{"title":"大卫与歌利亚:物联网的非对称优势","authors":"Gabriele Oligeri, Savio Sciancalepore, Alireza Sadighian","doi":"10.1109/CommNet60167.2023.10365313","DOIUrl":null,"url":null,"abstract":"Modern battlefields are experiencing an increased dependency on smart devices that can sense, process, and communicate data, also known as the Military Internet of Things (MIoT) architecture. While MIoT supports and enhances situation awareness, it opens up new cyber attacks that, when properly designed and deployed, can affect the safety of military operators.In this work, we discuss the trade-off between two opposite phenomena caused by the massive deployment of MIoT in modern battlefields: situational awareness and asymmetric advantage. We highlight how a resource-constrained adversary can resort to simple and effective tactics to deploy cyber attacks that can have either short-term effects or be detrimental to strategic military objectives.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"19 2","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"David and Goliath: Asymmetric Advantage in MIoT\",\"authors\":\"Gabriele Oligeri, Savio Sciancalepore, Alireza Sadighian\",\"doi\":\"10.1109/CommNet60167.2023.10365313\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern battlefields are experiencing an increased dependency on smart devices that can sense, process, and communicate data, also known as the Military Internet of Things (MIoT) architecture. While MIoT supports and enhances situation awareness, it opens up new cyber attacks that, when properly designed and deployed, can affect the safety of military operators.In this work, we discuss the trade-off between two opposite phenomena caused by the massive deployment of MIoT in modern battlefields: situational awareness and asymmetric advantage. We highlight how a resource-constrained adversary can resort to simple and effective tactics to deploy cyber attacks that can have either short-term effects or be detrimental to strategic military objectives.\",\"PeriodicalId\":505542,\"journal\":{\"name\":\"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"volume\":\"19 2\",\"pages\":\"1-8\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CommNet60167.2023.10365313\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CommNet60167.2023.10365313","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modern battlefields are experiencing an increased dependency on smart devices that can sense, process, and communicate data, also known as the Military Internet of Things (MIoT) architecture. While MIoT supports and enhances situation awareness, it opens up new cyber attacks that, when properly designed and deployed, can affect the safety of military operators.In this work, we discuss the trade-off between two opposite phenomena caused by the massive deployment of MIoT in modern battlefields: situational awareness and asymmetric advantage. We highlight how a resource-constrained adversary can resort to simple and effective tactics to deploy cyber attacks that can have either short-term effects or be detrimental to strategic military objectives.