军事环境中的物联网漏洞

IF 0.3 Q4 INTERNATIONAL RELATIONS
Andreas Toth
{"title":"军事环境中的物联网漏洞","authors":"Andreas Toth","doi":"10.3849/2336-2995.30.2021.03.045-058","DOIUrl":null,"url":null,"abstract":"IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.","PeriodicalId":41437,"journal":{"name":"Vojenske Rozhledy-Czech Military Review","volume":" ","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Internet of Things Vulnerabilities in Military Environments\",\"authors\":\"Andreas Toth\",\"doi\":\"10.3849/2336-2995.30.2021.03.045-058\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.\",\"PeriodicalId\":41437,\"journal\":{\"name\":\"Vojenske Rozhledy-Czech Military Review\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2021-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Vojenske Rozhledy-Czech Military Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3849/2336-2995.30.2021.03.045-058\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vojenske Rozhledy-Czech Military Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3849/2336-2995.30.2021.03.045-058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 0

摘要

物联网设备(传感器、无人机、摄像头)越来越重视军事行动。物联网元素在军事环境中的应用增加了态势感知,并支持信息优势的获取和维护。它们提供的有关敌人、作战区域以及我方士兵和资产的位置和状态的信息有助于在战术、作战和战略层面上成功执行行动。然而,如果它们的漏洞允许它们收集的数据泄露,或者它们提供了进入敌人使用的信息通信网络的途径,它们也可能构成严重威胁。在本文中,作者使用关键字分析检查了这些物联网设备的漏洞。在对相关文献进行分析得出结论后,他将结果与当今典型的通用物联网威胁和攻击进行了比较,如分布式拒绝服务攻击、安全、软件、安全和隐私问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Internet of Things Vulnerabilities in Military Environments
IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Vojenske Rozhledy-Czech Military Review
Vojenske Rozhledy-Czech Military Review INTERNATIONAL RELATIONS-
自引率
0.00%
发文量
23
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信