عنوان مقاله [English]
The Internet of things, as an emerging technology, can provide the ability to identify and transfer data to all objects. Controlling the performance of equipment, identifying users and controlling information are the key advantages of this technology. The special features of the battle scene and the multiplicity and variety of equipment used in this environment, make it possible for defense organizations around the world to use this technology to control the battle scene. One of the requirements of utilizing the technology of the Internet of things in the battle scene is to focus on the subject of security and create a security- based architecture that defines all the components and relationships between components in the form of security components. The present study is an applied research and its method is descriptive- analytical with exploratory approach. The qualitative data of this research is gathered from the study of sources and of scientific researches and using qualitative research method of meta-synthesis. In order to validate the proposed architecture, the opinions of the sample community, which are experts in the field of defense sciences and are fully acquainted with the technology of the Internet of Things, as well as experts in the field of Internet of things, have been used based on interviews. The study results show that Internet of Things (IoT) technology has the best performance on the battle scene in the environment of cloud computing that is based on big data. It was also determined that due to the features of the battle scene; the security layer should cover all layers of the architecture.