18 Hits in 3.2 sec

Situational Awareness: Techniques, Challenges, and Prospects

Arslan Munir, Alexander Aved, Erik Blasch
2022 AI  
Situational awareness (SA) is defined as the perception of entities in the environment, comprehension of their meaning, and projection of their status in near future.  ...  In this article, we propose a model for SA and dynamic decision-making that incorporates artificial intelligence and dynamic data-driven application systems to adapt measurements and resources in accordance  ...  Using biometrics, environmental sensors, and other connected IoMT/IoBT devices to send and receive data quickly leveraging fog/edge computing will not only help improve command and control operations but  ... 
doi:10.3390/ai3010005 fatcat:r25ws743cjbena5aqrigziasfm

C4I System Security Architecture: A Perspective on Big Data Lifecycle in a Military Environment

Seungjin Baek, Young-Gab Kim
2021 Sustainability  
However, we overcome the security matters by examining the battlefield environment and the system through the flow of data in the battlefield.  ...  First, to enhance the general understanding of big data and the military environment, an overview of the C4I system, the characteristics of the 6V's, and the five-phase big data lifecycle were described  ...  For example, in the data generation layer of a C4I system, infrastructure can be referred to as IoBT devices and the network that connects those devices.  ... 
doi:10.3390/su132413827 fatcat:3udwx4rhwzhbpdbryglnnjfk5a

Evolution from the Network-Centric Warfare Сoncept to the Data-Centric Operation Theory

Anatolii Skoryk, Boris Nizienko, Anatolii Dudush, Vasil Shulezhko, Irina Romanchenko
2021 Advances in Military Technology  
It is concluded that there is hardware redundancy in modern weapon systems and it is possible to use it as a network resource, the management of which provides additional opportunities for improving operational  ...  It argues the need for a transition from the Network-Centric Warfare concept to the Data-Centric Operation theory and proposes a 4D-extensional representation of the combat space of weapon systems integrated  ...  Admiral Owens was well aware of the continuity of the control system (C4ISR) and the control object (precision force).  ... 
doi:10.3849/aimt.01430 fatcat:wco4uhji4zepzl2un37d3rviwa

FogSurv: A Fog-Assisted Architecture for Urban Surveillance Using Artificial Intelligence and Data Fusion

Arslan Munir, Jisu Kwon, Jong Hun Lee, Joonho Kong, Erik Blasch, Alexander Aved, Khan Muhammad
2021 IEEE Access  
FogSurv can enable the armed forces to fully exploit the information gathered by a wide set of heterogeneous IoBT/IoMT devices deployed in the battlefield and can provide the armed forces a strategical  ...  Using biometrics, environmental sensors, and other connected IoMT/IoBT devices to send and receive data quickly as enabled by FogSurv will permit military personnel to timely respond to potentially dangerous  ...  This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see  ... 
doi:10.1109/access.2021.3102598 fatcat:f3lwlsfjlvhhhd3ct4rs6sybky

Cyber Threats and Cyber Deception in Hybrid Warfare

William Steingartner, Darko Galinec
2021 Acta Polytechnica Hungarica  
However, in the world of cyber security, deception as a tactic and element of a more robust defensive strategy has been still largely underexploited.  ...  This environment of menace is of a global nature when transcending geographic boundaries and characterized by the emerging development of offensive cyber capabilities that are an inherent part of conflicts  ...  Acknowledgement This work was supported by the Project KEGA 011TUKE-4/2020: "A development of the new semantic technologies in educating of young IT experts".  ... 
doi:10.12700/aph.18.3.2021.3.2 fatcat:gu24yimtirhjpd2vxavsnuhfya

Artificial intelligence and machine learning for future army applications

John M. Fossaceca, Stuart H. Young, Tien Pham, Michael A. Kolodny, Dietrich M. Wiegmann
2018 Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX  
This paper discusses some of the motivating factors behind US Army Research in AI and ML and provides a survey of a subset of the US Army Research Laboratory's (ARL) Computational and Information Sciences  ...  autonomy for ground robots in unexplored, dynamic, cluttered, contested, and sparse data environments.  ...  and explanations of their research.  ... 
doi:10.1117/12.2307753 fatcat:mtpmrsiixjfsta6av32kd23lly

Multimedia Internet of Things: A Comprehensive Survey

Ali Nauman, Yazdan Ahmad Qadri, Muhammad Amjad, Yousaf Bin Zikria, Muhammad Khalil Afzal, Sung Won Kim
2020 IEEE Access  
IoT devices are constrained in terms of energy, computing, size, and storage memory.  ...  This paper provides a comprehensive survey of M-IoT with an emphasis on architecture, protocols, and applications. This article starts by providing a horizontal overview of the IoT.  ...  Additionally, the heterogeneity of the devices in the network creates a set of challenges in terms of interoperability.  ... 
doi:10.1109/access.2020.2964280 fatcat:ilihkpik65bdvblyal6rp7tb2y

The Shift to 6G Communications: Vision and Requirements [article]

Muhammad Waseem Akhtar, Syed Ali Hassan, Rizwan Ghaffar, Haejoon Jung, Sahil Garg, M. Shamim Hossain
2020 arXiv   pre-print
support a massive number of devices with ultra-low latency requirements.  ...  In this article, we provide a detailed overview of the 6G network dimensions with air interface and associated potential technologies.  ...  Devices and applications in this category include wearable devices, control and monitoring devices, self-driving cars, smart grids, industrial automation and control devices, and medical and health-related  ... 
arXiv:2010.07993v1 fatcat:u4g5vyhor5amtltrkx5olvhq6e

The shift to 6G communications: vision and requirements

Muhammad Waseem Akhtar, Syed Ali Hassan, Rizwan Ghaffar, Haejoon Jung, Sahil Garg, M. Shamim Hossain
2020 Human-Centric Computing and Information Sciences  
and can support a massive number of devices with ultra-low latency requirements.  ...  In this article, we provide a detailed overview of the 6G network dimensions with air interface and associated potential technologies.  ...  In such a scenario, an energy-efficient and scalable intelligent network design will be required. The industry has moved towards IoTs, IoEV and IoBTs [107, 109] .  ... 
doi:10.1186/s13673-020-00258-2 fatcat:ibwxzee35fc7xmx4bwzj46xfzy

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., and Bose, R., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe  ...  Saleem, A., +, JIoT July 2020 6132-6142 HAC: Enable High Efficient Access Control for Information-Centric Internet of Things.  ...  Kaur, A., +, JIoT Feb. 2020 1111-1121 Drone-Enabled Internet-of-Things Relay for Environmental Monitoring in Remote Areas Without Public Networks.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0 [article]

Alexander Kott, Paul Théron, Martin Drašar, Edlira Dushku, Benoît LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca
2019 arXiv   pre-print
of computing and communicating devices.  ...  In a conflict with a technically sophisticated adversary, NATO military tactical networks will operate in a heavily contested battlefield.  ...  In addition, battlefield environment require new remote attestation schemes can also be used to verify the trustworthiness of a large group of devices in a more efficient way than attesting each of devices  ... 
arXiv:1803.10664v2 fatcat:gtkwxl2gezcn7hbdtldxh77zai

Normative Challenges of Identification in the Internet of Things: Privacy, Profiling, Discrimination, and the GDPR

Sandra Wachter
2017 Social Science Research Network  
In the Internet of Things (IoT), identification and access control technologies provide essential infrastructure to link data between a user's devices with unique identities, and provide seamless and linked  ...  The EU General Data Protection Regulation (GDPR), set to come into force in May 2018, may provide essential guidance to achieve a fair balance between the interests of IoT providers and users.  ...  Funding This article is a deliverable of the Privacy-Enhancing and Identification-Enabling Solutions for IoT (PEIESI) project, part of the PETRAS Internet of Things research hub.  ... 
doi:10.2139/ssrn.3083554 fatcat:4iunn3i52nhhpdebakrhxd73qy

No Soldiers Left Behind: An IoT-based Low-Power Military Mobile Health System Design

James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul Haskell-Dowland
2020 IEEE Access  
a person and their environment.  ...  for incident investigation, insight into the demands of military service in a deployed environment."  ...  Paul has more than 20 years of experience in cyber security research and education in both the UK and Australia.  ... 
doi:10.1109/access.2020.3035812 fatcat:zctgp4nlrbgpnb2lw75vufbb2y

Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG [article]

Alexander Kott, Ryan Thomas, Martin Drašar, Markus Kont, Alex Poylisher, Benjamin Blakely, Paul Theron, Nathaniel Evans, Nandi Leslie, Rajdeep Singh, Maria Rigaki, S Jay Yang, Benoit LeBlanc (+7 others)
2018 arXiv   pre-print
The report focuses on the following questions: In what computing and tactical environments would such an agent operate? What data would be available for the agent to observe or ingest?  ...  This requires cyber-defense agents with a significant degree of intelligence, autonomy, self-learning, and adaptability.  ...  Acknowledgments The co-chairs express their gratitude to Ms Katarina Takusova for her outstanding help in organizing and executing the workshop, to Mr John B MacLeod for his critical role in organizing  ... 
arXiv:1804.07646v1 fatcat:my3fdrso4zcudguqgjglbl6qdu

Authentication Protocols for Internet of Things: A Comprehensive Survey [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
In addition, we provide a taxonomy and comparison of authentication protocols for the IoT in form of tables in five terms, namely, network model, goals, main processes, computation complexity, and communication  ...  In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT).  ...  With MITM attack, an adversary can spoof the identities of two honest nodes (N1 and N2) involved in a network exchange and pass N1 for N2 and vice versa, Brute-force attack X X X X X 0 X [64, 78,  ... 
arXiv:1612.07206v1 fatcat:awa32vfghnhwvdzrmjh2t2r2cm
« Previous Showing results 1 — 15 out of 18 results