defense iot - royal aeronautical society...defense iot –the things what are the things •...
TRANSCRIPT
2
Defense IoT – The things
• Defense Internet of Things (IoT) – The things
• Defense Bring Your Own Device (BYOD)- The device
• Technological Developments
• Development value proposition
• Tactical byod in IoT - challenge
• Spectrum of joint operations
• Bridging the Hesitation Gap
• The Interoperability Bet
• Interoperability bet - The Hellenic answer
Defense IoT – The things
What are the things
• “Internet of Things: Anytime, anywhere, by anyone and anything.” by ITU, November 2005
• “ “The vision of the internet of things is to attach tiny devices to every single object to make it identifiable by its own unique IP address. These devices can then autonomously communicate with one another.” by Financial Times
• “ Tactical Things with identities & virtual secure personalities operating with artificial intelligence in smart spaces using clever and adoptable interfaces to connect and communicate within all levels of decision making, tactical, operational, strategic, technological”- by EYEONIX
Defense IoT – The things
• Internet of Things will be (already is?) everywhere
• The military community cannot ignore ongoing developments in the IoT.
• If IoT will permeate our daily lives and environment, it will certainly
affect, if not permeate, the military environment.
• It is mandatory to:
– Understand
– Defend against
– Leverage
– Exploit
Defense byod – The device
• Where tactical computer end-users use their personal devices to interface with and access network resources.
• Any Device/Anywhere
• Evaluate ConOps Requirements
• Adopt a Strategy, Policies, Procedures
• Prepare Your Infrastructure
• Build in Security at Every Opportunity
• Roll Out a Complete Service
• Test drive before full implementation
• Evaluate and Adjust
• Key to success is figuring out how to empower users of tactical devices with network access without compromising security, overwhelming the network and IT staff.
Technological developments
Internet of
Things
Computing
Anytime
Any content
Content
Anyone
Anybody
Collection
Any Service
Any Business
Communication
Any path
Any Network
Connectivity
Any place
Anywhere
Convergence
Anything
Any device
“We are already in an era of ubiquity, where the tactical users of the Internet will be counted in millions, and where field officers may become the minority as generators and receivers of traffic. Changes brought about by the Internet will be dwarfed by those prompted by the networking of devices in things , systems and fields”
Development Value propositionH
um
an
based
High intelligentDynamic environment
Tactical Ecosystem
Low intelligentStatic tactical device
Information mining Automation & Monitor
Artificial Intelligence
Mach
ine b
ase
Decision support
• Data collection• Embedded devices
• Static devices• Routine process• Process optimization• Optimize resource
consumption
• Complex autonomous sys.• Situational awareness• Smart system• Intelligent robotics• Experience enhancement
• Sensor driven analysis• New Knowledge generation
Development Value
proposition
Tactical byod in IoT - Challenges
Challenges• Standardization
• Heterogeneous platforms, communication and software data
sources and formats
• Hardware, software and data compatibility
• Continuous real time connectivity
• Making gap smaller between users and technology
• Customer-tailored robust applications
• Accountability
• Interoperability
Spectrum of Joint Operations
Small Scale or Localized Incident
Probability
Severit
y
Floods
EOD Operations
Hurricanes
Wild Fires
Special Events (NSSE)
Civil Disturbances
Severe Earthquake
WMD Event
Agro-terrorism
JOINED FORCES
Broader Scope Incident
Significant Incident
Earthquakes
Severe Hurricanes
Ice Storms
DF/LE/CIV
Terrorist Attack
High Low
Low
High
9
Bridging the hesitation gap
• It is common that each intelligence database owner is not
willing to share it.
• There are security issues when adding questionable or legacy
“things” or used devices.
• Information sharing is a force multiplier.
• Byod from dispersed field teams and IoT intelligence is
extremely valuable for decision makers.
• There are middle layers who can accommodate the smooth
migration to the world of devices and things.
• Internet of Systems and Internet of Fields in a Semantic Web
will form the operational diagram of the future.
Interoperability considerations
• Cannot rely on centralized clouds. Tactical clouds still questionable.
• New innovations in IoT middleware design are needed to support
intelligent information integration and interpretation.
• Semantics-based middleware extensions – relying on combined use.
of ontologies and Semantic Web technologies – offer significant
promise.
• Some standard protocols exist, but typically involve licensing.
• Privacy and security are the primary concerns.
• Area-denied (A2AD) situations.
The Interoperability Bet
• Change of operational mindset
• Add the field user as tactical real time scene generator.
• Understand that in a number of operations it all comes to
tactical.
• Temporary unification between DF and HS teams.
• Common theater of operations and decision making.
• Simulations and continuous training
• Understand , update and live with the security threat
• Can you teach an old dog new tricks?
- Yes you can.
13
Eyeonix Solutions
Interoperability Bet – The Hellenic answer
• Hellas has a large variety of legacy and in most cases EoL equipment or assets to integrate.
• Developed middle layer gateways create legacy independent network elements to be connected with the unified world of devices and things.
• Existing secure smartphone based application is the solution for the field users to interact, communicate and interexchange information.
• The things are providing close-to-real time sensitive (ISR, SCADA,POI, BFT, etc) information to C2 and the field teams.
• Information acquisition from civilians consists a powerful added value but needs fundamental policing and coordination.
• Independent, autonomous teams can cooperate in joint operations with team building over the air.
• Large number of security related techniques, can protect the interoperability interfaces and very powerful MDMs are protecting the connected users and intelligent things.
• Integrity, contingency, continuous training and simulation are the keys of success once connected in the world of no-mistakes.
Headquarters34 Vourvachi str., 11743
Athens, Greece
T: +30 210 92 40 425
F: +30 210 92 40 445
George K. StrouzakisChief Executive Officer
THANK YOU