scholarly journals C4I System Security Architecture: A Perspective on Big Data Lifecycle in a Military Environment

2021 ◽  
Vol 13 (24) ◽  
pp. 13827
Author(s):  
Seungjin Baek ◽  
Young-Gab Kim

Although the defense field is also one of the key areas that use big data for security reasons, there is a lack of study that designs system frameworks and presents security requirements to implement big data in defense. However, we overcome the security matters by examining the battlefield environment and the system through the flow of data in the battlefield. As such, this research was conducted to apply big data in the defense domain, which is a unique field. In particular, a three-layered system framework was designed to apply big data in the C4I system, which collects, manages, and analyzes data generated from the battlefield, and the security measures required for each layer were developed. First, to enhance the general understanding of big data and the military environment, an overview of the C4I system, the characteristics of the 6V’s, and the five-phase big data lifecycle were described. While presenting a framework that divides the C4I system into three layers, the roles and components of each layer are described in detail, considering the big data lifecycle and system framework. A security architecture is finally proposed by specifying security requirements for each field in the three-layered C4I system. The proposed system framework and security architecture more accurately explain the unique nature of the military domain than those studied in healthcare, smart grids, and smart cities; development directions requiring further research are described.

2021 ◽  
Author(s):  
Chun Sing Lai ◽  
Loi Lei Lai ◽  
Qi Hong Lai

2022 ◽  
pp. 368-379
Author(s):  
Kimmi Kumari ◽  
M. Mrunalini

The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.


2020 ◽  
pp. 833-854
Author(s):  
Md Muzakkir Hussain ◽  
M.M. Sufyan Beg ◽  
Mohammad Saad Alam ◽  
Shahedul Haque Laskar

Electric vehicles (EVs) are key players for transport oriented smart cities (TOSC) powered by smart grids (SG) because they help those cities to become greener by reducing vehicle emissions and carbon footprint. In this article, the authors analyze different use-cases to show how big data analytics (BDA) can play vital role for successful electric vehicle (EV) to smart grid (SG) integration. Followed by this, this article presents an edge computing model and highlights the advantages of employing such distributed edge paradigms towards satisfying the store, compute and networking (SCN) requirements of smart EV applications in TOSCs. This article also highlights the distinguishing features of the edge paradigm, towards supporting BDA activities in EV to SG integration in TOSCs. Finally, the authors provide a detailed overview of opportunities, trends, and challenges of both these computing techniques. In particular, this article discusses the deployment challenges and state-of-the-art solutions in edge privacy and edge forensics.


2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Markus Heinrich ◽  
Tsvetoslava Vateva-Gurova ◽  
Tolga Arul ◽  
Stefan Katzenbeisser ◽  
Neeraj Suri ◽  
...  

Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware platform that provides the resources required for safety as well as security applications and is able to run these applications of mixed-criticality (safety-critical applications and other applications run on the same device). To achieve this, we apply the MILS approach, a separation-based high-assurance security architecture to simplify the safety case and security case of our approach. We describe the assurance requirements of the separation kernel subcomponent, which represents the key component of the MILS architecture. We further discuss the security measures of our architecture that are included to protect the safety-critical application from cyberattacks.


Author(s):  
Kimmi Kumari ◽  
M. Mrunalini

The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.


2019 ◽  
Vol 11 (3) ◽  
pp. 23-42 ◽  
Author(s):  
Md Muzakkir Hussain ◽  
M.M. Sufyan Beg ◽  
Mohammad Saad Alam ◽  
Shahedul Haque Laskar

Electric vehicles (EVs) are key players for transport oriented smart cities (TOSC) powered by smart grids (SG) because they help those cities to become greener by reducing vehicle emissions and carbon footprint. In this article, the authors analyze different use-cases to show how big data analytics (BDA) can play vital role for successful electric vehicle (EV) to smart grid (SG) integration. Followed by this, this article presents an edge computing model and highlights the advantages of employing such distributed edge paradigms towards satisfying the store, compute and networking (SCN) requirements of smart EV applications in TOSCs. This article also highlights the distinguishing features of the edge paradigm, towards supporting BDA activities in EV to SG integration in TOSCs. Finally, the authors provide a detailed overview of opportunities, trends, and challenges of both these computing techniques. In particular, this article discusses the deployment challenges and state-of-the-art solutions in edge privacy and edge forensics.


Internet of Things (IoT) involves interconnecting smart devices for data collection and making intelligent decisions where, the usual devices become autonomous and smart. With the swift and fast paced developments in the area of smart cities, smart homes, and smart everything the Internet of Things (IoT) is creating an exceptional role that has scope for immense growth and potential. Its objective is the seamless integration of digital and physical worlds into one ecosystem that would lead to the latest intelligent era of the Internet. This state of the art technology can offer huge potential for businesses and offer opportunities for already existent areas like healthcare, energy etc. Yet due to insufficient security techniques IoT is not completely fool proof against security breaches and privacy issues. Since IoT is made up of devices that are resourceconstrained and it has a complex environment, which makes enforcement of security measures even more complicated and tricky. This is where Blockchain’s (BC) “security by design” comes in; that is capable of tackling IoT’s foremost security requirements. Features like transparency, data encryption, auditability, operational resilience and immutability can help remove IoT’s architectural shortcomings. This paper focuses on this relationship and surveys the most relevant work in this area, for analyzing how blockchain is capable of solving the issues related to authorization and access control for IoT environments.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2015 ◽  
Author(s):  
Fahimeh Tabatabaei ◽  
Tahir Wani ◽  
Nastran Hajiheidari
Keyword(s):  
Big Data ◽  

Sign in / Sign up

Export Citation Format

Share Document