{"title":"未来军事战场信息网络的网络安全挑战","authors":"Dulik","doi":"10.3849/aimt.01248","DOIUrl":null,"url":null,"abstract":"This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks – the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":"14 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Cyber Security Challenges in Future Military Battlefield Information Networks\",\"authors\":\"Dulik\",\"doi\":\"10.3849/aimt.01248\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks – the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.\",\"PeriodicalId\":39125,\"journal\":{\"name\":\"Advances in Military Technology\",\"volume\":\"14 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Military Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3849/aimt.01248\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Military Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3849/aimt.01248","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
Cyber Security Challenges in Future Military Battlefield Information Networks
This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks – the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.