet of

Things: Overview of the design challenges." Internet of Things, Smart Spaces, and Next Generation Networking.

Springer Berlin Heidelberg, 2013. 48- 59.

. Barnaghi, Payam, et al. "Semantics for the Internet of Things: early progress and back to the future."

International Journal on Semantic Web and Information Systems (IJSWIS) 8.1 (2012): 1-21.

. Cho, Jin-Hee, Ananthram Swami, and Ing-Ray Chen. "A survey on trust management for mobile ad hoc

networks." Communications Surveys & Tutorials, IEEE 13.4 (2011): 562- 583.

. Babar, Sachin, et al. "Proposed security model and threat taxonomy for the internet of things (IoT)." Recent Trends in Network Security and Applications. Springer Berlin Heidelberg, 2010. 420-429.

. Kristin E. Heckman and Frank J. Stech, Cyber Denial, Deception and Counter Deception: A Framework for

Supporting Active Cyber Defense. Springer 2015 11

. Yan, Zheng, Peng Zhang, and Athanasios V. Vasilakos. "A survey on trust management for Internet of

Things." Journal of network and computer applications 42 (2014): 120- 134.

. Satyajayant Misra, Reza Tourani and Nahid Ebrahimi Majd, "Secure content delivery in information-centric

networks: design, implementation, and analyses," ACM SIGCOMM Information-Centric Networking Workshop,

pp. 73–78, 2012.




DOI: https://doi.org/10.37591/rrjosst.v12i3.3845

Refbacks

  • There are currently no refbacks.


eISSN: 2321–2837