ISBN-13: 9781119892144 / Angielski / Twarda / 2023
ISBN-13: 9781119892144 / Angielski / Twarda / 2023
List of Contributors xixIntroduction: IoT for Defense and National Security xxvRobert DouglassSection 1 Introduction: Vision, Applications, and Opportunities 1Stephan Gerali1 Internet of Battlefield Things: Challenges, Opportunities, and Emerging Directions 5Maggie Wigness, Tarek Abdelzaher, Stephen Russell, and Ananthram Swami1.1 IoBT Vision 51.2 IoBT vs. IoT 61.3 IoBT Operational Requirements 71.5 Performant and Resilient IoBTs 131.6 Future Directions 161.7 Conclusion 19References 202 Sensorized Warfighter Weapon Platforms: IoT Making the Fog of War Obsolete 23Kyle Broadway2.1 Introduction 242.2 IoT for Firearms 262.3 New Insights into the Battlefield Provided by IoT 272.4 Challenges for IoT in Soldier Weapons 312.5 Battlefield Challenges to Aggregating and Exfiltrating Data 322.6 Protection and Security for IoT Data Communication 342.7 State of the Art 372.8 Conclusion 37References 383 IoBT Resource Allocation via Mixed Discrete and Continuous Optimization 39Jonathan Bunton and Paulo Tabuada3.1 Introduction 393.2 Lattices and Submodular Functions 423.3 Problem Formulation 433.4 An Equivalent Parameterization 443.5 Returning to Constraints 473.6 Computational Examples 503.7 Conclusions 55References 554 Operationalizing IoT Data for Defense and National Security 59Steve Morgan and Jaime Wightman4.1 Introduction 594.2 Problem Statement 604.3 Challenges 624.4 Security Considerations 644.5 Developing a Strategy for Operationalizing Data 654.6 Precedence 694.7 End State 704.8 Conclusion 71References 715 Real Time Monitoring of Industrial Machines using AWS IoT 73Stephan Gerali5.1 Problem Statement 735.2 Solution Statement - Overview 745.3 Solution Statement - Edge Computing 745.4 Solution Statement - Cloud Connectivity 755.5 Solution Statement - Streaming Analytics and Data Storage 765.6 Solution Statement - Data Visualization 775.7 Solution Statement - Example Data Visualizations 785.8 Results 795.9 Next Steps 79References 806 Challenges and Opportunities of IoT for Defense and National Security Logistics 83Gisele Bennett, William Crowder, and Christina Baxter6.1 Introduction 836.2 Linking Industry and DoD Uses of IoT 846.3 Situational Awareness 856.4 Applications for DoD 866.5 Observations on the Future 93Acknowledgement 94References 947 Digital Twins for Warship Systems: Technologies, Applications and Challenges 97Sara Ferreno-Gonzalez, Alicia Munin-Doce, Marcos Míguez González, Lucía Santiago Caamaño, and Vicente Diaz-Casas7.1 Introduction 977.2 A Digital Twin Architecture for Implementation 997.3 Ship Digital Twin Implementation 108References 111Section 2 Introduction: Artificial Intelligence and IoT for Defense and National Security 115Robert Douglass8 Principles of Robust Learning and Inference for IoBTs 119Nathaniel D. Bastian, Susmit Jha, Paulo Tabuada, Venugopal Veeravalli, and Gunjan Verma8.1 Internet of Battlefield Things and Intelligence 1198.2 Dimensions of Responsible AI 1208.3 Detecting Surprise: Adversarial Defense and Outlier Detection 1238.4 Novel Deep Learning Representation: Dynamical System 1248.5 Robust Secure State Estimation 1258.6 Distributionally Robust Learning 1268.7 Future Directions 1278.8 Conclusion 128References 1289 AI at the Edge: Challenges, Applications, and Directions 133Dhiraj Joshi, Nirmit Desai, Shyama Prosad Chowdhury, Wei-Han Lee, Luis Bathen, Shiqiang Wang, and Dinesh Verma9.1 Introduction 1339.2 IoT Applications 1349.3 Distributed AI Architecture 1389.4 Technology 1439.5 Research Directions 1529.6 Conclusions 155References 15510 AI Enabled Processing of Environmental Sounds in Commercial and Defense Environments 161David Wood, Jae-wook Ahn, Seraphin Calo, Nancy Greco, Keith Grueneberg, Tadanobu Inoue, Dinesh Verma, and Shiqiang Wang10.1 Introduction 16110.2 Use Cases 16610.3 System Architecture 16910.4 Technology 17110.5 Summary 182References 183Section 3 Introduction: Security, Resiliency, and Technology for Adversarial Environments 187Ananthram Swami11 Assurance by Design for Cyber-physical Data-driven Systems 191Satish Chikkagoudar, Samrat Chatterjee, Ramesh Bharadwaj, Auroop Ganguly, Sastry Kompella, and Darlene Thorsen11.1 Introduction 19111.2 Methods for Assurance 19611.3 Discussion and Conclusion 207References 20812 Vulnerabilities in IoT Systems 213Zheng Fang and Prasant Mohapatra12.1 Introduction 21312.2 Firmware 21712.3 Communication Protocols 21912.4 IoT Apps 22412.5 Physical Dependencies 22612.6 Companion Mobile Apps 22712.7 Hardware 22812.8 IoT Platforms 22912.9 Countermeasures 23012.10 Conclusions 231References 23113 Intrusion Detection Systems for IoT 237Hyunwoo Lee, Anand Mudgerikar, Ninghui Li, and Elisa Bertino13.1 Introduction 23713.2 Background 23813.3 IoT Attack Scenarios 24313.4 Proposed IDSes for IoT 24513.5 Research Directions 252Acknowledgement 254References 25514 Bringing Intelligence at the Network Data Plane for Internet of Things Security 259Qiaofeng Qin, Konstantinos Poularakis, and Leandros Tassiulas14.1 Introduction 25914.2 Related Work 26214.3 System Design 26314.4 Problem Modeling 26614.5 Algorithms and Learning Models 26714.6 Evaluation Results 27114.7 Conclusions and Future Challenges 280Acknowledgment 281References 28115 Distributed Computing for Internet of Things Under Adversarial Environments 285Gowri Sankar Ramachandran, Luis A. Garcia, and Bhaskar Krishnamachari15.1 Introduction 28515.2 Distributed Computing for IoT in Defense Applications 28715.3 Threat Model 28815.4 Frameworks for Distributed Computing 29115.5 Establishing Trust in Adversarial Environments: Solutions and Open Opportunities 29515.6 Summary 302Acknowledgment 303References 30316 Ensuring the Security of Defense IoT Through Automatic Code Generation 307M. Douglas Williams and Robert Douglass16.1 The Challenge of IoT in Defense and National Security Applications: The Challenge 30716.2 Solutions 30816.3 Automatic Code Generation 31216.4 IoT Interface-code Issuing Authority 31916.5 Conclusions 321References 322Section 4 Introduction: Communications and Networking 325Keith Gremban17 Leveraging Commercial Communications for Defense IoT 327Keith Gremban and Paul J. Kolodzy17.1 Introduction 32717.2 Key Differences Between Defense and Commercial Communications Requirements 32917.2.1 Interoperability 32917.2.2 Mobility 33017.2.3 Security 33017.2.4 Vulnerability 33117.3 Key Differences Between Defense and Commercial Technology Development 33217.4 Commercial Communications for Use in Defense and Homeland Security 33417.5 Conclusion 337References 33718 Military IoT: Tactical Edge Clouds for Content Sharing Across Heterogeneous Networks 339Tim Strayer, Sam Nelson, Dan Coffin, Bishal Thapa, Joud Khoury, Armando Caro, Michael Atighetchi, and Stephane Blais18.1 Introduction 33918.2 The Need for Tactical Edge Clouds 34118.3 Two Architectures 34218.4 Tactical Edge Cloud Architectural Insights 34718.5 Summary 351Acknowledgment 351References 35119 Spectrum Challenges in the Internet of Things: State of the Art and Next Steps 353Francesco Restuccia, Tommaso Melodia, and Jonathan Ashdown19.1 Introduction 35319.2 Spectrum Bands of Interest in the Internet of Things 35619.3 Spectrum Management in the Internet of Things: Requirements and Existing Work 35819.4 Spectrum Management in the Internet of Things: The Way Ahead 36019.5 Conclusions 366References 36720 Tactical Edge IoT in Defense and National Security 377Paula Fraga-Lamas and Tiago M. Fernández-Caramés20.1 Introduction 37720.2 Background 37820.3 Compelling COTS Edge IoT Applications 38220.4 Target Scenarios for Tactical Edge IoT 38220.5 Communications Architecture 38620.6 Main Challenges and Recommendations 38820.7 Conclusions 390Acknowledgments 390References 39021 Use and Abuse of IoT: Challenges and Recommendations 397Robert Douglass21.1 The Elements of IoT and Their Nature 39821.2 Preventing the Abuse of IoT While Enabling Its Benefits 43321.3 Types of Abuse and Misuse, and Prevention Through Regulation 44021.4 Concluding Remarks: A Call to Action 457References 458Index 467
Robert Douglass, PhD, is the Chief Technology Officer at Alta Montes Inc.Keith Gremban, PhD, is Co-Director of the Spectrum Policy Initiative at the Silicon Flatirons Center, and Research Professor in the Ann and H.J. Smead Aerospace Engineering Sciences Department at the University of Colorado Boulder.Ananthram Swami, PhD, is the Army ST for Network Science, and Chief Scientist of the DEVCOM Army Research Laboratory's CRA on the Internet of Battlefield Things. He is a co-editor of the Wiley book, Wireless Sensor Networks: Signal Processing and Communications Perspectives (2007).Stephan Gerali, PhD, is a Senior Fellow at Lockheed Martin, Inc.
1997-2024 DolnySlask.com Agencja Internetowa