{"title":"Securing communication protocols in military computing","authors":"Rajeev Kumar, Raees Ahmad Khan","doi":"10.12968/s1353-4858(24)70011-7","DOIUrl":null,"url":null,"abstract":"In the rapidly evolving landscape of military operations driven by advanced technology, the integration of sophisticated computing solutions has become pivotal for gaining a strategic edge. However, this shift brings forth a heightened vulnerability in communication protocols, raising concerns about the security of data exchange among military systems. This research delves into the challenges and vulnerabilities inherent in military communication protocols, aiming to identify potential threats to the confidentiality, integrity and availability of sensitive information. The article further proposes robust strategies to fortify communication channels against evolving cyberthreats, contributing to a deeper understanding of these protocols and offering practical solutions for securing them in the dynamic cyber security landscape.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"9 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(24)70011-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the rapidly evolving landscape of military operations driven by advanced technology, the integration of sophisticated computing solutions has become pivotal for gaining a strategic edge. However, this shift brings forth a heightened vulnerability in communication protocols, raising concerns about the security of data exchange among military systems. This research delves into the challenges and vulnerabilities inherent in military communication protocols, aiming to identify potential threats to the confidentiality, integrity and availability of sensitive information. The article further proposes robust strategies to fortify communication channels against evolving cyberthreats, contributing to a deeper understanding of these protocols and offering practical solutions for securing them in the dynamic cyber security landscape.