Abstract

Although the defense field is also one of the key areas that use big data for security reasons, there is a lack of study that designs system frameworks and presents security requirements to implement big data in defense. However, we overcome the security matters by examining the battlefield environment and the system through the flow of data in the battlefield. As such, this research was conducted to apply big data in the defense domain, which is a unique field. In particular, a three-layered system framework was designed to apply big data in the C4I system, which collects, manages, and analyzes data generated from the battlefield, and the security measures required for each layer were developed. First, to enhance the general understanding of big data and the military environment, an overview of the C4I system, the characteristics of the 6V’s, and the five-phase big data lifecycle were described. While presenting a framework that divides the C4I system into three layers, the roles and components of each layer are described in detail, considering the big data lifecycle and system framework. A security architecture is finally proposed by specifying security requirements for each field in the three-layered C4I system. The proposed system framework and security architecture more accurately explain the unique nature of the military domain than those studied in healthcare, smart grids, and smart cities; development directions requiring further research are described.

Highlights

  • In the hyper-connected era of the fourth industrial revolution, big data technology is being used to create better lives for people and generate increased profits in the fields of commerce, healthcare, public services, science, military, etc

  • Variety: Military intelligence types include human intelligence (HUMINT), signal intelligence (SIGINT), measurement and signature intelligence (MASINT), geospatial intelligence (GEOINT), open-source intelligence (OSINT), etc. This information is collected from the human, the Internet of Battlefield Things (IoBT), sensors, unmanned aerial vehicles (UAVs), satellites, etc., operated on the battlefield, and the collected data are stored in the database as structured, unstructured, or semi-structured formats

  • Defense C4I systems contain highly sensitive information, which can affect national security and the life of each combatant; they require a high level of protection because the presence of an enemy poses a severe and persistent threat

Read more

Summary

Introduction

In the hyper-connected era of the fourth industrial revolution, big data technology is being used to create better lives for people and generate increased profits in the fields of commerce, healthcare, public services, science, military, etc. Sustainability 2021, 13, 13827 data are different, it is necessary to study the structure and security requirements of the system depending on the field of use. The security architecture for the C4I big data system was designed based on the system framework and security requirement to which big data were applied. Derivation of detailed four-layered security architecture for the military C4I big data system: We derived security requirements for the entire C4I big data system. To understand the military environment, this section presents an overview of C4I systems from a data perspective and how the defense information system is applied to the 6V’s characteristics of big data by examining the details of 6V’s.

Understanding Big Data in Military Environment
Overview of C4I Systems from a Data Perspective and Its Security Concerns
Five-Phase Big Data Lifecycle
C4I System Framework with Big Data in the Battlefield Environment
Layered Big Data System Framework from a System Perspective
Three-Layered C4I System Framework in Terms of Battlefield Data Flow
Proposed C4I Big Data System Framework
Security Architecture for the Military C4I Big Data System
Security Threat and Requirements Related to C4I Big Data System Framework
Data Generation Layer
Data Processing Layer
Data Usage Layer
Evaluation and Discussion
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call