A Review on Internet of Things for Defense and Public Safety
Abstract
:1. Introduction
- Public protection (PP) radio communication: communications used by agencies and organizations responsible for dealing with the maintenance of law and order, protection of life and property, and emergency situations.
- Disaster relief (DR) radio communication: communications used by agencies and organizations dealing with a serious disruption in the functioning of society, posing a significant, widespread threat to human life, health, property or the environment, whether caused by accident, nature or human activity, and whether they happen suddenly or as a result of complex, long-term processes.
2. Compelling COTS IoT Applications
- Transportation: Telogis [41], which builds engine-monitoring systems for General Motors (GM) vehicles, estimates that its smart engine reduces fuel consumption by 25%, around 30% in idle time, increases fleet use by 25%, and workforce productivity by 15%.
- Energy efficiency: IoT-based energy management systems can reduce energy use in office by 20% [3]. Smart thermostats and HVAC (Heating, Ventilation and Air Conditioning) save consumers as much as 10%–15% on heating and cooling. Additionally, smart appliances for home automation systems [42] are now being researched [43]. IoT-based use cases for smart cities have been also identified, like traffic monitoring [44], surveillance [45] and pollution monitoring [46]. Within this scenario, the content of the samples acquired may expose critical information. For example, in the case of noise pollution monitoring applications, the noise may also contain private conversations.
- Inventory management: USTRANSCOM’s Global Transportation Network (GTN) [47] and DLA (Defense Logistics Agency) developed a common information platform that enables the military to improve end-to-end supply visibility, service and logistics processes. The platform includes a single repository and universal access to logistics data so that any user or developer can easily access or manage supply chain information. Also, such a platform facilitates the development of new applications that run on the same backbone. Another contribution of USTRANSCOM is fleet management, which uses RFID trackers to monitor palletized shipments among major transit hubs.
- Mining: embedded sensors on equipment and vehicles offer a more precise picture of ground operations and enable real-time monitoring of equipment. This new technology, together with autonomous mining systems, is transforming daily operations. An IoT deployment reduces expenditure on infrastructure and machines by reducing outages and maintenance, energy consumption and environmental impact, while significantly improving productivity and mine safety by reducing injuries and fatalities. A renowned example is the autonomous drilling system of Rio Tinto (Perth, Australia), which includes tunneling machines, trains, autonomous haulage systems, and driverless trucks. This mission-control site manages operations of 15 mines, 31 pits, 4 port terminals and a 1600 km rail network [48].
3. Target Scenarios for Mission-Critical IoT
3.1. C4ISR
3.2. Fire-Control Systems
3.3. Logistics
3.3.1. Fleet Monitoring and Management
3.3.2. Individual Supplies
3.4. Smart Cities Operations
3.5. Personal Sensing, Soldier Healthcare and Workforce Training
3.6. Collaborative and Crowd Sensing
3.7. Energy Management
3.8. Surveillance
4. Operational Requirements
4.1. Deployment Features
4.2. System Management and Planning
4.3. Supported Services and Applications
4.4. Network Capabilities
4.5. Supported Network Topologies
4.6. Mobility Capabilities
4.7. Security Capabilities
- Device and network security: the potential of IoT is derived to a large extent from the ubiquity of devices and applications, and the connections between them. This myriad of links creates a massive number of potential entry points for cyber-attackers. The systems also depend on backbone storage and processing functions, which can include other potential vulnerabilities. One of the ways to enhance the security of a complex network is to limit the number of nodes that an attacker can access from any given entry point. This approach conflicts with IoT, which generates much of its value from the integration of different systems. Securing a broad range of devices is also difficult. Many of them have limited capacity with no human interface and depend on real-time integration of data. This complicates traditional approaches to security, like multi-factor authentication or advanced encryption, which can hinder the exchange of data on the network, requiring more computing power on devices, or needing human interaction.
- Insider misuse: cyber risks and insider threats are a challenge for large organizations. A single mistake from a single user can allow an attacker to gain access to the system.
- Electronic warfare: most technologies communicate wirelessly on radio frequencies. Adversaries can use jamming techniques to block those signals making the devices unable to communicate with backbone infrastructure. Wireless connections also raise the risk of exposing the location through radio frequency emissions. Transmitters can serve as a beacon detectable by any radio receiver within range, and the triangulation of such emissions can compromise the mission.
- Automation: the full automation of equipment and vehicles extends the reach of cyber threats to the physical domain.
4.8. Robustness Capabilities
4.9. Coverage Capabilities
4.10. Availability
4.11. Reliability
4.12. Interoperability Capabilities
4.13. Target Platforms
5. Building IoT for Tactical and Emergency Environments
- Perception layer: this first layer represents the physical elements aimed at collecting and processing information. Most COTS IoT devices are designed for benign environments and currently focus on home automation, personal services and multimedia content delivery. Miniaturized devices such as transducers (sensors and actuators), smartphones, System on Chips (SoCs) and embedded computers are getting more powerful and energy efficient. The next generation of processors includes new hardware features aimed at providing highly trusted computing platforms. For example, Intel includes an implementation of the Trusted Platform Module (TPM) designed to secure hardware through cryptography. Technologies such as ARM TrustZone, Freescale Trust Architecture, and Intel Trusted Execution enable the integration of both software and hardware security features [32]. Plug-and-play mechanisms are needed by this layer to configure heterogeneous networks. Big data processes are initiated at this perception layer. This layer transfers data to the Object Abstraction layer through secure channels.
- Object Abstraction Layer: it transfers data to the Service Management layer through secure channels. To transfer the data, the protocols used in the COTS IoT nodes either use existing wireless standards, or an adaptation of previous wireless protocols in the target sector. Typically, IoT devices should operate using low power under lossy and noisy conditions. Other functions like cloud computing and data management processes are handled at this layer [117].
- Service Management Layer or Middleware: this layer enables the abstraction of specific hardware platforms. It processes the data received, takes decisions and delivers the services over network protocols [118].
- Application Layer: it provides the services requested to meet users’ demands.
- Business Management Layer: this layer designs, analyzes, develops and evaluates elements related to IoT systems, supporting decision-making processes based on Big Data. The control mechanisms for accessing data in the Applications layer are also handled by this layer. It builds a business model based on the data received from the Application layer. Moreover, this layer monitors and manages the underlying four layers, comparing the output of each one with the output expected to enhance services and maintain users’ privacy [119]. This layer is hosted on powerful devices due to its complexity and computational needs.
- Identity-related services: these services are employed to identify objects, but are also used in other types of services.
- Information Aggregation services: these services collect and summarize raw measurements.
- Collaborative-Aware services: these services act on top the Information Aggregation services and use the obtained data to make decisions.
- Ubiquitous services: these collaborative-aware services function anytime to anyone, anywhere.
5.1. IoT Standardized Protocols
5.1.1. Application Layer Protocols
5.1.2. Service Discovery Protocols
5.2. Enabling Technologies
5.3. Enabling Protocols
5.4. Computation
5.4.1. Hardware and Software Platforms
5.4.2. Cloud Platforms
5.4.3. Fog Computing
- Location: fog resources provide less delay because they are positioned between smart objects and the cloud data-centers.
- Distribution: it is possible to deploy many of such micro centers close to the end-users as their cost is a small fraction of a cloud data-center.
- Scalability: the number of micro fog centers can be increased to cope with the increasing load and the increased number of end-users.
- Density of devices: fog helps to provide resilient and replicated services.
- Mobility support: fog resources act as a mobile cloud.
- Real-time: it provides better performance for real-time interactive services.
- Standardization: fog resources can interoperate with various cloud providers.
- On-the-fly analysis: fog resources can perform data aggregation to send partially processed data as opposed to raw data to the cloud data center for further processing.
5.5. Digital Analytics
- Open Integration standards: they facilitate interoperability among devices with different capabilities and ownership through supporting ontologies. IoT ontologies should be integrated with existing community standards.
- Reasoning support: Ontology-based reasoning has been applied towards military sensor management systems, including those tasked with pairing sensors to mission tasks. Gomez et al. [166] present an ontology based on Military Missions and Means Framework that formalizes sensor specifications as well as expressing corresponding task specifications. When there is limited network connectivity, such reasoning capabilities could be applied tocontinually assess how available IoT resources can be utilized.
- Data Provenance: the steps taken to generate data have been commonly acknowledged as important towards assessment of data quality and trustworthiness. In a military context, issues of provenance will be a dominant concern because the state, ownership, and reliability of devices will be uncertain. The capability will be critical when automated or semi-automated content assessment becomes desirable. New architectures will need to incorporate provenance and trust management tightly integrated in IoT technologies. The W3 PROV specification [167] is a primary standard for digital provenance representation, which is now being extended for IoT.
6. Main Challenges and Technical Limitations
From COTS to Mission-Critical IoT: Further Recommendations
- Introduce rapid field testing: the military should consider creating a dedicated technology comprising military personnel in a live training environment to experiment with technologies and get real end-user feedback early in the development process. This testbed could change the way the military accomplishes its mission, or introduces creative new ways to use IoT devices and applications. Its goal would be twofold: to recognize devices and systems with potential applications and, second, to identify completely new strategies, tactics, and methods for accomplishing missions using COTS.
- The military can to a certain extent, take advantage of civilian mobile waveforms such as 4G/5G LTE [73]. Nevertheless, those advances will need to be paired with military-specific communications architectures (e.g., multiband radios with scarce bandwidth, MANET topologies and defensive countermeasures).
- Use Platform as a Service (PaaS) to deliver web-based services without building and maintaining the infrastructure, thereby creating a more flexible and scalable framework to adjust and update the systems. Adopting PaaS also carries risks for the military, and requires private contractors to implement additional security procedures.
- Realize a comprehensive trust framework that can support all the requirements of IoT for the military. Many state-of-the-art approaches that address issues such as trust and value depend on inter-domain policies and control. In military environments, policies will likely be contextual and transient, conflated by inter-organizational and adversarial interactions.
- Information theories will need to focus on decision making and cognitive layers of information management and assimilation. Further, methods for eliciting causal relationships from sparse and extensive heterogeneously-sourced data will require additional theoretical research.
7. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
Abbreviations
DoD | Department of Defense |
ACV | Armored Combat Vehicles |
AJ | Anti-Jamming |
BFT | Blue Force Tracking |
C2 | Command and Control |
C4ISR | Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance |
COP | Common Operational Picture |
COTS | Commercial Off-The-Shelf |
EPC | Electronic Product Code |
EPM | Electronic Protection Measures |
HAP | High-Altitude Platforms |
IaaS | Infrastructure as a Service |
IoT | Internet of Things |
ISR | Intelligence Surveillance and Reconnaissance |
JIE | Joint Information Environment |
LPD | Low Probability of Detection |
LPI | Low Probability of Interception |
M2M | Machine-to-Machine |
MANET | Mobile ad-hoc networks |
MPE | Mission Partner Environment |
NCW | Network Centric Warfare |
NFC | Near Field Communication |
NFV | Network Function Virtualization |
PaaS | Platform as a Service |
PPDR | Public Protection Disaster Relief |
QoI | Quality of Information |
RFID | Radio-frequency identification |
SaaS | Software as a Service |
SDR | Software Defined Radio |
SOA | Service-Oriented Architecture |
TLS | Transport Layer Security |
UAV | Unmanned Aerial Vehicle |
VoI | Value of Information |
Wi-Fi | Wireless Fidelity |
WSN | Wireless Sensor Networks |
References
- Lee, H.; Yoo, S.; Kim, Y.W. An energy management framework for smart factory based on context-awareness. In Proceedings of the 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 31 January–2 February 2016; pp. 685–688.
- Lee, C.H.; Chung, C.W. RFID data processing in supply chain management using a path encoding scheme. IEEE Trans. Knowl. Data Eng. 2011, 23, 742–758. [Google Scholar] [CrossRef]
- Manyika, J.; Chui, M.; Bisson, P.; Woetzel, J.; Dobbs, R.; Bughin, J.; Aharon, D. The Internet of Things: Mapping the Value beyond the Hype; Technical Report; McKinsey Global Institute: Washington, DC, USA, 2015. [Google Scholar]
- Ericsson. Ericsson Mobility Report on the Pulse of the Networked Society; Technical Report; Ericsson: Stockholm, Sweden, November 2015. [Google Scholar]
- Business Insider (BI) Intelligence. The Internet of Things: Examining How the IoT Will Affect the World; Technical Report; Business Insider: New York, NY, USA, 2015. [Google Scholar]
- Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M. Internet of things for smart cities. IEEE Internet Things J. 2014, 1, 22–32. [Google Scholar] [CrossRef]
- Vermesan, O.; Friess, P. IoT—From Research and Innovation to Market Deployment; River Publishers: Aalborg, Denmark, 2014. [Google Scholar]
- Takanokura, M.; Matsui, M.; Tang, H. Energy management with battery system for smart city. In Proceedings of the 33rd Chinese Control Conference (CCC), Nanjing, China, 28–30 July 2014; pp. 8200–8203.
- Alam, K.M.; Saini, M.; Saddik, A.E. Toward social internet of vehicles: Concept, architecture, and applications. IEEE Access 2015, 3, 343–357. [Google Scholar] [CrossRef]
- Zheng, D.; Carter, W.A. Leveraging the IoT for a more Efficient and Effective Military; Technical Report; Rowman & Littlefield: Lanham, MD, USA, 2015. [Google Scholar]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Miorandi, D.; Sicari, S.; Pellegrini, F.D.; Chlamtac, I. Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 2012, 10, 1497–1516. [Google Scholar] [CrossRef]
- Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Akyildiz, I.F.; Jornet, J.M. The Internet of nano-things. IEEE Wirel. Commun. 2010, 17, 58–63. [Google Scholar] [CrossRef]
- International Telecommunication Union Radiocommunication Sector (ITU-R). Radiocommunication Objectives and Requirements for Public Protection and Disaster Relief (PPDR); Technical Report ITU-R M.2377-0 (07/2015); ITU: Geneva, Switzerland, 2015. [Google Scholar]
- TETRA Association. Public Safety Mobile Broadband and Spectrum Needs,16395-94, Analysis Mason; Technical Report; Analysis Mason Limited: London, UK, 2010. [Google Scholar]
- TETRA Critical Communications Association (TCCA). The Strategic Case for Mission Critical Mobile Broadband: A Review of the Future Needs of the Users of Critical Communications; Technical Report; TCCA: Newcastle Upon Tyne, UK, 2013. [Google Scholar]
- European Telecommunications Standards Institute (ETSI). Emergency Communications (EMTEL); Requirements for Communications from Authorities/Organizations to Individuals, Groups or the General Public During Emergencies; Technical Report ETSI TS 102 182-V1.4.1; ETSI: Sophia Antipolis, France, 2010. [Google Scholar]
- Telecommunications Industry Association (TIA). APCO Project 25 Statement of Requirements (P25 SoR); Technical Report; TIA: Arlington, MA, USA, 2013. [Google Scholar]
- Office of Emergency Communications. Fiscal Year 2016 SAFECOM Guidance on Emergency Communications Grants (SAFECOM Guidance); Technical Report; Department of Homeland Security: Washington, DC, USA, 2016.
- Ran, Y. Considerations and suggestions on improvement of communication network disaster countermeasures after the Wenchuan earthquake. IEEE Commun. Mag. 2011, 49, 44–47. [Google Scholar] [CrossRef]
- Salkintzis, A.K. Evolving public safety communication systems by integrating WLAN and TETRA networks. IEEE Commun. Mag. 2006, 44, 38–46. [Google Scholar] [CrossRef]
- Ferrus, R.; Pisz, R.; Sallent, O.; Baldini, G. Public safety mobile broadband: A techno-economic perspective. IEEE Veh. Technol. Mag. 2013, 8, 28–36. [Google Scholar] [CrossRef]
- Hasan, M.S.; LaMacchia, M.; Muzzelo, L.; Gunsaulis, R.; Housewright, L.R.; Miller, J. Designing the joint tactical radio system (JTRS) handheld, manpack, and small form fit (HMS) radios for interoperable networking and waveform applications. In Proceedings of the IEEE Military Communications Conference, Orlando, FL, USA, 29–31 October 2007; pp. 1–6.
- Baldini, G.; Karanasios, S.; Allen, D.; Vergari, F. Survey of wireless communication technologies for public safety. IEEE Commun. Surv. Tutor. 2014, 16, 619–641. [Google Scholar] [CrossRef]
- Favraud, R.; Apostolaras, A.; Nikaein, N.; Korakis, T. Toward moving public safety networks. IEEE Commun. Mag. 2016, 54, 14–20. [Google Scholar] [CrossRef]
- Fantacci, R.; Gei, F.; Marabissi, D.; Micciullo, L. Public safety networks evolution toward broadband: Sharing infrastructures and spectrum with commercial systems. IEEE Commun. Mag. 2016, 54, 24–30. [Google Scholar] [CrossRef]
- Usman, M.; Gebremariam, A.A.; Raza, U.; Granelli, F. A software-defined device-to-device communication architecture for public safety applications in 5G networks. IEEE Access 2015, 3, 1649–1654. [Google Scholar] [CrossRef]
- Chudzikiewicz, J.; Furtak, J.; Zielinski, Z. Fault-tolerant techniques for the Internet of Military Things. In Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 12–14 December 2015; pp. 496–501.
- Yushi, L.; Fei, J.; Hui, Y. Study on application modes of military Internet of Things (MIOT). In Proceedings of the IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 25–27 May 2012; Voloum 3, pp. 630–634.
- Butun, I.; Erol-Kantarci, M.; Kantarci, B.; Song, H. Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Commun. Mag. 2016, 54, 47–53. [Google Scholar] [CrossRef]
- Zheng, D.; Carter, W.A. The Internet of Things for Defense; Technical Report; Wind River Systems: Alameda, CA, USA, 2015. [Google Scholar]
- Mariani, J.; Williams, B.; Loubert, B. Continuing the March: The Past, Present, and Future of the IoT in the Military; Technical Report; Deloitte University Press: Deloitte, UK, 2015. [Google Scholar]
- Suri, N.; Tortonesi, M.; Michaelis, J.; Budulas, P.; Benincasa, G.; Russell, S.; Stefanelli, C.; Winkler, R. Analyzing the applicability of internet of things to the battlefield environment. In Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Brussels, Belgium, 23–24 May 2016.
- Wrona, K. Securing the Internet of Things a military perspective. In Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 12–14 December 2015; pp. 502–507.
- Eom, J. Security threats recognition and countermeasures on smart battlefield environment based on IoT. Int. J. Secur. Appl. 2015, 9, 347–356. [Google Scholar] [CrossRef]
- Alqassem, I.; Svetinovic, D. A taxonomy of security and privacy requirements for the Internet of Things (IoT). In Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, Bandar Sunway, Malaysia, 9–12 December 2014; pp. 1244–1248.
- Trusted Computing Group, Guidance for Securing IoT Using TCG Technology, Version 1.0, Revision 21. Available online: http://www.trustedcomputinggroup.org/wp-content/uploads/TCG_Guidance_for_Securing_IoT_1_0r21.pdf (acessed on 1 July 2016).
- Tunnell, H.D. The U.S. Army and network-centric warfare a thematic analysis of the literature. In Proceedings of the Military Communications Conference, Tampa, FL, USA, 26–28 October 2015; pp. 889–894.
- Tunnell, H.D. Network-centric warfare and the data-information-knowledge-wisdom hierarchy. Mil. Rev. 2014, 92, 43–50. [Google Scholar]
- Telogis. Available online: https://www.telogis.com/gm (accessed on 12 September 2016).
- Suárez-Albela, M.; Fraga-Lamas, P.; Fernández-Caramés, T.M.; Dapena, A.; González-López, M. Home Automation System Based on Intelligent Transducer Enablers. Sensors 2016, 16, 1595. [Google Scholar] [CrossRef] [PubMed]
- Fernández-Caramés, T.M. An intelligent power outlet system for the smart home of the Internet of Things. Int. J. Distrib. Sensor Netw. 2015, 2015, 214805. [Google Scholar] [CrossRef] [PubMed]
- Misbahuddin, S.; Zubairi, J.A.; Saggaf, A.; Basuni, J.; A-Wadany, S.; Al-Sofi, A. IoT based dynamic road traffic management for smart cities. In Proceedings of the 12th International Conference on High-Capacity Optical Networks and Enabling/Emerging Technologies (HONET), Islamabad, Pakistan, 21–23 December 2015; pp. 1–5.
- Zhou, W.; Saha, D.; Rangarajan, S. A system architecture to aggregate video surveillance data in Smart Cities. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–7.
- Boubrima, A.; Matigot, F.; Bechkit, W.; Rivano, H.; Ruas, A. Optimal deployment of wireless sensor networks for air pollution monitoring. In Proceedings of the 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA, 3–6 August 2015; pp. 1–7.
- Statement of General Norton A. Schwartz, USAF Commander, United States Transportation Command. Available online: http://www.dod.mil/dodgc/olc/docs/testSchwartz080312.pdf (accessed on 12 September 2016).
- Rio Tinto, Rio Tinto Mine of the Future, Next-Generation Mining: People and Technology Working Together. Available online: http://www.riotinto.com/documents/Mine_of_The_Future_Brochure.pdf (accessed on 12 September 2016).
- RERUM: REliable, Resilient and SecUre IoT for sMart City Applications. Available online: https://ict-rerum.eu (accessed on 12 September 2016).
- RELYonIt: Research by Experimentation for Dependability on the Internet of Things. Available online: http://relyonit.eu (accessed on 12 September 2016).
- FIESTA-IoT: Federated Interoperable Semantic IoT Testbeds and Applications. Available online: http://fiesta-iot.eu (accessed on 12 September 2016).
- BIG IoT: Bridging the Interoperability Gap of the Internet of Things. Available online: http://big-iot.eu (accessed on 12 September 2016).
- BloTope: Building an IoT Open Innovation Ecosystem for Connected Smart Objects. Available online: http://biotope.cs.hut.fi/index.php/partners (accessed on 12 September 2016).
- METIS II. Available online: https://metis-ii.5g-ppp.eu/about-metis/ (accessed on 12 September 2016).
- Li, F.; Qanbari, S.; Vögler, M.; Dustdar, S. Constructing green software services: From service models to cloud-based architecture. In Green in Software Engineering; Springer International Publishing: Cham, Switzerland, 2015; pp. 83–104. [Google Scholar]
- Aegis Combat System. Available online: http://www.lockheedmartin.com/us/products/aegis.html (accessed on 12 September 2016).
- Tomahawk Land Attack Missile (TLAM). Available online: http://www.navair.navy.mil/index.cfm?fuseaction=home.display&key=F4E98B0F-33F5-413B-9FAE-8B8F7C5F0766 (accessed on 12 September 2016).
- Calhoun, G.L.; Draper, M.H. Display and Control Concepts for Multi-UAV Applications. In Handbook of Unmanned Aerial Vehicles; Springer: Dordrecht, The Netherlands, 2015; pp. 2443–2473. [Google Scholar]
- Meunier, F.; Wood, A.; Weiss, K.; Huberty, K.; Flannery, S.; Moore, J.; Hettenbach, C.; Lu, B. The Internet of Things Is Now: Connecting the Real Economy; Technical Report; Morgan Stanley Research: New York, NY, USA, 2014. [Google Scholar]
- Wang, P.; Ali, A.; Kelly, W. Data security and threat modeling for smart city infrastructure. In Proceedings of the International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, 5–7 August 2015; pp. 1–6.
- Cirani, S.; Picone, M. Wearable computing for the internet of things. IT Prof. 2015, 17, 35–41. [Google Scholar] [CrossRef]
- Catherwood, P.A.; Finlay, D.D.; McLaughlin, J.A.D. Subcutaneous body area networks: A SWOT analysis. In Proceedings of the IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland, 11–12 November 2015; pp. 1–8.
- Alderson, A. Sports tech—Fitness trackers. Eng. Technol. 2015, 10, 84–85. [Google Scholar] [CrossRef]
- Shunk, D. Ethics and the enhanced soldier of the near future. Mil. Rev. 2015, 95, 91–98. [Google Scholar]
- Instrumented-Multiple Integrated Laser Engagement System (I-MILES). Available online: https://www.cubic.com/Global-Defense/Training-Systems-and-Solutions/Ground-Combat-Training/Multiple-Integrated-Laser-Engagement-System (accessed on 12 September 2016).
- Preece, A.; Pizzocaro, D.; Borowiecki, K.; de Mel, G.; Gomez, M.; Vasconcelos, W.; Bar-Noy, A.; Johnson, M.P.; Porta, T.L.; Rowaihy, H.; et al. Reasoning and resource allocation for sensor-mission assignment in a coalition context. In Proceedings of the IEEE Military Communications Conference, San Diego, CA, USA, 16–19 November 2008; pp. 1–7.
- Sheng, X.; Tang, J.; Xiao, X.; Xue, G. Sensing as a service: Challenges, solutions and future directions. IEEE Sens. J. 2013, 13, 3733–3741. [Google Scholar] [CrossRef]
- Jaimes, L.G.; Vergara-Laurens, I.J.; Raij, A. A survey of incentive techniques for mobile crowd sensing. IEEE Internet Things J. 2015, 2, 370–380. [Google Scholar] [CrossRef]
- Chang, J.M.; Ho, P.C.; Chang, T.C. Securing BYOD. IT Prof. 2014, 16, 9–11. [Google Scholar] [CrossRef]
- Zhang, Y.; Meratnia, N.; Havinga, P. Outlier detection techniques for wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2010, 12, 159–170. [Google Scholar] [CrossRef]
- Kantarci, B.; Mouftah, H.T. Trustworthy sensing for public safety in cloud-centric internet of things. IEEE Internet Things J. 2014, 1, 360–368. [Google Scholar] [CrossRef]
- U.S. Department of Defense. Annual Energy Management Report; Technical Report; Office of the Assistant Secretary of Defense (Energy, Installations, and Environment): Washington, DC, USA, 2015.
- Fraga-Lamas, P.; Castedo-Ribas, L.; Morales-Méndez, A.; Camas-Albar, J.M. Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN. In Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Brussels, Belgium, 23–24 May 2016; pp. 1–8.
- OMA Lightweight M2M. Available online: http://technical.openmobilealliance.org/Technical/technical-information/release-program/current-releases/oma-lightweightm2m-v1-0 (accessed on 12 September 2016).
- Perelman, V.; Schönwälder, J.; Ersue, M.; Watsen, K. Network configuration protocol for constrained devices (NETCONF Light). IETF Draft 2012. Available online: https://tools.ietf.org/html/draft-schoenw-netconf-light-01 (accessed on 12 September 2016). [Google Scholar]
- Abeele, F.V.; Hoebeke, J.; Moerman, I.; Demeester, P. Fine-grained management of CoAP interactions with constrained IoT devices. In Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 5–8 May 2014; pp. 1–5.
- OMA Device Management Working Group. Available online: http://openmobilealliance.org/about-oma/work-program/device-management/ (accessed on 12 September 2016).
- Program Executive Office Soldier, Portfolio 2014—The Soldier: Our Strength and Purpose. Available online: http://www.peosoldier.army.mil/portfolio/ (accessed on 12 September 2016).
- U.S. Air Force: Programmers Earn Award for Innovative Tablet App. Available online: http://www.af.mil/News/ArticleDisplay/tabid/223/Article/518660/programmers-earn-award-for-innovative-tablet-app.aspx (accessed on 12 September 2016).
- Mitchell, P.T. Network Centric Warfare and Coalition Operations—The New Military Operating System, 1st ed.; Routledge: New York, NY, USA, 2009. [Google Scholar]
- Janes.com, U.S. Harris Corporation Readies New Tactical Radios for US Special Forces. Available online: http://www.janes.com/article/60812/harris-corporation-readies-new-tactical-radios-for-us-special-forces (accessed on 12 September 2016).
- Wood, T.; Ramakrishnan, K.K.; Hwang, J.; Liu, G.; Zhang, W. Toward a software-based network: Integrating software defined networking and network function virtualization. IEEE Netw. 2015, 29, 36–41. [Google Scholar] [CrossRef]
- Openstack. Available online: https://www.openstack.org (accessed on 1 July 2016).
- Redi, J.; Ramanathan, R. The DARPA WNaN network architecture. In Proceedings of the Military Communications Conference, Baltimore, MD, USA, 7–10 November 2011; pp. 2258–2263.
- Salmanian, M.; Brown, J.D.; Watson, S.; Song, R.; Tang, H.; Simmelink, D. An architecture for secure interoperability between coalition tactical MANETs. In Proceedings of the Military Communications Conference, Tampa, FL, USA, 26–28 October 2015; pp. 37–42.
- Nguyen, M.T.; Teague, K.A. Compressive and cooperative sensing in distributed mobile sensor networks. In Proceedings of the Military Communications Conference, Tampa, FL, USA, 26–28 October 2015; pp. 1033–1038.
- Ward, J.R.; Younis, M. A cross-layer defense scheme for countering traffic analysis attacks in Wireless Sensor Networks. In Proceedings of the Military Communications Conference, Tampa, FL, USA, 26–28 October 2015; pp. 972–977.
- Amdouni, I.; Adjih, C.; Plesse, T. Network coding in military wireless ad hoc and sensor networks: Experimentation with GardiNet. In Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Cracow, Poland, 18–19 May 2015; pp. 1–9.
- Liang, Q.; Cheng, X.; Huang, S.C.; Chen, D. Opportunistic sensing in wireless sensor networks: Theory and application. IEEE Trans. Comput. 2014, 63, 2002–2010. [Google Scholar] [CrossRef]
- Zambrano, A.; Perez, I.; Palau, C.; Esteve, M. Quake detection system using smartphone-based wireless sensor network for early warning. In Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Budapest, Hungary, 24–28 March 2014; pp. 297–302.
- Beal, J.; Usbeck, K.; Loyall, J.; Metzler, J. Opportunistic sharing of airborne sensors. In Proceedings of the 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington, DC, USA, 26–28 May 2016; pp. 25–32.
- Ma, H.; Zhao, D.; Yuan, P. Opportunities in mobile crowd sensing. IEEE Commun. Mag. 2014, 52, 29–35. [Google Scholar] [CrossRef]
- Ganz, F.; Li, R.; Barnaghi, P.; Harai, H. A resource mobility scheme for service-continuity in the internet of things. In Proceedings of the IEEE International Conference on Green Computing and Communications (GreenCom), Besançon, France, 20–23 November 2012; pp. 261–264.
- Fu, H.L.; Lin, P.; Yue, H.; Huang, G.M.; Lee, C.P. Group mobility management for large-scale machine-to-machine mobile networking. IEEE Trans. Veh. Technol. 2014, 63, 1296–1305. [Google Scholar] [CrossRef]
- Misra, S.; Agarwal, P. Bio-inspired group mobility model for mobile ad hoc networks based on bird-flocking behavior. Soft Comput. 2012, 16, 437–450. [Google Scholar] [CrossRef]
- Piñol, O.P.; Raza, S.; Eriksson, J.; Voigt, T. BSD-based elliptic curve cryptography for the open Internet of Things. In Proceedings of the 7th International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–29 July 2015; pp. 1–5.
- Premnath, S.N.; Haas, Z.J. Security and privacy in the internet-of-things under time-and-budget-limited adversary model. IEEE Wirel. Commun. Lett. 2015, 4, 277–280. [Google Scholar] [CrossRef]
- Yürür, O.; Liu, C.H.; Sheng, Z.; Leung, V.C.M.; Moreno, W.; Leung, K.K. Context-awareness for mobile sensing: A survey and future directions. IEEE Commun. Surv. Tutor. 2016, 18, 68–93. [Google Scholar] [CrossRef]
- Etefia, B.; Gerla, M.; Zhang, L. Supporting military communications with Named Data Networking: An emulation analysis. In Proceedings of the IEEE Military Communications Conference, Orlando, FL, USA, 29 October–1 November 2012; pp. 1–6.
- Fongen, A.; Mancini, F. Integrity attestation in military IoT. In Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 12–14 December 2015; pp. 484–489.
- Defense Information Systems Agency (DISA) for Department of Defense (DoD). Cloud Computing Security Requirements Guide; Technical Report; DISA: Fort Meade, MD, USA, March 2016.
- Ganz, F.; Puschmann, D.; Barnaghi, P.; Carrez, F. A practical evaluation of information processing and abstraction techniques for the internet of things. IEEE Internet Things J. 2015, 2, 340–354. [Google Scholar] [CrossRef]
- Álvarez, J.L.; Rice, M.; Samson, J.R.; Koets, M.A. Increasing the capability of CubeSat-based software-defined radio applications. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 4–11 March 2016; pp. 1–10.
- U.S. Department of Defense. Program Acquisition Cost by Weapon System; Technical Report; Office of the Under Secretary of Defense (comptroller)/Chief Financial Officer: Arlington County, VA, USA, 2016.
- U.S. Department of Defense. Unmanned Systems Integrated Roadmap FY2013–2038; Technical Report; U.S. Department of Defense: Arlington County, VA, USA, 2013.
- Macedo, D.; Guedes, L.A.; Silva, I. A dependability evaluation for Internet of Things incorporating redundancy aspects. In Proceedings of the IEEE 11th International Conference on Networking, Sensing and Control (ICNSC), Miami, FL, USA, 7–9 April 2014; pp. 417–422.
- Maalel, N.; Natalizio, E.; Bouabdallah, A.; Roux, P.; Kellil, M. Reliability for emergency applications in internet of things. In Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, Cambridge, MA, USA, 20–23 May 2013; pp. 361–366.
- Li, L.; Jin, Z.; Li, G.; Zheng, L.; Wei, Q. Modeling and analyzing the reliability and cost of service composition in the IoT: A probabilistic approach. In Proceedings of the IEEE 19th International Conference on Web Services (ICWS), Honolulu, HI, USA, 24–29 June 2012; pp. 584–591.
- Alsheikh, M.A.; Hoang, D.T.; Niyato, D.; Tan, H.P.; Lin, S. Markov decision processes with applications in wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2015, 17, 1239–1267. [Google Scholar] [CrossRef]
- Defense Information Systems Agency (DISA). Enabling the Joint Information Environment (JIE), Shaping the Enterprise for the Conflicts of Tomorrow; Technical Report; DISA: Fort Meade, MD, USA, 2014.
- Lockheed Martin, Lockheed Martin-Led Team Demonstrates Interoperability with Legacy and Stealth Fighters Using Open Systems Architecture. Available online: http://www.lockheedmartin.com/us/news/press-releases/2014/march/140307ae_lockheed-martin-demonstrates-interoperability.html (accessed on 12 September 2016).
- U.S. Army CERDEC (Communications-Electronics Research, Development and Engineering Center) NVESD. Available online: http://www.cerdec.army.mil/inside_cerdec/ (accessed on 12 September 2016).
- Krčo, S.; Pokrić, B.; Carrez, F. Designing IoT architecture(s): A European perspective. In Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 6–8 March 2014; pp. 79–84.
- EU FP7 Internet of Things Architecture Project. Available online: http://www.iot-a.eu/public (accessed on 12 September 2016).
- Docking, M.; Uzunov, A.V.; Fiddyment, C.; Brain, R.; Hewett, S.; Blucher, L. UNISON: Towards a middleware architecture for autonomous cyber defence. In Proceedings of the 24th Australasian Software Engineering Conference (ASWEC), Adelaide, Australia, 28 Septmber–1 October 2015; pp. 203–212.
- Cameron, A.; Stumptner, M.; Nandagopal, N.; Mayer, W.; Mansell, T. A rule-based platform for distributed real-time SOA with application in defence systems. In Proceedings of the Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 12–14 November 2013; pp. 1–7.
- Yang, Z.; Yue, Y.; Yang, Y.; Peng, Y.; Wang, X.; Liu, W. Study and application on the architecture and key technologies for IOT. In Proceedings of the International Conference on Multimedia Technology (ICMT), Hangzhou, China, 26–28 July 2011; pp. 747–751.
- Chaqfeh, M.A.; Mohamed, N. Challenges in middleware solutions for the internet of things. In Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA, 21–25 May 2012; pp. 21–26.
- Wu, M.; Lu, T.J.; Ling, F.Y.; Sun, J.; Du, H.Y. Research on the architecture of Internet of Things. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 20–22 August 2010; Volume 5, pp. 484–487.
- Sarkar, C.; Nambi, S.N.A.U.; Prasad, R.V.; Rahim, A. A scalable distributed architecture towards unifying IoT applications. In Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 6–8 March 2014; pp. 508–513.
- Powers, B. A Multi-agent Architecture for NATO Network Enabled Capabilities: Enabling Semantic Interoperability in Dynamic Environments (NC3A RD-2376). In Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, Turku, Finland, 28 July–1 August 2008; pp. 563–564.
- ASSIST Database. Available online: http://quicksearch.dla.mil/ (accessed on 12 September 2016).
- Al-Fuqaha, A.; Khreishah, A.; Guizani, M.; Rayes, A.; Mohammadi, M. Toward better horizontal integration among IoT services. IEEE Commun. Mag. 2015, 53, 72–79. [Google Scholar] [CrossRef]
- Uckelmann, D.; Isenberg, M.A.; Teucke, M.; Halfar, H.; Scholz-Reiter, B. Autonomous control and the internet of things: Increasing robustness, scalability and agility in logistic networks. In Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks; Ranasinghe, C.D., Sheng, Z.Q., Zeadally, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 163–181. [Google Scholar]
- Villaverde, B.C.; Alberola, R.D.P.; Jara, A.J.; Fedor, S.; Das, S.K.; Pesch, D. Service discovery protocols for constrained machine-to-machine communications. IEEE Commun. Surv. Tutor. 2014, 16, 41–60. [Google Scholar] [CrossRef]
- Institute of Electrical and Electronics Engineers (IEEE). IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks–Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007); IEEE: Piscataway, NJ, USA, 2012. [Google Scholar]
- Olyaei, B.B.; Pirskanen, J.; Raeesi, O.; Hazmi, A.; Valkama, M. Performance comparison between slotted IEEE 802.15.4 and IEEE 802.11ah in IoT based applications. In Proceedings of the IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 7–9 October 2013; pp. 332–337.
- Institute of Electrical and Electronics Engineers (IEEE). IEEE Standard for Air Interface for Broadband Wireless Access Systems; IEEE Std 802.16-2012 (Revision of IEEE Std 802.16-2009); IEEE: Piscataway, NJ, USA, 2012. [Google Scholar]
- Institute of Electrical and Electronics Engineers (IEEE). IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Broadband Wireless Access Systems Amendment 3: Advanced Air Interface; IEEE Std 802.16m-2011(Amendment to IEEE Std 802.16-2009); IEEE: Piscataway, NJ, USA, 2011. [Google Scholar]
- European Telecommunications Standards Institute (ETSI)—Third Generation Partnership Project (3GPP). LTE Specifications. Release 10 onwards. 2010. Available online: http://www.3gpp.org/technologies/keywords-acronyms/98-lte (accessed on 1 October 2016).
- Vahedi, E.; Ward, R.K.; Blake, I.F. Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2. IEEE Trans. Autom. Sci. Eng. 2014, 11, 1250–1261. [Google Scholar] [CrossRef]
- Open Automotive Alliance. Available online: http://www.openautoalliance.net (accessed on 12 September 2016).
- Tsai, C.W.; Lai, C.F.; Chiang, M.C.; Yang, L.T. Data mining for internet of things: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 77–97. [Google Scholar] [CrossRef]
- U.S. Department of Defense. Updated Guidance on the Acquisition and Use of Commercial Cloud Computing Services; Technical Report; Department of Defense: Washington, DC, USA, 2015.
- MilCloud. Available online: http://www.disa.mil/computing/cloud-services/milcloud (accessed on 12 September 2016).
- Xu, X.; Huang, S.; Chen, Y.; Browny, K.; Halilovicy, I.; Lu, W. TSAaaS: Time series analytics as a service on IoT. In Proceedings of the IEEE International Conference on Web Services (ICWS), Anchorage, AK, USA, 27 June–2 July 2014; pp. 249–256.
- AWS IoT. Available online: http://aws.amazon.com/iot/ (accessed on 12 September 2016).
- Nextgov, CIA is Bringing Amazon’s Marketplace to the Intelligence Community. Available online: http://www.nextgov.com/cloud-computing/2015/02/cia-bringing-amazons-marketplace-intelligence-community/104937/ (accessed on 12 September 2016).
- Bluemix IoT Solutions. Available online: https://www.ibm.com/cloud-computing/bluemix/solutions/iot/ (accessed on 12 September 2016).
- Xively. Available online: https://www.xively.com/ (accessed on 12 September 2016).
- Verma, D.C.; Verma, P. Techniques for Surviving Mobile Data Explosion, 1st ed.; Wiley-IEEE Press: Hoboken, NJ, USA, 2014. [Google Scholar]
- Nimbits. Available online: http://bsautner.github.io/com.nimbits/ (accessed on 12 September 2016).
- Mazhelis, O.; Tyrväinen, P. A framework for evaluating Internet-of-Things platforms: Application provider viewpoint. In Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 6–8 March 2014; pp. 147–152.
- Vögler, M.; Schleicher, J.M.; Inzinger, C.; Dustdar, S. A scalable framework for provisioning large-scale IoT deployments. ACM Trans. Internet Technol. 2015, 16, 1–20. [Google Scholar] [CrossRef]
- Reddy, J.M.; Monika, J.M. Integrate military with distributed cloud computing and secure virtualization. In Proceedings of the 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC), Salt Lake City, UT, USA, 10–16 November 2012; pp. 1200–1206.
- Wang, S.; Zhou, J.; Liu, J.K.; Yu, J.; Chen, J.; Xie, W. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1265–1277. [Google Scholar] [CrossRef]
- Satyanarayanan, M.; Lewis, G.; Morris, E.; Simanta, S.; Boleng, J.; Ha, K. The role of cloudlets in hostile environments. IEEE Pervasive Comput. 2013, 12, 40–49. [Google Scholar] [CrossRef]
- Wan, L.; Han, G.; Shu, L.; Feng, N.; Zhu, C.; Lloret, J. Distributed parameter estimation for mobile wireless sensor network based on cloud computing in battlefield surveillance system. IEEE Access 2015, 3, 1729–1739. [Google Scholar] [CrossRef]
- Fox, G.C.; Kamburugamuve, S.; Hartman, R.D. Architecture and measured characteristics of a cloud based internet of things. In Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA, 21–25 May 2012; pp. 6–12.
- Chang, H.; Hari, A.; Mukherjee, S.; Lakshman, T.V. Bringing the cloud to the edge. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 27 April–2 May 2014; pp. 346–351.
- Ponte: Connecting Things to Developers. Available online: http://www.eclipse.org/ponte/ (accessed on 12 September 2016).
- Kura: OSGI-Based Application Framework for M2M Service Gateways. Available online: http://www.eclipse.org/proposals/technology.kura (accessed on 12 September 2016).
- Scada. Available online: http://www.eclipse.org/proposals/technology.eclipsescada/ (accessed on 12 September 2016).
- Krikkit. Available online: http://www.eclipse.org/proposals/technology.krikkit/ (accessed on 12 September 2016).
- Lin, Y.H.; Wang, Q.; Wang, J.S.; Shao, L.; Tang, J. Wireless IoT platform based on SDR technology. In Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing, Beijing, China, 20–23 August 2013; pp. 2245–2246.
- Qin, Z.; Denker, G.; Giannelli, C.; Bellavista, P.; Venkatasubramanian, N. A software defined networking architecture for the internet-of-things. In Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 23–27 May 2014; pp. 1–9.
- Celesti, A.; Fazio, M.; Giacobbe, M.; Puliafito, A.; Villari, M. Characterizing cloud federation in IoT. In Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 93–98.
- ClouT: Cloud of Things for Empowering the Citizen Clout in Smart Cities. Call: FP7-ICT-2013- EU-Japan. Available online: http://clout-project.eu (accessed on 12 September 2016).
- MUlti-cloud Secure Applications (MUSA) Project. Call: H2020-ICT- 2014-1. Topic: ICT-07-2014. Available online: http://www.musa-project.eu/ (accessed on 12 September 2016).
- Chen, M.; Zhang, Y.; Hu, L.; Taleb, T.; Sheng, Z. Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies. Mob. Netw. Appl. 2015, 20, 704–712. [Google Scholar] [CrossRef]
- Lee, C.A. Cloud federation management and beyond: Requirements, relevant standards, and gaps. IEEE Cloud Comput. 2016, 3, 42–49. [Google Scholar] [CrossRef]
- Hashizume, K.; Rosado, D.G.; Fernández-Medina, E.; Fernandez, E.B. An analysis of security issues for cloud computing. J. Internet Serv. Appl. 2013, 4, 1–13. [Google Scholar] [CrossRef]
- Li, W.; Zhao, Y.; Lu, S.; Chen, D. Mechanisms and challenges on mobility-augmented service provisioning for mobile cloud computing. IEEE Commun. Mag. 2015, 53, 89–97. [Google Scholar] [CrossRef]
- Chang, V.; Ramachandran, M. Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 2016, 9, 138–151. [Google Scholar] [CrossRef]
- Wei-bing, M.; Wen-guang, W.; Yi-fan, Z.; Wei-bing, M.; Fa-yi, Y. Semantic Web services description based on command and control interaction user context. In Proceedings of the 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 20–21 December 2014; pp. 541–544.
- Gómez, M.; Preece, A.; Johnson, M.P.; de Mel, G.; Vasconcelos, W.; Gibson, C.; Bar-Noy, A.; Borowiecki, K.; La Porta, T.; Pizzocaro, D.; et al. An ontology-centric approach to sensor-mission assignment. In Knowledge Engineering: Practice and Patterns; Springer: Berlin/Heidelberg, Germany, 2008; pp. 347–363. [Google Scholar]
- W3 PROV. Available online: https://www.w3.org/TR/prov-overview (accessed on 12 September 2016).
- U.S. Government Accountability Office (GAO). GAO-16-88: DOD Has Addressed Most Reporting Requirements and Continues to Refine Its Asset Visibility Strategy; Technical Report; GAO: Washington, DC, USA, 2015.
- U.S. Government Accountability Office (GAO). Department of Defense Fiscal Year (FY) 2015 Budget Estimates; Technical Report; GAO: Washington, DC, USA, 2014.
- U.S. Government Accountability Office (GAO). F-35 Sustainment Need for Affordable Strategy, Greater Attention to Risks, and Improved Cost Estimates; Technical Report; GAO: Washington, DC, USA, 2014.
PS Organizations | Description |
Police officers |
|
Fire services |
|
Border guards |
|
Coastal guards |
|
Medical responders |
|
Road agents |
|
Railway agents |
|
Custom guards |
|
Airport security |
|
Military |
|
Research | Timeframe 2016–2020 |
Identification |
|
Architecture |
|
Infrastructure |
|
Applications |
|
Communications |
|
Network |
|
Software |
|
Signal Processing |
|
Discovery |
|
Energy efficiency |
|
Security |
|
Interoperability |
|
Standardization |
|
Hardware |
|
© 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fraga-Lamas, P.; Fernández-Caramés, T.M.; Suárez-Albela, M.; Castedo, L.; González-López, M. A Review on Internet of Things for Defense and Public Safety. Sensors 2016, 16, 1644. https://doi.org/10.3390/s16101644
Fraga-Lamas P, Fernández-Caramés TM, Suárez-Albela M, Castedo L, González-López M. A Review on Internet of Things for Defense and Public Safety. Sensors. 2016; 16(10):1644. https://doi.org/10.3390/s16101644
Chicago/Turabian StyleFraga-Lamas, Paula, Tiago M. Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo, and Miguel González-López. 2016. "A Review on Internet of Things for Defense and Public Safety" Sensors 16, no. 10: 1644. https://doi.org/10.3390/s16101644
APA StyleFraga-Lamas, P., Fernández-Caramés, T. M., Suárez-Albela, M., Castedo, L., & González-López, M. (2016). A Review on Internet of Things for Defense and Public Safety. Sensors, 16(10), 1644. https://doi.org/10.3390/s16101644