Details

IoT for Defense and National Security


IoT for Defense and National Security


1. Aufl.

von: Robert Douglass, Keith Gremban, Ananthram Swami, Stephan Gerali

111,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 04.01.2023
ISBN/EAN: 9781119892205
Sprache: englisch
Anzahl Seiten: 528

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>IoT for Defense and National Security</b> <p><b>Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments</b> <p><i>IoT for Defense and National Security </i>covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. <p>As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. <p>Written by leading researchers and practitioners of IoT technology for defense and national security, <i>IoT for Defense and National Security </i>also includes information on: <ul><li> Changes in warfare driven by IoT weapons, logistics, and systems</li> <li> IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions)</li> <li> Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference</li> <li> Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them</li> <li> Adapting rapidly expanding commercial IoT to power IoT for defense</li></ul> <p>For application engineers from defense-related companies as well as managers, policy makers, and academics, <i>IoT for Defense and National Security</i> is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.
<p>List of Contributors xix</p> <p>Introduction: IoT for Defense and National Security xxv<br /> <i>Robert Douglass</i></p> <p><b>Section 1 Introduction: Vision, Applications, and Opportunities 1<br /> </b><i>Stephan Gerali</i></p> <p><b>1 Internet of Battlefield Things: Challenges, Opportunities, and Emerging Directions 5<br /> </b><i>Maggie Wigness, Tarek Abdelzaher, Stephen Russell, and Ananthram Swami</i></p> <p>1.1 IoBT Vision 5</p> <p>1.2 IoBT vs. IoT 6</p> <p>1.3 IoBT Operational Requirements 7</p> <p>1.5 Performant and Resilient IoBTs 13</p> <p>1.6 Future Directions 16</p> <p>1.7 Conclusion 19</p> <p>References 20</p> <p><b>2 Sensorized Warfighter Weapon Platforms: IoT Making the Fog of War Obsolete 23<br /> </b><i>Kyle Broadway</i></p> <p>2.1 Introduction 24</p> <p>2.2 IoT for Firearms 26</p> <p>2.3 New Insights into the Battlefield Provided by IoT 27</p> <p>2.4 Challenges for IoT in Soldier Weapons 31</p> <p>2.5 Battlefield Challenges to Aggregating and Exfiltrating Data 32</p> <p>2.6 Protection and Security for IoT Data Communication 34</p> <p>2.7 State of the Art 37</p> <p>2.8 Conclusion 37</p> <p>References 38</p> <p><b>3 IoBT Resource Allocation via Mixed Discrete and Continuous Optimization 39<br /> </b><i>Jonathan Bunton and Paulo Tabuada</i></p> <p>3.1 Introduction 39</p> <p>3.2 Lattices and Submodular Functions 42</p> <p>3.3 Problem Formulation 43</p> <p>3.4 An Equivalent Parameterization 44</p> <p>3.5 Returning to Constraints 47</p> <p>3.6 Computational Examples 50</p> <p>3.7 Conclusions 55</p> <p>References 55</p> <p><b>4 Operationalizing IoT Data for Defense and National Security 59<br /> </b><i>Steve Morgan and Jaime Wightman</i></p> <p>4.1 Introduction 59</p> <p>4.2 Problem Statement 60</p> <p>4.3 Challenges 62</p> <p>4.4 Security Considerations 64</p> <p>4.5 Developing a Strategy for Operationalizing Data 65</p> <p>4.6 Precedence 69</p> <p>4.7 End State 70</p> <p>4.8 Conclusion 71</p> <p>References 71</p> <p><b>5 Real Time Monitoring of Industrial Machines using AWS IoT 73<br /> </b><i>Stephan Gerali</i></p> <p>5.1 Problem Statement 73</p> <p>5.2 Solution Statement – Overview 74</p> <p>5.3 Solution Statement – Edge Computing 74</p> <p>5.4 Solution Statement – Cloud Connectivity 75</p> <p>5.5 Solution Statement – Streaming Analytics and Data Storage 76</p> <p>5.6 Solution Statement – Data Visualization 77</p> <p>5.7 Solution Statement – Example Data Visualizations 78</p> <p>5.8 Results 79</p> <p>5.9 Next Steps 79</p> <p>References 80</p> <p><b>6 Challenges and Opportunities of IoT for Defense and National Security Logistics 83<br /> </b><i>Gisele Bennett, William Crowder, and Christina Baxter</i></p> <p>6.1 Introduction 83</p> <p>6.2 Linking Industry and DoD Uses of IoT 84</p> <p>6.3 Situational Awareness 85</p> <p>6.4 Applications for DoD 86</p> <p>6.5 Observations on the Future 93</p> <p>Acknowledgement 94</p> <p>References 94</p> <p><b>7 Digital Twins for Warship Systems: Technologies, Applications and Challenges 97<br /> </b><i>Sara Ferreno-Gonzalez, Alicia Munin-Doce, Marcos Míguez González, Lucía Santiago Caamaño, and Vicente Diaz-Casas</i></p> <p>7.1 Introduction 97</p> <p>7.2 A Digital Twin Architecture for Implementation 99</p> <p>7.3 Ship Digital Twin Implementation 108</p> <p>References 111</p> <p><b>Section 2 Introduction: Artificial Intelligence and IoT for Defense and National Security 115<br /> </b><i>Robert Douglass</i></p> <p><b>8 Principles of Robust Learning and Inference for IoBTs 119<br /> </b><i>Nathaniel D. Bastian, Susmit Jha, Paulo Tabuada, Venugopal Veeravalli, and Gunjan Verma</i></p> <p>8.1 Internet of Battlefield Things and Intelligence 119</p> <p>8.2 Dimensions of Responsible AI 120</p> <p>8.3 Detecting Surprise: Adversarial Defense and Outlier Detection 123</p> <p>8.4 Novel Deep Learning Representation: Dynamical System 124</p> <p>8.5 Robust Secure State Estimation 125</p> <p>8.6 Distributionally Robust Learning 126</p> <p>8.7 Future Directions 127</p> <p>8.8 Conclusion 128</p> <p>References 128</p> <p><b>9 AI at the Edge: Challenges, Applications, and Directions 133<br /> </b><i>Dhiraj Joshi, Nirmit Desai, Shyama Prosad Chowdhury, Wei-Han Lee, Luis Bathen, Shiqiang Wang, and Dinesh Verma</i></p> <p>9.1 Introduction 133</p> <p>9.2 IoT Applications 134</p> <p>9.3 Distributed AI Architecture 138</p> <p>9.4 Technology 143</p> <p>9.5 Research Directions 152</p> <p>9.6 Conclusions 155</p> <p>References 155</p> <p><b>10 AI Enabled Processing of Environmental Sounds in Commercial and Defense Environments 161<br /> </b><i>David Wood, Jae-wook Ahn, Seraphin Calo, Nancy Greco, Keith Grueneberg, Tadanobu Inoue, Dinesh Verma, and Shiqiang Wang</i></p> <p>10.1 Introduction 161</p> <p>10.2 Use Cases 166</p> <p>10.3 System Architecture 169</p> <p>10.4 Technology 171</p> <p>10.5 Summary 182</p> <p>References 183</p> <p><b>Section 3 Introduction: Security, Resiliency, and Technology for Adversarial Environments 187<br /> </b><i>Ananthram Swami</i></p> <p><b>11 Assurance by Design for Cyber-physical Data-driven Systems 191<br /> </b><i>Satish Chikkagoudar, Samrat Chatterjee, Ramesh Bharadwaj, Auroop Ganguly, Sastry Kompella, and Darlene Thorsen</i></p> <p>11.1 Introduction 191</p> <p>11.2 Methods for Assurance 196</p> <p>11.3 Discussion and Conclusion 207</p> <p>References 208</p> <p><b>12 Vulnerabilities in IoT Systems 213<br /> </b><i>Zheng Fang and Prasant Mohapatra</i></p> <p>12.1 Introduction 213</p> <p>12.2 Firmware 217</p> <p>12.3 Communication Protocols 219</p> <p>12.4 IoT Apps 224</p> <p>12.5 Physical Dependencies 226</p> <p>12.6 Companion Mobile Apps 227</p> <p>12.7 Hardware 228</p> <p>12.8 IoT Platforms 229</p> <p>12.9 Countermeasures 230</p> <p>12.10 Conclusions 231</p> <p>References 231</p> <p><b>13 Intrusion Detection Systems for IoT 237<br /> </b><i>Hyunwoo Lee, Anand Mudgerikar, Ninghui Li, and Elisa Bertino</i></p> <p>13.1 Introduction 237</p> <p>13.2 Background 238</p> <p>13.3 IoT Attack Scenarios 243</p> <p>13.4 Proposed IDSes for IoT 245</p> <p>13.5 Research Directions 252</p> <p>Acknowledgement 254</p> <p>References 255</p> <p><b>14 Bringing Intelligence at the Network Data Plane for Internet of Things Security 259<br /> </b><i>Qiaofeng Qin, Konstantinos Poularakis, and Leandros Tassiulas</i></p> <p>14.1 Introduction 259</p> <p>14.2 Related Work 262</p> <p>14.3 System Design 263</p> <p>14.4 Problem Modeling 266</p> <p>14.5 Algorithms and Learning Models 267</p> <p>14.6 Evaluation Results 271</p> <p>14.7 Conclusions and Future Challenges 280</p> <p>Acknowledgment 281</p> <p>References 281</p> <p><b>15 Distributed Computing for Internet of Things Under Adversarial Environments 285<br /> </b><i>Gowri Sankar Ramachandran, Luis A. Garcia, and Bhaskar Krishnamachari</i></p> <p>15.1 Introduction 285</p> <p>15.2 Distributed Computing for IoT in Defense Applications 287</p> <p>15.3 Threat Model 288</p> <p>15.4 Frameworks for Distributed Computing 291</p> <p>15.5 Establishing Trust in Adversarial Environments: Solutions and Open Opportunities 295</p> <p>15.6 Summary 302</p> <p>Acknowledgment 303</p> <p>References 303</p> <p><b>16 Ensuring the Security of Defense IoT Through Automatic Code Generation 307<br /> </b><i>M. Douglas Williams and Robert Douglass</i></p> <p>16.1 The Challenge of IoT in Defense and National Security Applications: The Challenge 307</p> <p>16.2 Solutions 308</p> <p>16.3 Automatic Code Generation 312</p> <p>16.4 IoT Interface-code Issuing Authority 319</p> <p>16.5 Conclusions 321</p> <p>References 322</p> <p><b>Section 4 Introduction: Communications and Networking 325</b><br /> <i>Keith Gremban</i></p> <p><b>17 Leveraging Commercial Communications for Defense IoT 327<br /> </b><i>Keith Gremban and Paul J. Kolodzy</i></p> <p>17.1 Introduction 327</p> <p>17.2 Key Differences Between Defense and Commercial Communications Requirements 329</p> <p>17.2.1 Interoperability 329</p> <p>17.2.2 Mobility 330</p> <p>17.2.3 Security 330</p> <p>17.2.4 Vulnerability 331</p> <p>17.3 Key Differences Between Defense and Commercial Technology Development 332</p> <p>17.4 Commercial Communications for Use in Defense and Homeland Security 334</p> <p>17.5 Conclusion 337</p> <p>References 337</p> <p><b>18 Military IoT: Tactical Edge Clouds for Content Sharing Across Heterogeneous Networks 339<br /> </b><i>Tim Strayer, Sam Nelson, Dan Coffin, Bishal Thapa, Joud Khoury, Armando Caro, Michael Atighetchi, and Stephane Blais</i></p> <p>18.1 Introduction 339</p> <p>18.2 The Need for Tactical Edge Clouds 341</p> <p>18.3 Two Architectures 342</p> <p>18.4 Tactical Edge Cloud Architectural Insights 347</p> <p>18.5 Summary 351</p> <p>Acknowledgment 351</p> <p>References 351</p> <p><b>19 Spectrum Challenges in the Internet of Things: State of the Art and Next Steps 353<br /> </b><i>Francesco Restuccia, Tommaso Melodia, and Jonathan Ashdown</i></p> <p>19.1 Introduction 353</p> <p>19.2 Spectrum Bands of Interest in the Internet of Things 356</p> <p>19.3 Spectrum Management in the Internet of Things: Requirements and Existing Work 358</p> <p>19.4 Spectrum Management in the Internet of Things: The Way Ahead 360</p> <p>19.5 Conclusions 366</p> <p>References 367</p> <p><b>20 Tactical Edge IoT in Defense and National Security 377<br /> </b><i>Paula Fraga-Lamas and Tiago M. Fernández-Caramés</i></p> <p>20.1 Introduction 377</p> <p>20.2 Background 378</p> <p>20.3 Compelling COTS Edge IoT Applications 382</p> <p>20.4 Target Scenarios for Tactical Edge IoT 382</p> <p>20.5 Communications Architecture 386</p> <p>20.6 Main Challenges and Recommendations 388</p> <p>20.7 Conclusions 390</p> <p>Acknowledgments 390</p> <p>References 390</p> <p><b>21 Use and Abuse of IoT: Challenges and Recommendations 397<br /> </b><i>Robert Douglass</i></p> <p>21.1 The Elements of IoT and Their Nature 398</p> <p>21.2 Preventing the Abuse of IoT While Enabling Its Benefits 433</p> <p>21.3 Types of Abuse and Misuse, and Prevention Through Regulation 440</p> <p>21.4 Concluding Remarks: A Call to Action 457</p> <p>References 458</p> <p>Index 467</p>
<p><b>Robert Douglass, PhD,</b> is the Chief Technology Officer at Alta Montes Inc. <p><b>Keith Gremban, PhD,</b> is Co-Director of the Spectrum Policy Initiative at the Silicon Flatirons Center, and Research Professor in the Ann and H.J. Smead Aerospace Engineering Sciences Department at the University of Colorado Boulder. <p><b>Ananthram Swami, PhD,</b> is the Army ST for Network Science, and Chief Scientist of the DEVCOM Army Research Laboratory’s CRA on the Internet of Battlefield Things. He is a co-editor of the Wiley book, <i>Wireless Sensor Networks: Signal Processing and Communications Perspectives</i> (2007). <p><b>Stephan Gerali, PhD,</b> is a Senior Fellow at Lockheed Martin, Inc.
<p><b>Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments</b> <p><i>IoT for Defense and National Security </i>covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. <p>As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. <p>Written by leading researchers and practitioners of IoT technology for defense and national security, <i>IoT for Defense and National Security </i>also includes information on: <ul><li> Changes in warfare driven by IoT weapons, logistics, and systems</li> <li> IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions)</li> <li> Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference</li> <li> Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them</li> <li> Adapting rapidly expanding commercial IoT to power IoT for defense</li></ul> <p>For application engineers from defense-related companies as well as managers, policy makers, and academics, <i>IoT for Defense and National Security</i> is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €