This open-access book examines the military applications of the Internet of Things in three main parts: (I) Motivation and Use Cases, (II) Challenges and Solutions, and (III) Experimental Results and Recommendations. The first part describes the motivation and selected Military IoT (MIoT) application areas. The second part provides an overview of the specific requirements that MIoT applications must meet, including the ability to process large volumes of diverse data, support for increased automation, robust device and network security, and resilience against electronic warfare measures. It…mehr
This open-access book examines the military applications of the Internet of Things in three main parts: (I) Motivation and Use Cases, (II) Challenges and Solutions, and (III) Experimental Results and Recommendations. The first part describes the motivation and selected Military IoT (MIoT) application areas. The second part provides an overview of the specific requirements that MIoT applications must meet, including the ability to process large volumes of diverse data, support for increased automation, robust device and network security, and resilience against electronic warfare measures. It examines existing architectural frameworks for IoT ecosystems and the challenges of integrating these frameworks into current military infrastructure, including communications, and proposes architectural patterns for integrating IoT into the military domain. Part II evaluates current IoT-related technologies for sensing, actuation, and communication relevant to the military domain. It alsooffers a comprehensive overview of various aspects of IT network security in military applications, including the concept of Data-Centric Security, which is viewed as a promising security model for future NATO operations. Other security considerations include securing data exchange between the IoT networks and federated C2 systems, leveraging publish-subscribe services, and incorporating trusted hardware components, such as TPM, into IoT devices to improve security. Part II also outlines a comprehensive approach to ensuring reliability and security across all layers and stages of the MIoT lifecycle and evaluates the suitability of selected fault-tolerance techniques in MIoT, including the need for fault-tolerance methods to be consistently applied across all layers. Part III summarizes five different categories of experiments conducted by the authors on a distributed NATO testbed at multiple physical locations to test and validate IoT technologies and their applications within the military domain.
Artikelnr. des Verlages: 89538231, 978-3-032-03377-2
Seitenzahl: 250
Erscheinungstermin: 10. November 2025
Englisch
Abmessung: 235mm x 155mm
ISBN-13: 9783032033772
ISBN-10: 3032033772
Artikelnr.: 74926949
Herstellerkennzeichnung
Springer-Verlag GmbH
Tiergartenstr. 17
69121 Heidelberg
ProductSafety@springernature.com
Autorenporträt
Niranjan Suri is the Associate for Research in the Military Information Sciences Division at the US Army DEVCOM Army Research Laboratory and an Associate Director and Senior Research Scientist at the Florida Institute for Human & Machine Cognition (IHMC). He received his B.Sc. and M.Sc. in Computer Science from the University of West Florida and his Ph.D. in Computer Science from Lancaster University. His research interests include Internet of Things, Network and Communication Protocols, Distributed Systems, and Information Management. He has authored or co-authored over 250 peer-reviewed papers, holds multiple patents, and has co-edited two books. Konrad Wrona is a Principal Scientist at the NATO Cyber Security Centre in The Hague, Netherlands, where he leads the Research, Policy, and Innovation (RPI) team. He also holds a research position at the Military University of Technology in Warsaw, Poland. Konrad has more than 20 years of experience in both industrial (Ericsson Research and SAP Research) and academic (RWTH Aachen University, Media Lab Europe, and Rutgers University) research and development environments. He earned his M.Eng. in Telecommunications from Warsaw University of Technology, Poland, in 1998, and his Ph.D. in Electrical Engineering from RWTH Aachen University, Germany, in 2005. He is an author and co-author of over a hundred publications and holds several patents. His professional interests include a wide range of security issues in information systems, communication networks, wireless and mobile applications, distributed systems, and the Internet of Things. Konrad Wrona is a Senior Member of the IEEE, a Senior Member of the ACM, and a member of IACR. Zbigniew Zieli¿ski received his Ph.D. in Computer Science in 1988 and his D.Sc. (habilitation) from Military University of Technology (MUT) in 2014. He currently holds a professor position at the MUT in Warsaw. He is an author and a co-author of over ninety papers in the refereed journals and conference proceedings. His current research interests include computer systems dependability and security, fault-tolerant systems, Internet of Things, as well formal methods for ICT systems modeling and validation. He participated both as a team member and a project leader in several R&D projects concerned embedded real-time computer systems, dependability and cybersecurity of CPS systems. Currently he is an expert of the Polish Accreditation Committee and a Member of the IEEE.
Inhaltsangabe
Introduction.- Part I Motivation and use cases.- Motivation for Military Applications of Internet of Things.- Selected application areas.- Part II Challenges and solutions.- Architectural considerations.- Building blocks: Sensing, actuating, and communicating.- Middleware Prototypes.- Security considerations.- Reliability and fault tolerance.- Part III Experimental results and recommendations.- Experimental validation.- Future directions.- Conclusion.
Introduction.- Part I Motivation and use cases.- Motivation for Military Applications of Internet of Things.- Selected application areas.- Part II Challenges and solutions.- Architectural considerations.- Building blocks: Sensing, actuating, and communicating.- Middleware Prototypes.- Security considerations.- Reliability and fault tolerance.- Part III Experimental results and recommendations.- Experimental validation.- Future directions.- Conclusion.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826