Title

Security aspects of military sensor-based defence systems

Document Type

Conference Proceeding

Publisher

IEEE

Faculty

Faculty of Health, Engineering and Science

School

School of Computer and Security Science/ECU Security Research Institute

RAS ID

17037

Comments

This article was originally published as: Johnstone, M.N., & Thompson, R. (2013). Security aspects of military sensor-based defence systems. Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. (pp. 302-309). Deakin University. IEEE. © 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Original article available here

Abstract

The Australian Defence Force has IMAP and JMAP to perform planning prior to the deployment of forces, but due to the dynamic nature of modern warfare there is a knowledge and security gap for on-ground forces during the execution of an operation. Multi-agent based sensor systems can provide on-ground forces with a significant amount of real-time information that can be used to modify planning due to changed conditions. Future planning will require automated agents planners capable of semi-autonomous generated plans and courses of action. Multi-agent sensor systems will also provide cyber security and management of system performance and human C2 workload. This will become a critical C3 ISTAR capability as multi-agents are faster than humans for path planning and resource allocation in multivariate, dynamic, time-pressured environments. The issue with such sensor systems is the degree to which they are vulnerable to attack by opposing forces. This paper explores the types of attack that could be successful using the IEEE 802.15.4 protocol as an example and proposes defences that could be put in place to circumvent or minimise the effect of an attack.

Share

 
COinS