IoT for Defense and National Security

by ; ; ;
Edition: 1st
Format: Hardcover
Pub. Date: 2023-01-25
Publisher(s): Wiley-IEEE Press
  • eCampus.com Device Compatibility Matrix

    Click the device icon to install or view instructions

    Apple iOS | iPad, iPhone, iPod
    Apple iOS | iPad, iPhone, iPod
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Windows 10 / 8 / 7 / Vista / XP
    Windows 10 / 8 / 7 / Vista / XP
    Mac OS X | **iMac / Macbook
    Mac OS X | **iMac / Macbook
    Enjoy offline reading with these devices
    Apple Devices
    Android Devices
    Windows Devices
    Mac Devices
    iPad, iPhone, iPod
    Our reader is compatible
     
     
     
    Android 2.2 +
     
    Our reader is compatible
     
     
    Kindle Fire
     
    Our reader is compatible
     
     
    Windows
    10 / 8 / 7 / Vista / XP
     
     
    Our reader is compatible
     
    Mac
     
     
     
    Our reader is compatible
List Price: $166.44

Buy New

Usually Ships in 8 - 10 Business Days.
$158.51

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$139.20
$139.20

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book covers topics on IoT security, architecture, robotics, sensing, policy, operations and more, written by leading researchers and practitioners of IoT technology for defense and national security. Section 1 addresses IoT for defense and national security in a wider context, providing an overview of the U.S. Army’s research consortium titled “Internet of Battle Things”, a collaboration between the U.S. Army and leading IoT research institutions. Section 2 reviews topics in IoT architectures, operations, and infrastructure for defense. Section 3 describes specific applications of IoT for robotics and sensing. Section 4 contains information on addressing security, survivability and operations in hostile environments, all topics essential to safe and successful use of IoT for defense. Section 5 concludes with approaches to IoT communications and networking in defense environments, including discussions that explore robust IoT achieved by distributing content and processing to the edge of the network.

Author Biography

Robert Douglass, PhD, is the Chief Technology Officer at Alta Montes Inc.

Keith Gremban, PhD, is a Senior Fellow with the Silicon Flatirons Center at the University of Colorado School of Law.

Ananthram Swami, PhD, is the Director of Internet of Battle Things with the DEVCOM Army Research Laboratory. He is a co-author of the Wiley title Wireless Sensor Networks: Signal Processing and Communications Perspectives (2007).

Stephan Gerali, PhD, is a Senior Fellow at Lockheed Martin, Inc.

Table of Contents

List of Contributors xix

Introduction: IoT for Defense and National Security xxv
Robert Douglass

Section 1 Introduction: Vision, Applications, and Opportunities 1
Stephan Gerali

1 Internet of Battlefield Things: Challenges, Opportunities, and Emerging Directions 5
Maggie Wigness, Tarek Abdelzaher, Stephen Russell, and Ananthram Swami

1.1 IoBT Vision 5

1.2 IoBT vs. IoT 6

1.3 IoBT Operational Requirements 7

1.5 Performant and Resilient IoBTs 13

1.6 Future Directions 16

1.7 Conclusion 19

References 20

2 Sensorized Warfighter Weapon Platforms: IoT Making the Fog of War Obsolete 23
Kyle Broadway

2.1 Introduction 24

2.2 IoT for Firearms 26

2.3 New Insights into the Battlefield Provided by IoT 27

2.4 Challenges for IoT in Soldier Weapons 31

2.5 Battlefield Challenges to Aggregating and Exfiltrating Data 32

2.6 Protection and Security for IoT Data Communication 34

2.7 State of the Art 37

2.8 Conclusion 37

References 38

3 IoBT Resource Allocation via Mixed Discrete and Continuous Optimization 39
Jonathan Bunton and Paulo Tabuada

3.1 Introduction 39

3.2 Lattices and Submodular Functions 42

3.3 Problem Formulation 43

3.4 An Equivalent Parameterization 44

3.5 Returning to Constraints 47

3.6 Computational Examples 50

3.7 Conclusions 55

References 55

4 Operationalizing IoT Data for Defense and National Security 59
Steve Morgan and Jaime Wightman

4.1 Introduction 59

4.2 Problem Statement 60

4.3 Challenges 62

4.4 Security Considerations 64

4.5 Developing a Strategy for Operationalizing Data 65

4.6 Precedence 69

4.7 End State 70

4.8 Conclusion 71

References 71

5 Real Time Monitoring of Industrial Machines using AWS IoT 73
Stephan Gerali

5.1 Problem Statement 73

5.2 Solution Statement – Overview 74

5.3 Solution Statement – Edge Computing 74

5.4 Solution Statement – Cloud Connectivity 75

5.5 Solution Statement – Streaming Analytics and Data Storage 76

5.6 Solution Statement – Data Visualization 77

5.7 Solution Statement – Example Data Visualizations 78

5.8 Results 79

5.9 Next Steps 79

References 80

6 Challenges and Opportunities of IoT for Defense and National Security Logistics 83
Gisele Bennett, William Crowder, and Christina Baxter

6.1 Introduction 83

6.2 Linking Industry and DoD Uses of IoT 84

6.3 Situational Awareness 85

6.4 Applications for DoD 86

6.5 Observations on the Future 93

Acknowledgement 94

References 94

7 Digital Twins for Warship Systems: Technologies, Applications and Challenges 97
Sara Ferreno-Gonzalez, Alicia Munin-Doce, Marcos Míguez González, Lucía Santiago Caamaño, and Vicente Diaz-Casas

7.1 Introduction 97

7.2 A Digital Twin Architecture for Implementation 99

7.3 Ship Digital Twin Implementation 108

References 111

Section 2 Introduction: Artificial Intelligence and IoT for Defense and National Security 115
Robert Douglass

8 Principles of Robust Learning and Inference for IoBTs 119
Nathaniel D. Bastian, Susmit Jha, Paulo Tabuada, Venugopal Veeravalli, and Gunjan Verma

8.1 Internet of Battlefield Things and Intelligence 119

8.2 Dimensions of Responsible AI 120

8.3 Detecting Surprise: Adversarial Defense and Outlier Detection 123

8.4 Novel Deep Learning Representation: Dynamical System 124

8.5 Robust Secure State Estimation 125

8.6 Distributionally Robust Learning 126

8.7 Future Directions 127

8.8 Conclusion 128

References 128

9 AI at the Edge: Challenges, Applications, and Directions 133
Dhiraj Joshi, Nirmit Desai, Shyama Prosad Chowdhury, Wei-Han Lee, Luis Bathen, Shiqiang Wang, and Dinesh Verma

9.1 Introduction 133

9.2 IoT Applications 134

9.3 Distributed AI Architecture 138

9.4 Technology 143

9.5 Research Directions 152

9.6 Conclusions 155

References 155

10 AI Enabled Processing of Environmental Sounds in Commercial and Defense Environments 161
David Wood, Jae-wook Ahn, Seraphin Calo, Nancy Greco, Keith Grueneberg, Tadanobu Inoue, Dinesh Verma, and Shiqiang Wang

10.1 Introduction 161

10.2 Use Cases 166

10.3 System Architecture 169

10.4 Technology 171

10.5 Summary 182

References 183

Section 3 Introduction: Security, Resiliency, and Technology for Adversarial Environments 187
Ananthram Swami

11 Assurance by Design for Cyber-physical Data-driven Systems 191
Satish Chikkagoudar, Samrat Chatterjee, Ramesh Bharadwaj, Auroop Ganguly, Sastry Kompella, and Darlene Thorsen

11.1 Introduction 191

11.2 Methods for Assurance 196

11.3 Discussion and Conclusion 207

References 208

12 Vulnerabilities in IoT Systems 213
Zheng Fang and Prasant Mohapatra

12.1 Introduction 213

12.2 Firmware 217

12.3 Communication Protocols 219

12.4 IoT Apps 224

12.5 Physical Dependencies 226

12.6 Companion Mobile Apps 227

12.7 Hardware 228

12.8 IoT Platforms 229

12.9 Countermeasures 230

12.10 Conclusions 231

References 231

13 Intrusion Detection Systems for IoT 237
Hyunwoo Lee, Anand Mudgerikar, Ninghui Li, and Elisa Bertino

13.1 Introduction 237

13.2 Background 238

13.3 IoT Attack Scenarios 243

13.4 Proposed IDSes for IoT 245

13.5 Research Directions 252

Acknowledgement 254

References 255

14 Bringing Intelligence at the Network Data Plane for Internet of Things Security 259
Qiaofeng Qin, Konstantinos Poularakis, and Leandros Tassiulas

14.1 Introduction 259

14.2 Related Work 262

14.3 System Design 263

14.4 Problem Modeling 266

14.5 Algorithms and Learning Models 267

14.6 Evaluation Results 271

14.7 Conclusions and Future Challenges 280

Acknowledgment 281

References 281

15 Distributed Computing for Internet of Things Under Adversarial Environments 285
Gowri Sankar Ramachandran, Luis A. Garcia, and Bhaskar Krishnamachari

15.1 Introduction 285

15.2 Distributed Computing for IoT in Defense Applications 287

15.3 Threat Model 288

15.4 Frameworks for Distributed Computing 291

15.5 Establishing Trust in Adversarial Environments: Solutions and Open Opportunities 295

15.6 Summary 302

Acknowledgment 303

References 303

16 Ensuring the Security of Defense IoT Through Automatic Code Generation 307
M. Douglas Williams and Robert Douglass

16.1 The Challenge of IoT in Defense and National Security Applications: The Challenge 307

16.2 Solutions 308

16.3 Automatic Code Generation 312

16.4 IoT Interface-code Issuing Authority 319

16.5 Conclusions 321

References 322

Section 4 Introduction: Communications and Networking 325
Keith Gremban

17 Leveraging Commercial Communications for Defense IoT 327
Keith Gremban and Paul J. Kolodzy

17.1 Introduction 327

17.2 Key Differences Between Defense and Commercial Communications Requirements 329

17.2.1 Interoperability 329

17.2.2 Mobility 330

17.2.3 Security 330

17.2.4 Vulnerability 331

17.3 Key Differences Between Defense and Commercial Technology Development 332

17.4 Commercial Communications for Use in Defense and Homeland Security 334

17.5 Conclusion 337

References 337

18 Military IoT: Tactical Edge Clouds for Content Sharing Across Heterogeneous Networks 339
Tim Strayer, Sam Nelson, Dan Coffin, Bishal Thapa, Joud Khoury, Armando Caro, Michael Atighetchi, and Stephane Blais

18.1 Introduction 339

18.2 The Need for Tactical Edge Clouds 341

18.3 Two Architectures 342

18.4 Tactical Edge Cloud Architectural Insights 347

18.5 Summary 351

Acknowledgment 351

References 351

19 Spectrum Challenges in the Internet of Things: State of the Art and Next Steps 353
Francesco Restuccia, Tommaso Melodia, and Jonathan Ashdown

19.1 Introduction 353

19.2 Spectrum Bands of Interest in the Internet of Things 356

19.3 Spectrum Management in the Internet of Things: Requirements and Existing Work 358

19.4 Spectrum Management in the Internet of Things: The Way Ahead 360

19.5 Conclusions 366

References 367

20 Tactical Edge IoT in Defense and National Security 377
Paula Fraga-Lamas and Tiago M. Fernández-Caramés

20.1 Introduction 377

20.2 Background 378

20.3 Compelling COTS Edge IoT Applications 382

20.4 Target Scenarios for Tactical Edge IoT 382

20.5 Communications Architecture 386

20.6 Main Challenges and Recommendations 388

20.7 Conclusions 390

Acknowledgments 390

References 390

21 Use and Abuse of IoT: Challenges and Recommendations 397
Robert Douglass

21.1 The Elements of IoT and Their Nature 398

21.2 Preventing the Abuse of IoT While Enabling Its Benefits 433

21.3 Types of Abuse and Misuse, and Prevention Through Regulation 440

21.4 Concluding Remarks: A Call to Action 457

References 458

Index 467

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.