Skip to main content
Taylor & Francis Group Logo
Advanced Search

Click here to search books using title name,author name and keywords.

  • Login
  • Hi, User  
    • Your Account
    • Logout
Advanced Search

Click here to search books using title name,author name and keywords.

Breadcrumbs Section. Click here to navigate to respective pages.

Chapter

Cyber Security for Network of Things (NoTs) in Military Systems

Chapter

Cyber Security for Network of Things (NoTs) in Military Systems

DOI link for Cyber Security for Network of Things (NoTs) in Military Systems

Cyber Security for Network of Things (NoTs) in Military Systems book

Challenges and Countermeasures

Cyber Security for Network of Things (NoTs) in Military Systems

DOI link for Cyber Security for Network of Things (NoTs) in Military Systems

Cyber Security for Network of Things (NoTs) in Military Systems book

Challenges and Countermeasures
ByMuhammad Imran Malik, Ian Noel McAteer, Peter Hannay, Ahmed Ibrahim, Zubair Baig, Guanglou Zheng
BookSecurity Analytics for the Internet of Everything

Click here to navigate to parent product.

Edition 1st Edition
First Published 2020
Imprint CRC Press
Pages 19
eBook ISBN 9781003010463

ABSTRACT

For more than a decade, technological demands have led to the emergence of a plethora of devices controllable via wired or wireless communications, collectively termed as Network of Things (NoTs). However, security of NoT has not kept pace with the rapid advances in innovation and deployment of NoT devices, thus creating significant risks to all associated information assets. Preference of having fast and cost-effective technological solutions to conduct military operations by nation states and their governments globallyhaskept cybersecurity goals at lesser priority. Hence, commercial NoT solutions are being adoptedwithout considering their inherent security architectures, thus risking reliability and efficacy of military operations. This paper explores the emerging concept of NoTs in military systems conferring their efficacy and presents various threats that can easily compromise military networks. The paper stresses the need for improving security posture when NoTs are employed within military systems and proposes measures to address the ever-evolving cyber security challenges in NoTs.

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions
  • Connect with us

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2021 Informa UK Limited