SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Zhu L, Majumdar S, Ekenna C. Hum. Behav. Emerg. Technol. 2021; 3(2): 255-260.

Copyright

(Copyright © 2021, John Wiley and Sons)

DOI

10.1002/hbe2.231

PMID

unavailable

Abstract

The internet of battlefield things (IoBT) is an innovative technology for improving the operational effectiveness of military systems. It is a network of sensors, wearables, and IoT devices that makes use of cloud and edge computing to create a coherent combat force, connect warfighters with smart technology in armor, radios, weapons, and other objects. To ensure the cybersecurity of IoBT, it is a critical mission to have a systematic understanding of the cyberattack and cyber defense. This article offers an insightful review in order to improve cybersecurity awareness and advance the development of appropriate security mechanisms from both cybersecurity and IoBT perspective. The review characterizes three common types of cyberattacks and three common types of cyber defenses across the military field. Multiple entry-points and single device hacking behavior, unmanned aerial vehicles controlled risks, and collateral damage forms three main crucial attacks to military cyberspace. Comply to connect, blockchain, and artificial cyber hunters are three major types of cyber defense strategies that increase cybersecurity efficiency across current and emerging operational environments.


Language: en

Keywords

AI; artificial cyber hunters; blockchain; comply to connect (C2C); cyber defenses; cyberattacks; cybersecurity; internet of battlefield things (IoBT); multiple entry-points hacking; unmanned aerial vehicles

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print