Connecting the Battlespace: �C2 and IoT Technical Interoperability in �Tactical Federated Environments
Marco Manso (marco@particle-summary.pt), Barbara Guerra (PARTICLE SUMMARY Ltd., PORTUGAL)
Janusz Furtak (Military University of Technology of Poland, POLAND)
Frank T. Johnsen (Norwegian Defence Research Establishment (FFI), NORWAY)
James Michaelis (U.S. Army Research Laboratory, USA)
Daniel Ota (Fraunhofer FKIE, GERMANY)
Niranjan Suri (U.S. Army Research Laboratory / Florida Institute for Human and Machine Cognition, USA)
Konrad Wrona (NATO Cyber Security Centre, THE NETHERLANDS)
Outline
This work has been performed in context of the NATO research task group IST-176 on “Federated. Interoperability of Military C2 and IoT Systems”
Background and Motivation
Background and Motivation
Background and Motivation
Technology Stack | Comments | Experimentation campaign plan |
Hardware | See 3.1 and 3.2 | Use COTS: IoT hardware, wearables, sensors, gateways |
Communications and Middleware | See 3.3.1 and 3.3.2 | Use open standards and COTS: Wi-Fi, Ethernet, Bluetooth, MQTT |
Applications | See 4.2.2 | Demonstration using existing C2 and IoT tools and systems |
Security | See 3.4 | Define the theoretical framework to demonstrate in experiments. |
This paper
This paper
Connecting the Battlespace
Connected Soldiers
IoT Connected Battlespace
Connecting the Battlespace
Layer | Protocol | Notes |
Network | IP | Recommended by NC3A |
Transport | TCP | Reliability, fit for stable networks |
UDP | Not reliable, efficient, fit for DIL networks | |
Application | MQTT | Fit for small size messages (<KB) Supports periodic updates (every second) |
WebRTC | Fit for multimedia (audio, video, data) | |
RTSP | Fit for legacy digital CCTV systems | |
Websockets | Fit for data streaming |
Enabling Technologies
Security Considerations
Issues Investigated:
Distributed ledger-based key management
and authentication for federated IoT environments
Security Considerations
Issues Investigated:
Distributed ledger-based key management
and authentication for federated IoT environments
Security Considerations
Issues Investigated:
Distributed ledger-based key management
and authentication for federated IoT environments
Security Considerations
Issues Investigated:
Distributed ledger-based key management
and authentication for federated IoT environments
Experiment Design
TOPIC Structure:
Country-code/organisation-id/device-id
/info
/location
/vitals
/image
/…
Experiment Design
PARTICLE AWARE
U.S. ARL ATAK Display
Fraunhofer FKIE �adapted SitaWare
FFI CAGED SA (left side) and
Metis SA in HQ (right side)
Experiment Design
Conclusion
References
THANK YOU !
POC: Marco Manso (CEO) marco@particle-summary.pt
Authors: Marco Manso, Barbara Guerra, Janusz Furtak, Frank T. Johnsen,
James Michaelis, Daniel Ota, Niranjan Suri, Konrad Wrona