| Literature DB >> 27782052 |
Paula Fraga-Lamas1, Tiago M Fernández-Caramés2, Manuel Suárez-Albela2, Luis Castedo3, Miguel González-López2.
Abstract
The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.Entities:
Keywords: Internet of Things; Machine-to-Machine communications; cloud computing; defense and public safety; heterogeneous networks; mission-critical networks; public safety responders; security; tactical environment; trust management; wireless sensor networks
Mesh:
Year: 2016 PMID: 27782052 PMCID: PMC5087432 DOI: 10.3390/s16101644
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Proliferation of devices and applications in the Internet of Things (IoT).
Public Safety (PS) agents.
| PS Organizations | Description |
| Police officers | Law enforcement and protection of the citizens: keep the peace and secure volatile areas, prevent and investigate crime, detain individuals suspected/convicted of offenses against criminal law. Urban/rural environments, major events and border areas. |
| Fire services | Law enforcement, protection of the environment, search and rescue. With variations from country to country, the primary areas of responsibility include: structure fire-fighting and fire safety, wild land fire-fighting, life-saving through search and rescue, rendering humanitarian services, management of hazardous materials, environment protection, salvage and damage control, safety management within an inner cordon and mass decontamination. Urban/rural environments, ports and airports. |
| Border guards | National security agencies which perform land border control against criminal activities and control of illegal immigration. They can also be involved in cross-national disaster management. Rural environments and border security areas (green border). |
| Coastal guards | Law enforcement, protection of the environment, search and rescue (at sea and other waterways), protection of coastal waters, criminal interdiction, illegal immigration, disaster and humanitarian assistance in areas of operation. They can also be involved in cross-national disaster management (e.g., earthquake, flooding). Border areas (Blue border) and ports. |
| Medical responders | Emergency medical services provide critical care of sick and injured citizens, and the ability to transfer the people in a safe and controlled environment. All scenarios. |
| Road agents | Police agency responsible for the law enforcement and protection of road transportation ways. Urban/rural environments. |
| Railway agents | Specialized police agency responsible for the protection and law enforcement of road transportation. Urban/rural environments. |
| Custom guards | Law enforcement, crime prevention, monitoring people and goods entering a country. Border areas. |
| Airport security | Law enforcement, protect airports, passengers and aircrafts from crime. Urban/rural environments. |
| Military | It is the organization responsible for the national defense policy and the protection of national security. It may also supports PS organizations in case of a large national disaster, terrorist acts, major events, search and rescue or emergency medical services. All scenarios. |
Figure 2Private sector vs defense and public safety technology stack.
Figure 3Promising target scenarios for defense and public safety.
Figure 4Soldiers of today and the future.
Figure 5Operational Capabilities assessed to cover mission-critical scenarios.
Figure 6Requirements and application services for commanders.
Figure 7DoD Enterprise Mobile Devices Management (MDM) evolution.
Figure 8Main characteristics of DMCC-S R2.0.
Figure 9Mobility components and their security.
Figure 10IoT landscape.
Figure 11The IoT architecture. (a) Three-layer; (b) Middleware-based; (c) Service-Oriented Architecture (SOA)-based; (d) Six-layer.
Figure 12Example of military architecture with six layers.
Figure 13Cloud paradigms: security inheritance and risks.
Figure 14Fog computing paradigm.
Roadmap for technologies and ongoing research.
| Research | Timeframe 2016–2020 |
| Identification | Identity management Open framework for the IoT Soft Identities Semantics DNA identifiers Convergence of IP and IDs and addressing scheme: unique or multiple IDs Extend the ID concept (more than ID number) Electro Magnetic Identification (EMID) Multi methods, one ID |
| Architecture | Network of networks architectures Adaptive and context based architectures Self-managing properties (they include self-configuring, self-healing, self-optimizing, self-protecting, self-awareness, self-adaptation, self-evolving and self-anticipating) Cognitive and experimental architectures Code in tags to be executed in the tag or in trusted readers with global applications, adaptive coverage, universal authentication of objects, recovery of tags following power loss, more memory, less energy consumption, 3-D real time location/position embedded systems Cooperative position cyber-physical systems |
| Infrastructure | Cross domain application deployment Integrated IoT, multi-application and multi-provider infrastructures General purpose IoT: global discovery mechanism |
| Applications | IoT device with strong processing and analytics capabilities Handling heterogeneous high capability data collection and processing Application domain-independent abstractions and functionality Cross-domain integration and management Context-aware adaptation of operation Standardization of APIs Mobile applications with bio-IoT-human interaction |
| Communications | Wide spectrum and spectrum aware protocols Ultra-low power system on chip, multi-protocol chips Multi-functional reconfigurable chips On-chip antennas On-chip networks and multi-standard RF architectures Seamless networks Gateway convergence Hybrid network technologies convergence 5G developments Collision-resistant algorithms Plug-and-play tags, self-repairing tags |
| Network | Self-aware, self-configuring, self-learning, self-repairing and self- organizing networks Sensor network locations transparency IPv6-enabled scalability Ubiquitous IPv6-based IoT deployment Software defined networks Service based network Multi authentication, integrated/universal authentication IPv6-based Internet of Everything (smart cities) Robust security based on a combination of ID metrics |
| Software | Goal oriented: distributed intelligence, problem solving, Things-to-Things collaboration environments IoT complex data analysis IoT intelligent data visualization Hybrid IoT User oriented: the invisible IoT, things-to-Humans collaboration, IoT 4 All and User-centric IoT Quality of Information and IoT service reliability Highly distributed IoT processes Semi-automatic process analysis and distribution Fully autonomous IoT devices Micro operating systems Context aware business event generation Interoperable ontologies of business events |
| Signal Processing | Context aware data processing and data responses Distributed energy efficient data processing Cognitive processing and optimization Common sensor ontologies (cross domain) |
| Discovery | Automatic route tagging and identification management centers Semantic discovery of sensors Cognitive search engines Autonomous search engines Scalable Discovery services for connecting things with services while respecting security, privacy and confidentiality |
| Energy efficiency | Energy harvesting (biological, chemical, induction) Power generation in harsh environments Biodegradable batteries Nano-power processing unit Energy recycling Long range wireless power Wireless power everywhere, anytime |
| Security | Low cost, secure and high performance identification/authentication devices User centric context-aware privacy Privacy aware data processing Security and privacy profiles and policies Context centric security Homomorphic Encryption, searchable Encryption Protection mechanisms for IoT DoS/DdoS attacks Self-adaptive security mechanisms and protocols Access control and accounting schemes General attack detection and recovery/resilience Cyber Security Decentralized self-configuring methods for trust establishment Novel methods to assess trust in people, devices and data Location privacy preservation Personal information protection from inference and observation Trust Negotiation |
| Interoperability | Automated self-adaptable and agile interoperability Reduced cost of interoperability Open platform for IoT validation Dynamic and adaptable interoperability for technical and semantic areas |
| Standardization | M2M standardization Standards for cross interoperability with heterogeneous networks Standards for IoT data and information sharing Standards for autonomic communication protocols Interaction standards Behavioral standards |
| Hardware | Smart bio-chemical sensors Nano-technology and new materials Interacting/Collaborative tags Self-powering sensors Polymer based memory, ultra-low power EPROM/FRAM Molecular sensors Transparent displays Biodegradable antennas Nano-power processing units Biodegradable antennas Multi-protocol frontends Collision free air to air protocol and minimum energy protocols Multi-band, multi-mode wireless sensor architectures implementations Reconfigurable wireless systems Micro readers with multi-standard protocols for reading sensor and actuator data System-in Package (SiP) technology including 3D integration of components |