31
Defen Scientif DRDC-R February Inter for C Paul Lab DRDC – Prepared ce Rese ic Letter RDDC-2017 y 2018 netwo Canadia Corporate O d for: Dr. Pau earch an 7-L276 rking o an Arm Office ul Comeau, CAN UNC nd Deve CAN U of thin med Fo OCS for the CLASSIFIED lopment UNCLASSIFIE ngs (IoT orces e Science an t Canad ED T) and nd Technolog a implic gy Outlook cations s

DRDC-RDDC-2017-L276 - DOCUMENT

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DRDC-RDDC-2017-L276 - DOCUMENT

DefenScientifDRDC-RFebruary

Interfor CPaul LabDRDC – Prepared

ce Resefic Letter RDDC-2017y 2018

rnetwoCanadia

bé Corporate O

d for: Dr. Pau

earch an

7-L276

rking oan Arm

Office

ul Comeau,

CAN UNC

nd Deve

CAN U

of thinmed Fo

OCS for the

CLASSIFIED

lopment

UNCLASSIFIE

ngs (IoTorces

e Science an

t Canad

ED

T) and

nd Technolog

a

implic

gy Outlook

cationss

Page 2: DRDC-RDDC-2017-L276 - DOCUMENT

CAN UNCLASSIFIED

Template in use: SB SL Covering Page_EN_Smart_2017-11-02_V01_WW.dotm

© Her Majesty the Queen in Right of Canada (Department of National Defence), 2018

© Sa Majesté la Reine en droit du Canada (Ministère de la Défense nationale), 2018

CAN UNCLASSIFIED

IMPORTANT INFORMATIVE STATEMENTS

Disclaimer: Her Majesty the Queen in right of Canada, as represented by the Minister of National Defence ("Canada"), makes no representations or warranties, expressed or implied, of any kind whatsoever, and assumes no liability for the accuracy, reliability, completeness, currency or usefulness of any information, product, process or material included in this document. Nothing in this document should be interpreted as an endorsement for the specific use of any tool, technique or process examined in it. Any reliance on, or use of, any information, product, process or material included in this document is at the sole risk of the person so using it or relying on it. Canada does not assume any liability in respect of any damages or losses arising out of or in connection with the use of, or reliance on, any information, product, process or material included in this document.

This document was reviewed for Controlled Goods by Defence Research and Development Canada (DRDC) using the Schedule to the Defence Production Act.

Page 3: DRDC-RDDC-2017-L276 - DOCUMENT

February

DRDC-R

Prepared

Scientific

InternArmed

Backgr

The cumuand reconnincluding availabilitis given atindustry, i

In this Sciconcept ofpotential asecurity ch

Object

To summaintegratingpossible asystems toactuators obefore.

This SL isInternet ofdomains a

Evolut

The Advaand the fir

y 2018

DDC-2017-L

d for: Dr. Pa

c Letter

etworkid Forces

round

ulative evidennaissance (C4cyber securit

ty of sensing at addressing tit may annihil

ientific Letterf network-cenadvantage imphallenges of I

ive

arise analysesg IoT and oth

approaches foro support opeor their virtua

s an attempt tof Things, theiand systems?

ion

anced Researcrst network to

L276

aul Comeau,

ng of ths

ce of comman4ISR) systemty [4] offers aand actuatingthe monumenlate most of th

r (SL) we assuntric operationpact of IoT asIoT are made

s and surveys her simple digr benefiting frrations. Whatal versions) co

o answer the ir enablers, th

ch Projects Ago implement t

, OCS; for th

hings (Io

nd, control, cms’ value in a v

n initial indicg internetworktal combinatihese potentia

ume that the qns (NCO) on s an extreme manageable.

of relevant Iogital devices infrom such techt is importantonnect the ph

following quheir applicatio

gency Networthe Transmiss

he Science a

oT) and i

communicatiovariety of pub

cation of the aked of things,ion of threats l advantages.

quantifiable mwarfighter efcase of netwo

oT publication public safethnology evolut to recognize hysical world

estion from thons and their i

rk (ARPANEsion Control P

and Technol

mplicat

ons, computerblic safety [1]additional adv aka IoT. Howfrom billions

marginal impaffectiveness corking, as lon

ons addressingty and defencution while m for this workd to the digit

he Office of timplications o

ET) was an eaProtocol/Inter

ogy Outlook

ions for

rs, intelligenc] and militaryvantage of thewever, unlesss of things, as

act [2] of netwcould be extenng as the form

g some of thece systems, semaintaining thk is that IoT dtal one to a d

the Chief Scieon the defenc

arly packet swrnet Protocol

k

r Canadi

ce, surveillancy operations [e massive s special attens claimed by

working fromnded to projec

midable cyber

e challenges oee [5]. It descrhe resilience odevices (sensodegree never

entist: what arce and security

witching netw(TCP/IP) suit

1

ian

ce, 2, 3]

ntion

m the ct the

of ribes of our ors, seen

re y

work te.

Page 4: DRDC-RDDC-2017-L276 - DOCUMENT

2

Both technconnectednetworks. purpose attoaster becbe billionse.g., smartreference networks Internet, hfurther as entities crpossible fudevices su

IoT def

For a large‘things’ caprocess, thproposed t

“Internet othe Internephysical ofeature anidentity, sservices, wcapture anintelligentconsiderat

The same appear thathey can bdescriptiothing will few sensoemerging:

1 https://en2 https://ww3 In 2013 oforced the m2016 a newstimulate inreliable heahttp://tricor

nologies becad to the public

A first non-ct a conferencecame ‘smart’ s of devices ot TV, vehicleto the public (or just integr

hence IoT stanreported in [6eating their o

future of IoT auch as the med

finition

e environmenan be interconhe Institute ofthe following

of Things envet through the

or virtual reprnd are uniqueltatus, locationwith or withound communicat interfaces antion” [8].

committee [8at IoT will be be identified, nns or data relbe a node of rs up to large: sensor, actua

.wikipedia.orgww.postscapesone was built anmanufacturer t

w competition wnnovation and alth diagnoses rder.xprize.org

ame the technc Internet. In tcomputer thine in October 1by being con

or things with , building andInternet, the rrated in a systnds for intern6, 7] where thwn social net

autonomy is odical tricorde

nt scenario, i.ennected to delf Electrical ang definition of

visions a self-e use of standesentation in ly identifiablen or any otherut human inteation, and actnd is made av

8] expressed tcharacterizednamed and adated to them a network. Io

e and complexator, gateway

/wiki/ARPAN.com/internet-ond satisfied somto stop it: httpswas initiated: Tintegration of anywhere, any

g/news/blog/sta

nical foundatiothe concept o

ng (first IoT) c19892. Using nnected to a c

various degrd city. Althoureality is that tem via intern

networking of hings are smartwork. The latoutside the inter3 should be e

e., an IoT sysliver a complnd Electronicsf IoT:

-configuring, dard communi

the digital woe. The represer business, soervention, thrtuation capab

vailable anywh

the following d as a set of inddressed (smaor even relatioT systems shx systems. Uny, virtual objec

ET. of-things-histome customers bs://www.statnewThe Qualcommprecision diagn

ytime. The winar-trek-beyond-

on of the Intef IoT, interneconnected to Ithe Simple Nomputer netwees of smartn

ugh the expresthese things

nal bus) that mf things in thisrt and also inttter is beyondtended time henvisaged.

stem with a leex service ans Engineers (I

adaptive, comication protocorld, sensing/entation contaocial or privatough the explility. The servhere, anytime

observationsnterworking nart objects). ‘ionships betwhow scaling cnder this perspct. All of them

ory/ (Access dabut the Food anws.com/2016/1

m Tricorder XPnostic technolo

nning teams now-doctors-view

ernet1. Not allet includes TCInternet is a t

Network Manawork. Now onness deployedssion coined icould also be

may not be dis SL. Also the

nterconnected d the scope ofhorizon althou

evel of complend support an IEEE) Comm

mplex networcols. The inte/actuation capains informatitely relevant iloitation of unvice is exploie, and for any

s from some onetworks of thThings’ can b

ween objects. Fapabilities, frpective the dim assume ubi

ate: 18 April 20nd Drug Admi12/14/scanadu-

PRIZE is a $10 ogies, helping cw work with a (Access date:

l TCP/IP netwCP/IP and nontoaster for demagement Protne finds that bd and connectis Internet of

e deployed onirectly connece concept couor even can e

f this SL giveugh advanced

exity where aexecution of

mittee on the d

rk that intercoerconnected thpability, a proion including information. Tnique identifiited through thything taking s

of its findingshings that canbe physical obFor a majorityrom small sysifferentiation iquitous conn

017). You had inistration (FD-tricorder-crowmillion global

consumers maa member of the17 April 2017)

works are n-TCP/IP monstration tocol (SNMP)by 2020 there ed to an interThings makin

n a variety of cted to the puuld be pushedevolve into en that such d handheld sm

a large amouna complex

definition of I

onnects ‘thinghings have ogrammability

the thing’s The things ofication, data he use of security into

s: “…it wouldn be made smbjects or theiry of definitionstems based obetween nod

nectivity, whil

to insert the brDA or USFDA)wdfund/.Then il competition t

ake their own e FDA. ).

) the will

rnet, ng

ublic d

mart

nt of

IoT

gs’ to

y

ffer

d mart if

r ns a

on a des is le

read.

in to

Page 5: DRDC-RDDC-2017-L276 - DOCUMENT

each entityoffered at be alwaysrealistic scdegraded

IoT netwomedical, ssensors anInternet Prfollows: “fixed seamTactical racommercicost IoT n

Billions

The large deployed,

IoT ter

With the eFor examp(M2M) codetails abo

Several au[20–28]. Ointeractionprotection[30–35]. I

IoT driv

A dominaintegratedmonths. Insuccess ra

4 Command5 Comparishttps://www8 June 2016 https://ww(Access da

y performs dithings’ interf achievable. Tcenario couldcellular phon

orks could be security and mnd weapons serotocol versioThe military

mless C24 comadios provideial agencies, anetworks.

s of IoT d

number of obi.e., replacing

minology

evolution of Iple Internet oommunicationout IoE).

uthors report oOther authors n (HCI) with ns due to econIn fact [5] ext

vers

ant driver is cod in a businessn public securate in addition

d and Control (son of IPv4 andw.ibm.com/sup7).

ww.iottechexpoate: 20 April 20

ifferent functifaces.” In pubThis is a signi

d be one where service acce

private, indumilitary. Tactiecurely by uson 6 (IPv6) [1IoT networks

mmunicationse interoperabiland allied coa

devices

bjects requiring IPv4 by IPv

y expans

oT technologf Everything n without hum

on internet ofdocument toIoT [29]. Som

nomic and secends IIoT tec

ompetivenesss model, a netrity and defenn to saving liv

(C2). d IPv6: pport/knowledg

o.com/2016/01017).

ions. Anotherblic security aificant issue te we deploy iess (can be in

strial or speciical networksing appropria

11–13] and bls operate overs between opelity with all s

alition forces.”

ng a unique idv6 for a larger

ion

gies and appli(IoE) 6 is con

man interventi

f military thinols and proto

me IoT technocrecy of their chnologies to

s in both commt advantage (rnce this may tves and reduci

gecenter/en/ssw

1/m2m/ioe-vs-i

r emerging asand military scthat needs to bin a city with

n a contested u

ific to a doma could be des

ate resilient stlockchain [14r tactical radioerational elemervices, vario” However, fo

dentifier is ber number of u

cations came nsidered a supions is consid

ngs (IoMT) [1types to exploologies offer bbusiness, e.gpublic safety

mercial and inreturn on invetranslate in reing cost, or in

w_i5_54/rzai2/

iot-vs-m2m-wh

spect is the pocenarios the ube addressed a crippled In

urban environ

ain of applicasigned to expltacks includin4, 15]). This isos that establ

ments and highous agencies ofor security I s

eyond most ofunique object

specific specperset of IoT adered a subset

16–19] and inore novel waybetter cyber, ., Industrial Inand defence.

ndustrial domestment, ROI)esponsivenessncrease missio

/rzai2compipv

hats-the-differe

ossibility of uubiquitous cofor such appl

nternet connecnment (CUE)

ations such as loit all kinds ong advantagess nicely summlish and mainther echelon hof the U.S. Gsuggest using

f the protocols5.

cialisation andand Machine-t of IoT (see A

nternet of battys for humanhacking and nternet of Th.

mains. Where ) is often obss and increaseon sustainabi

v4ipv6.htm (Ac

ence-and-does-

sing functiononnectivity calications. A ctivity and ) [9, 10]).

transport, of things suchs such as frommarised in [5]tain mobile an

headquarters. overnment,

g independent

ls currently fu

d generalisati-to-Machine Annex A for

le things (IoBn-computer security

hings (IIoT)

IoT is suitablerved after a

e in mission lity.

ccess date:

-it-matter/

3

ns annot

h as m ] as nd

t low

ully

ion.

more

BT)

ly few

Page 6: DRDC-RDDC-2017-L276 - DOCUMENT

4

Increasingwatches, acosts declsmartphonthan a billsmartphon

Accordingexplosion

1. The co

2. A lot m

3. Intern

4. High a

Enablin

There is awith sensoproducts. customersplatforms9

requiremeorganizatidevices, umanage thoutcomes informatioavoid cogn

In [36] theUDOO, FMulle, andactivationcandidatesbeen used

Under thedefence su(DoD) Joi

7 http://ww(Access da8 http://ww9 An IoT pl10 http://ww

g demand7: Dand smart therine. A similarnes jumped frlion devices inne component

g to BI (Businin the IoT8.

ost of Interne

more money

net connectivi

adoption of re

ng techn

n abundance ors and built-iThese produc

s. Two recent 9 [37, 38] focuents, as well aion may have use of some anhat team and ein line with b

on managemenitive overloa

ey provide exriendlyARM,d T-Mote Skytime of a dev

s for the deved widely in IoT

hood of the ruch as softwaint Tactical R

ww.mckinsey.coate: 10 May 201ww.businessinsi

latform facilitaww.ni.com/whi

emand for thermostats, for r dynamic occrom about 170n 2014. The its. Smart buil

ness Insider) I

et-connected s

is being pour

ty continues t

emotes, espec

ologies

of enabling tein TCP/IP andcts often connreports from using on the m

as a projectionto consider a

nalytics to maensure that vabusiness valueent for shared ad of tactical

xamples of har, Intel Galileoy. Software plvice. These Oelopment of RT scenarios.

radios of somare define radiRadio System

om/industries/s17). ider.com/four-eates communicite-paper/5370

e first generatinstance) wilcurred with th0 million devincrease in ordldings and cit

Intelligence f

sensors is com

red into the Io

to expand.

cially smartph

echnologies sd security fun

nect to a centrO'Reilly prov

methodology n in the futurea team for manake sense out alued informae. The same ssituation awaunit members

rdware and soo, Raspberry Platforms start

OS include ReRTOS-based I

me IoT hardwaios (SDRs) w(JTRS) progr

semiconductor

elements-drivination, data flow6/en/ (Access d

tion of Internl increase as che rise of smaices sold annuders coincideies also contr

findings, there

ming down.

oT.

hones, phable

such as [36] Snctionalities wral managemevide a represefor selecting

e of a sustainanaging the larof that data a

ation is used bshould be conareness in ords.

oftware platfoPI, Gadgeteert with Operatial-Time Oper

IoT applicatio

are platforms which evolvedram. Silicon in

s/our-insights/

ng-iot-2014-10w, device manadate: 11 April

net of Things pcomponent teartphone usagually just fou

ed with a steepribute to the d

e are four key

ets and tablets

Single Board Cwhich are typient portal to pentative overv platforms baable business rge amount o

and assign a ‘by the right pensidered for puder to deliver

orms. Hardwar, BeagleBoneing Systems (rating Systemons. For instan

one finds tecd under the USndustry, e.g.,

/the-internet-of

0 (Access dateagement, and t2017).

products (fitnechnologies ege. Consumerur or five yearp decline in thdemand.

y elements tha

s.

Computers (Sically used to

provide the review of the enased on the us

plan. In suchof data collectchief data offeople, i.e., keublic safety aactionable in

are platforms e, Cubieboard(OS) to run fo

ms (RTOS) thnce, the Cont

chnologies deS Department National Ins

f-things-sizing-

: 11 April 2017the functionalit

ness bands, smvolve and the

rs’ demand fors ago to morehe price of cr

at are driving

SBCs) integrao realize IoT equired data bnabling IoT ser’s intent anh future an ted by IoT ficer’ (CDO) eeping the and defence Ionformation an

include Ardud, Z1,WiSensor the whole at are good tiki RTOS has

veloped for t of Defense truments10, lo

-up-the-opport

7). ty of applicatio

mart eir or e ritical

the

ated

by

nd

to

oT nd

uino, se,

s

ooks

tunity

ons.

Page 7: DRDC-RDDC-2017-L276 - DOCUMENT

beyond tofrequencycommunic(4G) phonGeneratio

Note that system byPython, Cprivate onpreferenceZigbee, Rstandards

Annex B pnecessary of IoT obj

IoT app

Annex C pcapabilitiedeployed

Potentopport

There is nassessmen2013 fromthat summ

In additionused in de

Policie

Although emerging

Conclu

Based on defence an

11 http://iot

day best SDRy integrated cications (MILCnes. Future tecn (5G) smart

the April 201y the surveyedC++ and Noden premise cloue the connecti

RS-232/RS-48included HTT

provides a timmove from I

jects.

plications

provides somes. It appears operational sy

ial implictunities)

no consensus ynts. A good plm Cisco [40]. Amarises the cur

n, Annex F prefence and sec

es and sta

there are no lpolicies and s

usion

information and security (D

t.ieee.org/imag

R solutions whircuit (RFIC) COM), electrchnologies inphones, and

16 IoT Develod participants.e.js (uses the Cud, Microsoftivity protocol5, LPWAN (LTP, MQTT, C

meline of the ePv4 to IPv6 d

s

me examples othat industry,ystems and pr

cations fo

yet, meaning lace to start mAnnex E provrrent situation

rovides informcurity system

andards

leading policystandards.

available so faD&S) capabil

es/files/pdf/iot

hich evolved and digital sionic warfare,

ntegrating anaother systems

oper Survey11

. The most usChrome V8 JaAzure, Goog

ls were TCP/ILoRa, SigFox

CoAP, HTTP/

evolution of ndue to the larg

of emerging ap, transport andrototype syste

or defenc

different orgamaking sense vides an excen.

mation about s.

y and standard

ar about IoT tities in terms

t-developer-sur

from field prignal processi, signals intellalog with digits yet to be def

reports that Lsed programinavaScript enggle Cloud PlatIP, Wi-Fi, Ethx, LTE-M, etc/2…[39].

networks towge number of

pplications (bd medical appems tested so

ce and se

anizations anout of it is the

erpt from a De

the relation b

d currently, A

technologies, of advantage

rvey-2016-repo

rogrammable ing (DSP) devligence (SIGItal circuits wifined.

Linux was theng languages gine). Cloud stform and IBMhernet, Bluetoc.), 6LoWPA

ward the currenf unique ident

both civilian aplications cur far.

curity (th

nd companies e paper from epartment of

between IoT a

Annex D prov

one can projes and threats

ort-final.pdf (A

gate-array (Fvices in suppoINT) and Fouill support IoT

e most used Iwere Java, C

services wereM Bluemix. Iooth/Bluetoot

AN (IPv6), UP

nt state of IoTtifiers required

and military) rrently lead in

hreats an

have significCovington anDefense (DoD

analytics and

vides some in

ect their poteto Canada, i.

Access date: 11

FPGA), radio ort of military

urth GeneratioT and Fifth

IoT operatingC, Java Script,e Amazon AWIn their order th Smart, CellPnP… Messag

T including thd for the billi

and future n terms of

d

cant different nd CarskaddeD) publicatio

the track data

formation on

ential impacts .e., advantage

1 April 2017).

5

y on

WS, of lular, ging

he ons

en n

a

on es in

Page 8: DRDC-RDDC-2017-L276 - DOCUMENT

6

terms of mour nation

In summausing IoT trained opelectronic situational

It is not resuch capabalready ad

This IoT ein the devsupport toowner’s p

Future

First of allThere is a developmIoT-Europsharing. Toperationa

The reviewcould be tecosystemchains and

Given the test beds falso be us

Prepared

multiplying Dn and our allie

ary, given the hardware and

perators, it appecosystem de

l awareness w

evolutionary, bilities could

dopting IoT ec

evolution couelopment of f

o coalition senermission [41

work

l, there is a nevariety of po

ent of this SLpean Platform

There are also al demonstrat

w of IoT for Dtranslated to m

m for defense d supply give

low cost of dfor evaluatinged to explore

d by: Paul Lab

ND/CAF capes.

possibility tod software wipears that thereployed for o

with more tim

but an accelecontribute to

cosystems.

uld be managefuture systemnsor discovera1].

eed to discussossible partnerL it was notedms Initiative (I

DoD, DISA tions.

Defense and Pmodern warfaand public san its integrati

developing mug their values the domain o

bbé (DRDC –

pabilities and

o minimise adith sufficient re is a signific

operations hermely and preci

erated evolutioo support our

ed to progressms, e.g., Open

ability, access

s what IoT carships with si

d that some mIoT-EPI) for pand USDOT

Public Safety are. It also preafety. For examion of RFID.

ultifunction Ifor improving

of cybersecur

– Corporate O

threats if mal

dverse effects security protecant advantagre and abroadise informatio

on in the reneforce prepare

sively be introStandard for sibility and co

apabilities supibling organiz

major efforts wplatform deveinitiatives tha

paper [5] shoesents a researmple, IoT cou

oT ecosystemg Canadian Dity outside ou

Office).

levolent group

on operationection and appge to integrate

d. It is expecteon.

ewal of our Dedness to oper

oduced for in Unattended S

ontrol based o

pport current azations with s

were from Eurelopment, inteat have alread

ows how the rrch roadmap uld change th

ms, it is recomDefense and Sur operational

ups use such a

al networks fpropriate use e IoT technoled to provide

D&S capabilitirate with othe

service upgraSensors (OSUon sensor cap

and future DNsimilar interesropean initiatieroperability dy delivered p

revolutionizefor enabling

he way we ma

mmended to dSecurity capabl networks [42

advantages ag

from hackers, and care from

logies to the improved

ies. In additioer countries

ades or integrUS) interface pabilities and

ND priorities.st. During theives such as and informat

prototypes an

ed IIoT benefian affordable

anage the logi

develop some bilities. They 2].

gainst

of m

on,

rated in

. e

tion nd

its e IoT istic

as can

Page 9: DRDC-RDDC-2017-L276 - DOCUMENT

Refere

[1] J. Simple," P

[2] Aon Terror

[3] J. Assessme

[4] MMore than

[5] P.López, "App. 1–44,

[6] Levolutiona2014.

[7] Dand resear

[8] R"IEEE Inthttp://iot.iY15.pdf.

[9] KService SuDefence, Dhttps://ww

[10] MFramewor17 April 2

[11] C.-MNetworks,on GenetiJ. C.-W. Lpp. 319–3

[12] L. WConsumerIEEE.

nces

Pagotto and Proceedings o

A. P. Dacus, "I(GWOT)," D

Ferris, "A Nent," Journal o

M. Bernier andn C4ISR, mor

. Fraga-LamaA Review on I

2016.

. Atzori, A. Ieary step of the

D. Miorandi, Srch challenge

. Minerva, A.ernet Initiativieee.org/imag

K. Ivanova, G.upport: ScopiDefence Scien

ww.dst.defenc

M. A. Kolodnyrk Ontologica2017 Availabl

M. Chen, S.-C," in Genetic c and Evoluti

Lin, J.-S. Pan,26.

Wang et al., "Sr Communica

D. O’Donnelof ISCRAM 2

Impact of C4IDTIC Docume

ew Americanof Military an

d J. Treurniet,re than CNO,"

as, T. M. FernInternet of Th

era, and G. Me internet of t

S. Sicari, F. Ds," Ad Hoc N

. Biru, and D.ve | iot.ieee.ores/files/pdf/IE

E. Gallasch, ing Study andnce and Tech

ce.gov.au/site

ya, P. H. Deitzal Approach fle: http://inter

C. Hsu, and Gand Evolutionionary Compu, P. Tin, and M

Survey on distions and Net

l, "Canada’s M012, pp. 1–10

ISR/Digitizatent 25 May 20

n Way of Warnd Strategic S

, "Understand" in Conferen

nández-Caramhings for Defe

Morabito, "Frothings," IEEE

e Pellegrini, aNetworks, vol.

. Rotondi, "Torg," 2015, AvEEE_IoT_To

and J. Jordand Technology hnology Octobs/default/files

zb, and T. Phfor ISR PED Mrnationalc2ins

G.-H. Lai, "Denary Compututing, August M. Yokota, E

stributed mobtworking Conf

Multi-Agency0, 2012.

ion and Joint 006.

r? C4ISR in OStudies, vol. 6

ding Cyber Opnce on Cyber

més, M. Suáreense and Publ

om 'smart objeE Communicat

and I. Chlamt10, no. 7, pp

owards a defivailable: owards_Defin

ns, "AutomatePrioritisation

ber 2016, Avas/publications

hama, "MINI-Missions... thstitute.org/s/1

efense Denial-ting: Proceedt 26–28, 2015ds. Cham: Sp

bility managemnference (CCN

y Situational

t Force Ability

Operation Iraq6, no. 1, 2003.

perations in aConflict Proc

ez-Albela, L. Clic Safety," Se

ects' to 'socialtions Magazin

tac, "Internet . 1497–1516,

inition of the

nition_Interne

ed and Autonn," Australianailable: s/documents/D

-DASS: a Newhe magic rabb16-75-zj2w.pd

-of Service Adings of the Ni5, Yangon, Mypringer Intern

ment schemesNC), 2014 IEE

Awareness S

y to Conduct

qi Freedom, A.

a Canadian Stceedings, 201

Castedo, and ensors, Articl

l objects': Thene, vol. 52, n

of things: Vi, 9 2012.

Internet of Th

t_of_Things_

nomous Systemn Government

DST-Group-T

w Missions &its," Accesseddf.

Attacks on IPvNinth Internati

yanmar - Volunational Publis

s for Proxy mEEE 11th, 201

System–Keepi

the Global W

A Provisional

trategic conte0, pp. 227–24

M. Gonzálezle vol. 16, no.

e next no. 1, pp. 97–1

ision, applicat

hings (IoT),"

_Revision1_2

ms for Combt, Department

TN-1573.pdf.

& Means d on:

v6 Wireless Sional Confereume 1, T. T. Zshing, 2016,

mobile IPv6," 4, pp. 132–13

7

ing it

War

xt: 43.

z-. 10,

105,

tions

in

27MA

bat t of

.

ensor ence Zin,

in 38:

Page 10: DRDC-RDDC-2017-L276 - DOCUMENT

8

[13] A. JFuture Int

[14] M. S

[15] A. Kcryptograp(SP), 2016

[16] J. ChThings," iIEEE.

[17] J. ChInternet ofpp. 508–5

[18] T. KInternatiopp. 1–5.

[19] J. LearchitectuConferenc

[20] NATMultiple MtrajectoireTechnologEducationrddc.gc.ca

[21] MissSociety Bu

[22] G. HBattlefieldApplicatioComputer

[23] L. KSelf-Heali(24th), Orbin/GetTR

[24] A. Kno. 12, pp

. Jara, S. Varaternet through

Swan, "Block

Kosba, A. Milphy and priva6, pp. 839–85

hudzikiewiczn 2015 IEEE

hudzikiewiczf Military Thi13: IEEE.

Kaur and D. Konal Conferen

ee, L. Kant, Ares for multi-ce, 2012, pp.

TO, "AdvanceMicro UAV Aes techniques gy Organizatinal Notes RTOa/cowdocs/cow

souri S&T, "Mulletin, Articl

Hua, Y. X. Li,d Situation Awon, and Commr and Informa

Kant, W. Chening for Battlerlando, FloridRDoc?AD=AD

Kott, A. Swamp. 70–75, 2016

akliotis, A. Fh IPv6 suppor

kchain: Bluepr

ller, E. Shi, Zacy-preserving58: IEEE.

z, J. Furtak, an2nd World Fo

z, J. Furtak, anings," in 2015

Kumar, "Wirelnce on Recent

A. McAuley, K-tier military n1–7.

ed AutonomoApplications /d'application

ion, Neuilly-sO-EN-SCI-19w1_e.html.

Missouri S&Te vol. 89, no.

, and X. M. Ywareness Sysmunication, Ption Science,

n, C. Lee, A. field Network

da, 29 NovembDA432120

mi, and B. J. W6.

. Skarmeta, anrt," Mobile Inf

rint for a new

. Wen, and Cg smart contr

nd Z. Zielinskorum on Inter

nd Z. Zielinsk5 IEEE 2nd W

less multifunct Advances in

K. Sinkar, C. networks," in

ous Formation/ Contrôle d'us pour micro

sur-Seine (Fra95, 01 Jun 200

T gets funding 8, pp. 4–4, 2

Yan, "Researcstem," in AdvaPt 2, vol. 144,

2011, pp. 44

Sethi, and M.ks," presentedber – 2 Decem

West, "The In

nd P. Kirsteinformation Sys

w economy," O

C. Papamanthoracts," in 2016

ki, "Fault-tolernet of Things

ki, "Secure prWorld Forum o

ctional robot Engineering

Graff, and Mn MILCOM 20

n Control andune formation

UAV multiplance) Systems08, Available

g to develop b010.

h on the Wireanced ResearG. Shen and 3–449.

. Natu, "D-FLd at the Procember, 2005. A

nternet of Batt

n, "Extendingstems, vol. 10

O'Reilly Med

ou, "Hawk: T6 IEEE Symp

erant techniqus (WF-IoT), M

rotocol for wion Internet of

for military a& Computati

M. Patel, "Plan012 - 2012 IE

d Trajectory Mn autonome évle," in "RTO-s Concepts an

e: http://candid

battlefield 'sm

eless Sensor Nrch on ElectroX. Huang, E

LASH: Dynameedings for thAvailable: http

tle Things," C

g the Internet 0, no. 1, pp. 3

dia, Inc.14919

The blockchainosium on Sec

ues for the IntMilan, Italy, 2

ireless commuf Things (WF-

applications,"ional Science

nning & desigEEE Military

Management Tvoluée et gest-EN-SCI-195nd Integrationd.drdc-

mart dust'," Am

Networks Aponic Commerds. (Commun

mic Fault Loce Army Scien

tp://www.dtic

Computer, Ar

of Things to 3–17, 2014.

920475, 2015.

n model of curity and Pri

ternet of Milit2015, pp. 496–

unication with-IoT), 2015,

in 2015 2nd es (RAECS), 2

gn of routing Communicati

Techniques fotion des ," Research a

n Panel,

merican Cera

plied in the rce, Web nications in

calization andnce Conferencc.mil/cgi-

rticle vol. 49,

the

.

ivacy

tary –501:

hin

2015,

ions

for

and

amic

d ce

Page 11: DRDC-RDDC-2017-L276 - DOCUMENT

[25] M. MMILCOM

[26] P. PInternatio(ICCICCT

[27] S. RDecision SResearch DRDC-RD

[28] N. S2016 InterBrussels, B

[29] M. Kthings," IE

[30] L. Dindustrial

[31] R. Rpp. 51–58

[32] W. YOpportuniSciences /

[33] M. Sframework

[34] C. Joof Things,

[35] M. Rmodels," I

[36] A. Asurvey on Tutorials,

[37] M. J

[38] M. JSebastopothingworxmedia_Th

Maher, "JointM 2007 - IEEE

. Ray, "Towaonal ConferenT), 2015, pp. 4

Ray, "In-TheatSupport and DCentre, QuebDDC-2016-C

Suri et al., "Anrnational ConBelgium, 201

Kranz, P. HolEEE internet

Da Xu, W. Heinformatics,

Roman, P. Naj, 2011.

Yeager and J.ities Minitrac/ Cloud and In

S. Hossain ank for health m

ohnson, "Secu," Accessed o

R. Palattella eIEEE Journal

Al-Fuqaha, Menabling techvol. 17, no. 4

J. Perry, "Eva

J. Perry, "Theol, CA2016, Ax/files/uploadhe_Platform_T

t Tactical RadE Military Com

ards an Internence on Contro411–416.

tre Sense & RDisruptive Tebec QC (CANC250, 01 Feb 2

nalyzing the Anference on M16, pp. 117–12

lleis, and A. Scomputing, v

, and S. Li, "Ivol. 10, no. 4

jera, and J. Lo

.-H. Morin, "Ick," in Proceenternet of Thi

nd G. Muhammmonitoring," C

uring the Parton: 24 April 2

et al., "Internel on Selected A

M. Guizani, M.hnologies, pro4, pp. 2347–2

aluating and c

e Platform TraAvailable: https/2016081714Transformatio

dio System: Tmmunications

et of Things bol, Instrument

Respond Logiechnologies,"

N); Thales Can2016, Availab

Applicability Military Comm22.

Schmidt, "Emol. 14, no. 2,

Internet of thi4, pp. 2233–22

opez, "Securi

Introduction tedings of the 5ings:: Challen

mad, "Cloud-Computer Net

ticipation of S2017, Availab

et of things inAreas in Com

. Mohammadotocols, and a

2376, 2015.

hoosing an Io

ansformation:ps://s3.amazo42142/WP_Oon_How_IoT

Tactical Netwos Conference,

based architectation, Comm

istics In-TheaDefence Res

nada, Quebecble: http://can

of Internet omunications a

mbedded interapp. 46–53, 20

ings in indust243, 2014.

ing the interne

to Cloud and 50th Hawaii Inges and Opp

-assisted indutworks, vol. 1

Safety-Criticale: http://epri

n the 5G era: Emmunications

di, M. Aledharapplications,"

oT platform,"

: How IoT Wonaws.com/tpOreilly-T_Will_Chang

ork Planning , 2007, pp. 1–

ctural framewunication and

atre S&RL - Tearch and De

c Que (CAN),ndid.drdc-rddc

f Things to thand Informati

action: Intera010.

tries: A surve

et of things,"

the Internet oInternational portunities Mi

ustrial internet101, pp. 192–

al SCADA Syints.gla.ac.uk/

Enablers, archs, vol. 34, no.

ri, and M. Ay" IEEE Comm

ed. Sebastop

Will Change ITpg-

ge_IT_and_W

and Managem–7.

work for defend Computatio

TA5. Investigevelopment C, Canada, Conc.gc.ca/cowd

he Battlefield ion Systems (I

acting with the

ey," IEEE Tra

Computer, v

of Things: ChConference o

Minitrack, 2017

t of things (II–202, 2016.

ystems in the /130828/1/13

hitecture, and3, pp. 510–52

yyash, "Internmunications Su

pol, CA: O'Re

T, and When.,

When.pdf.

ment," in

nce," in 2015 onal Technolo

ation of SelecCanada, Valcantract Report ocs/cow1_e.h

EnvironmentICMCIS),

e internet of

ansactions on

ol. 44, no. 9,

hallenges and on System 7, p. 5931.

IoT)–enabled

Industrial Int0828.pdf.

d business 27, 2016.

net of things: Aurveys &

eilly Media, 2

," O'Reilly M

9

ogies

cted artier

html.

t," in

ternet

A

2016.

Media,

Page 12: DRDC-RDDC-2017-L276 - DOCUMENT

10

[39] IEEEIEEE IoT building I

[40] M. JInternatio

[41] R. Gexperimenand Photo

[42] P. LadvantageICCRTS), and USC IInternation

[43] B. Xinformatio10, no. 2,

[44] W. ZInternatiopp. 660–6

[45] G. Zmonitorine-Health N

[46] S. Rcare: a com

[47] C. SIoT PlatfoThings, ReIntelligenc

[48] L. WLLP, Cana

[49] J. PaCanada –Crddc.gc.ca

[50] M. LInternet Tin Compu

E. (2016, 6 Fand AGILE I

IoT). Availabl

J. Covington aonal Conferen

Ganger, M. Nonts," in SPIE Donics.

Labbé, "Couldes?," in 22nd In

Topic 3: ImpInstitute for Cnal Command

Xu, L. Da Xu,on system forpp. 1578–158

Zhao, C. Wanonal Conferen665: IET.

Zhang, C. Li, g system modNetworking, A

R. Islam, D. Kmprehensive

Sangwhan, M.orm in the Deeston, VA, Uce: IEEE.

Wasser, R. HiladaMarch 20

agotto et al., "Centre for Seca/PDFS/unc18

L. Das, "PrivaTechnology, Icuter Science, 2

ebruary 2017IoT co-sponsole: http://iot.ie

and R. Carskance on Cyber

owicki, J. KoDefense+ Sec

d early adoptionternational Cplications of tCreative Techd and Control

H. Cai, C. Xr emergency m86, 2014.

ng, and Y. Nance on Commu

Y. Zhang, C. del based on tApplications a

Kwak, M. H. Ksurvey," IEEE

. P. Ruiz, M. sign of Real-tSA, 2016, vo

ll, and M. Ko16.

"Public Safetycurity Scienc81/p537863_A

acy and Securcdcit 2015, vo2015, pp. 33–

7). IEEE IoT Dored an onlineeee.org/image

adden, "ThreaConflict (CyC

vach, T. Gregcurity, 2016, p

on of internetCommand anhe Internet of

hnologies 120l Institute (IC

Xie, J. Hu, andmedical servic

akahira, "Medunication Tec

Xing, and J. the IoT sensoand Services

Kabir, M. HosE Access, vol

Wachowicz, time Recomm

ol. Technical S

czerginski, "C

y Broadband e, DRDC CSA1b.pdf.

rity Challengeol. 8956, R. N–48.

Developer Sure survey to bees/files/pdf/io

at implicationCon), Tallinn,

gory, and B. Lpp. 983105–9

tworking of ind Control Resf Intelligent T

015 WaterfronC2I).

d F. Bu, "Ubiqces," IEEE Tr

dical applicatichnology and

Yang, "Semaors," in 2012 I(Healthcom),

ssain, and K.-l. 3, pp. 678–7

L. H. Tran, Hmender SystemSession: Sem

Cybersecurity

Network ArcS TR 2013-00

es in Internet Natarajan, G. B

rvey 2016 (Thetter understaot-developer-s

ns of the inter, Estonia, 201

Liss, "OSUS 983105-6: Int

ntelligent thinesearch and TThings, Army nt Drive, Play

quitous data aransactions o

ion on interned Application

anMedical: a IEEE 14th Int, 2012, pp. 23

-S. Kwak, "Th708, 2015.

H. Cao, and I.ms," in IEEE

mantic Techno

y and the Inte

chitecture Des09, 2013, Av

of Things," iBarua, and M

The Eclipse Ioand how devesurvey-2016-

rnet of things,13, pp. 1–12:

sensor integrternational So

ngs provide siTechnology Sy

Research Labya Vista, CA,

accessing meton Industrial I

et of things," i(ICCTA 2011

kind of sematernational C38–243: IEEE

he internet of

Maduako, "TWorld Forum

ologies and Co

ernet of Thing

scription," Deailable: http:/

in DistributedM. R. Patra, Ed

T Working Grelopers are report-final.p

," in 2013 5thIEEE.

ation in Armyociety for Opt

ignificant ymposium (22boratory - W2017, p. 20:

thod in IoT-bInformatics, v

in IET 1), 2011,

antic medical Conference onE.

f things for he

The Role of am on Internet ollective

gs," McMillan

efence R&D //cradpdf.drdc

d Computing ads. (Lecture N

roup,

pdf.

h

y tics

2nd est

based vol.

n

ealth

an of

n

c-

and Notes

Page 13: DRDC-RDDC-2017-L276 - DOCUMENT

[51] R. Sno. 10, pp

[52] L. JaEfficiencypp. 1–14,

[53] J. KAerospace

[54] K. KGround/AM. A. Kol

[55] P. Lfor NetwoInformatioICCRTS, L

[56] F. Lof Things,

[57] C.-Hcommunic

[58] J. P.Communi

[59] O. Rwireless s2015.

[60] S. NEdinburghAvailable

[61] H. N46, no. 4,

[62] A. SAuthenticIEEE Mili

[63] J. ACharlottes

[64] J. A

S. Ferrell, "Unp. 151–154, 20

aeseung, S. Yy in Ubiquitou2016.

eller, "DARPe Electronics,

Klawon, J. Goir Multisensolodny and T.

Labbé, Z. Maaork-and Internon," in 7th IntLoews Le Co

Li, Y. Han, and," Computer C

H. Liao and Tcation. INTEC

M. Lichtmanications Jamm

R. Merad Bouensor network

Nagy, "Reporth (AUSTRAL: http://candid

Ning, H. Liu, pp. 46–53, 20

Singla, A. Muation for interitary Commun

. Stankovic, "sville Dept of

. Stankovic, "

ninterrupted In016.

Yunsick, and Pus Computing

PA eyes cyber Article vol. 2

old, K. Bachmor InteroperabPham, Eds.: P

amar, E. Abdenet-based Synternational C

oncorde, Québ

d C. Jin, "PraCommunicati

.-K. Woo, AdCH Open Acc

n, S. Amuru, ming Taxonom

udia, S. M. Seks using state

t on Cisco LivLIA), Ottawa,d.drdc-rddc.g

and L. T. Yan013.

udgerikar, I. Prnet of thingsnications Con

"Adaptive andf Computer Sc

"Robust and S

nformation C

P. Jong Hyukg Environmen

rsecurity for I27, no. 7, pp.

man, and D. Lbility, IntegraProceedings o

elhamid, B. Mnchronized E-Command andbec City, Can

actical access ions, vol. 89–

daptation fromcess Publisher

C. Shahriar, Tmy," IEEE Se

enouci, and Meful public key

ve Melbourne, Canada, Genc.ca/cowdocs

ng, "Cyberent

Papapanagiotos in mission crnference, 201

d Reactive Secience, 2007.

Secure Locali

Crucial to Agil

, "Lightweighnts," Sensors

Internet of Th 8-8, 2016.

Landoll, "Consation, and Netof SPIE, 2016

Moulin, R. Pro-activities for d Control Resenada, 2002, p.

control for se–90, pp. 154-1

m transmissior, 2012.

T. C. Clancy,ecurity & Priv

M. Feham, "A y cryptograph

e 2015," DSTOneral Documes/cow1_e.htm

tity Security i

ou, and A. A. ritical vehicu5, pp. 1298–1

ecurity for Wi

ization," Virg

le Army," Ar

ht Sensor Aut(14248220),

hings and emb

sidering IIOTtworking for P6.

oulx, and D. DLocation-andearch and Te27: CCRP.

ensor network164, 9/1/ 2016

on security (TR

, R. M. Buehrvacy, Feb. 20

novel secure hy," Ad Hoc N

O Cyber and ent DSTO-GD

ml.

in the Interne

Yavuz, "HAAular networks,1304.

ireless Sensor

ginia Univ, Ch

rmy Magazine

thentication SArticle vol. 1

bedded compu

T and SecurityPersistent ISR

Demers, "Recd Time-depenechnology Sym

ks in the cont6.

TRANSEC) to

rer, J. H. Reed16.

aggregation sNetworks, vo

Electronic WD-0880, 01 Ju

et of Things,"

A: Hardware-," in MILCOM

r Networks,"

harlottesville,

e, Article vol.

Scheme for En16, no. 12,

uting," Milita

y for the DoDR Vii, vol. 983

commendationdent mposium, 7th

ext of the Inte

cognitive rad

d, "A

scheme for l. 32, pp. 98–

Warfare Divisiun 2015 2015

Computer, v

-Accelerated M 2015 - 2015

Virginia Uni

, 2009.

11

66,

nergy

ary &

D," in 31,

ns

ernet

dio

–113,

ion, 5,

vol.

5

v,

Page 14: DRDC-RDDC-2017-L276 - DOCUMENT

12

[65] L. WKNN ClasEngineeri

[66] T. ZChallenge

[67] B. ZInternatioSocial Co

[68] S. ZState Univ

[69] C. Bdecades opp. 31–37

[70] R. CWiley & S

[71] M. Mthe InterneSynthesis

[72] S. KSpringer,

[73] A. FTransmiss

[74] A. FSimultaneConferenc

[75] P. LDispersed2007.

[76] P. LOperationInstitute of

[77] P. LDisperse CMeeting ofpp. 998–1

Wenchao, Y. Pssification Alng, Article, p

Zhang, H. Antes and a Solut

Zhu, A. Josephonal Conferenmputing, 201

Zhu, G. Cao, av. of New Yo

Belisle, V. Kof software rad

7, 2015.

C. Dixon, SpreSons, Inc., 19

Möstl, J. Schlet-of-Things,(CODES+ IS

Kounev et al., 2017, pp. 3–1

F. Cattoni, M.sion Systems

F. Cattoni, M.eous Digitalizce, 2007.

Labbé, D. Ardd Civil and Mi

Labbé, "GPS ans," in Proceeof Navigation

Labbé, D. ArdCivilian and Mof The Institut010.

Ping, W. Yuegorithm in W

pp. 1–8, 2014.

tunes, and S. Ation Framewo

h, and S. Sastnce on Interne1, pp. 380–38

and P. Liu, "Drk at Buffalo,

ovarik, L. Pucdio technolog

ead Spectrum94.

latow, R. Erns" in 2016 Inte

SSS), 2016, pp

"The Notion 16.

Musso, and Cin a Software

Musso, and Czation of Data

en, L. Li, andilitary Urban

and GIS Integdings of the 1(ION GPS 19

en, and L. Li,Military Urbate of Navigatio

, P. Li, and LWireless Senso

.

Aggarwal, "Dork," IEEE Int

try, "A Taxonet of Things a88.

Distributed Se, Amherst Re

ker, and M. Tgy innovation,

m Systems: Wi

st, H. Hoffmaernational Cop. 1–9: IEEE.

of Self-aware

C. S. Regazzoe Defined Rad

C. S. Regazzoa Transmission

d Y. Ge, "SelfOperations,"

gration in Mob12th Internati999), Nashvil

, "GPS-INS-Ran Operationson, The Catam

L. Jianhua, "Aor Network," J

Defending Coternet of Thin

nomy of Cybend 4th Intern

elf-healing Meesearch Found

Turner, "The s," IEEE Comm

ith Commerci

ann, A. Merchonference on H

e Computing,

oni, "Integratdio Framewor

oni, "SDR Ann and Naviga

f-Aware / SituInside GNSS

bile Equipmeional Technicle, TN, 1999,

Radio and GIS," in Proceedmaran Resort

A New IntrusioJournal of El

onnected Vehings Journal, v

er Attacks on ational Confe

echanisms fordation 2010.

software communications M

ial Applicatio

hant, and A. SHardware/Sof

," in Self-Awa

tion Between rk," 2007.

nalog Front-Eation Signals,

uation AwareS, vol. 2, no. 2

ent for Improvcal Meeting of, pp. 545–554

S Integration dings of the 20t Hotel, San D

on Detection lectrical & Co

icles Against vol. 1, no. 1, p

SCADA Sysference on Cyb

r Securing Se

mmunications Magazine, vo

ons. New York

Shraer, "Self-oftware Codes

are Computin

Navigation a

End Architect" in SDR For

e; Integrated H2, pp. 34–45,

ved Mobile Ef the Satellite4.

into Handhel007 National Diego, CA, 20

System Baseomputer

Malware: pp. 10–21, 20

stems," in 201ber, Physical

ensor Network

architecture: ol. 53, no. 9,

k, NY, USA:

-aware systemsign and Syste

ng Systems:

and Data-

ture For rum Technica

Handhelds forMarch/April

Emergency e Division of T

ld ComputersTechnical

007,

d on

014.

11 l and

ks,"

two

John

ms for em

l

r

The

s for

Page 15: DRDC-RDDC-2017-L276 - DOCUMENT

[78] D. WAutonomoOttawa ONhttp://cand

[79] Y. Zrelative loMemorandrddc.gc.ca

[80] B. RReport, Drddc.gc.ca

[81] L. LCooperatiTechnical rddc.gc.ca

[82] M. Dtransport aDefence R(CAN);CoDRDC-RDrddc.gc.ca

[83] C. WValcartierReport DR

[84] W. SAIAA SPA

[85] D. WNetwork fAnalysis, http://crad

[86] C. KHands-On

[87] Y. Dmassive MWireless C

[88] F. Dwithin pubbrief overv

Waller, I. Chaous Sensor NeN (CAN), Tedid.drdc-rddc

Zhou, J. Schemocation discovdum DRDC-Oa/PDFS/unc10

Ricard, "Le noRDC-RDDC

a/cowdocs/cow

Li, "Localizative LocalizatiReport DRD

a/cowdocs/cow

Deziel, "A Reavec garantie Research and ommunicationDDC-2014-Ca/PDFS/unc19

Widdis, "SASNr, Valcartier QRDC-VALCA

Shen, "Self-RACE 2009 Co

Waller, "A Simfor Early WarOttawa ON, T

dpdf.drdc-rdd

Kolias, A. Stavn"," IEEE Sec

Deng, L. WanMIMO aided hCommunicatio

Delaveau, A. Eblic and privaview," Proce

apman, and Metwork," Defechnical Mem

c.gc.ca/cowdo

mbri, L. Lamovery for SASNOTTAWA-TM07/p533710_A

oeud de capte-2014-R70, 0w1_e.html.

ion in Self-Heon of Sensor

DC-OTTAWAw1_e.html.

eliable Transpde livraison pDevelopmentns Research C

C109, 01 Jun 298/p800537_A

Net Sensor SQUE (CAN); ARTIER-CR-

Reconfigurablonference & E

mulation Studrning DetectioTechnical Mec.gc.ca/PDFS

vrou, J. Voascurity & Priva

ng, K.-K. Wonhetnets using ons & Signal

Evesti, J. Suomate civilian wiedings of SDR

M. Michaud-Shfence R&D Ca

morandum, DRocs/cow1_e.ht

ont, and J. BiNet," DefenceM-2010-140,A1b.pdf.

ur SASNet," 01 Dec 2014,

ealing AutonoNodes Using

A-TR-2008-02

port Protocol pour les appat Canada, OttCentre, Ottaw2014, AvailabA1b.pdf.

ignal ProcessMacDonald D

-2009-010, 01

e Robots for AExposition, A

dy of the Effeon," Defence emorandum DS/unc87/p531

, I. Bojanovaacy, vol. 14, n

ng, A. Nallanphysical layeProcessing (

malainen, andireless-netwoR, pp. 11–20,

hields, "Concanada – Centr

RDC-CORA-Ttml.

ird, "Experime R&D Canad 01 Aug 2010

Defence ReseAvailable: htt

omous Sensorg Distributed M20, 01 Jan 200

for Resource areils de commtawa Research

wa ON, Contrable: http://crad

sing AlgorithmDettwiler and1 Jan 2009.

Adaptive andAIAA SPACE

ectiveness of tR&D Canada

DRDC-CORA821.pdf.

, and R. Kuhnno. 1, pp. 37–

athan, M. Elker security," in(WCSP), 2015

d N. Shapira, rks–existing a, 2013.

cept of Operatre for OperatiTM-2008-052

ments and analda, Ottawa ON0, Available:

earch and Dettp://candid.dr

r Networks (SMaps," Defen08, Available

Constrained munications ah Centre, Ottaact Report, dpdf.drdc-

ms: Part 1," Dd Associates L

d MultifunctioE Forum, Pasa

the Self-healia – Centre for

A-TM-2009-0

n, "Learning I–46, 2016.

kashlan, and Sn 2015 Intern5, pp. 1–5: IE

"Active and and potential

tions for the Sional Researc2, 01 Jul 2009

lysis of stand-N (CAN), Tehttp://cradpd

evelopment Crdc-

SASNet): Stunce R&D Cane: http://candi

Nodes / Un Paux ressourceawa ON

Defence R&DLtd, Dartmout

onal Tasks," padena, Califor

ing Autonomor Operational

019, 01 Jul 20

Internet-of-T

S. Lambotharnational ConfEEE.

passive eaves future counte

Self-healing ch and Analys9, Available:

-alone GPS fochnical

df.drdc-

anada, Scient

udies on nada – Ottawaid.drdc-

Protocole de s limitées,"

D Canada - th NS, Contra

presented at thrnia, 2008.

ous Sensor l Research an009, Available

hings Securit

ran, "Safeguarference on

sdropper threermeasures–a

13

sis,

or

tific

a,

actor

he

d e:

ty"

rding

ats a

Page 16: DRDC-RDDC-2017-L276 - DOCUMENT

14

[89] P. Pfor Ubiqu

[90] DoDDefense, C

[91] X. ZHelicopterElectronic

[92] DoDTRADOC

[93] P. LGeospatiaDefense aTechnolog

[94] P. LPan-TTCPp. 44 slide

[95] P. LSituation A(SET) PanRTA-SET-

[96] P. L5th InternCanberra,

[97] R. A"Applied VRTO-EN-

[98] S. Atransmitte

[99] J. Mand futuredefense inmilitary-d

irinen, "A briitous Connec

D CIO, "DoD Chief Informa

Zhang, B. Xiar in a GPS-Decs, vol. 62, no

D, "IntroductiC ATDO-A, F

Labbé, L. Lamal Informationnd Business Cgies (TRACK)

Labbé, "CollabP Workshop oes.

Labbé, L. LamAwareness (Snel Symposium-104, Antalya

Labbé and R. Pational CommACT, Austra

A. Van den BVehicle Tech-AVT-131, 01

Adee, "Wireleers," IEEE Spe

Mariani, B. Wie of the IoT inndustry. Availdefense-indust

ief overview otivity (5GU),

Policy Recomation Officer

an, B. Zhao, aenied Environo. 10, pp. 6392

on to tactical Fort Monroe, V

mont, Y. Ge, an in Complex Continuity (IC), Santa Clara

borative Blueon the Robust

mont, Y. Ge, aSA) in Complm on Militarya, Turkey, 200

Proulx, "Impamand and Conalia, 2000, p.

Braembusschehnology Panel1 Dec 2005.

ss sensors thaectrum, vol. 4

illiams, and Bn the military;lable: https://dtry.html.

of 5G researc2014, pp. 17–

mmendations(CIO) Decem

and Y. Zhang,nment Using 2–6403, 2015

digital informVA 2000.

and L. Li, "CrTerrains," in

CGD&BC), Fa, California,

-forces Tracktness and Vul

and D. Arden,lex Terrains,"y Capabilities07, p. 20.

act of Systemntrol Researc36: CCRP.

e, "Micro Gasl," Research a

at live forever47, no. 2, pp.

B. Loubert, (2; The Internetdupress.deloit

ch activities," –22: IEEE.

for The Intermber 2016.

, "AutonomouOn-Board Vi

5.

mation link J

reating a Dynaproceedings

First Internati2007, p. 13: I

king and Beyolnerability of

, "Cooperativ in proceedin

s Enabled by A

ms and Informach and Techno

s Turbines – Aand Technolo

r; Energy harv14–14, 2010.

015) 6 July, Ct of Things intte.com/dup-u

in 2014 1st I

rnet of Thing

us Flight Conision," IEEE T

and quick ref

amic Picture of the Interna

ional WorkshoIEEE.

ond," ed. DRDNetwork Cen

ve Blue-force ngs of the SenAdvances in N

ation Qualityology Sympos

A Short Surveogy Organizat

vesters and ra.

Continuing thn defense. Theus-en/focus/in

International

s (IoT)," U.S

ntrol of a NanTransactions

ference guide

of Network Pational Confeop on Trackin

DC Ottawa: pntric Warfare

Tracking (BFnsors & ElectrNavigation Se

y on Mission Esium, 5th ICC

ey of Design tion, Neuilly-

adioisotopes f

he march: Thee Internet of Tnternet-of-thi

Conference o

. Department

no Quadrotor on Industrial

(TADIL J ),"

Participant erence on Glong Computing

proceedings o2007,

FT) and Shareronics Technoensors, NATO

EffectivenessCRTS. 2000.,

Problems," insur-Seine (Fr

fuel tiny

e past, presenThings in the ngs/iot-in-

on 5G

of

l

" HQ

obal g

of the

ed ology

O

," in

n rance)

nt,

Page 17: DRDC-RDDC-2017-L276 - DOCUMENT

Annex

Quote fromas a naturanew markmodern cconnectio

People: CExamples

Things: Pfrom other

Data: Rawmechanismhours per

Processesuse of smacustomers

IoE establemployedInternet ofeventually

From the scommuniccontrol, ro

12 https://wdate: 20 Ap

Intx A

m Sarah Wheal developme

keting domainconnectivity tons imaginab

Considered as include socia

Physical sensor sources. Exa

w data analyzms. Examplesday to evalua

s: Leveragingart fitness devs.

lishes an end- across all conf Digital, Induy constitute a

same source wcation betweeobotics, and o

www.iottechexppril 2017).

ternet of

eeler12, 20 Jannt of the IoT

n, IoE encomptechnology u

ble:

end-nodes coal networks, h

ors, devices, aamples includ

zed and proces include tempate room cool

g connectivityvices and soci

-to-end ecosynnectivity useustrial Internesubset of IoE

we find: “M2en machines wother applicati

po.com/2016/0

f Everyth

nuary 2016: “Amovement anpasses the wi

use-cases. IoE

onnected acrohealth and fitn

actuators and de smart therm

ssed into usefperature logs ling requireme

y among data, ial networks t

stem of connee-cases. Any et of Things,

E if not consid

2M is more rewithout humaions involving

1/m2m/ioe-vs-

hing (Io

Although thend is largely aider concept

E comprises o

oss the Interneness sensors,

other items gmostats and g

ful informatioconverted int

ents.

things and peto advertise re

ectivity inclufurther classicommunicati

dered as such

cently referrean interventiong device-to-d

-iot-vs-m2m-w

E)

e concept of Inassociated wit of connectivf four key ele

et to share infamong others

generating datgadgets.

on to enable into an average

eople to add velevant health

uding technoloifications—suon technologalready.”

ed to technolon. Examples i

device commu

whats-the-differ

nternet of Eveth Cisco’s tac

vity from theements inclu

formation ands.

ta or receiving

intelligent dece number of h

value. Examphcare offering

ogies, processuch as Internegies and the In

ogies that enainclude telemunications.”

rence-and-does

erything emerctics to initiate perspective uding all sort

d activities.

g information

cisions and cohigh-temperat

ples include thgs to prospect

ses and conceet of Humans,nternet itself—

able metry, traffic

s-it-matter/ (Ac

15

rged te a of

ts of

n

ontrol ture

he tive

epts ,

—will

ccess

Page 18: DRDC-RDDC-2017-L276 - DOCUMENT

16

Annex

From initiby Baron code to cocomputer)today IoT set up a dysystems")

The first dcomputersSeptembeWhirlwindand the sy

The birth Transmissits componto the smathe DefenUniversitythe Commprotocol aassign an another 10poor qualisuch as Qoencryptioncontributeservice/ne

All of thissystems cosuch advaexample fversion of6LoWPANinformatio

13 https://w14 https://en15 https://en16 https://w17 https://to18 The auth19 https://w

Timx B

ial technologiSchilling in R

ommunicate o) connected to(1964: In Un

ynamic by wh.

digital commus included ther 1950, a “mid using a cust

ystem digitize

of Internet16 ision Control Pnents as IP la

all number of ce Research Ey of Rocheste

munications Rallows for 2128

IPv6 address 00+ earths.” Iity of service oS information in mind. It pes to detect, metwork denial,

s information ould benefit o

antages due tofor IoT protocf the Internet PN, therefore, on wirelessly

www.postscapesn.wikipedia.orgn.wikipedia.org

www.postscapesools.ietf.org/htmhor of this SL cwww.link-labs.c

meline a

ies using electRussia, and inover a distanco a network (nderstanding Mhich all previo

unications wee military radaicrowave earlytom interface d the radar in

is linked to thProtocol (TCPabel (aka, add

IPs availableEstablishmener were complResearch Cent

8 (approximatto every atom

It evolved from(QoS) manag

on sharing andprovides more

monitor, prote, degradation

is critical to sof the inhereno malevolent acols is 6LoWPProtocol (IPvallows for theusing a secur

s.com/internet-g/wiki/Computg/wiki/Semi-As.com/internet-ml/rfc1020 (Accontributed to tcom/blog/6low

adapted

tromagnetic sn 1833 Carl Fre of 1200 m w1990 by JohnMedia Marshous technolog

ere for defencar system Semy-warning raddeveloped by

nformation an

he ARPANETP) and the Intress). Then in

e under IP vert Network, Dleted under ther (CRC) Otttely 340 undem on the surfam the IPv4 wgement and sed managemene means to coct, analyze anand disruptio

show that pubnt potential froactions to injePAN19, “a somv6) and Low-pe smallest devre Internet pro

-of-things-histoter_network (A

Automatic_Grou-of-things-histoccess date: 18 Athe early evolut

wpan-vs-zigbee

from IoT

signals (1832riedrich Gauswithin Göttin

n Romkey), vihall McLuhan gies, including

ce systems (Inmi-Automaticdar system at y Forrester's t

nd successfull

T born in 1969ternet Protocon 1984 the Dorsion 4 (IPv4)RENET17 Ca

he scientific atawa. In 2011ecillion) addreace of the eart

with the intent ecurity, so IPvnt, multicastinombat cyberatnd defend agaons [11–13].

blic safety andom pervasiveect false informewhat contopower Wirelevices with limotocol.”

ory/ (Access daAccess date: 18und_Environmory/ (Access daApril 2017). tion of IPv6. (Access date:

T histor

: An electromss and Wilhel

ngen, Germanisionaries hav

n stated: "....byg cities, will b

n the late 1950c Ground Envt Hanscom Fieteam. An aircly sent it to W

9. The concepol (IP), TCP/Iomain Name ). During thatanada REF ARauthority of Pa, IPv618 was pesses or as Steth, and still ht to correct itsv6 was born wng, authenticattacks and netainst network

d defence IoTe IoT capabilitrmation or denorted acronymess Personal Amited processi

ate: 18 April 28 April 2017).ment (Access da

ate: 18 April 2

18 April 2017

ry13

magnetic teleglm Weber inv

ny.) to the firstve predicted thy means of elbe translated

0s, early netwvironment (SAeld was conn

craft was flowWhirlwind15.”

ptual ARPANIP, with uniquSystem (DNSt period the keRPANET conaul Labbé whpublicly launeven Leibson

have enough as various weakwith improveation, securitytwork exploitinfiltrations p

T augmented ties while prenial of servic

m that combinArea Networking ability to

2017).

ate: 18 April 22017).

7).

graph was crevented their owt thing (not a he evolution lectric media, into informat

works of AGE)14.): In ected to

wn past the sit

NET evolved ue identificatiS) was createdey componennnected via hile seconded ched - The ne

n put it, “we caddresses left knesses such

ed capabilitiesy, privacy andtation. It preventing

information eventing deniaes. A good

nes the latest ks (LoWPANtransmit

017).

eated wn

of we

tion

te,

the ion of d due

nts of

to ew could

to do as

s d

al of

N).

Page 19: DRDC-RDDC-2017-L276 - DOCUMENT

The very fa big imparequired atheoreticaoperations

Index IS

1 BE

2 DE

3 CH

4 U

5 GR

6 LU

7 PT

8 GB

9 IN

10 JP

11 FR

12 CA

13 EC

14 PE

15 IE

16 EE

17 M

18 NO

19 FI

20 AU

21 TT

22 BR

The transiCurrently

20 http://w21 https://la

fixes that havact on the funan increasingll. They are has including gr

Table B.1:

SO-3166 Code

E 1

E 7

H

S 28

R

U

T

B 6

N 46

P 11

R 5

A 3

C

E 1

E

E

MY 2

O

I

U 2

T

R 13

ition is not eaorganizations

ww.digit.fyi/i

abs.apnic.net/di

ve kept IPv4 gnctionality or y complex seaving a real imrowth, perform

: IPv6 adoptio

Internet Users

V

10109309

70971603

7353067

88324176

7063611

553892

6915955

60555720

65606607

14900869

56039156

32326774

7135628

13141549

3838543

1194349

21296431

5207437

5121012

20887921

945247

39942445

asy. Table B.1s have to run

ipv6/ (Accessists/v6dcc.html

going have intthe operation

et of fixes andmpact on busimance, manag

on, Date: 18 A

V6 Use ratio

V6

55.32 5

42.05 29

34.66 2

33.53 96

33.37 2

31.73

26.74 1

24.84 15

24.72 115

21.67 24

18.70 10

18.33 5

18.32 1

18.32 2

18.14

17.11

15.52 3

14.78

14.52

14.30 2

13.81

13.74 19

1 shows 22 coin parallel the

s date: 18 Aprl (Access date:

troduced a prn of the Internd bodges to keinesses todaygeability, sec

Apr 2017 (Fir

6 Users (Est)

Pop

5592492 11

9844102 80

2548818 8

6674350 325

2357278 10

175765

849045 10

5040627 65

5074864 1337

4902102 126

0478733 64

5924606 36

307589 16

2407295 32

696496 4

204335 1

3305986 31

769895 5

743597 5

2987394 24

130549 1

9231305 210

ountries rankee IPv4 stack a

ril 2018). : 18 April 2017

roliferation ofnet. We are meep it functiony. They impaccurity, flexibil

rst 22 IPv6 U

pulation Cou

1422949 Belg

0649549 Germ

8432417 Swi

5790030 Unit

0900635 Gre

581820 Lux

0276308 Port

5394947 Unitand

7950022 Indi

6126092 Japa

4860135 Fran

6527429 Can

6555983 Ecu

2052560 Peru

4738942 Irela

1306728 Esto

1044361 Mal

5313712 Nor

5536230 Finl

4545149 Aus

1367942 Trin

0756695 Braz

ed in term of tand IPv6 stac

7).

f problems thaoving to IPv6ning. These pct many areaslity and reliab

Users by Coun

untry

gium

rmany

itzerland

ted States of

ece

xembourg

tugal

ted KingdomNorthern Ire

ia

an

nce

nada

uador

u

and

onia

laysia

rway

land

stralia

nidad and Tob

zil

their use ratiock.

at are now ha620: “IPv4 hasproblems are n of Internet

bility.”

ntry)21.

America

m of Great Britland

bago

o of IPv6.

17

aving s not

tain

Page 20: DRDC-RDDC-2017-L276 - DOCUMENT

18

Annex

From the ctechnologfollowing of real-tim

The U.S. DOffice (ITof transpoelectronic infrastructbetween aradio rangexpand thsupervisio

Fig

22 https://w23 Authorizin Canada: Governmen

Emx Can

civilian side wies and relatepaper about a

me recommen

Department oTS JPO) is resort to advance

and informatture (V2I) and

all modes of trge of several ke wireless net

on.

gure C.1: Decommuni

www.its.dot.govzed use by Ken

A Knowledgent Conference

merging d future

we currently fed ecosystemsan IoT platforder systems.”

of Transportatsponsible for ce transportatiotion technologd vehicle-to-vransportationkilometers alotworks with m

edicated shortications will a

v/factsheets/ITnneth Leonard, e-Building WorCentre, 111 Su

applicae capabi

find a varietys [43–46]. It crm for smart t”

tion (USDOTconducting re

on safety, mobgy applicationvehicle (V2V. ITS IoT devong roads andmultiple conn

t-range commallow connect

SJPO_overviewDirector, ITS

rkshop; Transpussex Drive, O

tions (blities

y of medical ocan also be aptourism [47]:

T), Intelligent esearch on behbility, and envns, known as ). Wireless co

vices and gated intersectionsnections to a w

munications (Dtivity between

w.htm (AccessJPO during the

port Canada / Dttawa, 8–9 Ma

both civi

or hospital serpplied to touri “The role of

Transportatiohalf of the Devironmental sITS22. ITS Io

ommunicationeways operatis as illustratedwire USDOT

DSRC) at 5.9 n all modes of

s date: 21 Aprie workshop: Tr

Defence Researarch 2017.

lian and

rvices augmenism as discusf an IoT platfo

on Systems, Jepartment on sustainability oT includes vns will allow ing at 5.9 GHd in Figure Cnetwork for a

GHz and othf transportati

il 2017). ransforming Rrch and Develo

d military

nted by IoT sed in the orm in the des

Joint Programall major mothrough

vehicle-to-connectivity

Hz offer wireleC.1. Then theyanalytics and

her wireless on23.

Road Transportaopment Canada

y)

sign

m odes

ess y

ation a,

Page 21: DRDC-RDDC-2017-L276 - DOCUMENT

Several exHowever, Figure C.

Figu

Another ecounter-unthe comba

xamples couldthe proliferat2 from [5].

ure C. 2: Exa

xample is fornmanned aircatant of the fu

d be found in tion of device

mples of IoT L

r the dismouncraft system (Uuture.

the IoT devees and applica

devices and aLabbé-Lamas

nted combatanUAS) and phy

eloper survey ations of IoT

applications fs, 15 Februar

nt as describedysiological st

from IEEE, Atechnologies

from [5] (Perry 2017).

d in [5] whertatus monitor

Agile and IoTis best illustr

rmission from

re new capabiare included

T Eclipse [39]rated by

m the authors;

ilities such as in Figure C.3

19

].

3 for

Page 22: DRDC-RDDC-2017-L276 - DOCUMENT

20

24 Illustratio

on from [5]. Pe

Figur

ermission from

e C.3: Soldier

m the authors; L

rs of today an

Labbé-Lamas,

nd the future2

15 February 20

24.

017.

Page 23: DRDC-RDDC-2017-L276 - DOCUMENT

Annex

There are groups havWide WebEPCglobaTelecomm

There are Informatiovariety of a person [essential adomotics passumed tconnectivia Canadia[49].

In order toconsider thas that def(COMSECmaking it knowledgradio comone tries tprobabilitypower is ie.g., usingLPD [70].

Typical japrotocol aAuthors’ ijamming owith modeClassificathe buildincommon m

25 https://aw26 http://ww27 https://bu28 “interfereusing the mhttp://www29 https://ca

Emx D

no IoT recogve been creatb Consortiumal, Institute ofmunications S

specific obligon Protection f IoT devices (48]. In comba

and would be purposes via that most of thity to their res

an public safet

o tackle the brhe three dimefending againC) as that keedifficult for se of accurate

mmunication iso achieve a loy of exploitatncreased to c

g more coding. With a lowe

ammer capabiand error correintent of the jor anti-jammiern electroniction (CAPECng of secure smethods used

ws.amazon.comww.rogers.comusiness.bell.ca/ence suppressi

minimum meanw.ece.utah.edu/apec.mitre.org

merging

gnized policy ted to provide

m (W3C), Intef Electrical antandards Inst

gations identiand Electron

(e.g., physioloat situation mprotected accplatform provhe IoT of intespective operty broadband

road subject oensions of wirnst unauthorizeping importasomeone to inwaveforms, ms to detect, inow probabilitytion (LPE) anombat jammi

g gain and sprer LPD comes

ilities allow dection capabiamming taxoing strategies c warfare.” ThC)29 which “is software. Eacd to overcome

m/iot-platform/

m/enterprise/pro/shop/enterprison for direct se

n squared error /~ece6961/proj(Access date: 2

policies

and standardse protocols in rnet Engineer

nd Electronicsitute (ETSI).

fied in Canadnic Documentogical status m

monitoring heacordingly. Thviders such aserest in a contrational netwo

communicati

of security or reless commu

zed access to oant communicntercept or intmodulation sc

ntercept, exploy of detection

nd better anti-jing then the Lread the signas usually lowe

devising an evlities of the c

onomy paper [within a larg

he authors refa catalog andh attack patte

e that challeng

/ (Access date:oducts-and-soluse/machine-to-mequence spread(MMSE) perfoect/madhow_M22 April 2017)

s and sta

s so far. Somesupport of th

ring Task Fors Engineers (I

dian and Provts Act (PIPEDmonitors) colalth and stress

his is quite difs AWS25, Rogtext of public orks or future ions network

cybersecurityunication secuor modificatio

cations secureterfere with rachemes, and coit, and jam thn (LPD), low jamming. On

LPD will suffeal28 in order toer LPI and LP

ven better jamommunicatio[58] is “to hel

ger context of fer to the Comd taxonomy oern provides age, and recom

23 April 2017utions/internet-machine-manad-spectrum codformance criterMMSE_94.pdf).

andards

e standard orghe IoT includirce (IETF), EIEEE) and the

vincial legislatDA) that needllect informats level of eachfferent from ugers26 or Bell security and ones such asexpected to o

y [5, 7, 15, 16urity, i.e., infoon of informa

e; and transmiadio communcoding [57]. The communicprobability o

ne of the challfer. So other ao both combaPE.

mmer strategy on to disturb, tlp researchers

f known stratemmon Attack of cyber-attacka challenge th

mmended meth

7). -of-things (Acc

agement-centrede-division murion.” f (Access date:

s

ganizations [3ing efforts ledlectronic Prode European

tions such as d to be considetion that can bh combatant

using IoT for services27. Indefence use w

s the network operate in the

6, 18, 26, 50-ormation secuation; commuission securitynications withThe basic stracation signalsof interceptionlenges is if theapproaches haat jamming an

by deducing this is protocs place newlyegies in a wayPattern Enumk patterns, cr

hat the attackehods for mitig

cess date: 23 Ae (Access date:ultiple-access (C

25 April 2017

36] and differd by the Worlduct Code (E

the Personal ered when a be used to idecan be considcommercial o

n this section wireless architecture f

e 700 MHz ba

69] we have turity (INFOSEunications secy (TRANSEC

hout prior ategy against . To counter tn (LPI), low e transmitter

ave to be sougnd obtain a low

the type of ol jamming.

y discovered y that is consimeration and eated to assiser must overcgating the att

April 2017). 23 April 2017CDMA) system

7).

21

rent ld

EPC)

entify dered or we

for and

to EC)

curity C)

a these,

ght, wer

istent

st in ome, ack.”

7). ms

Page 24: DRDC-RDDC-2017-L276 - DOCUMENT

22

For exampaccuracy rin order toreceiving

More infoIn additionnetworks propagatio

Next we hsufficient.protect theapproacheand type okeys over to increase

Further coaddressed

ple, performarequire using o counter intespectrum as s

ormation aboun we have to [23, 63, 64, 6on, interferen

have to consid. In such casee informationes will not be of OS selecteda large numb

e security at t

onsiderations in a separate

ance improvemsystem and nrference or jaseen by the w

ut radio commconsider the s

68, 78–85] whces and noise

der the INFOSs encryption,

n. Given the smcompatible w

d as demonstrber of low costhe physical la

of cybersecur document.

ments in termnetwork self-aamming. Thes

wideband front

munication jamsignificant re

hich offer an ae.

SEC and COMrandomizatio

mall size of awith the availarated in [86]. st IoTs via wiayer (PHYLA

rity and cyber

ms of energy eawareness at vse networks mt end of their

mming and nesearch and finadaptive appr

MSET aspecton and utilisata large numbeable hardwareAlso this crea

ireless links [3AW) [35, 87–

rwarfare are b

efficiency, datvarious layer

may share QOSDR from ea

etwork securindings on selroach to coun

ts assuming thation of blockcer of IoTs, it ie capacity (coates a big cha36, 61, 86]. O

–89].

beyond the sc

ta streaming slevels of the

OS informatioach participan

ity could be flf-healing netwnter jamming,

hat TRANSEchain should is possible thaomputing andallenge in manOther studies s

cope of this S

speed and IoT stack [71

on about the nt location.

found in [58, 6works and senadverse

C was not be sufficient

at these d memory sizenaging cryptoshow techniq

L. It needs to

1–77]

64]. nsor

to

e) o

ques

o be

Page 25: DRDC-RDDC-2017-L276 - DOCUMENT

Annex

Case Stu

IoT Uses

The very deployingsituationaConnectecapabilitiedominatecapabilitieremote frback to th

Threats

Imagine thacking ithe enemorganizatdangerouwarfighteto take adinto the w

Recomm

Prioritize ensuring (and combroader a

Regardingand IPv6 stoto underinformatioresearch.”

There are resistance

30 https://w

Scx Epu

udy: Battle

s and Pote

small size ag in low powal awarenessed into commes greatly aue the enemy es, real timerom the batthe warfighte

and Vulne

that the enento or comp

my to providetions; makinusly. At the ser, giving thedvantage ofwarfighter de

mendation

addressing that the info

mmunicate tharray of pote

g the transitiostack. “The Inrtakes this maon-stealing, ac”30

some ThingWto tampering

www.infosecuri

cenario eblicatio

efield Situat

ntial Benef

and low cost wer networkss, giving themunications ugment theiin difficult e

e situational tlefield, allowers, again inc

rabilities

emy takes adpromising thee false informg decisions asame time, tem the advaf the confusioecision maki

the highest ormation is ehese changeential device

n from IPv4 tnternet Protocassive sea chaccording to N

Worx works ing (intentional,

ity-magazine.co

examplen [90]

tional Awa

fits

of sensing as in forward em real powecapabilities r ability to eenvironmentinformation

wing advice creasing the

dvantage of ese devices mation to thand actions,they can alsoantage of theon they having process.

risk vulneraencrypted w

es broadly) toes that could

to IPv6, currecol Version 6 ange, it opens NATO Cooper

n progress for malfunction

om/news/nato-

e excerp

areness

and communsituations toer to see arobuilt into the

execute theirts. With the acan be relayand addition

eir effectiven

vulnerabilitiand the infoe warfighter, and actionso see the infe situational e created th

bilities alreawhere neededo ensure sup be deployed

ently organiza(IPv6) transia wide scope

rative Cyber

r IoT tamper-or sabotage).

-ipv6-transition

pted from

nications devo provide waound cornerseir uniforms r missions anaddition of iyed to commnal big picturness.

es in the deormation ther and the sus they take eformation thawareness

hrough the in

dy installed d. Implemenpply chain rid with our t

ations have toition is well ue for potentialDefence Cen

-resistant com. These could

n-opens-up/ (A

m a DoD

vices makesarfighters wis and acrossand armor,

nd effectivelmproved intmand and sure informatio

evices or netwey supply. Thpporting remeither unreliahat should haand further njection of fa

in mission snt policies anisk managemroops.

o run in parallunderway, andl attack vecto

ntre of Excelle

mponent (see nd provide som

Access date: 18

D policy

s them ideal th enhanced

s hostile terrthese y engage anternetworkinupport faciliton to be sen

working, his may allowmote ably or ave gone to allowing thealse informa

systems, sucnd processesment of a

lel the IPv4 std as the Internors for covert ence (CCDCo

note in [38]), me advantages

8 April 2017).

23

for d rain.

nd ng ties nt

w

the em ation

ch as s

tack net in

oE)

i.e., s to

Page 26: DRDC-RDDC-2017-L276 - DOCUMENT

24

public secrequiring

Figure E.1wireless cwireless Ioavoid selfprotocols,

An examp45 grams control de

Figure E

31 Authoris

curity and defimproved reli

1 illustrates thonnections aroT or IoBT (I

f-jamming and waveforms,

ple of things fand has a dia

emonstration i

E.1: An overviand

sation to use th

fence IoT systiability and se

he various wirre in real situaIoMT) deviced interferencemessages and

for such battlemeter less thain GPS-denie

iew of the Inted devices could

is illustration w

tems. Integratecurity.

reless connecation accompes. This require within the ald data formats

efield is a nanan 0.15 m thaed environmen

ernet of Battled communica

was provided b

ted circuit har

ctions betweenlished by diffres the develollowable radis.

no quadrotor hat was successnts, the Black

e Things as pate and collab

by the author (K

rdening is als

n battle thingferent radio copment of a ro spectrum in

helicopter whsfully employk Hornet [91].

presented in [2borate on the

Kott-Labbé, 13

so available fo

gs in a typical ommunicatio

robust commun addition to t

hich weighs abyed in autonom.

24], where a battlefield31.

3 April 2017).

or systems

battlefield. Ton systems anunication planthe multiplici

bout only mous flight

variety of sys

These nd n to ity of

stems

Page 27: DRDC-RDDC-2017-L276 - DOCUMENT

Annex

There is a more specthe follow(TADILs)success ra

“Track Ideplatform, psurveillanmanagemedata systemreceive pogenerate nIn additionelectro-op

So a trackbattlefieldremote fromake trackthe result timely andinterceptioabout 40%certainly vbehind thelocation lisurveyed a

In the revi(the sensovalue of apowered bdata at higpoint or seneed IoT wcapacity fenergy fro

32 Identifica33 Joint tactsequence nsecondary J34 Network35 www.adt

Rex F

variety of ancifically in dig

wing discussio) [92]. Impactate have been

entification: Tplatform activce function faent informatioms (TDSs) th

osition informnear real-timen to radar trac

ptical, can also

k could be relad. From some om the sensork data almostinstantly forwd useful data on in referenc

%. But these pvalid for a lare next corner,ike a meter. Ina priori.

iewed materiaor) when possctionable info

by batteries, igh rate versuseries thereof. with more com

for a given perom the enviro

ation, friend ortical informatio

number, transmJU address, tra

k Participation Gtdl.army.mil in

elation b

nalytics that hgital military on here is an et of the positioreported base

Track identifivity, specific all into three gon, and positi

hat support sumation and stae track reportscks, other typo generate rea

ated to statistiprevious exp

rs, the resultint useless. Whewarded to tactfor real-time ce studies [96percentages dorge variety of , there is a neen a building o

al on IoT systible in order tormation at th.e., one needs

s the energy reThis also poimputing capariod without rnment such a

r foe (IFF). on distribution

mission mode, track number bloGroups (NPGs

n Tadil J (Acce

between

ave been devinformation s

excerpt from aonal accuracyed on the anal

ication is repotype, or natiogeneral areasional referenc

urveillance noatus directly frs that are exchpes of sensorsal-time track r

ical time serieperiences, wheng data sufferen the analytitical operatorsdecisions and] were in excon’t translate scenarios. Foed for data upor a tunnel thi

tems the trendto improve thhe tactical levs to estimate tequired for prints to the factabilities and bre-supplying.as from solar p

n system (JTIDrack numbers,

ock. s). ess date: 24 Ap

analytic

eloped and tesystems are rea reference doy, dead reckonlyses of vario

orted on TADonality….Surv: track and tra

ces, which incormally use acrom TADIL Changed with J, for examplereports to be

es when tryinen analytics (r from some tiics and pre-prs (or autonomd actions. Theess of 50% wwell from on

or CUE when pdates with smis becomes ev

d is to move dhe (timeliness vel. Trade-offsthe amount ofrocessing the t that if we w

buffer memory This could bpanels, some

S) unit (JU) asterminal outpu

pril 2017).

cs and t

ested so far buelated to trackocument on thning and time

ous military ex

DIL J as an enveillance: Meack amplifyinclude points, ctive sensors, C or TADIL JJTIDS33 on the, signal intellshared on the

ng to follow th(man operatedime lateness, rocessing are

mous actuatore improvemen

when the averane scenario to tracked oppomall delays likven more chal

data processin and position

fs need to be mf energy requraw data and

want secure coy space, and c

be curbed whefuel and ener

ssignments—JUut, user type, in

track dat

ut some that hk data. In ordhe subject of eliness of tracxercises [93–

nvironment, idessages that sng informatiostrobes, and fsuch as radar

J participantshe surveillancligence, infrare surveillance

he movementd or autonomosometimes wdone close to

rs), it is expecnt of the succage delay was

o another one osing entities ke one secondllenging if the

ng of raw sennal accuracy fomade when seuired to transmd sending a cleommunicationconsequentlyen the IoT courgy efficient n

U address, partnitial entry iden

ta

have been useder to understa

tactical data ck data on mis–95].

dentification, upport the n, track fixes. Tacticar or IFF32, or . These TDSse NPG”34. red, and

e NPG.35

t of entities inous) are far

with delays thao the sensors acted to obtainess rate of s reduced by but this trendare lurking d and precisioe area was no

nsor data to thfor moving tarensors are mit a lot of rawean track datans in additiony more energyuld scavenge network proto

ticipant type anntification,

25

ed and links ssion

al

s

n a

at and more

d is

on ot

he IoT rget)

w a , we

y

ocols

nd

Page 28: DRDC-RDDC-2017-L276 - DOCUMENT

26

[18, 20, 52Such harv

In [99] thetechnologof integratfound a coawareness(although intelligenchave leanesecure govapplicatio

If some ofwith existdata with the friendlin Figure F

36 Piezoelecpower budgenergy to a100 years, 37 Central I38 Frank KoFebruary 1community39 Link 16 iTactical Dapicture in n40 NATO Im

2, 62, 97]. Otvesters do not

e authors use ies to developting IoT sensiost reduction s improvementhis assumes

ce leaders haved on civilianvernment netwns is, potentia

f the analyticsing military tvarious elemely and opposiF.1.

ctric or microeget of betweenachieve a 5-mWthe device cou

Intelligence Agonkel, “The CI0, 2015, www

y/105054/, (Acis a military taata Links. Withnear-real time. mproved Link

ther alternativproduce enou

an informatiop an understaning and actuafor the infrast

nt could be acan increase i

ve followed sun expertise, wworks.38 Thusally, already i

s are closer oractical data syents in a battling forces try

electromechanin about 0.1 micW RF pulse eveuld function autgency (CIA). IA is bringing A.defenseone.co

ccess date: 27 Mctical data exchh Link 16, mili

Eleven (NILE

ves exist but ough power fo

on value loopnding of the v

ating in suppotructure. Usin

chieved with ln the surface uit: The CIA3

orking with cs, the infrastruin place.”

r integrated inystems, like Llefield. That cto use the pu

ical systems (Mcrowatt and 1 mery three minuttonomously, ac

Amazon’s marom/technology/March 2015). hange networkitary aircraft as

E) Program.

often for very r most of our

p comprising evalue to opera

ort to military ng cost reductlow security rthat could be

37 and Defenscommercial coucture for dea

n IoT sensors Link 1639 (or Ncould be diffeublic Internet t

MEMS) cantilevmilliwatt. The dtes. Most impoccording to Lal

rketplace to the/2015/02/cia-b

k used by NATs well as ships

low power br applications.

elements abouations, risk andecision mak

tion from IIotrisk from the e the object ofse Informationompanies to baling with the

it will make NILE40, aka L

erent from theto their respe

ver convert medevice was ablortant, because l and Tin, for a

e intelligence cbringing-amazo

TO. Its specificaand ground for

budget as desc.

ut value drivend advantagesking and opert they observeincreased numf cyberattacksn Security Agbring the cloue data volume

it easier to coLink-22), thae view of cybeective advanta

echanical motie to create suffthe half-life of

about that long

community,” Dons-marketplac

ation is part ofrces may exch

cribed in [98]

ers, stages ands, and overallrations. They e that battlespmber of things). “Defense agency (DISA)ud and softwae of tactical Io

ombine such dat exchange trerwarfare whages as illustra

ons into electrificient output f Ni‑63 is just

g: [98].

Defense One, ce-intelligence-

f the family of ange their tacti

36.

d l cost

pace gs and )

are to oT

data ack

here ated

icity a

over

-

ical

Page 29: DRDC-RDDC-2017-L276 - DOCUMENT

Figurethrou

IoBT may“human wIoBT’s comaking usa well-adaprocessinginformatio

Even durinand uses ailluminatio

41 Authoris

e F.1: Examplugh the civilia

y involve somwarfighters unomplexity andseful sense ofapted IoBT syg to exploit thon suitable to

ng cyberattacan applicationon flare could

sation to use th

le from [24] wan Internet of

me overwhelmnder extreme cd the informatf this massiveystem should he raw data fr

first respond

cks one can acn to detect if id be used to c

is illustration w

where combatf Things (gray

ming cognitivecognitive andtion it will pro, complex, anprovide conc

rom the multitders or combat

ccess a surveit has been tem

check if the ba

was provided b

tants (red andy nodes), to wh

e load if the syd physical streoduce. The Iond perplexingcise actionabletude of sourcetants.

illance street mpered or if tackground lig

by the author (K

d blue nodes)hich they will

ystems are noess will be stroBT will haveg ocean of infoe informationes and sensor

camera on ththe video feedght changes.

Kott-Labbé, 13

) perform cybl be inevitably

ot well designrongly challene to assist humormation”. Th

n by using anars available to

e civilian Inted is real or sub

3 April 2017).

erattacks pary connected41

ned. In fact nged by the mans in hat means thaalytics and otho produce

ernet of Thingbstituted, also

27

rtly 1.

at her

gs o an

Page 30: DRDC-RDDC-2017-L276 - DOCUMENT

CAN UNCLASSIFIED

CAN UNCLASSIFIED

DOCUMENT CONTROL DATA (Security markings for the title, abstract and indexing annotation must be entered when the document is Classified or Designated)

1. ORIGINATOR (The name and address of the organization preparing the document. Organizations for whom the document was prepared, e.g., Centre sponsoring a contractor's report, or tasking agency, are entered in Section 8.)

DRDC – Corporate OfficeDefence Research and Development Canada60 Moodie Drive, Ottawa Ontario,K1A 0Z4Canada

2a. SECURITY MARKING (Overall security marking of the document including special supplemental markings if applicable.)

CAN UNCLASSIFIED

2b. CONTROLLED GOODS

NON-CONTROLLED GOODS DMC A

3. TITLE (The complete document title as indicated on the title page. Its classification should be indicated by the appropriate abbreviation (S, C or U) inparentheses after the title.)

Internetworking of things (IoT) and implications for Canadian Armed Forces

4. AUTHORS (last name, followed by initials – ranks, titles, etc., not to be used)

Labbé, P.

5. DATE OF PUBLICATION (Month and year of publication of document.)

February 2018

6a. NO. OF PAGES (Total containing information, including Annexes, Appendices, etc.)

27

6b. NO. OF REFS (Total cited in document.)

99

7. DESCRIPTIVE NOTES (The category of the document, e.g., technical report, technical note or memorandum. If appropriate, enter the type of report, e.g., interim, progress, summary, annual or final. Give the inclusive dates when a specific reporting period is covered.)

Scientific Letter

8. SPONSORING ACTIVITY (The name of the department project office or laboratory sponsoring the research and development – include address.)

DRDC – Corporate OfficeDefence Research and Development Canada60 Moodie Drive, Ottawa Ontario,K1A 0Z4Canada

9a. PROJECT OR GRANT NO. (If appropriate, the applicable research and development project or grant number under which the document was written. Please specify whether project or grant.)

9b. CONTRACT NO. (If appropriate, the applicable number under which the document was written.)

10a. ORIGINATOR’S DOCUMENT NUMBER (The official document number by which the document is identified by the originating activity. This number must be unique to this document.)

DRDC-RDDC-2017-L276

10b. OTHER DOCUMENT NO(s). (Any other numbers which may be assigned this document either by the originator or by the sponsor.)

11a. FUTURE DISTRIBUTION (Any limitations on further dissemination of the document, other than those imposed by security classification.)

Public release

11b. FUTURE DISTRIBUTION OUTSIDE CANADA (Any limitations on further dissemination of the document, other than those imposed by security classification.)

Page 31: DRDC-RDDC-2017-L276 - DOCUMENT

CAN UNCLASSIFIED

CAN UNCLASSIFIED

12. ABSTRACT (A brief and factual summary of the document. It may also appear elsewhere in the body of the document itself. It is highly desirable that the abstract of classified documents be unclassified. Each paragraph of the abstract shall begin with an indication of the security classification of the information in the paragraph (unless the document itself is unclassified) represented as (S), (C), (R), or (U). It is not necessary to include here abstracts in both official languages unless the text is bilingual.)

___________________________________________________________________________

13. KEYWORDS, DESCRIPTORS or IDENTIFIERS (Technically meaningful terms or short phrases that characterize a document and could be helpful in cataloguing the document. They should be selected so that no security classification is required. Identifiers, such as equipment model designation, trade name, military project code name, geographic location may also be included. If possible keywords should be selected from a published thesaurus, e.g., Thesaurus of Engineering and Scientific Terms (TEST) and that thesaurus identified. If it is not possible to select indexing terms which are Unclassified, the classification of each should be indicated as with the title.)

Internet of Things (IoT), sensors, actuators, communications, near field communications; ARPANET; TCP/IP; IPV4 versus IPV6; Internet of Battle Things (IoBT); Military (IoMT); Industrial IoT (IIoT); Intelligent Thing (IoIT)