Part of a series on |
War |
---|
The Internet of Military Things (IoMT) is a class of Internet of things for combat operations and warfare. It is a complex network of interconnected entities, or "things", in the military domain that continually communicate with each other to coordinate, learn, and interact with the physical environment to accomplish a broad range of activities in a more efficient and informed manner. [1] [2] The concept of IoMT is largely driven by the idea that future military battles will be dominated by machine intelligence and cyber warfare and will likely take place in urban environments. [3] [4] By creating a miniature ecosystem of smart technology capable of distilling sensory information and autonomously governing multiple tasks at once, the IoMT is conceptually designed to offload much of the physical and mental burden that warfighters encounter in a combat setting. [5]
Over time, several different terms have been introduced to describe the use of IoT technology for reconnaissance, environment surveillance, unmanned warfare and other combat purposes. These terms include the Military Internet of Things (MIoT), [6] the Internet of Battle Things, [7] and the Internet of Battlefield Things (IoBT). [8]
The Internet of Military Things encompasses a large range of devices that possess intelligent physical sensing, learning, and actuation capabilities through virtual or cyber interfaces that are integrated into systems. These devices include items such as sensors, vehicles, robots, UAVs, human-wearable devices, biometrics, munitions, armor, weapons, and other smart technology. [9] In general, IoMT devices can generally be classified into one of four categories [10] (but the devices are meant to be ubiquitous enough to form a data fabric): [11] [12] [13]
In addition to connecting different electronic devices to a unified network, researchers have also suggested the possibility of incorporating inanimate and innocuous objects like plants and rocks into the system by fitting them with sensors that will turn them into information gathering points. [14] [15] Such efforts fall in line with projects related to the development of electronic plants, or e-Plants. [16]
Proposed examples of IoMT applications include tactical reconnaissance, smart management of resources, logistics support (i.e. equipment and supply tracking), smart city monitoring, and data warfare. [17] [18] Several nations, as well as NATO officials, have expressed Interest in the potential military benefits of IoT technology. [19]
Advancements in IoMT technology largely stemmed from military efforts to bolster the development of sensor networks and low-power computing platforms during the 1960s for defense applications. [10] [20] During the Cold War, the U.S. military pioneered the use of wireless sensor network technologies to detect and track Soviet submarines. One example was the Sound Surveillance System (SOSUS), a network of underwater acoustic sensors, i.e. hydrophones, placed throughout the Atlantic and Pacific Oceans to act as underwater listening posts for above-ground facilities. [21] Much of the sensor and networking technologies that the U.S. Department of Defense (DoD) developed during this time period ultimately served as the foundation for modern IoT systems. Critically, the DoD helped set the stage for future IoT research in the late 1960s with the creation of ARPANET, an early precursor to the Internet that geographically-dispersed military scientists used to share data. [22]
In the 1980s, the Defense Advanced Projects Agency (DARPA) formally partnered with academic researchers at the Massachusetts Institute of Technology (MIT) and Carnegie Mellon University to further develop distributed, wireless sensor networks. From there, research into wireless sensor technologies spread throughout the civilian research community and eventually found use for industrial applications such as power distribution, wastewater treatment, and factory automation. [21] [22] During this time period, the DoD also invested heavily in the miniaturization of integrated circuits in order to embed various objects with tiny computer chips. As a result of their funding, the commercial microelectronics industry was able to recover when it faced potential decline at the time. [22]
By the late 1990s, the Department of Defense had announced plans for “network-centric” warfare that integrated the physical, information, and cognitive domains to enhance information sharing and collaboration. [22] Examples of projects guided by this goal include the Nett Warrior (formerly known as the Ground Soldier System or Mounted Soldier System) [23] and the Force XXI Battle Command Brigade and Below communication platform, both of which were prevalent in the early 2000s. [24]
However, interest in IoT research in the military started to wane as commercial industry surged ahead with new technology. [3] While DoD continued research into advanced sensors, intelligent information processing systems, and communication networks, few military systems have taken full advantage of the IoT stack such as networked sensors and automated-response technology largely due to security concerns. [22] As of 2019, research in modern IoT technology within the military started to regain a considerable amount of support from the U.S. Army, Navy, and Air Force. [25] [26]
Several initiatives were formed by the Department of Defense in order to bolster IoT research in the military domain as well as to reduce the current gap in progress between military and industry applications.
The Connected Soldier project was a research initiative supported by the U.S. Army Natick Soldier Research, Development and Engineering Center (NSRDEC) that focused on creating intelligent body gear. The project aimed to establish an internet of things for each soldier by integrating wideband radio, biosensors, and smart wearable systems as standard equipment. These devices served not only to monitor the soldier's physiological status but also to communicate mission data, surveillance intelligence, and other important information to nearby military vehicles, aircraft, and other troops. [27] [28] [29]
In 2016, the U.S. Army Research Laboratory (ARL) created the Internet of Battlefield Things (IoBT) project in response to the U.S. Army's operational outline for 2020 to 2040, titled “Winning in a Complex World.” In the outline, the Department of Defense announced its goals to keep up with the technological advances of potential adversaries by turning its attention away from low-tech wars and instead focusing on combat in more urban areas. [30] Acting as a detailed blueprint for what ARL suspected future warfare may entail, the IoBT project pushed for better integration of IoT technology in military operations in order to better prepare for techniques such as electronic warfare that may lie ahead. [31] [32]
In 2017, ARL established the Internet of Battlefield Things Collaborative Research Alliance (IoBT-CRA) to bring together industry, university, and government researchers to advance the theoretical foundations of IoBT systems. [33] [34]
According to ARL, the IoBT was primarily designed to interact with the surrounding environment by acquiring information about the environment, acting upon it, and continually learning from these interactions. As a consequence, research efforts focused on sensing, actuation, and learning challenges. [35] In order for the IoBT to function as intended, the following prerequisite conditions must first be met in regard to technological capability, structural organization, and military implementation.
All entities in the IoBT must be able to properly communicate information to one another even with differences in architectural design and makeup. While future commercial internet of things may exhibit a lack of uniform standards across different brands and manufacturers, entities in IoBT must remain compatible despite displaying extreme heterogeneity. In other words, all electronic equipment, technology, or other commercial offerings accessed by military personnel must share the same language or at least have “translators” that make the transfer and processing of different types of information possible. In addition, the IoBT must be capable of temporarily incorporating available networked devices and channels that it does not own for its own use, especially if doing so is advantageous to the system (e.g. making use of existing civilian networking infrastructure in military operations in a megacity). [7] At the same time, the IoBT must take into consideration the varying degree of trustworthiness of all the networks it leverages. [33]
Timing will be critical in the success of IoBT. The speed of communication, computation, machine learning, inference, and actuation between entities are vital to many mission tasks, as the system must know which type of information to prioritize. [2] Scalability will also serve as an important factor in the operation since the network must be flexible enough to function at any size. [7]
The success of the IoBT framework often hinges on the effectiveness of the mutual collaboration between the human agents and the electronic entities in the network. In a tactical environment, the electronic entities will be tasked with a wide range of objectives from collecting information to executing cyber actions against enemy systems. In order for these technologies to perform those functions effectively, they must be able to not only ascertain the goals of the human agents as they change but also demonstrate a significant level of autonomous self-organization to adjust to the rapidly changing environment. Unlike commercial network infrastructures, the adoption of IoT in the military domain must take into consideration the extreme likelihood that the environment may be intentionally hostile or unstable, which will require a high degree of intelligence to navigate. [36]
As a result, the IoBT technology must be capable of incorporating predictive intelligence, machine learning, and neural network in order to understand the intent of the human users and determine how to fulfill that intent without the process of micromanaging each and every component of the system. [30]
According to ARL, maintaining information dominance will rely on the development of autonomous systems that can operate outside its current state of total dependence on human control. A key focus of IoBT research is the advancement of machine learning algorithms to provide the network with decision-making autonomy. [36] Rather than having one system at the core of the network functioning as the central intelligence component dictating the actions of the network, the IoBT will have intelligence distributed throughout the network. Therefore, individual components can learn, adapt, and interact with each other locally as well as update behaviors and characteristics automatically and dynamically on a global scale to suit the operation as the landscape of warfare constantly evolves. [35] [36] In the context of IoT, the incorporation of artificial intelligence into the sheer volume of data and entities involved in the network will provide an almost infinite number of possibilities for behavior and technological capability in the real world. [36]
In a tactical environment, the IoBT must be able to perform various types of learning behaviors to adapt to the rapidly changing conditions. One area that received considerable attention is the concept of meta-learning, which strives to determine how machines can learn how to learn. Having such a skill would allow the system to avoid fixating on pretrained absolute notions on how it should perceive and act whenever it enters a new environment. Uncertainty quantification models have also generated interest in IoBT research since the system's ability to determine its level of confidence in its own predictions based on its machine learning algorithms may provide some much needed context whenever important tactical decisions need to be made. [36]
The IoBT should also demonstrate a sophisticated level of situation awareness and artificial intelligence that will allow the system to autonomously perform work based on limited information. A primary goal is to teach the network how to correctly infer the complete picture of a situation while measuring relatively few variables. [14] As a result, the system must be capable of integrating the vast amount and variety of data that it regularly collects into its collective intelligence while functioning in a continuous state of learning at multiple time scales, simultaneously learning from past actions while acting in the present and anticipating future events. [33] [36]
The network must also account for unforeseen circumstances, errors, or breakdowns and be able to reconfigure its resources to recover at least a limited level of functionality. [7] However, some components must be prioritized and structured to be more resilient to failure than others. For instance, networks that carry important information such as medical data must never be at risk of shutdown. [37]
For semi-autonomous components, the human cognitive bandwidth serves as a notable constraint for the IoBT due to its limitations in processing and deciphering the flood of information generated by the other entities in the network. In order to obtain truly useful information in a tactical environment, semi-autonomous IoBT technologies must collect an unprecedented volume of data of immense complexity in levels of abstraction, trustworthiness, value, and other attributes. [2] [7] [14] Due to serious limitations in human mental capacity, attention, and time, the network must be able to easily reduce and transform large flows of information produced and delivered by the IoBT into reasonably-sized packets of essential information that is significantly relevant to army personnel, such as signals or warnings that pertain to their current situation and mission. [7]
A key risk of IoBT is the possibility that devices could communicate negligibly useful information that eats up the human's valuable time and attention or even propagate inappropriate information that misleads human individuals into performing actions that lead to adverse or unfavorable outcomes. At the same time, the system will stagnate if the human entities doubt the accuracy of the information provided by the IoBT technology. As a result, the IoBT must operate in a manner that is extremely convenient and easy to understand to the humans without compromising the quality of the information it provides them. [7]
Mosaic Warfare is a term coined by former DARPA Strategic Technology Office director Tom Burns and former deputy director Dan Patt to describe a “systems of systems” approach to military warfare that focuses on re-configuring defense systems and technologies so that they can be fielded rapidly in a variety of different combinations for different tasks. [38] [39] Designed to emulate the adaptable nature of the lego blocks and mosaic art form, Mosaic Warfare was promoted as a strategy to confuse and overwhelm adversary forces by deploying low-cost adaptable technological expendable weapon systems that can play multiple roles and coordinate actions with one another, complicating the decision-making process for the enemy. [40] This method of warfare arose as a response to the current monolithic system in the military, which relies on a centralized command-and-control structure fraught with vulnerable single-point communications and the development of a few highly capable systems that are too important to risk losing in combat. [39] [41]
The concept of Mosaic Warfare existed within DARPA since 2017 and contributed to the development of various technology programs such as the System of Systems Integration Technology and Experimentation (SoSIT), which led to the development of a network system that allows previously disjointed ground stations and platforms to transmit and translate data between one another. [42]
In 2017, DARPA announced the creation of a new program called the Ocean of Things, which planned to apply IoT technology on a grand scale in order to establish a persistent maritime situational awareness over large ocean areas. [43] According to the announcement, the project would involve the deployment of thousands of small, commercially available floats. Each float would contain a suite of sensors that collect environmental data—like sea surface temperature and sea state—and activity data, such as the movement of commercial vessels and aircraft. [44] All the data collected from these floats would then be transmitted periodically to a cloud network for storage and real-time analysis. [45] Through this approach, DARPA aimed to create an extensive sensor network that can autonomously detect, track, and identify both military, commercial, and civilian vessels as well as indicators of other maritime activity. [46]
The Ocean of Things project focused primarily on the design of the sensor floats and the analytic techniques that would be involved in organizing and interpreting the incoming data as its two main objectives. For the float design, the vessel had to be able to withstand the harsh ocean conditions for at least a year while being made out of commercially available components that cost less than $500 each in total. In addition, the floats could not pose any danger to passing vessels and had to be made out of environmentally safe materials so that it could safely dispose of itself in the ocean after completing its mission. In regards to the data analytics, the project concentrated on developing cloud-based software that could collect, process, and transmit data about the environment and their own condition using a dynamic display. [46]
One of the largest potential dangers of IoMT technology is the risk of both adversarial threats and system failures that could compromise the entire network. Since the crux of the IoMT concept is to have every component of the network—sensors, actuators, software, and other electronic devices—connected together to collect and exchange data, poorly protected IoT devices are vulnerable to attacks which may expose large amounts of confidential information. Furthermore, a compromised IoMT network is capable of causing serious, irreparable damage in the form of corrupted software, disinformation, and leaked intelligence. [47]
According to the U.S. Department of Defense, security remains a top priority in IoT research. The IoMT must be able to foresee, avoid, and recover from attempts by adversary forces to attack, impair, hijack, manipulate, or destroy the network and the information that it holds. The use of jamming devices, electronic eavesdropping, or cyber malware may pose a serious risk to the confidentiality, integrity, and availability of the information within the network. Furthermore, the human entities may also be targeted by disinformation campaigns in order to foster distrust in certain elements of the IoMT. [1] [7] Since IoMT technology may be used in an adversarial setting, researchers must account for the possibility that a large number of sources may become compromised to the point where threat-assessing algorithms may use some of those compromised sources to falsely corroborate the veracity of potentially malicious entities. [35]
Minimizing the risks associated with IoT devices will likely require a large-scale effort by the network to maintain impenetrable cybersecurity defenses as well as employ counterintelligence measures that thwart, subvert, or deter potential threats. Examples of possible strategies include the use of “disposable” security, where devices that are believed to be potentially compromised by the enemy are simply discarded or disconnected from the IoMT, and honeynets that mislead enemy eavesdroppers. Since adversary forces are expected to adapt and evolve their strategies for infiltrating the IoMT, the network must also undergo a continuous learning process that autonomously improves anomaly detection, pattern monitoring, and other defensive mechanisms. [7]
Secure data storage serves as one of the key points of interest for IoMT research. Since the IoMT system is predicted to produce an immense volume of information, attention was directed toward new approaches to maintaining data properly and regulating protected access that don't allow for leaks or other vulnerabilities. [48] One potential solution that was proposed by The Pentagon was Comply to Connect (C2C), a network security platform that autonomously monitored device discovery and access control in order to keep pace with the exponentially-growing network of entities. [31]
In addition to the risks of digital interference and manipulation by hackers, concerns have also been expressed regarding the availability of strong wireless signals in remote combat locations. The lack of a constant internet connection was shown to limit the utility and usability of certain military devices that depend on reliable reception. [49]
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.
Measurement and signature intelligence (MASINT) is a technical branch of intelligence gathering, which serves to detect, track, identify or describe the distinctive characteristics (signatures) of fixed or dynamic target sources. This often includes radar intelligence, acoustic intelligence, nuclear intelligence, and chemical and biological intelligence. MASINT is defined as scientific and technical intelligence derived from the analysis of data obtained from sensing instruments for the purpose of identifying any distinctive features associated with the source, emitter or sender, to facilitate the latter's measurement and identification.
Smartdust is a system of many tiny microelectromechanical systems (MEMS) such as sensors, robots, or other devices, that can detect, for example, light, temperature, vibration, magnetism, or chemicals. They are usually operated on a computer network wirelessly and are distributed over some area to perform tasks, usually sensing through radio-frequency identification. Without an antenna of much greater size the range of tiny smart dust communication devices is measured in a few millimeters and they may be vulnerable to electromagnetic disablement and destruction by microwave exposure.
Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advantage through the computer networking of dispersed forces. It was pioneered by the United States Department of Defense in the 1990s.
The Combat Capabilities Development Command (CCDC) C5ISR Center, formerly the Communications-Electronics RD&E Center (CERDEC), is the United States Army information technologies and integrated systems center. CCDC C5ISR Center is headquartered at Aberdeen Proving Ground in Maryland, with activities at Fort Belvoir in Virginia and Joint Base McGuire-Dix-Lakehurst in New Jersey.
In computing, ambient intelligence (AmI) refers to electronic environments that are sensitive and responsive to the presence of people. Ambient intelligence is a projection of the future of consumer electronics, telecommunications, and computing, originally developed in the late 1990s by Eli Zelkha and his team at Palo Alto Ventures for the time frame 2010–2020. This concept is intended to enable devices to work in concert with people in carrying out their everyday life activities, tasks, and rituals in an intuitive way by using information and intelligence hidden in the network connecting these devices. It is theorized that as these devices grow smaller, more connected, and more integrated into our environment, the technological framework behind them would disappear into our surroundings until only the user interface remains perceivable by users.
The U.S. Army Combat Capabilities Development Command Army Research Laboratory is the U.S. Army's foundational research laboratory. ARL is headquartered at the Adelphi Laboratory Center (ALC) in Adelphi, Maryland. Its largest single site is at Aberdeen Proving Ground, Maryland. Other major ARL locations include Research Triangle Park, North Carolina, White Sands Missile Range, New Mexico, Graces Quarters, Maryland, and NASA's Glenn Research Center, Ohio and Langley Research Center, Virginia. ARL also has regional sites in Playa Vista, California, Chicago, Austin, TX, and Boston.
Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This is expected to improve response times and save bandwidth. Edge computing is an architecture rather than a specific technology, and a topology- and location-sensitive form of distributed computing.
A smart transducer is an analog or digital transducer, actuator or sensor combined with a processing unit and a communication interface.
The Internet of things (IoT) describes physical objects with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks. The Internet of things (IoT) falls under the Electronics & Communication and Computer Science Engineering. Internet of things has been considered a misnomer because devices do not need to be connected to the public internet, they only need to be connected to a network, and be individually addressable.
Dust Networks, Inc. is an American company specializing in the design and manufacture of wireless sensor networks for industrial applications including process monitoring, condition monitoring, asset management, Environment, Health and Safety (EHS) monitoring and power management. They were acquired by Linear Technology, Inc in December 2011, which in turn was acquired by Analog Devices, Inc in 2017. The Dust Networks product team operates in the IoT Networking Platforms group of Analog Devices.
Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own." Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems. In the United States Navy, information operations are often supervised by a Navy Information Operations Command (NIOC), for example in the United States Tenth Fleet which has several NIOCs.
The Fourth Industrial Revolution, 4IR, or Industry 4.0, conceptualises rapid change to technology, industries, and societal patterns and processes in the 21st century due to increasing interconnectivity and smart automation. The term was popularised in 2015 by Klaus Schwab, the World Economic Forum founder and executive chairman, and has since been used in numerous economic, political, and scientific articles in reference to the current era of emerging high technology. Schwab asserts that the changes seen are more than just improvements to efficiency, but express a significant shift in industrial capitalism.
A digital twin is a digital representation of an intended or actual real-world physical product, system, or process that serves as the effectively indistinguishable digital counterpart of it for practical purposes, such as simulation, integration, testing, monitoring, and maintenance. The digital twin has been intended from its initial introduction to be the underlying premise for Product Lifecycle Management and exists throughout the entire lifecycle of the physical entity it represents. Since information is granular, the digital twin representation is determined by the value-based use cases it is created to implement. The digital twin can and does often exist before there is a physical entity. The use of a digital twin in the create phase allows the intended entity's entire lifecycle to be modeled and simulated. A digital twin of an existing entity may be used in real time and regularly synchronized with the corresponding physical system.
SensorThings API is an Open Geospatial Consortium (OGC) standard providing an open and unified framework to interconnect IoT sensing devices, data, and applications over the Web. It is an open standard addressing the syntactic interoperability and semantic interoperability of the Internet of Things. It complements the existing IoT networking protocols such CoAP, MQTT, HTTP, 6LowPAN. While the above-mentioned IoT networking protocols are addressing the ability for different IoT systems to exchange information, OGC SensorThings API is addressing the ability for different IoT systems to use and understand the exchanged information. As an OGC standard, SensorThings API also allows easy integration into existing Spatial Data Infrastructures or Geographic Information Systems.
The industrial internet of things (IIoT) refers to interconnected sensors, instruments, and other devices networked together with computers' industrial applications, including manufacturing and energy management. This connectivity allows for data collection, exchange, and analysis, potentially facilitating improvements in productivity and efficiency as well as other economic benefits. The IIoT is an evolution of a distributed control system (DCS) that allows for a higher degree of automation by using cloud computing to refine and optimize the process controls.
Subsea Internet of Things (SIoT) is a network of smart, wireless sensors and smart devices configured to provide actionable operational intelligence such as performance, condition and diagnostic information. It is coined from the term The Internet of Things (IoT). Unlike IoT, SIoT focuses on subsea communication through the water and the water-air boundary. SIoT systems are based around smart, wireless devices incorporating Seatooth radio and Seatooth Hybrid technologies. SIoT systems incorporate standard sensors including temperature, pressure, flow, vibration, corrosion and video. Processed information is shared among nearby wireless sensor nodes. SIoT systems are used for environmental monitoring, oil & gas production control and optimisation and subsea asset integrity management. Some features of IoT's share similar characteristics to cloud computing. There is also a recent increase of interest looking at the integration of IoT and cloud computing. Subsea cloud computing is an architecture design to provide an efficient means of SIoT systems to manage large data sets. It is an adaption of cloud computing frameworks to meet the needs of the underwater environment. Similarly to fog computing or edge computing, critical focus remains at the edge. Algorithms are used to interrogate the data set for information which is used to optimise production.
The Internet of Battlefield Things Collaborative Research Alliance (IoBT-CRA), also known as the Internet of Battlefield Things Research on Evolving Intelligent Goal-driven Networks, is a collaborative research alliance between government, industry, and university researchers for the purposes of developing a fundamental understanding of a dynamic, goal-driven Internet of Military Things (IoMT) known as the Internet of Battlefield Things (IoBT). It was first established by the U.S. Army Research Laboratory (ARL) to investigate the use of machine intelligence and smart technology on the battlefield, as well as strengthen the collaboration between autonomous agents and human soldiers in combat. An initial grant of $25 million was provided by ARL in October 2017 to fund the first five years of this potential 10-year research program.
The Joint Artificial Intelligence Center (JAIC) (pronounced "jake") was an American organization on exploring the usage of Artificial Intelligence (AI) (particularly Edge computing), Network of Networks and AI-enhanced communication for use in actual combat. In February 2022, JAIC was integrated into the Chief Digital and Artificial Intelligence Office (CDAO).
IoT Forensics is a branch of Digital forensics that has the goal of identifying and extracting digital information from devices belonging to the Internet of things field, using a forensically sound and legally acceptable process.