Download - DRDC-RDDC-2017-L276 - DOCUMENT
DefenScientifDRDC-RFebruary
Interfor CPaul LabDRDC – Prepared
ce Resefic Letter RDDC-2017y 2018
rnetwoCanadia
bé Corporate O
d for: Dr. Pau
earch an
7-L276
rking oan Arm
Office
ul Comeau,
CAN UNC
nd Deve
CAN U
of thinmed Fo
OCS for the
CLASSIFIED
lopment
UNCLASSIFIE
ngs (IoTorces
e Science an
t Canad
ED
T) and
nd Technolog
a
implic
gy Outlook
cationss
CAN UNCLASSIFIED
Template in use: SB SL Covering Page_EN_Smart_2017-11-02_V01_WW.dotm
© Her Majesty the Queen in Right of Canada (Department of National Defence), 2018
© Sa Majesté la Reine en droit du Canada (Ministère de la Défense nationale), 2018
CAN UNCLASSIFIED
IMPORTANT INFORMATIVE STATEMENTS
Disclaimer: Her Majesty the Queen in right of Canada, as represented by the Minister of National Defence ("Canada"), makes no representations or warranties, expressed or implied, of any kind whatsoever, and assumes no liability for the accuracy, reliability, completeness, currency or usefulness of any information, product, process or material included in this document. Nothing in this document should be interpreted as an endorsement for the specific use of any tool, technique or process examined in it. Any reliance on, or use of, any information, product, process or material included in this document is at the sole risk of the person so using it or relying on it. Canada does not assume any liability in respect of any damages or losses arising out of or in connection with the use of, or reliance on, any information, product, process or material included in this document.
This document was reviewed for Controlled Goods by Defence Research and Development Canada (DRDC) using the Schedule to the Defence Production Act.
February
DRDC-R
Prepared
Scientific
InternArmed
Backgr
The cumuand reconnincluding availabilitis given atindustry, i
In this Sciconcept ofpotential asecurity ch
Object
To summaintegratingpossible asystems toactuators obefore.
This SL isInternet ofdomains a
Evolut
The Advaand the fir
y 2018
DDC-2017-L
d for: Dr. Pa
c Letter
etworkid Forces
round
ulative evidennaissance (C4cyber securit
ty of sensing at addressing tit may annihil
ientific Letterf network-cenadvantage imphallenges of I
ive
arise analysesg IoT and oth
approaches foro support opeor their virtua
s an attempt tof Things, theiand systems?
ion
anced Researcrst network to
L276
aul Comeau,
ng of ths
ce of comman4ISR) systemty [4] offers aand actuatingthe monumenlate most of th
r (SL) we assuntric operationpact of IoT asIoT are made
s and surveys her simple digr benefiting frrations. Whatal versions) co
o answer the ir enablers, th
ch Projects Ago implement t
, OCS; for th
hings (Io
nd, control, cms’ value in a v
n initial indicg internetworktal combinatihese potentia
ume that the qns (NCO) on s an extreme manageable.
of relevant Iogital devices infrom such techt is importantonnect the ph
following quheir applicatio
gency Networthe Transmiss
he Science a
oT) and i
communicatiovariety of pub
cation of the aked of things,ion of threats l advantages.
quantifiable mwarfighter efcase of netwo
oT publication public safethnology evolut to recognize hysical world
estion from thons and their i
rk (ARPANEsion Control P
and Technol
mplicat
ons, computerblic safety [1]additional adv aka IoT. Howfrom billions
marginal impaffectiveness corking, as lon
ons addressingty and defencution while m for this workd to the digit
he Office of timplications o
ET) was an eaProtocol/Inter
ogy Outlook
ions for
rs, intelligenc] and militaryvantage of thewever, unlesss of things, as
act [2] of netwcould be extenng as the form
g some of thece systems, semaintaining thk is that IoT dtal one to a d
the Chief Scieon the defenc
arly packet swrnet Protocol
k
r Canadi
ce, surveillancy operations [e massive s special attens claimed by
working fromnded to projec
midable cyber
e challenges oee [5]. It descrhe resilience odevices (sensodegree never
entist: what arce and security
witching netw(TCP/IP) suit
1
ian
ce, 2, 3]
ntion
m the ct the
of ribes of our ors, seen
re y
work te.
2
Both technconnectednetworks. purpose attoaster becbe billionse.g., smartreference networks Internet, hfurther as entities crpossible fudevices su
IoT def
For a large‘things’ caprocess, thproposed t
“Internet othe Internephysical ofeature anidentity, sservices, wcapture anintelligentconsiderat
The same appear thathey can bdescriptiothing will few sensoemerging:
1 https://en2 https://ww3 In 2013 oforced the m2016 a newstimulate inreliable heahttp://tricor
nologies becad to the public
A first non-ct a conferencecame ‘smart’ s of devices ot TV, vehicleto the public (or just integr
hence IoT stanreported in [6eating their o
future of IoT auch as the med
finition
e environmenan be interconhe Institute ofthe following
of Things envet through the
or virtual reprnd are uniqueltatus, locationwith or withound communicat interfaces antion” [8].
committee [8at IoT will be be identified, nns or data relbe a node of rs up to large: sensor, actua
.wikipedia.orgww.postscapesone was built anmanufacturer t
w competition wnnovation and alth diagnoses rder.xprize.org
ame the technc Internet. In tcomputer thine in October 1by being con
or things with , building andInternet, the rrated in a systnds for intern6, 7] where thwn social net
autonomy is odical tricorde
nt scenario, i.ennected to delf Electrical ang definition of
visions a self-e use of standesentation in ly identifiablen or any otherut human inteation, and actnd is made av
8] expressed tcharacterizednamed and adated to them a network. Io
e and complexator, gateway
/wiki/ARPAN.com/internet-ond satisfied somto stop it: httpswas initiated: Tintegration of anywhere, any
g/news/blog/sta
nical foundatiothe concept o
ng (first IoT) c19892. Using nnected to a c
various degrd city. Althoureality is that tem via intern
networking of hings are smartwork. The latoutside the inter3 should be e
e., an IoT sysliver a complnd Electronicsf IoT:
-configuring, dard communi
the digital woe. The represer business, soervention, thrtuation capab
vailable anywh
the following d as a set of inddressed (smaor even relatioT systems shx systems. Uny, virtual objec
ET. of-things-histome customers bs://www.statnewThe Qualcommprecision diagn
ytime. The winar-trek-beyond-
on of the Intef IoT, interneconnected to Ithe Simple Nomputer netwees of smartn
ugh the expresthese things
nal bus) that mf things in thisrt and also inttter is beyondtended time henvisaged.
stem with a leex service ans Engineers (I
adaptive, comication protocorld, sensing/entation contaocial or privatough the explility. The servhere, anytime
observationsnterworking nart objects). ‘ionships betwhow scaling cnder this perspct. All of them
ory/ (Access dabut the Food anws.com/2016/1
m Tricorder XPnostic technolo
nning teams now-doctors-view
ernet1. Not allet includes TCInternet is a t
Network Manawork. Now onness deployedssion coined icould also be
may not be dis SL. Also the
nterconnected d the scope ofhorizon althou
evel of complend support an IEEE) Comm
mplex networcols. The inte/actuation capains informatitely relevant iloitation of unvice is exploie, and for any
s from some onetworks of thThings’ can b
ween objects. Fapabilities, frpective the dim assume ubi
ate: 18 April 20nd Drug Admi12/14/scanadu-
PRIZE is a $10 ogies, helping cw work with a (Access date:
l TCP/IP netwCP/IP and nontoaster for demagement Protne finds that bd and connectis Internet of
e deployed onirectly connece concept couor even can e
f this SL giveugh advanced
exity where aexecution of
mittee on the d
rk that intercoerconnected thpability, a proion including information. Tnique identifiited through thything taking s
of its findingshings that canbe physical obFor a majorityrom small sysifferentiation iquitous conn
017). You had inistration (FD-tricorder-crowmillion global
consumers maa member of the17 April 2017)
works are n-TCP/IP monstration tocol (SNMP)by 2020 there ed to an interThings makin
n a variety of cted to the puuld be pushedevolve into en that such d handheld sm
a large amouna complex
definition of I
onnects ‘thinghings have ogrammability
the thing’s The things ofication, data he use of security into
s: “…it wouldn be made smbjects or theiry of definitionstems based obetween nod
nectivity, whil
to insert the brDA or USFDA)wdfund/.Then il competition t
ake their own e FDA. ).
) the will
rnet, ng
ublic d
mart
nt of
IoT
gs’ to
y
ffer
d mart if
r ns a
on a des is le
read.
in to
each entityoffered at be alwaysrealistic scdegraded
IoT netwomedical, ssensors anInternet Prfollows: “fixed seamTactical racommercicost IoT n
Billions
The large deployed,
IoT ter
With the eFor examp(M2M) codetails abo
Several au[20–28]. Ointeractionprotection[30–35]. I
IoT driv
A dominaintegratedmonths. Insuccess ra
4 Command5 Comparishttps://www8 June 2016 https://ww(Access da
y performs dithings’ interf achievable. Tcenario couldcellular phon
orks could be security and mnd weapons serotocol versioThe military
mless C24 comadios provideial agencies, anetworks.
s of IoT d
number of obi.e., replacing
minology
evolution of Iple Internet oommunicationout IoE).
uthors report oOther authors n (HCI) with ns due to econIn fact [5] ext
vers
ant driver is cod in a businessn public securate in addition
d and Control (son of IPv4 andw.ibm.com/sup7).
ww.iottechexpoate: 20 April 20
ifferent functifaces.” In pubThis is a signi
d be one where service acce
private, indumilitary. Tactiecurely by uson 6 (IPv6) [1IoT networks
mmunicationse interoperabiland allied coa
devices
bjects requiring IPv4 by IPv
y expans
oT technologf Everything n without hum
on internet ofdocument toIoT [29]. Som
nomic and secends IIoT tec
ompetivenesss model, a netrity and defenn to saving liv
(C2). d IPv6: pport/knowledg
o.com/2016/01017).
ions. Anotherblic security aificant issue te we deploy iess (can be in
strial or speciical networksing appropria
11–13] and bls operate overs between opelity with all s
alition forces.”
ng a unique idv6 for a larger
ion
gies and appli(IoE) 6 is con
man interventi
f military thinols and proto
me IoT technocrecy of their chnologies to
s in both commt advantage (rnce this may tves and reduci
gecenter/en/ssw
1/m2m/ioe-vs-i
r emerging asand military scthat needs to bin a city with
n a contested u
ific to a doma could be des
ate resilient stlockchain [14r tactical radioerational elemervices, vario” However, fo
dentifier is ber number of u
cations came nsidered a supions is consid
ngs (IoMT) [1types to exploologies offer bbusiness, e.gpublic safety
mercial and inreturn on invetranslate in reing cost, or in
w_i5_54/rzai2/
iot-vs-m2m-wh
spect is the pocenarios the ube addressed a crippled In
urban environ
ain of applicasigned to expltacks includin4, 15]). This isos that establ
ments and highous agencies ofor security I s
eyond most ofunique object
specific specperset of IoT adered a subset
16–19] and inore novel waybetter cyber, ., Industrial Inand defence.
ndustrial domestment, ROI)esponsivenessncrease missio
/rzai2compipv
hats-the-differe
ossibility of uubiquitous cofor such appl
nternet connecnment (CUE)
ations such as loit all kinds ong advantagess nicely summlish and mainther echelon hof the U.S. Gsuggest using
f the protocols5.
cialisation andand Machine-t of IoT (see A
nternet of battys for humanhacking and nternet of Th.
mains. Where ) is often obss and increaseon sustainabi
v4ipv6.htm (Ac
ence-and-does-
sing functiononnectivity calications. A ctivity and ) [9, 10]).
transport, of things suchs such as frommarised in [5]tain mobile an
headquarters. overnment,
g independent
ls currently fu
d generalisati-to-Machine Annex A for
le things (IoBn-computer security
hings (IIoT)
IoT is suitablerved after a
e in mission lity.
ccess date:
-it-matter/
3
ns annot
h as m ] as nd
t low
ully
ion.
more
BT)
ly few
4
Increasingwatches, acosts declsmartphonthan a billsmartphon
Accordingexplosion
1. The co
2. A lot m
3. Intern
4. High a
Enablin
There is awith sensoproducts. customersplatforms9
requiremeorganizatidevices, umanage thoutcomes informatioavoid cogn
In [36] theUDOO, FMulle, andactivationcandidatesbeen used
Under thedefence su(DoD) Joi
7 http://ww(Access da8 http://ww9 An IoT pl10 http://ww
g demand7: Dand smart therine. A similarnes jumped frlion devices inne component
g to BI (Businin the IoT8.
ost of Interne
more money
net connectivi
adoption of re
ng techn
n abundance ors and built-iThese produc
s. Two recent 9 [37, 38] focuents, as well aion may have use of some anhat team and ein line with b
on managemenitive overloa
ey provide exriendlyARM,d T-Mote Skytime of a dev
s for the deved widely in IoT
hood of the ruch as softwaint Tactical R
ww.mckinsey.coate: 10 May 201ww.businessinsi
latform facilitaww.ni.com/whi
emand for thermostats, for r dynamic occrom about 170n 2014. The its. Smart buil
ness Insider) I
et-connected s
is being pour
ty continues t
emotes, espec
ologies
of enabling tein TCP/IP andcts often connreports from using on the m
as a projectionto consider a
nalytics to maensure that vabusiness valueent for shared ad of tactical
xamples of har, Intel Galileoy. Software plvice. These Oelopment of RT scenarios.
radios of somare define radiRadio System
om/industries/s17). ider.com/four-eates communicite-paper/5370
e first generatinstance) wilcurred with th0 million devincrease in ordldings and cit
Intelligence f
sensors is com
red into the Io
to expand.
cially smartph
echnologies sd security fun
nect to a centrO'Reilly prov
methodology n in the futurea team for manake sense out alued informae. The same ssituation awaunit members
rdware and soo, Raspberry Platforms start
OS include ReRTOS-based I
me IoT hardwaios (SDRs) w(JTRS) progr
semiconductor
elements-drivination, data flow6/en/ (Access d
tion of Internl increase as che rise of smaices sold annuders coincideies also contr
findings, there
ming down.
oT.
hones, phable
such as [36] Snctionalities wral managemevide a represefor selecting
e of a sustainanaging the larof that data a
ation is used bshould be conareness in ords.
oftware platfoPI, Gadgeteert with Operatial-Time Oper
IoT applicatio
are platforms which evolvedram. Silicon in
s/our-insights/
ng-iot-2014-10w, device manadate: 11 April
net of Things pcomponent teartphone usagually just fou
ed with a steepribute to the d
e are four key
ets and tablets
Single Board Cwhich are typient portal to pentative overv platforms baable business rge amount o
and assign a ‘by the right pensidered for puder to deliver
orms. Hardwar, BeagleBoneing Systems (rating Systemons. For instan
one finds tecd under the USndustry, e.g.,
/the-internet-of
0 (Access dateagement, and t2017).
products (fitnechnologies ege. Consumerur or five yearp decline in thdemand.
y elements tha
s.
Computers (Sically used to
provide the review of the enased on the us
plan. In suchof data collectchief data offeople, i.e., keublic safety aactionable in
are platforms e, Cubieboard(OS) to run fo
ms (RTOS) thnce, the Cont
chnologies deS Department National Ins
f-things-sizing-
: 11 April 2017the functionalit
ness bands, smvolve and the
rs’ demand fors ago to morehe price of cr
at are driving
SBCs) integrao realize IoT equired data bnabling IoT ser’s intent anh future an ted by IoT ficer’ (CDO) eeping the and defence Ionformation an
include Ardud, Z1,WiSensor the whole at are good tiki RTOS has
veloped for t of Defense truments10, lo
-up-the-opport
7). ty of applicatio
mart eir or e ritical
the
ated
by
nd
to
oT nd
uino, se,
s
ooks
tunity
ons.
beyond tofrequencycommunic(4G) phonGeneratio
Note that system byPython, Cprivate onpreferenceZigbee, Rstandards
Annex B pnecessary of IoT obj
IoT app
Annex C pcapabilitiedeployed
Potentopport
There is nassessmen2013 fromthat summ
In additionused in de
Policie
Although emerging
Conclu
Based on defence an
11 http://iot
day best SDRy integrated cications (MILCnes. Future tecn (5G) smart
the April 201y the surveyedC++ and Noden premise cloue the connecti
RS-232/RS-48included HTT
provides a timmove from I
jects.
plications
provides somes. It appears operational sy
ial implictunities)
no consensus ynts. A good plm Cisco [40]. Amarises the cur
n, Annex F prefence and sec
es and sta
there are no lpolicies and s
usion
information and security (D
t.ieee.org/imag
R solutions whircuit (RFIC) COM), electrchnologies inphones, and
16 IoT Develod participants.e.js (uses the Cud, Microsoftivity protocol5, LPWAN (LTP, MQTT, C
meline of the ePv4 to IPv6 d
s
me examples othat industry,ystems and pr
cations fo
yet, meaning lace to start mAnnex E provrrent situation
rovides informcurity system
andards
leading policystandards.
available so faD&S) capabil
es/files/pdf/iot
hich evolved and digital sionic warfare,
ntegrating anaother systems
oper Survey11
. The most usChrome V8 JaAzure, Goog
ls were TCP/ILoRa, SigFox
CoAP, HTTP/
evolution of ndue to the larg
of emerging ap, transport andrototype syste
or defenc
different orgamaking sense vides an excen.
mation about s.
y and standard
ar about IoT tities in terms
t-developer-sur
from field prignal processi, signals intellalog with digits yet to be def
reports that Lsed programinavaScript enggle Cloud PlatIP, Wi-Fi, Ethx, LTE-M, etc/2…[39].
networks towge number of
pplications (bd medical appems tested so
ce and se
anizations anout of it is the
erpt from a De
the relation b
d currently, A
technologies, of advantage
rvey-2016-repo
rogrammable ing (DSP) devligence (SIGItal circuits wifined.
Linux was theng languages gine). Cloud stform and IBMhernet, Bluetoc.), 6LoWPA
ward the currenf unique ident
both civilian aplications cur far.
curity (th
nd companies e paper from epartment of
between IoT a
Annex D prov
one can projes and threats
ort-final.pdf (A
gate-array (Fvices in suppoINT) and Fouill support IoT
e most used Iwere Java, C
services wereM Bluemix. Iooth/Bluetoot
AN (IPv6), UP
nt state of IoTtifiers required
and military) rrently lead in
hreats an
have significCovington anDefense (DoD
analytics and
vides some in
ect their poteto Canada, i.
Access date: 11
FPGA), radio ort of military
urth GeneratioT and Fifth
IoT operatingC, Java Script,e Amazon AWIn their order th Smart, CellPnP… Messag
T including thd for the billi
and future n terms of
d
cant different nd CarskaddeD) publicatio
the track data
formation on
ential impacts .e., advantage
1 April 2017).
5
y on
WS, of lular, ging
he ons
en n
a
on es in
6
terms of mour nation
In summausing IoT trained opelectronic situational
It is not resuch capabalready ad
This IoT ein the devsupport toowner’s p
Future
First of allThere is a developmIoT-Europsharing. Toperationa
The reviewcould be tecosystemchains and
Given the test beds falso be us
Prepared
multiplying Dn and our allie
ary, given the hardware and
perators, it appecosystem de
l awareness w
evolutionary, bilities could
dopting IoT ec
evolution couelopment of f
o coalition senermission [41
work
l, there is a nevariety of po
ent of this SLpean Platform
There are also al demonstrat
w of IoT for Dtranslated to m
m for defense d supply give
low cost of dfor evaluatinged to explore
d by: Paul Lab
ND/CAF capes.
possibility tod software wipears that thereployed for o
with more tim
but an accelecontribute to
cosystems.
uld be managefuture systemnsor discovera1].
eed to discussossible partnerL it was notedms Initiative (I
DoD, DISA tions.
Defense and Pmodern warfaand public san its integrati
developing mug their values the domain o
bbé (DRDC –
pabilities and
o minimise adith sufficient re is a signific
operations hermely and preci
erated evolutioo support our
ed to progressms, e.g., Open
ability, access
s what IoT carships with si
d that some mIoT-EPI) for pand USDOT
Public Safety are. It also preafety. For examion of RFID.
ultifunction Ifor improving
of cybersecur
– Corporate O
threats if mal
dverse effects security protecant advantagre and abroadise informatio
on in the reneforce prepare
sively be introStandard for sibility and co
apabilities supibling organiz
major efforts wplatform deveinitiatives tha
paper [5] shoesents a researmple, IoT cou
oT ecosystemg Canadian Dity outside ou
Office).
levolent group
on operationection and appge to integrate
d. It is expecteon.
ewal of our Dedness to oper
oduced for in Unattended S
ontrol based o
pport current azations with s
were from Eurelopment, inteat have alread
ows how the rrch roadmap uld change th
ms, it is recomDefense and Sur operational
ups use such a
al networks fpropriate use e IoT technoled to provide
D&S capabilitirate with othe
service upgraSensors (OSUon sensor cap
and future DNsimilar interesropean initiatieroperability dy delivered p
revolutionizefor enabling
he way we ma
mmended to dSecurity capabl networks [42
advantages ag
from hackers, and care from
logies to the improved
ies. In additioer countries
ades or integrUS) interface pabilities and
ND priorities.st. During theives such as and informat
prototypes an
ed IIoT benefian affordable
anage the logi
develop some bilities. They 2].
gainst
of m
on,
rated in
. e
tion nd
its e IoT istic
as can
Refere
[1] J. Simple," P
[2] Aon Terror
[3] J. Assessme
[4] MMore than
[5] P.López, "App. 1–44,
[6] Levolutiona2014.
[7] Dand resear
[8] R"IEEE Inthttp://iot.iY15.pdf.
[9] KService SuDefence, Dhttps://ww
[10] MFramewor17 April 2
[11] C.-MNetworks,on GenetiJ. C.-W. Lpp. 319–3
[12] L. WConsumerIEEE.
nces
Pagotto and Proceedings o
A. P. Dacus, "I(GWOT)," D
Ferris, "A Nent," Journal o
M. Bernier andn C4ISR, mor
. Fraga-LamaA Review on I
2016.
. Atzori, A. Ieary step of the
D. Miorandi, Srch challenge
. Minerva, A.ernet Initiativieee.org/imag
K. Ivanova, G.upport: ScopiDefence Scien
ww.dst.defenc
M. A. Kolodnyrk Ontologica2017 Availabl
M. Chen, S.-C," in Genetic c and Evoluti
Lin, J.-S. Pan,26.
Wang et al., "Sr Communica
D. O’Donnelof ISCRAM 2
Impact of C4IDTIC Docume
ew Americanof Military an
d J. Treurniet,re than CNO,"
as, T. M. FernInternet of Th
era, and G. Me internet of t
S. Sicari, F. Ds," Ad Hoc N
. Biru, and D.ve | iot.ieee.ores/files/pdf/IE
E. Gallasch, ing Study andnce and Tech
ce.gov.au/site
ya, P. H. Deitzal Approach fle: http://inter
C. Hsu, and Gand Evolutionionary Compu, P. Tin, and M
Survey on distions and Net
l, "Canada’s M012, pp. 1–10
ISR/Digitizatent 25 May 20
n Way of Warnd Strategic S
, "Understand" in Conferen
nández-Caramhings for Defe
Morabito, "Frothings," IEEE
e Pellegrini, aNetworks, vol.
. Rotondi, "Torg," 2015, AvEEE_IoT_To
and J. Jordand Technology hnology Octobs/default/files
zb, and T. Phfor ISR PED Mrnationalc2ins
G.-H. Lai, "Denary Compututing, August M. Yokota, E
stributed mobtworking Conf
Multi-Agency0, 2012.
ion and Joint 006.
r? C4ISR in OStudies, vol. 6
ding Cyber Opnce on Cyber
més, M. Suáreense and Publ
om 'smart objeE Communicat
and I. Chlamt10, no. 7, pp
owards a defivailable: owards_Defin
ns, "AutomatePrioritisation
ber 2016, Avas/publications
hama, "MINI-Missions... thstitute.org/s/1
efense Denial-ting: Proceedt 26–28, 2015ds. Cham: Sp
bility managemnference (CCN
y Situational
t Force Ability
Operation Iraq6, no. 1, 2003.
perations in aConflict Proc
ez-Albela, L. Clic Safety," Se
ects' to 'socialtions Magazin
tac, "Internet . 1497–1516,
inition of the
nition_Interne
ed and Autonn," Australianailable: s/documents/D
-DASS: a Newhe magic rabb16-75-zj2w.pd
-of Service Adings of the Ni5, Yangon, Mypringer Intern
ment schemesNC), 2014 IEE
Awareness S
y to Conduct
qi Freedom, A.
a Canadian Stceedings, 201
Castedo, and ensors, Articl
l objects': Thene, vol. 52, n
of things: Vi, 9 2012.
Internet of Th
t_of_Things_
nomous Systemn Government
DST-Group-T
w Missions &its," Accesseddf.
Attacks on IPvNinth Internati
yanmar - Volunational Publis
s for Proxy mEEE 11th, 201
System–Keepi
the Global W
A Provisional
trategic conte0, pp. 227–24
M. Gonzálezle vol. 16, no.
e next no. 1, pp. 97–1
ision, applicat
hings (IoT),"
_Revision1_2
ms for Combt, Department
TN-1573.pdf.
& Means d on:
v6 Wireless Sional Confereume 1, T. T. Zshing, 2016,
mobile IPv6," 4, pp. 132–13
7
ing it
War
xt: 43.
z-. 10,
105,
tions
in
27MA
bat t of
.
ensor ence Zin,
in 38:
8
[13] A. JFuture Int
[14] M. S
[15] A. Kcryptograp(SP), 2016
[16] J. ChThings," iIEEE.
[17] J. ChInternet ofpp. 508–5
[18] T. KInternatiopp. 1–5.
[19] J. LearchitectuConferenc
[20] NATMultiple MtrajectoireTechnologEducationrddc.gc.ca
[21] MissSociety Bu
[22] G. HBattlefieldApplicatioComputer
[23] L. KSelf-Heali(24th), Orbin/GetTR
[24] A. Kno. 12, pp
. Jara, S. Varaternet through
Swan, "Block
Kosba, A. Milphy and priva6, pp. 839–85
hudzikiewiczn 2015 IEEE
hudzikiewiczf Military Thi13: IEEE.
Kaur and D. Konal Conferen
ee, L. Kant, Ares for multi-ce, 2012, pp.
TO, "AdvanceMicro UAV Aes techniques gy Organizatinal Notes RTOa/cowdocs/cow
souri S&T, "Mulletin, Articl
Hua, Y. X. Li,d Situation Awon, and Commr and Informa
Kant, W. Chening for Battlerlando, FloridRDoc?AD=AD
Kott, A. Swamp. 70–75, 2016
akliotis, A. Fh IPv6 suppor
kchain: Bluepr
ller, E. Shi, Zacy-preserving58: IEEE.
z, J. Furtak, an2nd World Fo
z, J. Furtak, anings," in 2015
Kumar, "Wirelnce on Recent
A. McAuley, K-tier military n1–7.
ed AutonomoApplications /d'application
ion, Neuilly-sO-EN-SCI-19w1_e.html.
Missouri S&Te vol. 89, no.
, and X. M. Ywareness Sysmunication, Ption Science,
n, C. Lee, A. field Network
da, 29 NovembDA432120
mi, and B. J. W6.
. Skarmeta, anrt," Mobile Inf
rint for a new
. Wen, and Cg smart contr
nd Z. Zielinskorum on Inter
nd Z. Zielinsk5 IEEE 2nd W
less multifunct Advances in
K. Sinkar, C. networks," in
ous Formation/ Contrôle d'us pour micro
sur-Seine (Fra95, 01 Jun 200
T gets funding 8, pp. 4–4, 2
Yan, "Researcstem," in AdvaPt 2, vol. 144,
2011, pp. 44
Sethi, and M.ks," presentedber – 2 Decem
West, "The In
nd P. Kirsteinformation Sys
w economy," O
C. Papamanthoracts," in 2016
ki, "Fault-tolernet of Things
ki, "Secure prWorld Forum o
ctional robot Engineering
Graff, and Mn MILCOM 20
n Control andune formation
UAV multiplance) Systems08, Available
g to develop b010.
h on the Wireanced ResearG. Shen and 3–449.
. Natu, "D-FLd at the Procember, 2005. A
nternet of Batt
n, "Extendingstems, vol. 10
O'Reilly Med
ou, "Hawk: T6 IEEE Symp
erant techniqus (WF-IoT), M
rotocol for wion Internet of
for military a& Computati
M. Patel, "Plan012 - 2012 IE
d Trajectory Mn autonome évle," in "RTO-s Concepts an
e: http://candid
battlefield 'sm
eless Sensor Nrch on ElectroX. Huang, E
LASH: Dynameedings for thAvailable: http
tle Things," C
g the Internet 0, no. 1, pp. 3
dia, Inc.14919
The blockchainosium on Sec
ues for the IntMilan, Italy, 2
ireless commuf Things (WF-
applications,"ional Science
nning & desigEEE Military
Management Tvoluée et gest-EN-SCI-195nd Integrationd.drdc-
mart dust'," Am
Networks Aponic Commerds. (Commun
mic Fault Loce Army Scien
tp://www.dtic
Computer, Ar
of Things to 3–17, 2014.
920475, 2015.
n model of curity and Pri
ternet of Milit2015, pp. 496–
unication with-IoT), 2015,
in 2015 2nd es (RAECS), 2
gn of routing Communicati
Techniques fotion des ," Research a
n Panel,
merican Cera
plied in the rce, Web nications in
calization andnce Conferencc.mil/cgi-
rticle vol. 49,
the
.
ivacy
tary –501:
hin
2015,
ions
for
and
amic
d ce
[25] M. MMILCOM
[26] P. PInternatio(ICCICCT
[27] S. RDecision SResearch DRDC-RD
[28] N. S2016 InterBrussels, B
[29] M. Kthings," IE
[30] L. Dindustrial
[31] R. Rpp. 51–58
[32] W. YOpportuniSciences /
[33] M. Sframework
[34] C. Joof Things,
[35] M. Rmodels," I
[36] A. Asurvey on Tutorials,
[37] M. J
[38] M. JSebastopothingworxmedia_Th
Maher, "JointM 2007 - IEEE
. Ray, "Towaonal ConferenT), 2015, pp. 4
Ray, "In-TheatSupport and DCentre, QuebDDC-2016-C
Suri et al., "Anrnational ConBelgium, 201
Kranz, P. HolEEE internet
Da Xu, W. Heinformatics,
Roman, P. Naj, 2011.
Yeager and J.ities Minitrac/ Cloud and In
S. Hossain ank for health m
ohnson, "Secu," Accessed o
R. Palattella eIEEE Journal
Al-Fuqaha, Menabling techvol. 17, no. 4
J. Perry, "Eva
J. Perry, "Theol, CA2016, Ax/files/uploadhe_Platform_T
t Tactical RadE Military Com
ards an Internence on Contro411–416.
tre Sense & RDisruptive Tebec QC (CANC250, 01 Feb 2
nalyzing the Anference on M16, pp. 117–12
lleis, and A. Scomputing, v
, and S. Li, "Ivol. 10, no. 4
jera, and J. Lo
.-H. Morin, "Ick," in Proceenternet of Thi
nd G. Muhammmonitoring," C
uring the Parton: 24 April 2
et al., "Internel on Selected A
M. Guizani, M.hnologies, pro4, pp. 2347–2
aluating and c
e Platform TraAvailable: https/2016081714Transformatio
dio System: Tmmunications
et of Things bol, Instrument
Respond Logiechnologies,"
N); Thales Can2016, Availab
Applicability Military Comm22.
Schmidt, "Emol. 14, no. 2,
Internet of thi4, pp. 2233–22
opez, "Securi
Introduction tedings of the 5ings:: Challen
mad, "Cloud-Computer Net
ticipation of S2017, Availab
et of things inAreas in Com
. Mohammadotocols, and a
2376, 2015.
hoosing an Io
ansformation:ps://s3.amazo42142/WP_Oon_How_IoT
Tactical Netwos Conference,
based architectation, Comm
istics In-TheaDefence Res
nada, Quebecble: http://can
of Internet omunications a
mbedded interapp. 46–53, 20
ings in indust243, 2014.
ing the interne
to Cloud and 50th Hawaii Inges and Opp
-assisted indutworks, vol. 1
Safety-Criticale: http://epri
n the 5G era: Emmunications
di, M. Aledharapplications,"
oT platform,"
: How IoT Wonaws.com/tpOreilly-T_Will_Chang
ork Planning , 2007, pp. 1–
ctural framewunication and
atre S&RL - Tearch and De
c Que (CAN),ndid.drdc-rddc
f Things to thand Informati
action: Intera010.
tries: A surve
et of things,"
the Internet oInternational portunities Mi
ustrial internet101, pp. 192–
al SCADA Syints.gla.ac.uk/
Enablers, archs, vol. 34, no.
ri, and M. Ay" IEEE Comm
ed. Sebastop
Will Change ITpg-
ge_IT_and_W
and Managem–7.
work for defend Computatio
TA5. Investigevelopment C, Canada, Conc.gc.ca/cowd
he Battlefield ion Systems (I
acting with the
ey," IEEE Tra
Computer, v
of Things: ChConference o
Minitrack, 2017
t of things (II–202, 2016.
ystems in the /130828/1/13
hitecture, and3, pp. 510–52
yyash, "Internmunications Su
pol, CA: O'Re
T, and When.,
When.pdf.
ment," in
nce," in 2015 onal Technolo
ation of SelecCanada, Valcantract Report ocs/cow1_e.h
EnvironmentICMCIS),
e internet of
ansactions on
ol. 44, no. 9,
hallenges and on System 7, p. 5931.
IoT)–enabled
Industrial Int0828.pdf.
d business 27, 2016.
net of things: Aurveys &
eilly Media, 2
," O'Reilly M
9
ogies
cted artier
html.
t," in
ternet
A
2016.
Media,
10
[39] IEEEIEEE IoT building I
[40] M. JInternatio
[41] R. Gexperimenand Photo
[42] P. LadvantageICCRTS), and USC IInternation
[43] B. Xinformatio10, no. 2,
[44] W. ZInternatiopp. 660–6
[45] G. Zmonitorine-Health N
[46] S. Rcare: a com
[47] C. SIoT PlatfoThings, ReIntelligenc
[48] L. WLLP, Cana
[49] J. PaCanada –Crddc.gc.ca
[50] M. LInternet Tin Compu
E. (2016, 6 Fand AGILE I
IoT). Availabl
J. Covington aonal Conferen
Ganger, M. Nonts," in SPIE Donics.
Labbé, "Couldes?," in 22nd In
Topic 3: ImpInstitute for Cnal Command
Xu, L. Da Xu,on system forpp. 1578–158
Zhao, C. Wanonal Conferen665: IET.
Zhang, C. Li, g system modNetworking, A
R. Islam, D. Kmprehensive
Sangwhan, M.orm in the Deeston, VA, Uce: IEEE.
Wasser, R. HiladaMarch 20
agotto et al., "Centre for Seca/PDFS/unc18
L. Das, "PrivaTechnology, Icuter Science, 2
ebruary 2017IoT co-sponsole: http://iot.ie
and R. Carskance on Cyber
owicki, J. KoDefense+ Sec
d early adoptionternational Cplications of tCreative Techd and Control
H. Cai, C. Xr emergency m86, 2014.
ng, and Y. Nance on Commu
Y. Zhang, C. del based on tApplications a
Kwak, M. H. Ksurvey," IEEE
. P. Ruiz, M. sign of Real-tSA, 2016, vo
ll, and M. Ko16.
"Public Safetycurity Scienc81/p537863_A
acy and Securcdcit 2015, vo2015, pp. 33–
7). IEEE IoT Dored an onlineeee.org/image
adden, "ThreaConflict (CyC
vach, T. Gregcurity, 2016, p
on of internetCommand anhe Internet of
hnologies 120l Institute (IC
Xie, J. Hu, andmedical servic
akahira, "Medunication Tec
Xing, and J. the IoT sensoand Services
Kabir, M. HosE Access, vol
Wachowicz, time Recomm
ol. Technical S
czerginski, "C
y Broadband e, DRDC CSA1b.pdf.
rity Challengeol. 8956, R. N–48.
Developer Sure survey to bees/files/pdf/io
at implicationCon), Tallinn,
gory, and B. Lpp. 983105–9
tworking of ind Control Resf Intelligent T
015 WaterfronC2I).
d F. Bu, "Ubiqces," IEEE Tr
dical applicatichnology and
Yang, "Semaors," in 2012 I(Healthcom),
ssain, and K.-l. 3, pp. 678–7
L. H. Tran, Hmender SystemSession: Sem
Cybersecurity
Network ArcS TR 2013-00
es in Internet Natarajan, G. B
rvey 2016 (Thetter understaot-developer-s
ns of the inter, Estonia, 201
Liss, "OSUS 983105-6: Int
ntelligent thinesearch and TThings, Army nt Drive, Play
quitous data aransactions o
ion on interned Application
anMedical: a IEEE 14th Int, 2012, pp. 23
-S. Kwak, "Th708, 2015.
H. Cao, and I.ms," in IEEE
mantic Techno
y and the Inte
chitecture Des09, 2013, Av
of Things," iBarua, and M
The Eclipse Ioand how devesurvey-2016-
rnet of things,13, pp. 1–12:
sensor integrternational So
ngs provide siTechnology Sy
Research Labya Vista, CA,
accessing meton Industrial I
et of things," i(ICCTA 2011
kind of sematernational C38–243: IEEE
he internet of
Maduako, "TWorld Forum
ologies and Co
ernet of Thing
scription," Deailable: http:/
in DistributedM. R. Patra, Ed
T Working Grelopers are report-final.p
," in 2013 5thIEEE.
ation in Armyociety for Opt
ignificant ymposium (22boratory - W2017, p. 20:
thod in IoT-bInformatics, v
in IET 1), 2011,
antic medical Conference onE.
f things for he
The Role of am on Internet ollective
gs," McMillan
efence R&D //cradpdf.drdc
d Computing ads. (Lecture N
roup,
pdf.
h
y tics
2nd est
based vol.
n
ealth
an of
n
c-
and Notes
[51] R. Sno. 10, pp
[52] L. JaEfficiencypp. 1–14,
[53] J. KAerospace
[54] K. KGround/AM. A. Kol
[55] P. Lfor NetwoInformatioICCRTS, L
[56] F. Lof Things,
[57] C.-Hcommunic
[58] J. P.Communi
[59] O. Rwireless s2015.
[60] S. NEdinburghAvailable
[61] H. N46, no. 4,
[62] A. SAuthenticIEEE Mili
[63] J. ACharlottes
[64] J. A
S. Ferrell, "Unp. 151–154, 20
aeseung, S. Yy in Ubiquitou2016.
eller, "DARPe Electronics,
Klawon, J. Goir Multisensolodny and T.
Labbé, Z. Maaork-and Internon," in 7th IntLoews Le Co
Li, Y. Han, and," Computer C
H. Liao and Tcation. INTEC
M. Lichtmanications Jamm
R. Merad Bouensor network
Nagy, "Reporth (AUSTRAL: http://candid
Ning, H. Liu, pp. 46–53, 20
Singla, A. Muation for interitary Commun
. Stankovic, "sville Dept of
. Stankovic, "
ninterrupted In016.
Yunsick, and Pus Computing
PA eyes cyber Article vol. 2
old, K. Bachmor InteroperabPham, Eds.: P
amar, E. Abdenet-based Synternational C
oncorde, Québ
d C. Jin, "PraCommunicati
.-K. Woo, AdCH Open Acc
n, S. Amuru, ming Taxonom
udia, S. M. Seks using state
t on Cisco LivLIA), Ottawa,d.drdc-rddc.g
and L. T. Yan013.
udgerikar, I. Prnet of thingsnications Con
"Adaptive andf Computer Sc
"Robust and S
nformation C
P. Jong Hyukg Environmen
rsecurity for I27, no. 7, pp.
man, and D. Lbility, IntegraProceedings o
elhamid, B. Mnchronized E-Command andbec City, Can
actical access ions, vol. 89–
daptation fromcess Publisher
C. Shahriar, Tmy," IEEE Se
enouci, and Meful public key
ve Melbourne, Canada, Genc.ca/cowdocs
ng, "Cyberent
Papapanagiotos in mission crnference, 201
d Reactive Secience, 2007.
Secure Locali
Crucial to Agil
, "Lightweighnts," Sensors
Internet of Th 8-8, 2016.
Landoll, "Consation, and Netof SPIE, 2016
Moulin, R. Pro-activities for d Control Resenada, 2002, p.
control for se–90, pp. 154-1
m transmissior, 2012.
T. C. Clancy,ecurity & Priv
M. Feham, "A y cryptograph
e 2015," DSTOneral Documes/cow1_e.htm
tity Security i
ou, and A. A. ritical vehicu5, pp. 1298–1
ecurity for Wi
ization," Virg
le Army," Ar
ht Sensor Aut(14248220),
hings and emb
sidering IIOTtworking for P6.
oulx, and D. DLocation-andearch and Te27: CCRP.
ensor network164, 9/1/ 2016
on security (TR
, R. M. Buehrvacy, Feb. 20
novel secure hy," Ad Hoc N
O Cyber and ent DSTO-GD
ml.
in the Interne
Yavuz, "HAAular networks,1304.
ireless Sensor
ginia Univ, Ch
rmy Magazine
thentication SArticle vol. 1
bedded compu
T and SecurityPersistent ISR
Demers, "Recd Time-depenechnology Sym
ks in the cont6.
TRANSEC) to
rer, J. H. Reed16.
aggregation sNetworks, vo
Electronic WD-0880, 01 Ju
et of Things,"
A: Hardware-," in MILCOM
r Networks,"
harlottesville,
e, Article vol.
Scheme for En16, no. 12,
uting," Milita
y for the DoDR Vii, vol. 983
commendationdent mposium, 7th
ext of the Inte
cognitive rad
d, "A
scheme for l. 32, pp. 98–
Warfare Divisiun 2015 2015
Computer, v
-Accelerated M 2015 - 2015
Virginia Uni
, 2009.
11
66,
nergy
ary &
D," in 31,
ns
ernet
dio
–113,
ion, 5,
vol.
5
v,
12
[65] L. WKNN ClasEngineeri
[66] T. ZChallenge
[67] B. ZInternatioSocial Co
[68] S. ZState Univ
[69] C. Bdecades opp. 31–37
[70] R. CWiley & S
[71] M. Mthe InterneSynthesis
[72] S. KSpringer,
[73] A. FTransmiss
[74] A. FSimultaneConferenc
[75] P. LDispersed2007.
[76] P. LOperationInstitute of
[77] P. LDisperse CMeeting ofpp. 998–1
Wenchao, Y. Pssification Alng, Article, p
Zhang, H. Antes and a Solut
Zhu, A. Josephonal Conferenmputing, 201
Zhu, G. Cao, av. of New Yo
Belisle, V. Kof software rad
7, 2015.
C. Dixon, SpreSons, Inc., 19
Möstl, J. Schlet-of-Things,(CODES+ IS
Kounev et al., 2017, pp. 3–1
F. Cattoni, M.sion Systems
F. Cattoni, M.eous Digitalizce, 2007.
Labbé, D. Ardd Civil and Mi
Labbé, "GPS ans," in Proceeof Navigation
Labbé, D. ArdCivilian and Mof The Institut010.
Ping, W. Yuegorithm in W
pp. 1–8, 2014.
tunes, and S. Ation Framewo
h, and S. Sastnce on Interne1, pp. 380–38
and P. Liu, "Drk at Buffalo,
ovarik, L. Pucdio technolog
ead Spectrum94.
latow, R. Erns" in 2016 Inte
SSS), 2016, pp
"The Notion 16.
Musso, and Cin a Software
Musso, and Czation of Data
en, L. Li, andilitary Urban
and GIS Integdings of the 1(ION GPS 19
en, and L. Li,Military Urbate of Navigatio
, P. Li, and LWireless Senso
.
Aggarwal, "Dork," IEEE Int
try, "A Taxonet of Things a88.
Distributed Se, Amherst Re
ker, and M. Tgy innovation,
m Systems: Wi
st, H. Hoffmaernational Cop. 1–9: IEEE.
of Self-aware
C. S. Regazzoe Defined Rad
C. S. Regazzoa Transmission
d Y. Ge, "SelfOperations,"
gration in Mob12th Internati999), Nashvil
, "GPS-INS-Ran Operationson, The Catam
L. Jianhua, "Aor Network," J
Defending Coternet of Thin
nomy of Cybend 4th Intern
elf-healing Meesearch Found
Turner, "The s," IEEE Comm
ith Commerci
ann, A. Merchonference on H
e Computing,
oni, "Integratdio Framewor
oni, "SDR Ann and Naviga
f-Aware / SituInside GNSS
bile Equipmeional Technicle, TN, 1999,
Radio and GIS," in Proceedmaran Resort
A New IntrusioJournal of El
onnected Vehings Journal, v
er Attacks on ational Confe
echanisms fordation 2010.
software communications M
ial Applicatio
hant, and A. SHardware/Sof
," in Self-Awa
tion Between rk," 2007.
nalog Front-Eation Signals,
uation AwareS, vol. 2, no. 2
ent for Improvcal Meeting of, pp. 545–554
S Integration dings of the 20t Hotel, San D
on Detection lectrical & Co
icles Against vol. 1, no. 1, p
SCADA Sysference on Cyb
r Securing Se
mmunications Magazine, vo
ons. New York
Shraer, "Self-oftware Codes
are Computin
Navigation a
End Architect" in SDR For
e; Integrated H2, pp. 34–45,
ved Mobile Ef the Satellite4.
into Handhel007 National Diego, CA, 20
System Baseomputer
Malware: pp. 10–21, 20
stems," in 201ber, Physical
ensor Network
architecture: ol. 53, no. 9,
k, NY, USA:
-aware systemsign and Syste
ng Systems:
and Data-
ture For rum Technica
Handhelds forMarch/April
Emergency e Division of T
ld ComputersTechnical
007,
d on
014.
11 l and
ks,"
two
John
ms for em
l
r
The
s for
[78] D. WAutonomoOttawa ONhttp://cand
[79] Y. Zrelative loMemorandrddc.gc.ca
[80] B. RReport, Drddc.gc.ca
[81] L. LCooperatiTechnical rddc.gc.ca
[82] M. Dtransport aDefence R(CAN);CoDRDC-RDrddc.gc.ca
[83] C. WValcartierReport DR
[84] W. SAIAA SPA
[85] D. WNetwork fAnalysis, http://crad
[86] C. KHands-On
[87] Y. Dmassive MWireless C
[88] F. Dwithin pubbrief overv
Waller, I. Chaous Sensor NeN (CAN), Tedid.drdc-rddc
Zhou, J. Schemocation discovdum DRDC-Oa/PDFS/unc10
Ricard, "Le noRDC-RDDC
a/cowdocs/cow
Li, "Localizative LocalizatiReport DRD
a/cowdocs/cow
Deziel, "A Reavec garantie Research and ommunicationDDC-2014-Ca/PDFS/unc19
Widdis, "SASNr, Valcartier QRDC-VALCA
Shen, "Self-RACE 2009 Co
Waller, "A Simfor Early WarOttawa ON, T
dpdf.drdc-rdd
Kolias, A. Stavn"," IEEE Sec
Deng, L. WanMIMO aided hCommunicatio
Delaveau, A. Eblic and privaview," Proce
apman, and Metwork," Defechnical Mem
c.gc.ca/cowdo
mbri, L. Lamovery for SASNOTTAWA-TM07/p533710_A
oeud de capte-2014-R70, 0w1_e.html.
ion in Self-Heon of Sensor
DC-OTTAWAw1_e.html.
eliable Transpde livraison pDevelopmentns Research C
C109, 01 Jun 298/p800537_A
Net Sensor SQUE (CAN); ARTIER-CR-
Reconfigurablonference & E
mulation Studrning DetectioTechnical Mec.gc.ca/PDFS
vrou, J. Voascurity & Priva
ng, K.-K. Wonhetnets using ons & Signal
Evesti, J. Suomate civilian wiedings of SDR
M. Michaud-Shfence R&D Ca
morandum, DRocs/cow1_e.ht
ont, and J. BiNet," DefenceM-2010-140,A1b.pdf.
ur SASNet," 01 Dec 2014,
ealing AutonoNodes Using
A-TR-2008-02
port Protocol pour les appat Canada, OttCentre, Ottaw2014, AvailabA1b.pdf.
ignal ProcessMacDonald D
-2009-010, 01
e Robots for AExposition, A
dy of the Effeon," Defence emorandum DS/unc87/p531
, I. Bojanovaacy, vol. 14, n
ng, A. Nallanphysical layeProcessing (
malainen, andireless-netwoR, pp. 11–20,
hields, "Concanada – Centr
RDC-CORA-Ttml.
ird, "Experime R&D Canad 01 Aug 2010
Defence ReseAvailable: htt
omous Sensorg Distributed M20, 01 Jan 200
for Resource areils de commtawa Research
wa ON, Contrable: http://crad
sing AlgorithmDettwiler and1 Jan 2009.
Adaptive andAIAA SPACE
ectiveness of tR&D Canada
DRDC-CORA821.pdf.
, and R. Kuhnno. 1, pp. 37–
athan, M. Elker security," in(WCSP), 2015
d N. Shapira, rks–existing a, 2013.
cept of Operatre for OperatiTM-2008-052
ments and analda, Ottawa ON0, Available:
earch and Dettp://candid.dr
r Networks (SMaps," Defen08, Available
Constrained munications ah Centre, Ottaact Report, dpdf.drdc-
ms: Part 1," Dd Associates L
d MultifunctioE Forum, Pasa
the Self-healia – Centre for
A-TM-2009-0
n, "Learning I–46, 2016.
kashlan, and Sn 2015 Intern5, pp. 1–5: IE
"Active and and potential
tions for the Sional Researc2, 01 Jul 2009
lysis of stand-N (CAN), Tehttp://cradpd
evelopment Crdc-
SASNet): Stunce R&D Cane: http://candi
Nodes / Un Paux ressourceawa ON
Defence R&DLtd, Dartmout
onal Tasks," padena, Califor
ing Autonomor Operational
019, 01 Jul 20
Internet-of-T
S. Lambotharnational ConfEEE.
passive eaves future counte
Self-healing ch and Analys9, Available:
-alone GPS fochnical
df.drdc-
anada, Scient
udies on nada – Ottawaid.drdc-
Protocole de s limitées,"
D Canada - th NS, Contra
presented at thrnia, 2008.
ous Sensor l Research an009, Available
hings Securit
ran, "Safeguarference on
sdropper threermeasures–a
13
sis,
or
tific
a,
actor
he
d e:
ty"
rding
ats a
14
[89] P. Pfor Ubiqu
[90] DoDDefense, C
[91] X. ZHelicopterElectronic
[92] DoDTRADOC
[93] P. LGeospatiaDefense aTechnolog
[94] P. LPan-TTCPp. 44 slide
[95] P. LSituation A(SET) PanRTA-SET-
[96] P. L5th InternCanberra,
[97] R. A"Applied VRTO-EN-
[98] S. Atransmitte
[99] J. Mand futuredefense inmilitary-d
irinen, "A briitous Connec
D CIO, "DoD Chief Informa
Zhang, B. Xiar in a GPS-Decs, vol. 62, no
D, "IntroductiC ATDO-A, F
Labbé, L. Lamal Informationnd Business Cgies (TRACK)
Labbé, "CollabP Workshop oes.
Labbé, L. LamAwareness (Snel Symposium-104, Antalya
Labbé and R. Pational CommACT, Austra
A. Van den BVehicle Tech-AVT-131, 01
Adee, "Wireleers," IEEE Spe
Mariani, B. Wie of the IoT inndustry. Availdefense-indust
ief overview otivity (5GU),
Policy Recomation Officer
an, B. Zhao, aenied Environo. 10, pp. 6392
on to tactical Fort Monroe, V
mont, Y. Ge, an in Complex Continuity (IC), Santa Clara
borative Blueon the Robust
mont, Y. Ge, aSA) in Complm on Militarya, Turkey, 200
Proulx, "Impamand and Conalia, 2000, p.
Braembusschehnology Panel1 Dec 2005.
ss sensors thaectrum, vol. 4
illiams, and Bn the military;lable: https://dtry.html.
of 5G researc2014, pp. 17–
mmendations(CIO) Decem
and Y. Zhang,nment Using 2–6403, 2015
digital informVA 2000.
and L. Li, "CrTerrains," in
CGD&BC), Fa, California,
-forces Tracktness and Vul
and D. Arden,lex Terrains,"y Capabilities07, p. 20.
act of Systemntrol Researc36: CCRP.
e, "Micro Gasl," Research a
at live forever47, no. 2, pp.
B. Loubert, (2; The Internetdupress.deloit
ch activities," –22: IEEE.
for The Intermber 2016.
, "AutonomouOn-Board Vi
5.
mation link J
reating a Dynaproceedings
First Internati2007, p. 13: I
king and Beyolnerability of
, "Cooperativ in proceedin
s Enabled by A
ms and Informach and Techno
s Turbines – Aand Technolo
r; Energy harv14–14, 2010.
015) 6 July, Ct of Things intte.com/dup-u
in 2014 1st I
rnet of Thing
us Flight Conision," IEEE T
and quick ref
amic Picture of the Interna
ional WorkshoIEEE.
ond," ed. DRDNetwork Cen
ve Blue-force ngs of the SenAdvances in N
ation Qualityology Sympos
A Short Surveogy Organizat
vesters and ra.
Continuing thn defense. Theus-en/focus/in
International
s (IoT)," U.S
ntrol of a NanTransactions
ference guide
of Network Pational Confeop on Trackin
DC Ottawa: pntric Warfare
Tracking (BFnsors & ElectrNavigation Se
y on Mission Esium, 5th ICC
ey of Design tion, Neuilly-
adioisotopes f
he march: Thee Internet of Tnternet-of-thi
Conference o
. Department
no Quadrotor on Industrial
(TADIL J ),"
Participant erence on Glong Computing
proceedings o2007,
FT) and Shareronics Technoensors, NATO
EffectivenessCRTS. 2000.,
Problems," insur-Seine (Fr
fuel tiny
e past, presenThings in the ngs/iot-in-
on 5G
of
l
" HQ
obal g
of the
ed ology
O
," in
n rance)
nt,
Annex
Quote fromas a naturanew markmodern cconnectio
People: CExamples
Things: Pfrom other
Data: Rawmechanismhours per
Processesuse of smacustomers
IoE establemployedInternet ofeventually
From the scommuniccontrol, ro
12 https://wdate: 20 Ap
Intx A
m Sarah Wheal developme
keting domainconnectivity tons imaginab
Considered as include socia
Physical sensor sources. Exa
w data analyzms. Examplesday to evalua
s: Leveragingart fitness devs.
lishes an end- across all conf Digital, Induy constitute a
same source wcation betweeobotics, and o
www.iottechexppril 2017).
ternet of
eeler12, 20 Jannt of the IoT
n, IoE encomptechnology u
ble:
end-nodes coal networks, h
ors, devices, aamples includ
zed and proces include tempate room cool
g connectivityvices and soci
-to-end ecosynnectivity useustrial Internesubset of IoE
we find: “M2en machines wother applicati
po.com/2016/0
f Everyth
nuary 2016: “Amovement anpasses the wi
use-cases. IoE
onnected acrohealth and fitn
actuators and de smart therm
ssed into usefperature logs ling requireme
y among data, ial networks t
stem of connee-cases. Any et of Things,
E if not consid
2M is more rewithout humaions involving
1/m2m/ioe-vs-
hing (Io
Although thend is largely aider concept
E comprises o
oss the Interneness sensors,
other items gmostats and g
ful informatioconverted int
ents.
things and peto advertise re
ectivity inclufurther classicommunicati
dered as such
cently referrean interventiong device-to-d
-iot-vs-m2m-w
E)
e concept of Inassociated wit of connectivf four key ele
et to share infamong others
generating datgadgets.
on to enable into an average
eople to add velevant health
uding technoloifications—suon technologalready.”
ed to technolon. Examples i
device commu
whats-the-differ
nternet of Eveth Cisco’s tac
vity from theements inclu
formation ands.
ta or receiving
intelligent dece number of h
value. Examphcare offering
ogies, processuch as Internegies and the In
ogies that enainclude telemunications.”
rence-and-does
erything emerctics to initiate perspective uding all sort
d activities.
g information
cisions and cohigh-temperat
ples include thgs to prospect
ses and conceet of Humans,nternet itself—
able metry, traffic
s-it-matter/ (Ac
15
rged te a of
ts of
n
ontrol ture
he tive
epts ,
—will
ccess
16
Annex
From initiby Baron code to cocomputer)today IoT set up a dysystems")
The first dcomputersSeptembeWhirlwindand the sy
The birth Transmissits componto the smathe DefenUniversitythe Commprotocol aassign an another 10poor qualisuch as Qoencryptioncontributeservice/ne
All of thissystems cosuch advaexample fversion of6LoWPANinformatio
13 https://w14 https://en15 https://en16 https://w17 https://to18 The auth19 https://w
Timx B
ial technologiSchilling in R
ommunicate o) connected to(1964: In Un
ynamic by wh.
digital commus included ther 1950, a “mid using a cust
ystem digitize
of Internet16 ision Control Pnents as IP la
all number of ce Research Ey of Rocheste
munications Rallows for 2128
IPv6 address 00+ earths.” Iity of service oS information in mind. It pes to detect, metwork denial,
s information ould benefit o
antages due tofor IoT protocf the Internet PN, therefore, on wirelessly
www.postscapesn.wikipedia.orgn.wikipedia.org
www.postscapesools.ietf.org/htmhor of this SL cwww.link-labs.c
meline a
ies using electRussia, and inover a distanco a network (nderstanding Mhich all previo
unications wee military radaicrowave earlytom interface d the radar in
is linked to thProtocol (TCPabel (aka, add
IPs availableEstablishmener were complResearch Cent
8 (approximatto every atom
It evolved from(QoS) manag
on sharing andprovides more
monitor, prote, degradation
is critical to sof the inhereno malevolent acols is 6LoWPProtocol (IPvallows for theusing a secur
s.com/internet-g/wiki/Computg/wiki/Semi-As.com/internet-ml/rfc1020 (Accontributed to tcom/blog/6low
adapted
tromagnetic sn 1833 Carl Fre of 1200 m w1990 by JohnMedia Marshous technolog
ere for defencar system Semy-warning raddeveloped by
nformation an
he ARPANETP) and the Intress). Then in
e under IP vert Network, Dleted under ther (CRC) Otttely 340 undem on the surfam the IPv4 wgement and sed managemene means to coct, analyze anand disruptio
show that pubnt potential froactions to injePAN19, “a somv6) and Low-pe smallest devre Internet pro
-of-things-histoter_network (A
Automatic_Grou-of-things-histoccess date: 18 Athe early evolut
wpan-vs-zigbee
from IoT
signals (1832riedrich Gauswithin Göttin
n Romkey), vihall McLuhan gies, including
ce systems (Inmi-Automaticdar system at y Forrester's t
nd successfull
T born in 1969ternet Protocon 1984 the Dorsion 4 (IPv4)RENET17 Ca
he scientific atawa. In 2011ecillion) addreace of the eart
with the intent ecurity, so IPvnt, multicastinombat cyberatnd defend agaons [11–13].
blic safety andom pervasiveect false informewhat contopower Wirelevices with limotocol.”
ory/ (Access daAccess date: 18und_Environmory/ (Access daApril 2017). tion of IPv6. (Access date:
T histor
: An electromss and Wilhel
ngen, Germanisionaries hav
n stated: "....byg cities, will b
n the late 1950c Ground Envt Hanscom Fieteam. An aircly sent it to W
9. The concepol (IP), TCP/Iomain Name ). During thatanada REF ARauthority of Pa, IPv618 was pesses or as Steth, and still ht to correct itsv6 was born wng, authenticattacks and netainst network
d defence IoTe IoT capabilitrmation or denorted acronymess Personal Amited processi
ate: 18 April 28 April 2017).ment (Access da
ate: 18 April 2
18 April 2017
ry13
magnetic teleglm Weber inv
ny.) to the firstve predicted thy means of elbe translated
0s, early netwvironment (SAeld was conn
craft was flowWhirlwind15.”
ptual ARPANIP, with uniquSystem (DNSt period the keRPANET conaul Labbé whpublicly launeven Leibson
have enough as various weakwith improveation, securitytwork exploitinfiltrations p
T augmented ties while prenial of servic
m that combinArea Networking ability to
2017).
ate: 18 April 22017).
7).
graph was crevented their owt thing (not a he evolution lectric media, into informat
works of AGE)14.): In ected to
wn past the sit
NET evolved ue identificatiS) was createdey componennnected via hile seconded ched - The ne
n put it, “we caddresses left knesses such
ed capabilitiesy, privacy andtation. It preventing
information eventing deniaes. A good
nes the latest ks (LoWPANtransmit
017).
eated wn
of we
tion
te,
the ion of d due
nts of
to ew could
to do as
s d
al of
N).
The very fa big imparequired atheoreticaoperations
Index IS
1 BE
2 DE
3 CH
4 U
5 GR
6 LU
7 PT
8 GB
9 IN
10 JP
11 FR
12 CA
13 EC
14 PE
15 IE
16 EE
17 M
18 NO
19 FI
20 AU
21 TT
22 BR
The transiCurrently
20 http://w21 https://la
fixes that havact on the funan increasingll. They are has including gr
Table B.1:
SO-3166 Code
E 1
E 7
H
S 28
R
U
T
B 6
N 46
P 11
R 5
A 3
C
E 1
E
E
MY 2
O
I
U 2
T
R 13
ition is not eaorganizations
ww.digit.fyi/i
abs.apnic.net/di
ve kept IPv4 gnctionality or y complex seaving a real imrowth, perform
: IPv6 adoptio
Internet Users
V
10109309
70971603
7353067
88324176
7063611
553892
6915955
60555720
65606607
14900869
56039156
32326774
7135628
13141549
3838543
1194349
21296431
5207437
5121012
20887921
945247
39942445
asy. Table B.1s have to run
ipv6/ (Accessists/v6dcc.html
going have intthe operation
et of fixes andmpact on busimance, manag
on, Date: 18 A
V6 Use ratio
V6
55.32 5
42.05 29
34.66 2
33.53 96
33.37 2
31.73
26.74 1
24.84 15
24.72 115
21.67 24
18.70 10
18.33 5
18.32 1
18.32 2
18.14
17.11
15.52 3
14.78
14.52
14.30 2
13.81
13.74 19
1 shows 22 coin parallel the
s date: 18 Aprl (Access date:
troduced a prn of the Internd bodges to keinesses todaygeability, sec
Apr 2017 (Fir
6 Users (Est)
Pop
5592492 11
9844102 80
2548818 8
6674350 325
2357278 10
175765
849045 10
5040627 65
5074864 1337
4902102 126
0478733 64
5924606 36
307589 16
2407295 32
696496 4
204335 1
3305986 31
769895 5
743597 5
2987394 24
130549 1
9231305 210
ountries rankee IPv4 stack a
ril 2018). : 18 April 2017
roliferation ofnet. We are meep it functiony. They impaccurity, flexibil
rst 22 IPv6 U
pulation Cou
1422949 Belg
0649549 Germ
8432417 Swi
5790030 Unit
0900635 Gre
581820 Lux
0276308 Port
5394947 Unitand
7950022 Indi
6126092 Japa
4860135 Fran
6527429 Can
6555983 Ecu
2052560 Peru
4738942 Irela
1306728 Esto
1044361 Mal
5313712 Nor
5536230 Finl
4545149 Aus
1367942 Trin
0756695 Braz
ed in term of tand IPv6 stac
7).
f problems thaoving to IPv6ning. These pct many areaslity and reliab
Users by Coun
untry
gium
rmany
itzerland
ted States of
ece
xembourg
tugal
ted KingdomNorthern Ire
ia
an
nce
nada
uador
u
and
onia
laysia
rway
land
stralia
nidad and Tob
zil
their use ratiock.
at are now ha620: “IPv4 hasproblems are n of Internet
bility.”
ntry)21.
America
m of Great Britland
bago
o of IPv6.
17
aving s not
tain
18
Annex
From the ctechnologfollowing of real-tim
The U.S. DOffice (ITof transpoelectronic infrastructbetween aradio rangexpand thsupervisio
Fig
22 https://w23 Authorizin Canada: Governmen
Emx Can
civilian side wies and relatepaper about a
me recommen
Department oTS JPO) is resort to advance
and informatture (V2I) and
all modes of trge of several ke wireless net
on.
gure C.1: Decommuni
www.its.dot.govzed use by Ken
A Knowledgent Conference
merging d future
we currently fed ecosystemsan IoT platforder systems.”
of Transportatsponsible for ce transportatiotion technologd vehicle-to-vransportationkilometers alotworks with m
edicated shortications will a
v/factsheets/ITnneth Leonard, e-Building WorCentre, 111 Su
applicae capabi
find a varietys [43–46]. It crm for smart t”
tion (USDOTconducting re
on safety, mobgy applicationvehicle (V2V. ITS IoT devong roads andmultiple conn
t-range commallow connect
SJPO_overviewDirector, ITS
rkshop; Transpussex Drive, O
tions (blities
y of medical ocan also be aptourism [47]:
T), Intelligent esearch on behbility, and envns, known as ). Wireless co
vices and gated intersectionsnections to a w
munications (Dtivity between
w.htm (AccessJPO during the
port Canada / Dttawa, 8–9 Ma
both civi
or hospital serpplied to touri “The role of
Transportatiohalf of the Devironmental sITS22. ITS Io
ommunicationeways operatis as illustratedwire USDOT
DSRC) at 5.9 n all modes of
s date: 21 Aprie workshop: Tr
Defence Researarch 2017.
lian and
rvices augmenism as discusf an IoT platfo
on Systems, Jepartment on sustainability oT includes vns will allow ing at 5.9 GHd in Figure Cnetwork for a
GHz and othf transportati
il 2017). ransforming Rrch and Develo
d military
nted by IoT sed in the orm in the des
Joint Programall major mothrough
vehicle-to-connectivity
Hz offer wireleC.1. Then theyanalytics and
her wireless on23.
Road Transportaopment Canada
y)
sign
m odes
ess y
ation a,
Several exHowever, Figure C.
Figu
Another ecounter-unthe comba
xamples couldthe proliferat2 from [5].
ure C. 2: Exa
xample is fornmanned aircatant of the fu
d be found in tion of device
mples of IoT L
r the dismouncraft system (Uuture.
the IoT devees and applica
devices and aLabbé-Lamas
nted combatanUAS) and phy
eloper survey ations of IoT
applications fs, 15 Februar
nt as describedysiological st
from IEEE, Atechnologies
from [5] (Perry 2017).
d in [5] whertatus monitor
Agile and IoTis best illustr
rmission from
re new capabiare included
T Eclipse [39]rated by
m the authors;
ilities such as in Figure C.3
19
].
3 for
20
24 Illustratio
on from [5]. Pe
Figur
ermission from
e C.3: Soldier
m the authors; L
rs of today an
Labbé-Lamas,
nd the future2
15 February 20
24.
017.
Annex
There are groups havWide WebEPCglobaTelecomm
There are Informatiovariety of a person [essential adomotics passumed tconnectivia Canadia[49].
In order toconsider thas that def(COMSECmaking it knowledgradio comone tries tprobabilitypower is ie.g., usingLPD [70].
Typical japrotocol aAuthors’ ijamming owith modeClassificathe buildincommon m
25 https://aw26 http://ww27 https://bu28 “interfereusing the mhttp://www29 https://ca
Emx D
no IoT recogve been creatb Consortiumal, Institute ofmunications S
specific obligon Protection f IoT devices (48]. In comba
and would be purposes via that most of thity to their res
an public safet
o tackle the brhe three dimefending againC) as that keedifficult for se of accurate
mmunication iso achieve a loy of exploitatncreased to c
g more coding. With a lowe
ammer capabiand error correintent of the jor anti-jammiern electroniction (CAPECng of secure smethods used
ws.amazon.comww.rogers.comusiness.bell.ca/ence suppressi
minimum meanw.ece.utah.edu/apec.mitre.org
merging
gnized policy ted to provide
m (W3C), Intef Electrical antandards Inst
gations identiand Electron
(e.g., physioloat situation mprotected accplatform provhe IoT of intespective operty broadband
road subject oensions of wirnst unauthorizeping importasomeone to inwaveforms, ms to detect, inow probabilitytion (LPE) anombat jammi
g gain and sprer LPD comes
ilities allow dection capabiamming taxoing strategies c warfare.” ThC)29 which “is software. Eacd to overcome
m/iot-platform/
m/enterprise/pro/shop/enterprison for direct se
n squared error /~ece6961/proj(Access date: 2
policies
and standardse protocols in rnet Engineer
nd Electronicsitute (ETSI).
fied in Canadnic Documentogical status m
monitoring heacordingly. Thviders such aserest in a contrational netwo
communicati
of security or reless commu
zed access to oant communicntercept or intmodulation sc
ntercept, exploy of detection
nd better anti-jing then the Lread the signas usually lowe
devising an evlities of the c
onomy paper [within a larg
he authors refa catalog andh attack patte
e that challeng
/ (Access date:oducts-and-soluse/machine-to-mequence spread(MMSE) perfoect/madhow_M22 April 2017)
s and sta
s so far. Somesupport of th
ring Task Fors Engineers (I
dian and Provts Act (PIPEDmonitors) colalth and stress
his is quite difs AWS25, Rogtext of public orks or future ions network
cybersecurityunication secuor modificatio
cations secureterfere with rachemes, and coit, and jam thn (LPD), low jamming. On
LPD will suffeal28 in order toer LPI and LP
ven better jamommunicatio[58] is “to hel
ger context of fer to the Comd taxonomy oern provides age, and recom
23 April 2017utions/internet-machine-manad-spectrum codformance criterMMSE_94.pdf).
andards
e standard orghe IoT includirce (IETF), EIEEE) and the
vincial legislatDA) that needllect informats level of eachfferent from ugers26 or Bell security and ones such asexpected to o
y [5, 7, 15, 16urity, i.e., infoon of informa
e; and transmiadio communcoding [57]. The communicprobability o
ne of the challfer. So other ao both combaPE.
mmer strategy on to disturb, tlp researchers
f known stratemmon Attack of cyber-attacka challenge th
mmended meth
7). -of-things (Acc
agement-centrede-division murion.” f (Access date:
s
ganizations [3ing efforts ledlectronic Prode European
tions such as d to be considetion that can bh combatant
using IoT for services27. Indefence use w
s the network operate in the
6, 18, 26, 50-ormation secuation; commuission securitynications withThe basic stracation signalsof interceptionlenges is if theapproaches haat jamming an
by deducing this is protocs place newlyegies in a wayPattern Enumk patterns, cr
hat the attackehods for mitig
cess date: 23 Ae (Access date:ultiple-access (C
25 April 2017
36] and differd by the Worlduct Code (E
the Personal ered when a be used to idecan be considcommercial o
n this section wireless architecture f
e 700 MHz ba
69] we have turity (INFOSEunications secy (TRANSEC
hout prior ategy against . To counter tn (LPI), low e transmitter
ave to be sougnd obtain a low
the type of ol jamming.
y discovered y that is consimeration and eated to assiser must overcgating the att
April 2017). 23 April 2017CDMA) system
7).
21
rent ld
EPC)
entify dered or we
for and
to EC)
curity C)
a these,
ght, wer
istent
st in ome, ack.”
7). ms
22
For exampaccuracy rin order toreceiving
More infoIn additionnetworks propagatio
Next we hsufficient.protect theapproacheand type okeys over to increase
Further coaddressed
ple, performarequire using o counter intespectrum as s
ormation aboun we have to [23, 63, 64, 6on, interferen
have to consid. In such casee informationes will not be of OS selecteda large numb
e security at t
onsiderations in a separate
ance improvemsystem and nrference or jaseen by the w
ut radio commconsider the s
68, 78–85] whces and noise
der the INFOSs encryption,
n. Given the smcompatible w
d as demonstrber of low costhe physical la
of cybersecur document.
ments in termnetwork self-aamming. Thes
wideband front
munication jamsignificant re
hich offer an ae.
SEC and COMrandomizatio
mall size of awith the availarated in [86]. st IoTs via wiayer (PHYLA
rity and cyber
ms of energy eawareness at vse networks mt end of their
mming and nesearch and finadaptive appr
MSET aspecton and utilisata large numbeable hardwareAlso this crea
ireless links [3AW) [35, 87–
rwarfare are b
efficiency, datvarious layer
may share QOSDR from ea
etwork securindings on selroach to coun
ts assuming thation of blockcer of IoTs, it ie capacity (coates a big cha36, 61, 86]. O
–89].
beyond the sc
ta streaming slevels of the
OS informatioach participan
ity could be flf-healing netwnter jamming,
hat TRANSEchain should is possible thaomputing andallenge in manOther studies s
cope of this S
speed and IoT stack [71
on about the nt location.
found in [58, 6works and senadverse
C was not be sufficient
at these d memory sizenaging cryptoshow techniq
L. It needs to
1–77]
64]. nsor
to
e) o
ques
o be
Annex
Case Stu
IoT Uses
The very deployingsituationaConnectecapabilitiedominatecapabilitieremote frback to th
Threats
Imagine thacking ithe enemorganizatdangerouwarfighteto take adinto the w
Recomm
Prioritize ensuring (and combroader a
Regardingand IPv6 stoto underinformatioresearch.”
There are resistance
30 https://w
Scx Epu
udy: Battle
s and Pote
small size ag in low powal awarenessed into commes greatly aue the enemy es, real timerom the batthe warfighte
and Vulne
that the enento or comp
my to providetions; makinusly. At the ser, giving thedvantage ofwarfighter de
mendation
addressing that the info
mmunicate tharray of pote
g the transitiostack. “The Inrtakes this maon-stealing, ac”30
some ThingWto tampering
www.infosecuri
cenario eblicatio
efield Situat
ntial Benef
and low cost wer networkss, giving themunications ugment theiin difficult e
e situational tlefield, allowers, again inc
rabilities
emy takes adpromising thee false informg decisions asame time, tem the advaf the confusioecision maki
the highest ormation is ehese changeential device
n from IPv4 tnternet Protocassive sea chaccording to N
Worx works ing (intentional,
ity-magazine.co
examplen [90]
tional Awa
fits
of sensing as in forward em real powecapabilities r ability to eenvironmentinformation
wing advice creasing the
dvantage of ese devices mation to thand actions,they can alsoantage of theon they having process.
risk vulneraencrypted w
es broadly) toes that could
to IPv6, currecol Version 6 ange, it opens NATO Cooper
n progress for malfunction
om/news/nato-
e excerp
areness
and communsituations toer to see arobuilt into the
execute theirts. With the acan be relayand addition
eir effectiven
vulnerabilitiand the infoe warfighter, and actionso see the infe situational e created th
bilities alreawhere neededo ensure sup be deployed
ently organiza(IPv6) transia wide scope
rative Cyber
r IoT tamper-or sabotage).
-ipv6-transition
pted from
nications devo provide waound cornerseir uniforms r missions anaddition of iyed to commnal big picturness.
es in the deormation ther and the sus they take eformation thawareness
hrough the in
dy installed d. Implemenpply chain rid with our t
ations have toition is well ue for potentialDefence Cen
-resistant com. These could
n-opens-up/ (A
m a DoD
vices makesarfighters wis and acrossand armor,
nd effectivelmproved intmand and sure informatio
evices or netwey supply. Thpporting remeither unreliahat should haand further njection of fa
in mission snt policies anisk managemroops.
o run in parallunderway, andl attack vecto
ntre of Excelle
mponent (see nd provide som
Access date: 18
D policy
s them ideal th enhanced
s hostile terrthese y engage anternetworkinupport faciliton to be sen
working, his may allowmote ably or ave gone to allowing thealse informa
systems, sucnd processesment of a
lel the IPv4 std as the Internors for covert ence (CCDCo
note in [38]), me advantages
8 April 2017).
23
for d rain.
nd ng ties nt
w
the em ation
ch as s
tack net in
oE)
i.e., s to
24
public secrequiring
Figure E.1wireless cwireless Ioavoid selfprotocols,
An examp45 grams control de
Figure E
31 Authoris
curity and defimproved reli
1 illustrates thonnections aroT or IoBT (I
f-jamming and waveforms,
ple of things fand has a dia
emonstration i
E.1: An overviand
sation to use th
fence IoT systiability and se
he various wirre in real situaIoMT) deviced interferencemessages and
for such battlemeter less thain GPS-denie
iew of the Inted devices could
is illustration w
tems. Integratecurity.
reless connecation accompes. This require within the ald data formats
efield is a nanan 0.15 m thaed environmen
ernet of Battled communica
was provided b
ted circuit har
ctions betweenlished by diffres the develollowable radis.
no quadrotor hat was successnts, the Black
e Things as pate and collab
by the author (K
rdening is als
n battle thingferent radio copment of a ro spectrum in
helicopter whsfully employk Hornet [91].
presented in [2borate on the
Kott-Labbé, 13
so available fo
gs in a typical ommunicatio
robust commun addition to t
hich weighs abyed in autonom.
24], where a battlefield31.
3 April 2017).
or systems
battlefield. Ton systems anunication planthe multiplici
bout only mous flight
variety of sys
These nd n to ity of
stems
Annex
There is a more specthe follow(TADILs)success ra
“Track Ideplatform, psurveillanmanagemedata systemreceive pogenerate nIn additionelectro-op
So a trackbattlefieldremote fromake trackthe result timely andinterceptioabout 40%certainly vbehind thelocation lisurveyed a
In the revi(the sensovalue of apowered bdata at higpoint or seneed IoT wcapacity fenergy fro
32 Identifica33 Joint tactsequence nsecondary J34 Network35 www.adt
Rex F
variety of ancifically in dig
wing discussio) [92]. Impactate have been
entification: Tplatform activce function faent informatioms (TDSs) th
osition informnear real-timen to radar trac
ptical, can also
k could be relad. From some om the sensork data almostinstantly forwd useful data on in referenc
%. But these pvalid for a lare next corner,ike a meter. Ina priori.
iewed materiaor) when possctionable info
by batteries, igh rate versuseries thereof. with more com
for a given perom the enviro
ation, friend ortical informatio
number, transmJU address, tra
k Participation Gtdl.army.mil in
elation b
nalytics that hgital military on here is an et of the positioreported base
Track identifivity, specific all into three gon, and positi
hat support sumation and stae track reportscks, other typo generate rea
ated to statistiprevious exp
rs, the resultint useless. Whewarded to tactfor real-time ce studies [96percentages dorge variety of , there is a neen a building o
al on IoT systible in order tormation at th.e., one needs
s the energy reThis also poimputing capariod without rnment such a
r foe (IFF). on distribution
mission mode, track number bloGroups (NPGs
n Tadil J (Acce
between
ave been devinformation s
excerpt from aonal accuracyed on the anal
ication is repotype, or natiogeneral areasional referenc
urveillance noatus directly frs that are exchpes of sensorsal-time track r
ical time serieperiences, wheng data sufferen the analytitical operatorsdecisions and] were in excon’t translate scenarios. Foed for data upor a tunnel thi
tems the trendto improve thhe tactical levs to estimate tequired for prints to the factabilities and bre-supplying.as from solar p
n system (JTIDrack numbers,
ock. s). ess date: 24 Ap
analytic
eloped and tesystems are rea reference doy, dead reckonlyses of vario
orted on TADonality….Surv: track and tra
ces, which incormally use acrom TADIL Changed with J, for examplereports to be
es when tryinen analytics (r from some tiics and pre-prs (or autonomd actions. Theess of 50% wwell from on
or CUE when pdates with smis becomes ev
d is to move dhe (timeliness vel. Trade-offsthe amount ofrocessing the t that if we w
buffer memory This could bpanels, some
S) unit (JU) asterminal outpu
pril 2017).
cs and t
ested so far buelated to trackocument on thning and time
ous military ex
DIL J as an enveillance: Meack amplifyinclude points, ctive sensors, C or TADIL JJTIDS33 on the, signal intellshared on the
ng to follow th(man operatedime lateness, rocessing are
mous actuatore improvemen
when the averane scenario to tracked oppomall delays likven more chal
data processin and position
fs need to be mf energy requraw data and
want secure coy space, and c
be curbed whefuel and ener
ssignments—JUut, user type, in
track dat
ut some that hk data. In ordhe subject of eliness of tracxercises [93–
nvironment, idessages that sng informatiostrobes, and fsuch as radar
J participantshe surveillancligence, infrare surveillance
he movementd or autonomosometimes wdone close to
rs), it is expecnt of the succage delay was
o another one osing entities ke one secondllenging if the
ng of raw sennal accuracy fomade when seuired to transmd sending a cleommunicationconsequentlyen the IoT courgy efficient n
U address, partnitial entry iden
ta
have been useder to understa
tactical data ck data on mis–95].
dentification, upport the n, track fixes. Tacticar or IFF32, or . These TDSse NPG”34. red, and
e NPG.35
t of entities inous) are far
with delays thao the sensors acted to obtainess rate of s reduced by but this trendare lurking d and precisioe area was no
nsor data to thfor moving tarensors are mit a lot of rawean track datans in additiony more energyuld scavenge network proto
ticipant type anntification,
25
ed and links ssion
al
s
n a
at and more
d is
on ot
he IoT rget)
w a , we
y
ocols
nd
26
[18, 20, 52Such harv
In [99] thetechnologof integratfound a coawareness(although intelligenchave leanesecure govapplicatio
If some ofwith existdata with the friendlin Figure F
36 Piezoelecpower budgenergy to a100 years, 37 Central I38 Frank KoFebruary 1community39 Link 16 iTactical Dapicture in n40 NATO Im
2, 62, 97]. Otvesters do not
e authors use ies to developting IoT sensiost reduction s improvementhis assumes
ce leaders haved on civilianvernment netwns is, potentia
f the analyticsing military tvarious elemely and opposiF.1.
ctric or microeget of betweenachieve a 5-mWthe device cou
Intelligence Agonkel, “The CI0, 2015, www
y/105054/, (Acis a military taata Links. Withnear-real time. mproved Link
ther alternativproduce enou
an informatiop an understaning and actuafor the infrast
nt could be acan increase i
ve followed sun expertise, wworks.38 Thusally, already i
s are closer oractical data syents in a battling forces try
electromechanin about 0.1 micW RF pulse eveuld function autgency (CIA). IA is bringing A.defenseone.co
ccess date: 27 Mctical data exchh Link 16, mili
Eleven (NILE
ves exist but ough power fo
on value loopnding of the v
ating in suppotructure. Usin
chieved with ln the surface uit: The CIA3
orking with cs, the infrastruin place.”
r integrated inystems, like Llefield. That cto use the pu
ical systems (Mcrowatt and 1 mery three minuttonomously, ac
Amazon’s marom/technology/March 2015). hange networkitary aircraft as
E) Program.
often for very r most of our
p comprising evalue to opera
ort to military ng cost reductlow security rthat could be
37 and Defenscommercial coucture for dea
n IoT sensors Link 1639 (or Ncould be diffeublic Internet t
MEMS) cantilevmilliwatt. The dtes. Most impoccording to Lal
rketplace to the/2015/02/cia-b
k used by NATs well as ships
low power br applications.
elements abouations, risk andecision mak
tion from IIotrisk from the e the object ofse Informationompanies to baling with the
it will make NILE40, aka L
erent from theto their respe
ver convert medevice was ablortant, because l and Tin, for a
e intelligence cbringing-amazo
TO. Its specificaand ground for
budget as desc.
ut value drivend advantagesking and opert they observeincreased numf cyberattacksn Security Agbring the cloue data volume
it easier to coLink-22), thae view of cybeective advanta
echanical motie to create suffthe half-life of
about that long
community,” Dons-marketplac
ation is part ofrces may exch
cribed in [98]
ers, stages ands, and overallrations. They e that battlespmber of things). “Defense agency (DISA)ud and softwae of tactical Io
ombine such dat exchange trerwarfare whages as illustra
ons into electrificient output f Ni‑63 is just
g: [98].
Defense One, ce-intelligence-
f the family of ange their tacti
36.
d l cost
pace gs and )
are to oT
data ack
here ated
icity a
over
-
ical
Figurethrou
IoBT may“human wIoBT’s comaking usa well-adaprocessinginformatio
Even durinand uses ailluminatio
41 Authoris
e F.1: Examplugh the civilia
y involve somwarfighters unomplexity andseful sense ofapted IoBT syg to exploit thon suitable to
ng cyberattacan applicationon flare could
sation to use th
le from [24] wan Internet of
me overwhelmnder extreme cd the informatf this massiveystem should he raw data fr
first respond
cks one can acn to detect if id be used to c
is illustration w
where combatf Things (gray
ming cognitivecognitive andtion it will pro, complex, anprovide conc
rom the multitders or combat
ccess a surveit has been tem
check if the ba
was provided b
tants (red andy nodes), to wh
e load if the syd physical streoduce. The Iond perplexingcise actionabletude of sourcetants.
illance street mpered or if tackground lig
by the author (K
d blue nodes)hich they will
ystems are noess will be stroBT will haveg ocean of infoe informationes and sensor
camera on ththe video feedght changes.
Kott-Labbé, 13
) perform cybl be inevitably
ot well designrongly challene to assist humormation”. Th
n by using anars available to
e civilian Inted is real or sub
3 April 2017).
erattacks pary connected41
ned. In fact nged by the mans in hat means thaalytics and otho produce
ernet of Thingbstituted, also
27
rtly 1.
at her
gs o an
CAN UNCLASSIFIED
CAN UNCLASSIFIED
DOCUMENT CONTROL DATA (Security markings for the title, abstract and indexing annotation must be entered when the document is Classified or Designated)
1. ORIGINATOR (The name and address of the organization preparing the document. Organizations for whom the document was prepared, e.g., Centre sponsoring a contractor's report, or tasking agency, are entered in Section 8.)
DRDC – Corporate OfficeDefence Research and Development Canada60 Moodie Drive, Ottawa Ontario,K1A 0Z4Canada
2a. SECURITY MARKING (Overall security marking of the document including special supplemental markings if applicable.)
CAN UNCLASSIFIED
2b. CONTROLLED GOODS
NON-CONTROLLED GOODS DMC A
3. TITLE (The complete document title as indicated on the title page. Its classification should be indicated by the appropriate abbreviation (S, C or U) inparentheses after the title.)
Internetworking of things (IoT) and implications for Canadian Armed Forces
4. AUTHORS (last name, followed by initials – ranks, titles, etc., not to be used)
Labbé, P.
5. DATE OF PUBLICATION (Month and year of publication of document.)
February 2018
6a. NO. OF PAGES (Total containing information, including Annexes, Appendices, etc.)
27
6b. NO. OF REFS (Total cited in document.)
99
7. DESCRIPTIVE NOTES (The category of the document, e.g., technical report, technical note or memorandum. If appropriate, enter the type of report, e.g., interim, progress, summary, annual or final. Give the inclusive dates when a specific reporting period is covered.)
Scientific Letter
8. SPONSORING ACTIVITY (The name of the department project office or laboratory sponsoring the research and development – include address.)
DRDC – Corporate OfficeDefence Research and Development Canada60 Moodie Drive, Ottawa Ontario,K1A 0Z4Canada
9a. PROJECT OR GRANT NO. (If appropriate, the applicable research and development project or grant number under which the document was written. Please specify whether project or grant.)
9b. CONTRACT NO. (If appropriate, the applicable number under which the document was written.)
10a. ORIGINATOR’S DOCUMENT NUMBER (The official document number by which the document is identified by the originating activity. This number must be unique to this document.)
DRDC-RDDC-2017-L276
10b. OTHER DOCUMENT NO(s). (Any other numbers which may be assigned this document either by the originator or by the sponsor.)
11a. FUTURE DISTRIBUTION (Any limitations on further dissemination of the document, other than those imposed by security classification.)
Public release
11b. FUTURE DISTRIBUTION OUTSIDE CANADA (Any limitations on further dissemination of the document, other than those imposed by security classification.)
CAN UNCLASSIFIED
CAN UNCLASSIFIED
12. ABSTRACT (A brief and factual summary of the document. It may also appear elsewhere in the body of the document itself. It is highly desirable that the abstract of classified documents be unclassified. Each paragraph of the abstract shall begin with an indication of the security classification of the information in the paragraph (unless the document itself is unclassified) represented as (S), (C), (R), or (U). It is not necessary to include here abstracts in both official languages unless the text is bilingual.)
___________________________________________________________________________
13. KEYWORDS, DESCRIPTORS or IDENTIFIERS (Technically meaningful terms or short phrases that characterize a document and could be helpful in cataloguing the document. They should be selected so that no security classification is required. Identifiers, such as equipment model designation, trade name, military project code name, geographic location may also be included. If possible keywords should be selected from a published thesaurus, e.g., Thesaurus of Engineering and Scientific Terms (TEST) and that thesaurus identified. If it is not possible to select indexing terms which are Unclassified, the classification of each should be indicated as with the title.)
Internet of Things (IoT), sensors, actuators, communications, near field communications; ARPANET; TCP/IP; IPV4 versus IPV6; Internet of Battle Things (IoBT); Military (IoMT); Industrial IoT (IIoT); Intelligent Thing (IoIT)