Abstract

The internet of battlefield things (IoBT) is an innovative technology for improving the operational effectiveness of military systems. It is a network of sensors, wearables, and IoT devices that makes use of cloud and edge computing to create a coherent combat force, connect warfighters with smart technology in armor, radios, weapons, and other objects. To ensure the cybersecurity of IoBT, it is a critical mission to have a systematic understanding of the cyberattack and cyber defense. This article offers an insightful review in order to improve cybersecurity awareness and advance the development of appropriate security mechanisms from both cybersecurity and IoBT perspective. The review characterizes three common types of cyberattacks and three common types of cyber defenses across the military field. Multiple entry-points and single device hacking behavior, unmanned aerial vehicles controlled risks, and collateral damage forms three main crucial attacks to military cyberspace. Comply to connect, blockchain, and artificial cyber hunters are three major types of cyber defense strategies that increase cybersecurity efficiency across current and emerging operational environments.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.