Abstract
This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks - the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.
Highlights
The role of communication networks in military operations keeps on growing in importance, with mission areas such as covert special operations, time‐critical targeting, command and control and logistics, and all of them heavily rely on networks and network applications
While networks bring the promise of increased flexibility and efficiency for defense organizations, they present a myriad of new challenges arising from unique operating conditions and environments and the need for a high level of network security
While the benefits of commercial convergence to IP networks are strong motivators for adoption by military networks, IP has some undesirable characteristics that require attention, especially in terms of security (IPSec and key management) and a somewhat excessive frame structure that results in high overhead on bandwidth‐constrained links. This latter characteristic is especially troublesome in the High Frequency (HF) radio band, which still heavily relies on the military for a variety of tactical communication needs
Summary
The role of communication networks in military operations keeps on growing in importance, with mission areas such as covert special operations, time‐critical targeting, command and control and logistics, and all of them heavily rely on networks and network applications. The rapidly increasing dependence on networks requires the clear understanding of these challenges, as well as robust infrastructure which is secure from current and future cyber threats. Basic communication infrastructure is based on combat network radios, mobile nodes (typically protocol – Transmission Control Protocol/Internet Protocol – TCP/IP) and long‐haul Radio Relays (RRL). Security architectures and controls of obsolete military networks were not designed to face the new threats (for example cyber attacks, remote access to databases ...). Security control is often implemented after the network and new service deployment causing potential vulnerabilities and threats. Problem solution of “hardened internet” nowadays assumed creation of one complex network built from subnetworks – CYBERSPACE
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.