Cyber Security Challenges in Future Military Battlefield Information Networks

Authors

  • Miroslav Ďulík Armed Forces Academy of General Milan Rastislav Štefánik, Slovak Republic
  • Miroslav Ďulík jr. Armed Forces Academy of General Milan Rastislav Štefánik, Slovak Republic

DOI:

https://doi.org/10.3849/aimt.01248

Keywords:

cybersecurity, cyberspace, cyber warfare, electronic warfare, radio networks, security

Abstract

This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks – the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.

Author Biographies

  • Miroslav Ďulík, Armed Forces Academy of General Milan Rastislav Štefánik, Slovak Republic

    Department of Informatics

  • Miroslav Ďulík jr., Armed Forces Academy of General Milan Rastislav Štefánik, Slovak Republic

    Department of Informatics

References

ALBERTS, D.S., GARSTKA, J.J. and STEIN, F.P. Network Centric Warfare: Developing and Leveraging Information Superiority. CCRP publication series, USA, 2000. 25 p. ISBN 978-1-57906-019-0.

KÄRKKÄINEN, A. Cyber Security Architecture for Military Networks Using Cognitive Network Approach [PhD Thesis]. Helsinki: National Defence University, 2015. 94 p.

Cyber Electromagnetic Activities [on-line]. Field Manual 3-38. Headquarters, Department of the Army, Washington, USA, 2014. 96 p. [cited 2018-01-12]. Available from: https://fas.org/irp/doddir/army/fm3-38.pdf.

CBEST Intelligence-Led Testing. Understanding Cyber Threat Intelligence Operations [on-line]. Mountain View, California, 2016. 48 p. [cited 2018-01-08]. Available from: https://www.bankofengland.co.uk/-/media/boe/files/financialstability/financial-sector-continuity/understanding-cyber-threat-intelligenceoperations.pdf.

NATO Recognises Cyberspace as a ‘Domain of Operations’ [on-line]. NATO Warsaw Summit held on 8-9 July 2016. [cited 2018-01-11]. Available from: https://ccdcoe.org/incyder-articles/nato-recognises-cyberspace-as-a-domain-ofoperations-at-warsaw-summit.

SOLMS, R. and NIEKERK, J. From Information Security to Cyber Security. Computers & Security, 2013, vol. 38, p. 97-102. https://doi.org/10.1016/j.cose.2013.04.004.

ISO/IEC 27033-3:2015, Reference network scenarios – Risks, design techniques and control issues.

STALLINGS, W. and BROWN, L. Computer Security. Principles and Practice. New Jersey: Pearson Education, 2015. 848 p. ISBN 978-0-13-377392-7.

SAARELAINEN, T. Towards Tactical Military Software Defined Radio (SDR). In Proceedings of the Eighth International Conference on Sensor Technologies and Applications. 2014. p. 96-106. ISBN 978-1-61208-374-2.

DAVIES, M. Science and Technology to Understand and Counter Threat Using Electronic Means [on-line]. DST Partnerships Week 2016, 2016. [cited 2018-01-10] Available from: https://www.dst.defence.gov.au/sites/default/files/events/documents/CEWD%20Presentation.pdf.

PLESSIS, W.P. du. Software-Defined Radio (SDR) as a Mechanism for Exploring Cyber-Electronic Warfare (EW) Collaboration. In Proceedings of the 13th Information Security for South Africa Conference (ISSA). Johannesburg: IEEE, 2014. https://doi.org/10.1109/ISSA.2014.6950516.

It’s all SDR-related: Understanding Adaptive Radio, Cognitive Radio, and Intelligent Radio [on-line]. Nutaq Innovation [cited 2018-02-05]. Available from: https://www.nutaq.com/its-all-sdr-related-understanding-adaptive-radiocognitive-radio-and-intelligent-radio.

RILEY, S. “Cyber Terrain”: A Model for Increased Understanding of Cyber Activity [on-line]. October 2014. [cited 2018-08-02]. Available from: http://cyber-analysis.blogspot.sk/.

ZUBAIRI, J.A. and MAHBOOB, A. Cyber Security Standards, Practices and Industrial Applications. Systems and Methodologies. Pennsylvania: Hershey, 2012. 336 p. https://doi.org/10.4018/978-1-60960-851-4.

ZAVIDNIAK, M.P. Operational Military Perspective in Cyber Security IEEE Technology Summit [on-line]. May 2008. [cited 2018-01-15]. Available from https://slideplayer.com/slide/6216812.

Downloads

Published

01-09-2019

Issue

Section

Technical Information

Categories

How to Cite

Cyber Security Challenges in Future Military Battlefield Information Networks. (2019). Advances in Military Technology, 14(2), 263-277. https://doi.org/10.3849/aimt.01248

Similar Articles

1-10 of 71

You may also start an advanced similarity search for this article.