Cyber Security Challenges in Future Military Battlefield Information Networks
DOI:
https://doi.org/10.3849/aimt.01248Keywords:
cybersecurity, cyberspace, cyber warfare, electronic warfare, radio networks, securityAbstract
This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks – the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.
References
ALBERTS, D.S., GARSTKA, J.J. and STEIN, F.P. Network Centric Warfare: Developing and Leveraging Information Superiority. CCRP publication series, USA, 2000. 25 p. ISBN 978-1-57906-019-0.
KÄRKKÄINEN, A. Cyber Security Architecture for Military Networks Using Cognitive Network Approach [PhD Thesis]. Helsinki: National Defence University, 2015. 94 p.
Cyber Electromagnetic Activities [on-line]. Field Manual 3-38. Headquarters, Department of the Army, Washington, USA, 2014. 96 p. [cited 2018-01-12]. Available from: https://fas.org/irp/doddir/army/fm3-38.pdf.
CBEST Intelligence-Led Testing. Understanding Cyber Threat Intelligence Operations [on-line]. Mountain View, California, 2016. 48 p. [cited 2018-01-08]. Available from: https://www.bankofengland.co.uk/-/media/boe/files/financialstability/financial-sector-continuity/understanding-cyber-threat-intelligenceoperations.pdf.
NATO Recognises Cyberspace as a ‘Domain of Operations’ [on-line]. NATO Warsaw Summit held on 8-9 July 2016. [cited 2018-01-11]. Available from: https://ccdcoe.org/incyder-articles/nato-recognises-cyberspace-as-a-domain-ofoperations-at-warsaw-summit.
SOLMS, R. and NIEKERK, J. From Information Security to Cyber Security. Computers & Security, 2013, vol. 38, p. 97-102. https://doi.org/10.1016/j.cose.2013.04.004.
ISO/IEC 27033-3:2015, Reference network scenarios – Risks, design techniques and control issues.
STALLINGS, W. and BROWN, L. Computer Security. Principles and Practice. New Jersey: Pearson Education, 2015. 848 p. ISBN 978-0-13-377392-7.
SAARELAINEN, T. Towards Tactical Military Software Defined Radio (SDR). In Proceedings of the Eighth International Conference on Sensor Technologies and Applications. 2014. p. 96-106. ISBN 978-1-61208-374-2.
DAVIES, M. Science and Technology to Understand and Counter Threat Using Electronic Means [on-line]. DST Partnerships Week 2016, 2016. [cited 2018-01-10] Available from: https://www.dst.defence.gov.au/sites/default/files/events/documents/CEWD%20Presentation.pdf.
PLESSIS, W.P. du. Software-Defined Radio (SDR) as a Mechanism for Exploring Cyber-Electronic Warfare (EW) Collaboration. In Proceedings of the 13th Information Security for South Africa Conference (ISSA). Johannesburg: IEEE, 2014. https://doi.org/10.1109/ISSA.2014.6950516.
It’s all SDR-related: Understanding Adaptive Radio, Cognitive Radio, and Intelligent Radio [on-line]. Nutaq Innovation [cited 2018-02-05]. Available from: https://www.nutaq.com/its-all-sdr-related-understanding-adaptive-radiocognitive-radio-and-intelligent-radio.
RILEY, S. “Cyber Terrain”: A Model for Increased Understanding of Cyber Activity [on-line]. October 2014. [cited 2018-08-02]. Available from: http://cyber-analysis.blogspot.sk/.
ZUBAIRI, J.A. and MAHBOOB, A. Cyber Security Standards, Practices and Industrial Applications. Systems and Methodologies. Pennsylvania: Hershey, 2012. 336 p. https://doi.org/10.4018/978-1-60960-851-4.
ZAVIDNIAK, M.P. Operational Military Perspective in Cyber Security IEEE Technology Summit [on-line]. May 2008. [cited 2018-01-15]. Available from https://slideplayer.com/slide/6216812.
Downloads
Published
License
Copyright (c) 2019 Advances in Military Technology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Users can use, reuse and build upon the material published in the journal for any purpose, even commercially.