Internet of Military Things

Last updated

The Internet of Military Things (IoMT) is a class of Internet of things for combat operations and warfare. It is a complex network of interconnected entities, or "things", in the military domain that continually communicate with each other to coordinate, learn, and interact with the physical environment to accomplish a broad range of activities in a more efficient and informed manner. [1] [2] The concept of IoMT is largely driven by the idea that future military battles will be dominated by machine intelligence and cyber warfare and will likely take place in urban environments. [3] [4] By creating a miniature ecosystem of smart technology capable of distilling sensory information and autonomously governing multiple tasks at once, the IoMT is conceptually designed to offload much of the physical and mental burden that warfighters encounter in a combat setting. [5]

Contents

Over time, several different terms have been introduced to describe the use of IoT technology for reconnaissance, environment surveillance, unmanned warfare and other combat purposes. These terms include the Military Internet of Things (MIoT), [6] the Internet of Battle Things, [7] and the Internet of Battlefield Things (IoBT). [8]

Overview

The Internet of Military Things encompasses a large range of devices that possess intelligent physical sensing, learning, and actuation capabilities through virtual or cyber interfaces that are integrated into systems. These devices include items such as sensors, vehicles, robots, UAVs, human-wearable devices, biometrics, munitions, armor, weapons, and other smart technology. [9] In general, IoMT devices can generally be classified into one of four categories [10] (but the devices are meant to be ubiquitous enough to form a data fabric): [11] [12] [13]

In addition to connecting different electronic devices to a unified network, researchers have also suggested the possibility of incorporating inanimate and innocuous objects like plants and rocks into the system by fitting them with sensors that will turn them into information gathering points. [14] [15] Such efforts fall in line with projects related to the development of electronic plants, or e-Plants. [16]

Proposed examples of IoMT applications include tactical reconnaissance, smart management of resources, logistics support (i.e. equipment and supply tracking), smart city monitoring, and data warfare. [17] [18] Several nations, as well as NATO officials, have expressed Interest in the potential military benefits of IoT technology. [19]

History

Advancements in IoMT technology largely stemmed from military efforts to bolster the development of sensor networks and low-power computing platforms during the 1960s for defense applications. [10] [20] During the Cold War, the U.S. military pioneered the use of wireless sensor network technologies to detect and track Soviet submarines. One example was the Sound Surveillance System (SOSUS), a network of underwater acoustic sensors, i.e. hydrophones, placed throughout the Atlantic and Pacific Oceans to act as underwater listening posts for above-ground facilities. [21] Much of the sensor and networking technologies that the U.S. Department of Defense (DoD) developed during this time period ultimately served as the foundation for modern IoT systems. Critically, the DoD helped set the stage for future IoT research in the late 1960s with the creation of ARPANET, an early precursor to the Internet that geographically-dispersed military scientists used to share data. [22]

In the 1980s, the Defense Advanced Projects Agency (DARPA) formally partnered with academic researchers at the Massachusetts Institute of Technology (MIT) and Carnegie Mellon University to further develop distributed, wireless sensor networks. From there, research into wireless sensor technologies spread throughout the civilian research community and eventually found use for industrial applications such as power distribution, wastewater treatment, and factory automation. [21] [22] During this time period, the DoD also invested heavily in the miniaturization of integrated circuits in order to embed various objects with tiny computer chips. As a result of their funding, the commercial microelectronics industry was able to recover when it faced potential decline at the time. [22]

By the late 1990s, the Department of Defense had announced plans for “network-centric” warfare that integrated the physical, information, and cognitive domains to enhance information sharing and collaboration. [22] Examples of projects guided by this goal include the Nett Warrior (formerly known as the Ground Soldier System or Mounted Soldier System) [23] and the Force XXI Battle Command Brigade and Below communication platform, both of which were prevalent in the early 2000s. [24]

However, interest in IoT research in the military started to wane as commercial industry surged ahead with new technology. [3] While DoD continued research into advanced sensors, intelligent information processing systems, and communication networks, few military systems have taken full advantage of the IoT stack such as networked sensors and automated-response technology largely due to security concerns. [22] As of 2019, research in modern IoT technology within the military started to regain a considerable amount of support from the U.S. Army, Navy, and Air Force. [25] [26]

Programs

Several initiatives were formed by the Department of Defense in order to bolster IoT research in the military domain as well as to reduce the current gap in progress between military and industry applications.

The Connected Soldier

The Connected Soldier project was a research initiative supported by the U.S. Army Natick Soldier Research, Development and Engineering Center (NSRDEC) that focused on creating intelligent body gear. The project aimed to establish an internet of things for each soldier by integrating wideband radio, biosensors, and smart wearable systems as standard equipment. These devices served not only to monitor the soldier's physiological status but also to communicate mission data, surveillance intelligence, and other important information to nearby military vehicles, aircraft, and other troops. [27] [28] [29]

Internet of Battlefield Things (IoBT)

Internet of Battlefield Things technology in an unstructured, chaotic urban environment Internet of Battlefield Things.tif
Internet of Battlefield Things technology in an unstructured, chaotic urban environment

In 2016, the U.S. Army Research Laboratory (ARL) created the Internet of Battlefield Things (IoBT) project in response to the U.S. Army's operational outline for 2020 to 2040, titled “Winning in a Complex World.” In the outline, the Department of Defense announced its goals to keep up with the technological advances of potential adversaries by turning its attention away from low-tech wars and instead focusing on combat in more urban areas. [30] Acting as a detailed blueprint for what ARL suspected future warfare may entail, the IoBT project pushed for better integration of IoT technology in military operations in order to better prepare for techniques such as electronic warfare that may lie ahead. [31] [32]

In 2017, ARL established the Internet of Battlefield Things Collaborative Research Alliance (IoBT-CRA) to bring together industry, university, and government researchers to advance the theoretical foundations of IoBT systems. [33] [34]

According to ARL, the IoBT was primarily designed to interact with the surrounding environment by acquiring information about the environment, acting upon it, and continually learning from these interactions. As a consequence, research efforts focused on sensing, actuation, and learning challenges. [35] In order for the IoBT to function as intended, the following prerequisite conditions must first be met in regard to technological capability, structural organization, and military implementation.

Communication

All entities in the IoBT must be able to properly communicate information to one another even with differences in architectural design and makeup. While future commercial internet of things may exhibit a lack of uniform standards across different brands and manufacturers, entities in IoBT must remain compatible despite displaying extreme heterogeneity. In other words, all electronic equipment, technology, or other commercial offerings accessed by military personnel must share the same language or at least have “translators” that make the transfer and processing of different types of information possible. In addition, the IoBT must be capable of temporarily incorporating available networked devices and channels that it does not own for its own use, especially if doing so is advantageous to the system (e.g. making use of existing civilian networking infrastructure in military operations in a megacity). [7] At the same time, the IoBT must take into consideration the varying degree of trustworthiness of all the networks it leverages. [33]

Timing will be critical in the success of IoBT. The speed of communication, computation, machine learning, inference, and actuation between entities are vital to many mission tasks, as the system must know which type of information to prioritize. [2] Scalability will also serve as an important factor in the operation since the network must be flexible enough to function at any size. [7]

Learning

The success of the IoBT framework often hinges on the effectiveness of the mutual collaboration between the human agents and the electronic entities in the network. In a tactical environment, the electronic entities will be tasked with a wide range of objectives from collecting information to executing cyber actions against enemy systems. In order for these technologies to perform those functions effectively, they must be able to not only ascertain the goals of the human agents as they change but also demonstrate a significant level of autonomous self-organization to adjust to the rapidly changing environment. Unlike commercial network infrastructures, the adoption of IoT in the military domain must take into consideration the extreme likelihood that the environment may be intentionally hostile or unstable, which will require a high degree of intelligence to navigate. [36]

As a result, the IoBT technology must be capable of incorporating predictive intelligence, machine learning, and neural network in order to understand the intent of the human users and determine how to fulfill that intent without the process of micromanaging each and every component of the system. [30]

According to ARL, maintaining information dominance will rely on the development of autonomous systems that can operate outside its current state of total dependence on human control. A key focus of IoBT research is the advancement of machine learning algorithms to provide the network with decision-making autonomy. [36] Rather than having one system at the core of the network functioning as the central intelligence component dictating the actions of the network, the IoBT will have intelligence distributed throughout the network. Therefore, individual components can learn, adapt, and interact with each other locally as well as update behaviors and characteristics automatically and dynamically on a global scale to suit the operation as the landscape of warfare constantly evolves. [35] [36] In the context of IoT, the incorporation of artificial intelligence into the sheer volume of data and entities involved in the network will provide an almost infinite number of possibilities for behavior and technological capability in the real world. [36]

In a tactical environment, the IoBT must be able to perform various types of learning behaviors to adapt to the rapidly changing conditions. One area that received considerable attention is the concept of meta-learning, which strives to determine how machines can learn how to learn. Having such a skill would allow the system to avoid fixating on pretrained absolute notions on how it should perceive and act whenever it enters a new environment. Uncertainty quantification models have also generated interest in IoBT research since the system's ability to determine its level of confidence in its own predictions based on its machine learning algorithms may provide some much needed context whenever important tactical decisions need to be made. [36]

The IoBT should also demonstrate a sophisticated level of situation awareness and artificial intelligence that will allow the system to autonomously perform work based on limited information. A primary goal is to teach the network how to correctly infer the complete picture of a situation while measuring relatively few variables. [14] As a result, the system must be capable of integrating the vast amount and variety of data that it regularly collects into its collective intelligence while functioning in a continuous state of learning at multiple time scales, simultaneously learning from past actions while acting in the present and anticipating future events. [33] [36]

The network must also account for unforeseen circumstances, errors, or breakdowns and be able to reconfigure its resources to recover at least a limited level of functionality. [7] However, some components must be prioritized and structured to be more resilient to failure than others. For instance, networks that carry important information such as medical data must never be at risk of shutdown. [37]

Cognitive Accessibility

For semi-autonomous components, the human cognitive bandwidth serves as a notable constraint for the IoBT due to its limitations in processing and deciphering the flood of information generated by the other entities in the network. In order to obtain truly useful information in a tactical environment, semi-autonomous IoBT technologies must collect an unprecedented volume of data of immense complexity in levels of abstraction, trustworthiness, value, and other attributes. [2] [7] [14] Due to serious limitations in human mental capacity, attention, and time, the network must be able to easily reduce and transform large flows of information produced and delivered by the IoBT into reasonably-sized packets of essential information that is significantly relevant to army personnel, such as signals or warnings that pertain to their current situation and mission. [7]

A key risk of IoBT is the possibility that devices could communicate negligibly useful information that eats up the human's valuable time and attention or even propagate inappropriate information that misleads human individuals into performing actions that lead to adverse or unfavorable outcomes. At the same time, the system will stagnate if the human entities doubt the accuracy of the information provided by the IoBT technology. As a result, the IoBT must operate in a manner that is extremely convenient and easy to understand to the humans without compromising the quality of the information it provides them. [7]

Mosaic Warfare

Mosaic Warfare is a term coined by former DARPA Strategic Technology Office director Tom Burns and former deputy director Dan Patt to describe a “systems of systems” approach to military warfare that focuses on re-configuring defense systems and technologies so that they can be fielded rapidly in a variety of different combinations for different tasks. [38] [39] Designed to emulate the adaptable nature of the lego blocks and mosaic art form, Mosaic Warfare was promoted as a strategy to confuse and overwhelm adversary forces by deploying low-cost adaptable technological expendable weapon systems that can play multiple roles and coordinate actions with one another, complicating the decision-making process for the enemy. [40] This method of warfare arose as a response to the current monolithic system in the military, which relies on a centralized command-and-control structure fraught with vulnerable single-point communications and the development of a few highly capable systems that are too important to risk losing in combat. [39] [41]

The concept of Mosaic Warfare existed within DARPA since 2017 and contributed to the development of various technology programs such as the System of Systems Integration Technology and Experimentation (SoSIT), which led to the development of a network system that allows previously disjointed ground stations and platforms to transmit and translate data between one another. [42]

Ocean of Things

In 2017, DARPA announced the creation of a new program called the Ocean of Things, which planned to apply IoT technology on a grand scale in order to establish a persistent maritime situational awareness over large ocean areas. [43] According to the announcement, the project would involve the deployment of thousands of small, commercially available floats. Each float would contain a suite of sensors that collect environmental data—like sea surface temperature and sea state—and activity data, such as the movement of commercial vessels and aircraft. [44] All the data collected from these floats would then be transmitted periodically to a cloud network for storage and real-time analysis. [45] Through this approach, DARPA aimed to create an extensive sensor network that can autonomously detect, track, and identify both military, commercial, and civilian vessels as well as indicators of other maritime activity. [46]

The Ocean of Things project focused primarily on the design of the sensor floats and the analytic techniques that would be involved in organizing and interpreting the incoming data as its two main objectives. For the float design, the vessel had to be able to withstand the harsh ocean conditions for at least a year while being made out of commercially available components that cost less than $500 each in total. In addition, the floats could not pose any danger to passing vessels and had to be made out of environmentally safe materials so that it could safely dispose of itself in the ocean after completing its mission. In regards to the data analytics, the project concentrated on developing cloud-based software that could collect, process, and transmit data about the environment and their own condition using a dynamic display. [46]

Security concerns

One of the largest potential dangers of IoMT technology is the risk of both adversarial threats and system failures that could compromise the entire network. Since the crux of the IoMT concept is to have every component of the network—sensors, actuators, software, and other electronic devices—connected together to collect and exchange data, poorly protected IoT devices are vulnerable to attacks which may expose large amounts of confidential information. Furthermore, a compromised IoMT network is capable of causing serious, irreparable damage in the form of corrupted software, disinformation, and leaked intelligence. [47]

According to the U.S. Department of Defense, security remains a top priority in IoT research. The IoMT must be able to foresee, avoid, and recover from attempts by adversary forces to attack, impair, hijack, manipulate, or destroy the network and the information that it holds. The use of jamming devices, electronic eavesdropping, or cyber malware may pose a serious risk to the confidentiality, integrity, and availability of the information within the network. Furthermore, the human entities may also be targeted by disinformation campaigns in order to foster distrust in certain elements of the IoMT. [1] [7] Since IoMT technology may be used in an adversarial setting, researchers must account for the possibility that a large number of sources may become compromised to the point where threat-assessing algorithms may use some of those compromised sources to falsely corroborate the veracity of potentially malicious entities. [35]

Minimizing the risks associated with IoT devices will likely require a large-scale effort by the network to maintain impenetrable cybersecurity defenses as well as employ counterintelligence measures that thwart, subvert, or deter potential threats. Examples of possible strategies include the use of “disposable” security, where devices that are believed to be potentially compromised by the enemy are simply discarded or disconnected from the IoMT, and honeynets that mislead enemy eavesdroppers. Since adversary forces are expected to adapt and evolve their strategies for infiltrating the IoMT, the network must also undergo a continuous learning process that autonomously improves anomaly detection, pattern monitoring, and other defensive mechanisms. [7]

Secure data storage serves as one of the key points of interest for IoMT research. Since the IoMT system is predicted to produce an immense volume of information, attention was directed toward new approaches to maintaining data properly and regulating protected access that don't allow for leaks or other vulnerabilities. [48] One potential solution that was proposed by The Pentagon was Comply to Connect (C2C), a network security platform that autonomously monitored device discovery and access control in order to keep pace with the exponentially-growing network of entities. [31]

In addition to the risks of digital interference and manipulation by hackers, concerns have also been expressed regarding the availability of strong wireless signals in remote combat locations. The lack of a constant internet connection was shown to limit the utility and usability of certain military devices that depend on reliable reception. [49]

See also

Further reading

Related Research Articles

<span class="mw-page-title-main">DARPA</span> Technology research and development agency of the U.S. Department of Defense

The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Advanced Research Projects Agency (ARPA), the agency was created on February 7, 1958, by President Dwight D. Eisenhower in response to the Soviet launching of Sputnik 1 in 1957. By collaborating with academia, industry, and government partners, DARPA formulates and executes research and development projects to expand the frontiers of technology and science, often beyond immediate U.S. military requirements. The name of the organization first changed from its founding name, ARPA, to DARPA, in March 1972, changing back to ARPA in February 1993, then reverted to DARPA in March 1996.

Measurement and signature intelligence (MASINT) is a technical branch of intelligence gathering, which serves to detect, track, identify or describe the distinctive characteristics (signatures) of fixed or dynamic target sources. This often includes radar intelligence, acoustic intelligence, nuclear intelligence, and chemical and biological intelligence. MASINT is defined as scientific and technical intelligence derived from the analysis of data obtained from sensing instruments for the purpose of identifying any distinctive features associated with the source, emitter or sender, to facilitate the latter's measurement and identification.

Smartdust is a system of many tiny microelectromechanical systems (MEMS) such as sensors, robots, or other devices, that can detect, for example, light, temperature, vibration, magnetism, or chemicals. They are usually operated on a computer network wirelessly and are distributed over some area to perform tasks, usually sensing through radio-frequency identification. Without an antenna of much greater size the range of tiny smart dust communication devices is measured in a few millimeters and they may be vulnerable to electromagnetic disablement and destruction by microwave exposure.

Wireless sensor networks (WSNs) refer to networks of spatially dispersed and dedicated sensors that monitor and record the physical conditions of the environment and forward the collected data to a central location. WSNs can measure environmental conditions such as temperature, sound, pollution levels, humidity and wind.

Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advantage through the computer networking of dispersed forces. It was pioneered by the United States Department of Defense in the 1990s.

<span class="mw-page-title-main">United States Army Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance Center</span> Military unit

The Combat Capabilities Development Command (CCDC) C5ISR Center, formerly the Communications-Electronics RD&E Center (CERDEC), is the United States Army information technologies and integrated systems center. CCDC C5ISR Center is headquartered at Aberdeen Proving Ground in Maryland, with activities at Fort Belvoir in Virginia and Joint Base McGuire-Dix-Lakehurst in New Jersey.

<span class="mw-page-title-main">Ambient intelligence</span>

Ambient intelligence (AmI) refers to environments with electronic devices that are aware of and can recognize the presence of human beings and adapt accordingly. This concept encompasses various technologies in consumer electronics, telecommunications, and computing. Its primary purpose is to enhance user interactions through context-aware systems.

<span class="mw-page-title-main">Smart environment</span> Computing environment involving multiple devices

Smart environments link computers and other smart devices to everyday settings and tasks. Smart environments include smart homes, smart cities, and smart manufacturing.

<span class="mw-page-title-main">Edge computing</span> Distributed computing paradigm

Edge computing is a distributed computing model that brings computation and data storage closer to the sources of data. More broadly, it refers to any design that pushes computation physically closer to a user, so as to reduce the latency compared to when an application runs on a centralized data centre.

<span class="mw-page-title-main">Smart transducer</span>

A smart transducer is an analog or digital transducer, actuator, or sensor combined with a processing unit and a communication interface.

Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network and be individually addressable.

Dust Networks, Inc. is an American company that specializes in the design and manufacture of wireless sensor networks for industrial applications including process monitoring, condition monitoring, asset management, environment, health and safety (EHS) monitoring, and power management. They were acquired by Linear Technology, Inc in December 2011, which in turn was acquired by Analog Devices, Inc. in 2017. The Dust Networks product team operates in the IoT Networking Platforms group of Analog Devices.

DASH7 Alliance Protocol (D7A) is an open-source wireless sensor and actuator network protocol, which operates in the 433 MHz, 868 MHz and 915 MHz unlicensed ISM/SRD band. DASH7 provides multi-year battery life, range of up to 2 km, low latency for connecting with moving things, a very small open-source protocol stack, AES 128-bit shared-key encryption support, and data transfer of up to 167 kbit/s. The DASH7 Alliance Protocol is the name of the technology promoted by the non-profit consortium called the DASH7 Alliance.

SensorThings API is an Open Geospatial Consortium (OGC) standard providing an open and unified framework to interconnect IoT sensing devices, data, and applications over the Web. It is an open standard addressing the syntactic interoperability and semantic interoperability of the Internet of Things. It complements the existing IoT networking protocols such CoAP, MQTT, HTTP, 6LowPAN. While the above-mentioned IoT networking protocols are addressing the ability for different IoT systems to exchange information, OGC SensorThings API is addressing the ability for different IoT systems to use and understand the exchanged information. As an OGC standard, SensorThings API also allows easy integration into existing Spatial Data Infrastructures or Geographic Information Systems.

The industrial internet of things (IIoT) refers to interconnected sensors, instruments, and other devices networked together with computers' industrial applications, including manufacturing and energy management. This connectivity allows for data collection, exchange, and analysis, potentially facilitating improvements in productivity and efficiency as well as other economic benefits. The IIoT is an evolution of a distributed control system (DCS) that allows for a higher degree of automation by using cloud computing to refine and optimize the process controls.

<span class="mw-page-title-main">Subsea Internet of Things</span>

Subsea Internet of Things (SIoT) is a network of smart, wireless sensors and smart devices configured to provide actionable operational intelligence such as performance, condition and diagnostic information. It is coined from the term The Internet of Things (IoT). Unlike IoT, SIoT focuses on subsea communication through the water and the water-air boundary. SIoT systems are based around smart, wireless devices incorporating Seatooth radio and Seatooth Hybrid technologies. SIoT systems incorporate standard sensors including temperature, pressure, flow, vibration, corrosion and video. Processed information is shared among nearby wireless sensor nodes. SIoT systems are used for environmental monitoring, oil & gas production control and optimisation and subsea asset integrity management. Some features of IoT's share similar characteristics to cloud computing. There is also a recent increase of interest looking at the integration of IoT and cloud computing. Subsea cloud computing is an architecture design to provide an efficient means of SIoT systems to manage large data sets. It is an adaption of cloud computing frameworks to meet the needs of the underwater environment. Similarly to fog computing or edge computing, critical focus remains at the edge. Algorithms are used to interrogate the data set for information which is used to optimise production.

<span class="mw-page-title-main">IoBT-CRA</span>

The Internet of Battlefield Things Collaborative Research Alliance (IoBT-CRA), also known as the Internet of Battlefield Things Research on Evolving Intelligent Goal-driven Networks, is a collaborative research alliance between government, industry, and university researchers for the purposes of developing a fundamental understanding of a dynamic, goal-driven Internet of Military Things (IoMT) known as the Internet of Battlefield Things (IoBT). It was first established by the U.S. Army Research Laboratory (ARL) to investigate the use of machine intelligence and smart technology on the battlefield, as well as strengthen the collaboration between autonomous agents and human soldiers in combat. An initial grant of $25 million was provided by ARL in October 2017 to fund the first five years of this potential 10-year research program.

<span class="mw-page-title-main">Joint Artificial Intelligence Center</span>

The Joint Artificial Intelligence Center (JAIC) (pronounced "jake") was an American organization on exploring the usage of Artificial Intelligence (AI) (particularly Edge computing), Network of Networks and AI-enhanced communication for use in actual combat. In February 2022, JAIC was integrated into the Chief Digital and Artificial Intelligence Office (CDAO).

<span class="mw-page-title-main">IoT forensics</span> Branch of digital forensics

IoT Forensics or IoT Forensic Science, a branch of digital forensics, that deals with the use of any digital forensics processes and procedures relating to the recovery of digital evidence which originates from one or more IoT devices for the purpose of preservation, identification, extraction or documentation of digital evidence with the intention of reconstructing IoT-related events. These events may reside across one or more configurable computing resources that are within close proximity to the location where the event has taken place.

The Internet of Musical Things is a research area that aims to bring Internet of Things connectivity to musical and artistic practices. Moreover, it encompasses concepts coming from music computing, ubiquitous music, human-computer interaction, artificial intelligence, augmented reality, virtual reality, gaming, participative art, and new interfaces for musical expression. From a computational perspective, IoMusT refers to local or remote networks embedded with devices capable of generating and/or playing musical content.

References

  1. 1 2 Rowlands, Greg (May 21, 2017). "The Internet of Military Things & Machine Intelligence: A Winning Edge or Security Nightmare?". Australian Army. Retrieved October 31, 2019.
  2. 1 2 3 Cameron, Lori (2018). "Internet of Things Meets the Military and Battlefield: Connecting Gear and Biometric Wearables for an IoMT and IoBT". IEEE Computer Society. Retrieved October 31, 2019.
  3. 1 2 Machi, Vivienne (January 22, 2018). "Internet of Things to Provide Intelligence for Urban Warfare". National Defense. Retrieved October 31, 2019.
  4. Kott, Alexander; Alberts, David; Wang, Cliff (December 2015). "Will Cybersecurity Dictate the Outcome of Future Wars?". Computer. 48 (12): 98–101. doi:10.1109/MC.2015.359. ISSN   1558-0814. S2CID   2295481.
  5. "Internet of Battlefield Things (IoBT) Collaborative Research Alliance (CRA)". GovTribe. April 5, 2017. Retrieved October 31, 2019.
  6. Yushi, Lan; Fei, Jiang; Hui, Yu (May 25, 2012). "Study on application modes of military Internet of Things (MIOT)". 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE). pp. 630–634. doi:10.1109/CSAE.2012.6273031. ISBN   978-1-4673-0089-6. S2CID   16002322.
  7. 1 2 3 4 5 6 7 8 9 Kott, Alexander; Swami, Ananthram; West, Bruce (December 25, 2017). "The Internet of Battle Things". Computer. 49 (12): 70–75. arXiv: 1712.08980 . doi:10.1109/MC.2016.355. S2CID   5729832.
  8. Castiglione, Aniello; Choo, Kim-Kwang; Nappi, Michele; Ricciardi, Stefano (November 2017). "Context Aware Ubiquitous Biometrics in Edge of Military Things". IEEE Cloud Computing. 4 (6): 16–20. doi:10.1109/MCC.2018.1081072. ISSN   2325-6095. S2CID   3406869.
  9. Kott, Alexander (March 20, 2018). "Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments". Proceedings of the 2018 Spring Symposium of AAAI. arXiv: 1803.11256 . Bibcode:2018arXiv180311256K.
  10. 1 2 Russell, Stephen; Abdelzaher, Tarek (October 29, 2018). "The Internet of Battlefield Things: The Next Generation of Command, Control, Communications and Intelligence (C3I) Decision-Making". MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM). pp. 737–742. doi:10.1109/MILCOM.2018.8599853. ISBN   978-1-5386-7185-6. S2CID   57377070.
  11. Sydney J. Freedberg Jr. (17 Nov 2020) Project Rainmaker: Army Weaves ‘Data Fabric’ To Link Joint Networks: CCDC C5ISR built Project Rainmaker to weave together a data fabric which is foundational to JADC2
  12. Colin Demarest (26 Dec 2022) Q&A: Army’s Jennifer Swanson talks data mesh and digital fluency 31 responses to Technical Exchange Meeting 9
  13. Lauren C. Williams (16 Jun 2023) Become Interoperable or Disappear, Former DOD Data Chief Tells Contractors
  14. 1 2 3 Parker, Paul (October 3, 2018). "The internet of battlefield things is coming. Are IT pros ready?". C4ISRNET. Retrieved October 31, 2019.
  15. Russell, Stephen (March 27, 2017). "Internet of Battlefield things (IoBT) Collaborative Research Alliance Opportunity Day" (PDF). U.S. Army Research Laboratory. Retrieved October 31, 2019.
  16. Saxena, Shalini (March 1, 2017). "Researchers create electronic rose complete with wires and supercapacitors". Ars Technica. Retrieved October 31, 2019.
  17. Wassell, Pete (April 27, 2018). "3 Military Applications of The Internet of Things". Augmate. Retrieved October 31, 2019.
  18. Stone, Adam (October 11, 2018). "The answer to battlefield logistics problems could be IoT". C4ISRNET. Retrieved October 31, 2019.
  19. Seffers, George (March 1, 2017). "NATO Studying Military IoT Applications". SIGNAL Magazine. Retrieved October 31, 2019.
  20. Suri, Niranjan; Tortonesi, Mauro; Michaelis, James; Budulas, Peter; Benincasa, Giacomo; Russell, Stephen; Stefanelli, Cesare; Winkler, Robert (May 23, 2016). "Analyzing the applicability of Internet of Things to the battlefield environment". 2016 International Conference on Military Communications and Information Systems (ICMCIS). pp. 1–8. doi:10.1109/ICMCIS.2016.7496574. ISBN   978-1-5090-1777-5. S2CID   17390182.
  21. 1 2 "The Evolution of Wireless Sensor Networks" (PDF). Silicon Labs. 2013. Retrieved October 31, 2019.
  22. 1 2 3 4 5 Zheng, Denise; Carter, William (October 7, 2015). Leveraging the Internet of Things for a More Efficient and Effective Military. Lanham, MD: Rowman & Littlefield Publishers. ISBN   978-1-4422-5890-7.
  23. "Nett Warrior (formerly Ground Soldier System)" (PDF). The Office of the Director, Operational Test and Evaluation. Retrieved October 31, 2019.
  24. "Force XXI Battle Command Brigade and Below – FBCB2". Defense Update. July 23, 2005. Retrieved October 31, 2019.
  25. Breeden II, John (May 1, 2018). "The Internet of Things' Role on Battlefields and at Sea". Nextgov. Retrieved October 31, 2019.
  26. Beinart, Matthew (April 24, 2018). "Air Force Improving Data Control, Cyber Security Before Deploying New Sensors For IoT Devices". Defense Daily. Retrieved October 31, 2019.
  27. ANSYS Inc. (August 19, 2019). "Connected Soldier". ANSYS. Retrieved October 31, 2019.
  28. "Engineering the Internet of Things: The Connected Soldier" (PDF). ANSYS. 2016. Retrieved October 31, 2019.
  29. Stackpole, Beth (September 1, 2016). "Keeping the Connected Soldier Connected with Simulation". Digital Engineering 24/7. Retrieved October 31, 2019.
  30. 1 2 "Army Takes on Wicked Problems With the Internet of Battlefield Things". MeriTalk. January 30, 2018. Retrieved October 31, 2019.
  31. 1 2 Quach, Katyanna (April 11, 2018). "Get ready for the Internet of Battle Things, warns US Army AI boffin". The Register. Retrieved October 31, 2019.
  32. Tucker, Patrick (July 18, 2017). "US Army Seeks Internet-of-Battlefield-Things, Distributed Bot Swarms". Defense One. Retrieved October 31, 2019.
  33. 1 2 3 Gudeman, Kim (October 6, 2017). "Next-Generation Internet of Battle Things (IoBT) Aims to Help Keep Troops and Civilians Safe". ECE Illinois. Retrieved October 31, 2019.
  34. "IoBT: Empowering Readiness to Meet Commander Intent". IoBT REIGN. Retrieved October 31, 2019.
  35. 1 2 3 Abdelzaher, Tarek; et al. (November 2018). "Toward an Internet of Battlefield Things: A Resilience Perspective". Computer. 51 (11): 24–36. doi:10.1109/MC.2018.2876048. ISSN   1558-0814. S2CID   59525160.
  36. 1 2 3 4 5 6 Lawless, William; Mittu, Ranjeev; Sofge, Donald; Moskowitz, Ira; Russell, Stephen, eds. (2019). Artificial Intelligence for the Internet of Everything. Cambridge, MA: Academic Press. ISBN   9780128176368.
  37. Stone, Adam (August 3, 2018). "The internet of battlefield things will depend on modernized networks". C4ISRNET. Retrieved October 31, 2019.
  38. Magnuson, Stew (November 16, 2018). "DARPA Pushes 'Mosaic Warfare' Concept". National Defense. Retrieved October 31, 2019.
  39. 1 2 Weerts, Gwen (March 7, 2019). "Mosaic Warfare". SPIE. Retrieved October 31, 2019.
  40. "DARPA Tiles Together a Vision of Mosaic Warfare". DARPA. Retrieved October 31, 2019.
  41. Naegele, Tobias (September 10, 2019). "Mosaic Warfare: DARPA's Answer to Combating America's Advanced Foes". Air Force Magazine. Retrieved October 31, 2019.
  42. Hitchens, Theresa (September 10, 2019). "DARPA's Mosaic Warfare — Multi Domain Ops, But Faster". Breaking Defense. Retrieved October 31, 2019.
  43. Barry, Mark (December 21, 2017). "DARPA & The Ocean of Things". Aberdeen. Retrieved October 31, 2019.
  44. Hill, Kelly (December 19, 2017). "DARPA wants an "ocean of things"". RCR Wireless News. Retrieved October 31, 2019.
  45. "Ocean of Things Aims to Expand Maritime Awareness across Open Seas". DARPA. December 6, 2017. Retrieved October 31, 2019.
  46. 1 2 "DARPA Floats a Proposal for the Ocean of Things". MeriTalk. January 3, 2018. Retrieved October 31, 2019.
  47. Cenciotti, David (June 20, 2017). "Cybersecurity In The Sky: Internet of Things Capabilities Making Aircraft More Exposed To Cyber Threats Than Ever Before". The Aviationist. Retrieved October 31, 2019.
  48. Seffers, George (January 1, 2015). "Defense Department Awakens to Internet of Things". SIGNAL Magazine. Retrieved October 31, 2019.
  49. Sternstein, Aliya (March 31, 2017). "A more connected military means new battlefield glitches, too". The Christian Science Monitor. Retrieved October 31, 2019.