Basic security- based architecture for the battle scene based on the technology of the Internet of Things

Document Type : Original Article

Authors

1 Ph.D. Candidate in Cyber Security at Supreme National Defense University

2 Assistant Professor at Supreme National Defense University

Abstract

Abstract
    The Internet of things, as an emerging technology, can provide the ability to identify and transfer data to all objects. Controlling the performance of equipment, identifying users and controlling information are the key advantages of this technology. The special features of the battle scene and the multiplicity and variety of equipment used in this environment, make it possible for defense organizations around the world to use this technology to control the battle scene. One of the requirements of utilizing the technology of the Internet of things in the battle scene is to focus on the subject of security and create a security- based architecture that defines all the components and relationships between components in the form of security components. The present study is an applied research and its method is descriptive- analytical with exploratory approach. The qualitative data of this research is gathered from the study of sources and of scientific researches and using qualitative research method of meta-synthesis. In order to validate the proposed architecture, the opinions of the sample community, which are experts in the field of defense sciences and are fully acquainted with the technology of the Internet of Things, as well as experts in the field of Internet of things, have been used based on interviews. The study results show that Internet of Things (IoT) technology has the best performance on the battle scene in the environment of cloud computing that is based on big data. It was also determined that due to the features of the battle scene; the security layer should cover all layers of the architecture.

Keywords


  1.  

    1. ارکیان؛ پورخلیلی؛ خوش‌اخلاق (1394)، «امنیت و حریم خصوصی در اینترنت اشیاء»، دوفصلنامة علمی- ترویجی منادی امنیت فضای تولید و تبادل اطلاعات (افتا)، دورة 8، شمارة 2.
    2. پاکروان، پدرام؛ عسکریان‌ابیانه، حسین (1397)، «نظارت، کنترل و مانیتورینگ سیستمهای قدرت مبتنی بر اینترنت اشیاء و عملیاتی نمودن آن در شبکة وایفای»، سیزدهمین کنفرانس ملّی کیفیت و بهره‌وری؛ دو بال توسعه پایدار.
    3. شورای اجرایی (عالی) فنّاوری اطلاعات کشور (1396)، «چارچوب معماری سازمانی ایران و مدل مرجع امنیت»، کمیسیون توسعة دولت الکترونیک.
    4. کشتکارهرانکی، مهران (1395)، «طراحی الگوی راهبردی نوآوری اجتماعی در جمهوری اسلامی ایران»، رسالة دکتری دانشگاه عالی دفاع ملّی.
    5. محمدی، شهریار (1395)، «معماری پیشنهادی مبتنی بر اینترنت اشیاء و سیستمهای توصیهگر برای هوشمندسازی شهر تهران»، فصلنامة علمی پژوهشی پژوهشگاه علوم و فنّاوری اطلاعات ایران، دوره 32، شماره 1.
    6. مکنزی (1395)، «اینترنت اشیاء و چگونگی ارزشآفرینی آن»، تهران: دبیرخانه برنامه ملّی آینده‌نگاری علم و فنّاوری در حوزه فنّاوری اطلاعات و ارتباطات.

     

    ب) کتب لاتین

    1. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M, & Ayyash, M.,(2015), "Internet of Things: A Survey on Enabling Technologies, Protocols and Applications", IEEE Communications Surveys & Tutorials, vol. 17. pp. 2347 - 2376. Cisco’s white paper.
    2. Ammar, Mahmoud, Russello, Giovanni & Crispoa, Bruno, .,(2018). "Internet of Things: A survey on the security of IoT frameworks". Journal of Information Security and Applications, vol. 38, pp. 8 – 27.
    3. DoD CIO., (2017). "Policy Recommendations for the Internet of Things". Chief Information Officer U.S. Department of Defense, white paper.
    4. Gubbi, Jayavardhana, Buyya, Rajkumar, Marusic, Slaven & Palaniswami, Marimuthu (2013). "Internet of Things (IoT): A vision, architectural elements, and future directions", Elsevier. Future Generation Computer Systems, volume 29, number 7. P 1645 - 1660.
    5. Gupta, B., & Quamara, M., (2018) "An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols", Concurrency and Computation: Practice and Experience, pp. 291 – 319.
    6. ITU (2005), "ITU Internet Reports 2005: The Internet of Things. Executive Summary", International Telecommunication Union (ITU), Geneva, available online at http://www.itu.int/osg/spu/publications/internetofthings/,last retrieved April 18, 2012.
    7. Jacobson, Michael, (2015). "The Internet of Things", the Department of Defense and the Dangers of Networked Warfare. COMP-116: Computer Systems Security December 15, 2015 M.
    8. Li, Shancang, Li, Da Xu & Shanshan, Zhao (2015). "The internet of things: a survey", Information Systems Frontiers. Springer Science + Business Media: 243 - 259.
    9. Li, X., R.X., Lu, X.H., Liang & X.M. Shen. (2011). "Smart community: an internet of things application", IEEE Commun Mag 68 - 75.
    10. Mehta, Ashish & Dhariwal, Kunal, (2017). "Architecture and Plan of Smart hospital based on Internet of Things (IOT)", International Research Journal of Engineering and Technology (IRJET). Volume: 04 Issue: 04.
    11. NATO Parliamentary Assembly, Science and Technology Commitee, (2017). "The Internet of Things: Promises and Perils of a Disruptive Technology", www.nato-pa.int.
    12. Paul, A., and Jeyaraj, R., (2019) "Internet of Things: A primer" Human Behaviour and Emerging Technology, vol. 1, no. 1, pp. 37- 47.
    13. Paula, F-L., Tiago, M., Manuel, F-C., Luis, S-A., & Miguel, G.L., (2016). "A Review on Internet of Things for Defense and Public Safety", Sensors. 16. 1644; doi: 10.3390/s16101644, www.mdpi.com/journal/sensors.
    14. Ray, P.P., (2018) "A survey on Internet of Things architectures" Journal of King Saud University - Computer and Information Sciences, vol. 30, no. 3, pp. 291 – 319.
    15. Sandelowski, M., Barros, J., (2007). "Handbook for synthesizing qualitative research", Springer publishing company Inc. Available at: https://epdf.tips/handbook-for-synthesizing-qualitative-research.html.
    16. Sarkar, C., Nambi, S.N.A.U., Prasad, R.V., Rahim, A., (2014). "A scalable distributed architecture towards unifying IoT applications". In Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 6 – 8 March 2014; pp. 508 – 513.
    17. Torkaman, A., Seyyedi, M.A., (2016). "Analyzing IoT Reference Architecture Models". International Journal of Computer Science and Software Engineering (IJCSSE), Volume 5, Issue 8, August 2016.
    18. Truyen, frank, (2018). "Modeling a SABSA® Based Enterprise Security Architecture using Enterprise Architect", Cephas Consulting Corp. All rights reserved.
    19. Vermesan, O., & fries, P., (2014) "Internet of Things - from Research and Innovation to Market Deployment", River Publishers.
    20. Yushi, L., Fei, J., Hui, Y., (2012). "Study on application modes of military Internet of Things (MIOT)". In Proceedings of the IEEE International Conference on Computer Science and Automation Engineering (CSAE), hangjiajie China; Voloum 3, pp. 630 – 634.
    21. Zheng, Denise, & Carter, William, (2015). "Leveraging the Internet of Things for a More Efficient and Effective Military", S.l. Rowman & Littlefield, Center for Strategic and International Studies.