The Use of 5G in Military Cloud of Things Solutions
Copyright (c) 2023 Tóth András
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The copyright to this article is transferred to the University of Public Service Budapest, Hungary (for U.S. government employees: to the extent transferable) effective if and when the article is accepted for publication. The copyright transfer covers the exclusive right to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or any other reproductions of similar nature.
The author warrants that this contribution is original and that he/she has full power to make this grant. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.
An author may make an article published by University of Public Service available on a personal home page provided the source of the published article is cited and University of Public Service is mentioned as copyright holder
Abstract
In military operations, battlefield sensor systems and various solutions supporting reconnaissance and surveillance are increasingly important. Networked battlefield and military devices deployed in the operational theatre can be the best solution to this, ensuring that they are designed to collect all the data generated in their environment, which they are programmed to acquire. These devices continuously share the information they collect with each other and with a central storage and processing server. The required interconnections are typically two-way communications with all the criteria necessary to share the collected data in the shortest possible time. The data collected and analysed in this way can contribute significantly to the near real-time monitoring of the real operational situation and environment. This capability will enable the acquisition and maintenance of information superiority and can significantly speed up decision-making processes. Therefore, networked battlefield intelligent devices are essential for achieving operational objectives and successfully executing operations. In this paper, the author examines the integration of various levels of military IoT devices into the cloud environment and the use of 5G technology as a possible future solution for developing the communication environment. To achieve the research objectives, the author performs a comparative analysis between relevant international academic publications and technical reports on the topic, based on which he formulates his research results.
Keywords:
How to Cite
References
Afolabi, Ibrahim – Tarik Taleb – Konstantinos Samdanis – Adlen Ksentini – Hannu Flinck: Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions. IEEE Communications Surveys & Tutorials, 20, no. 3 (2018). 2429–2453. Online: https://doi.org/10.1109/COMST.2018.2815638
Bastos, Luis – Germano Capela – Alper Koprulu – Gerard Elzinga: Potential of 5G Technologies for Military Application. 2021 International Conference on Military Communication and Information Systems (ICMCIS), (2021). 1–8. Online: https://doi.org/10.1109/ICMCIS52405.2021.9486402
Bognár, Eszter Katalin: Possibilities and Security Challenges of Using IoT for Military Purposes. Hadmérnök, 13, no. 3 (2018). 378–390.
ETSI: 5G; System Architecture for the 5G System (3GPP TS 23.501 version 15.3.0 Release 15). 2020.
Filali, Abderrahime – Amine Abouaomar – Soumaya Cherkaoui – Abdellatif Kobbane – Mohsen Guizani: Multi-Access Edge Computing: A Survey. IEEE Access, 8 (2020). 197017–197046. Online: https://doi.org/10.1109/ACCESS.2020.3034136
ITU-R: Recommendation ITU-R M.2083-0, IMT Vision – Framework and Overall Objectives of the Future Development of IMT for 2020 and Beyond. 2020.
Kim, Hwankuk: 5G Core Network Security Issues and Attack Classification from Network Protocol Perspective. Journal of Internet Services and Information Security (JISIS), 10 (2020). 1–15. Online: https://doi.org/10.22667/JISIS.2020.05.31.001
Kollár, Csaba: Az IoT katonai felhasználási lehetőségei és a fejlesztés irányai. Hadmérnök, 12, no. 4 (2017). 146–158.
Liao, Jingjing – Xinjian Ou: 5G Military Application Scenarios and Private Network Architectures. 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), (2020). 726–732. Online: https://doi.org/10.1109/AEECA49918.2020.9213507
Nakao, Akihiro – Ping Du – Yoshiaki Kiriha – Fabrizio Granelli – Anteneh Atumo Gebremariam – Tarik Taleb – Miloud Bagaa: End-to-end Network Slicing for 5G Mobile Networks. Journal of Information Processing, 25 (2017). 153–163. Online: https://doi.org/10.2197/ipsjjip.25.153
Ranaweera, Pasika – Anca Delia Jurcut – Madhusanka Liyanage: Survey on Multi-Access Edge Computing Security and Privacy. IEEE Communications Surveys & Tutorials, 23, no. 2 (2021). 1078–1124. Online: https://doi.org/10.1109/COMST.2021.3062546
Sicari, Sabrina – Alessandra Rizzardi – Alberto Coen-Porisini: 5G in the Internet of Things Era: An Overview on Security and Privacy Challenges. Computer Networks, 179 (2020). Online: https://doi.org/10.1016/j.comnet.2020.107345
Tóth, András: Cloud of Things Security Challenges and Solutions. 2021 Communication and Information Technologies (KIT), (2021). 1–6. Online: https://doi.org/10.1109/KIT52904.2021.9583760
Wang, Peng – Xing Zhang – Zhi Yan – Barry G. Evans – Wenbo Wang: Convergence of Satellite and Terrestrial Networks: A Comprehensive Survey. IEEE Access, 8 (2020). 5550–5588. Online: https://doi.org/10.1109/ACCESS.2019.2963223