A Survey of Architectural Model for the Cyber Security of Internet of Military Things (IoMT) Devices
DOI:
https://doi.org/10.64290/bima.v9i2A.1149Keywords:
Internet of Military Things, Sensing devices, Munitions, Cyber-physical, Wearables devices.Abstract
The Internet of Military Things (IoMT) devices covers large range of devices that retain intelligent physical sensing and actuation capabilities through either virtual or cyber interfaces that are integrated into systems which are used in military operations and missions to provide situational awareness to troops. These devices include sensors, actuators, vehicles, robots, UAVs, wearable device, biometrics, munitions, armor, analytical devices and other smart technology. Although these devices and associated networks provide advantages to troops, it creates the downside of cyber security challenges with the potential threat that a malicious adversary might penetrate the networks and compromise, the devices, networks and classified information through its vulnerabilities along the layers of its architecture. He large number of these devices and the network through which they connect are the major targets for enemies and other cyber criminals. Over the years, various architectural design and models for IoMT have been proposed to help in curtailing the incident of cyber-physical attacks. The limitations of the IoMT device to support the implementation and enforcement of traditional security mechanism including the terrain the devices will be used offer fresh difficulty for the security of the military mission and the IoMT devices. These have led to serious researches in the domain of IoMT security especially using either machine learning (ML) or deep learning techniques and other technologies. This survey reviews existing architectural models and ML/DL based security model for IoMT devices. Also, a new architecture is proposed providing interface for various security policy implementations. Finally, the survey recommends the application of DL/ML in IoMT security by selecting suitable architectural models which are to be deployed across the layers of the network and the use of autonomic IoMT security models in military warfare and combat operations.