z-logo
open-access-imgOpen Access
Internet of Things Vulnerabilities in Military Environments
Author(s) -
Andreas Toth
Publication year - 2021
Publication title -
vojenské rozhledy
Language(s) - English
Resource type - Journals
eISSN - 2336-2995
pISSN - 1210-3292
DOI - 10.3849/2336-2995.30.2021.03.045-058
Subject(s) - adversary , computer security , drone , situation awareness , computer science , denial of service attack , internet of things , internet privacy , the internet , world wide web , engineering , genetics , biology , aerospace engineering
IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here