Research Article | | Peer-Reviewed

Blockchain at the Tactical Edge: Enabling an Internet of Battlefield Things

Received: 12 August 2023    Accepted: 6 September 2023    Published: 24 November 2023
Views:       Downloads:
Abstract

Future large-scale combat operations against a peer or near-peer adversary will involve a cyberspace domain in addition to the more traditional physical domains of air, land, sea, and space. The role that data and information play at every point in this continuum cannot be understated. Moreover, the ability to communicate effectively and coordinate across multiple domains simultaneously—to enable an internet of battlefield things—is dependent upon accessible and reliable information. This paper presents the results of a study that evaluated the use of blockchain technology to address challenges with increasing amounts of disparate sensor data and an information-rich landscape that can quickly overwhelm effective decision-making processes. The team explored how blockchain can be used at the tactical edge to support an internet of battlefield thing approach by verifying users, validating sensor data fed into artificial intelligence models, limiting access to data, and providing an audit trail across the data life cycle. The team developed a conceptual design for implementing blockchain for tactical data, artificial intelligence, and machine learning applications; identified challenges and limitations involved in implementing blockchain for the tactical domain; described the benefits of blockchain for these various applications; and evaluated the findings to propose future research into a wide set of tactical blockchain applications. The team studied three use cases: (1) blockchain at the tactical edge in a “data light” information environment for long range fires, (2) blockchain to secure tactical medical information in electronic health record, and (3) blockchain for collecting multiple types of tactical sensor data for chemical weapons defense to support measurement and signature intelligence analysis using artificial intelligence and machine learning.

Published in American Journal of Computer Science and Technology (Volume 6, Issue 4)
DOI 10.11648/j.ajcst.20230604.12
Page(s) 126-147
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Blockchain, Internet of Battlefield Things, Hyperledger, Data Fabric, Long Range Fires, Electronic Health Record, Chemical Weapons

References
[1] U. S. Army Training Doctrine Command. (2018) “The U. S. Army in multi-domain operations.” TRADOC Pam 525-3-1. Newport News, VA.
[2] U. S. Army Combined Army Center. (2022) “Combined arms doctrine newsletter and doctrine developer’s guidance.” Fort Leavenworth, KS.
[3] B. Johnson. (2019) “A framework for engineered complex adaptive systems of systems,” Diss. Monterey, CA, Naval Postgraduate School.
[4] F. P. Osinga. (2007) Science, Strategy and War: The Strategic Theory of John Boyd, Routledge.
[5] K. Rose, S. Eldridge, and L. Chapin. (2015) “The internet of things: an overview,” The internet society (ISOC), 80, pp. 1-50.
[6] D. K. Tosh, S. Shetty, P. Foytik, L. Njilla, and C. A. Kamhoua. (2018) “Blockchain-empowered secure internet-of-battlefield things (IoBT) architecture.” In MILCOM 2018 IEEE Military Communications Conference, pp. 593-598.
[7] G. Firican. (2017) “The 10 Vs of big data,” Transforming Data with Intelligence, 8.
[8] S. Miktoniuk and O. N. Yalcin. (2021) “Open data fabric: a decentralized data exchange and transformation protocol with complete reproducibility and provenance.” arXiv preprint, arXiv.2111.06364.
[9] IBM. (2018) “Governed data lake for business insights: explore the key building blocks to effectively deliver trusted data.” https://www.ibm.com/downloads/cas/RMAMZNRY.
[10] IBM. (2021) “How to choose the right data warehouse for AI,” https://ibm.com/downloads/cas/QK7MQ7YY.
[11] K. Hicks. (2021) “Creating data advantage,” Memorandum, Washington, DC: Department of Defense.
[12] T. Culpan. (2022) “The next cybersecurity crisis: poisoned AI,” Bloomberg, last modified 14 April 2022.
[13] M. Kuzlu. (2021) “Role of artificial intelligence in the internet of things (IoT) cybersecurity,” Discover Internet of Things.
[14] X. Li, Z. Wang, V. Leung, H. Ji, Y. Liu, and H. Zhang. (2021) “Blockchain-empowered data-driven networks: a survey and outlook.” ACM Computing Surveys 53 (3): 1-38. https://doi.org/10/1145/3446373.
[15] A. Binlashram, L. Hsairi, H. Bouricha, and H. A. Ahmadi. (2020) “A new multi-agents system based on blockchain for prediction anomaly from system logs.” In 22nd International Conference on Information Integration and Web-based Applications Services. https://doi.org/10.1145/3428757.3429149.
[16] C. Benzaid, T. Taleb, and M. A. Farooqi. (2021) “Trust in 5G and beyond networks.” IEEE Network 35 (3) 212-22. https://doi.org/10/1109/MNET.011.2000508.
[17] J. Clark. (2016) “What is the Internet of Things (IoT)?” IBM Business Operations Blog. November 16. https://www.ibm.com/blogs/internet-of-things/what-is-the-iot/.
[18] A. Kapitonov, S. Lonshakov, A. Krupenkin, and I. Berman. (2017) “Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs.” In 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS), 84-89. IEEE. https://doi.org/10.1109/RED-UAS.2017.8101648.
[19] H. Karimipour and F. Derakhshan. (2021) AI-Enabled Threat Detection. Cham: Springer AG.
[20] C. Chen, J. Yang, W. Tsuar, W. Weng, C. Wu, and X. Wei. (2022) “Enterprise data sharing with privacy-preserved based on hyperledger fabric blockchain in IIOT’s application.” Sensors (Basel, Switzerland) 22 (3) https://doi.org/10.3390/s22031146.
[21] A. Kott, A. Swami, and B. West. (2016) “The Internet of Battle Things.” Computer 49 (12) December: 70-75. https://doi.org/10.1109/MC.2016.355.
[22] C. C. Ionită. (2020) “The ‘Mosaic’ warfare: a new American strategy for the future.” Strategic Impact, 75: 25-42.
[23] R. Kumar and R. Sharma. (2021) “Leveraging blockchain for ensuring trust in IoT: a survey.” Journal of King Saud University. Computer and Information Sciences. http://doi.org/10.1016/j.jksuci.2021.09.004.
[24] A. Reyna, C. Martin, J. Chen, E. Soler, and M. Diaz. (2018) “On blockchain and its integration with IoT – challenges and opportunities.” Future Generation Computer Systems 88: 173-190.
[25] G. Allen. (2020) “Understanding AI technology.” Department of Defense Joint Artificial Intelligence Center. https://www.ai.mil/docs/Understanding%20AI%20Technology.pdf.
[26] M. Comiter. (2019) “Attacking artificial intelligence: AI’s security vulnerability and what policymakers can do about it.” Belfer Center Paper, Harvard Kennedy School.
[27] IBM. (2022a). “What is blockchain technology?” https://www.ibm.com/topics/what-is-blockchain.
[28] S. Saberi, M. Kouhizadeh, J. Sarkis, and L. Shen. (2019) “Blockchain technology and its relationships to sustainable supply chain management.” International Journal of Production Research 57 (7): 2117-35. https://doi.org/10.1080/00207543.2018. 1533261.
[29] G. Palaiokrassas, P. Skoufis, O. Voutyras, T. Kawaksaki, M. Gallissot, R. Azzabi, and A. Tsuge. (2021) “Combining blockchains, smart contracts, and complex sensors management platform for hyper-connected smart cities: an IoT data marketplace use case.” Computers (Basel, Switzerland) 10 (10): 133-. https://doi.org/10.3390/computers 10100133.
[30] A. Battah, M. Madine, H. Alzaabi, I. Yaqoob, K. Salah, and R. Jayaraman. (2020) “Blockchain-based multi-party authorization for accessing IPFS encrypted data.” IEEE Access 8: 196813-25. https://doi.org/10.1109/ACCESS.2020.3034260.
[31] E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. DeCaro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukolic, S. Cocco, and J. Yellick. (2018) Hyperledger fabric: a distributed operating system for permissioned blockchain.” In EuroSys ’18: Thirteenth EuroSys Conference 2018, April 23-26, 2018, Porto, Portugal. ACM, New York, NY, USA, 15 pages. https://doi.org/10.1145/3190508.3190538.
[32] S. Mikhtoniuk and O. Yalcin. (2021) “Open data fabric: a decentralized data exchange and transformation protocol with complete reproducibility and provenance.” arXiv: 2111.06364v1 [cs. DB] 11Nov2021.
[33] C. Gorenflo, S. Lee, L. Golab, and S. Keshav. (2019) “Fastfabric: scaling Hyperledger fabric to 20,000 transactions per second.” arXiv: 1901.00910v2 [cs. DC] 4Mar2019.
[34] A. Baliga, N. Solanki. S. Verekar, A. Pednekar, P. Kamat, and S. Chatterjee. (2018) “Performance characterization of Hyperledger fabric.” IEEE. Crypto Valley Conference on Blockchain Technology. DOI 10.1109/CVCBT.2018.00013.
[35] S. Malik, V. Dedeoglu, S. Kanhere, and R. Jurdak. (2019) “TustChain: trust management in blockchain and IoT supported supply chains.” In 2019 IEEE International Conference on Blockchain, 184-93.
[36] V. Adams, M. Alonso, W. Henry, D. Hyland-Wood, W. Jansen, V. Kodumudi, and A. Nannra. (2020) “Potential uses of blockchain by the Department of Defense.” Washington, DC: Value Technology Foundation.
[37] S. B. Rahayu, N Jusoh. (2019) “Military blockchain for supply chain management.” Journal of Education and Social Sciences 13 (1): 9-14.
[38] T. J. Willink. (2018) “On blockchain technology and its potential application in tactical networks.” Defense Research and Development, Ottawa, Canada.
[39] A. Kendall, A. Das, B Nagy, B. Johnson, and A. Ghosh. (2022) “Increasing confidence and data availability from IoT and other sources supporting artificial intelligence and analytical tools using hyperledger fabric blockchain.” Naval Postgraduate School White Paper, 2022.
[40] I. Makhdoom, M. Abolhasan, H. Abbas, and W. Ni. (2019) “Blockchain’s adoption in IoT: challenges, and a way forward.” Journal of Network and Computer Applications 125: 251-279.
[41] A. Abdelmaboud, A. Ahmed, M. Abaker, T. Eisa, H. Albasheer, S. Ghorashi, and F. Karim. (2022) “Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges, and future research directions.” Electronics (Basel, Switzerland) 11 (4): 630-. https://doi.org/10.3390/electronics11040630.
[42] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito. (2018) “Blockchain and IoT integration: a systematic survey.” Sensors (Basel, Switzerland) 18 (8): 2575.
[43] A. Attkan and V. Ranga. (2022) “Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security.” Complex and Intelligent Systems. https://doi.org/10.1007/s40747-022-00667-z.
[44] Y. Jeong. 2021. “Blockchain processing technique based on multiple hash chains for minimizing integrity errors of IoT data in cloud environments.” Sensors (Basel, Switzerland) 21 (14): 4679-4694. https://doi.org/10.3390/s21144679.
[45] D. Draskovic and G. Saleh. (2017) “Datapace: decentralized data marketplace based on blockchain.” White Paper, Datapace, http://datapace.io/.
[46] K. Moke, T. Low, and D. Khan. (2021) “IoT blockchain data veracity with data loss tolerance.” Applied Sciences 11 (21): 9978. https://doi.org/10.3390/app11219978.b
[47] R. Xu, L. Hang, W. Jin, and D. Kim. (2021) “Distributed secure edge computing architecture based on blockchain for real-time data integrity in IoT environments.” Actuators 10 (8): 197-. https://doi.org/10.3390/act10080197.
[48] B. Gan, Q. Wu, X. Li, and Y. Zhou. (2021) “Harsh communication environment oriented consortium blockchain construction on edge for internet of things.” Journal of Physics. Conference Series. 1972 (1): 12001-. https://doi.org/10.1088/1742-6596/1972/1/012001.
[49] H. Paiooh, M. Rashid. F. Alam, and S. Demidenko. (2021) “Hyperledger fabric blockchain for securing the edge internet of things.” Sensors (Basel, Switzerland) 21 (2): 359. https://doi.org/10.3390/s21020359.
[50] J. Zhang, C. Lu, G. Cheng, T. Guo, J. Kang, X. Zhang, X. Yuan, and X. Yan. (2021) “A blockchain-based trusted edge platform in edge computing environment.” Sensors (Basel, Switzerland) 21 (6): 2126. https://doi.org/10.3390/s21062126.
[51] R. Rahim, R. Patan, R. Manikandan, and S. Kumar. (2020) “Introduction to Blockchain and Big Data.” In Blockchain, Big Data, and Machine Learning: Trends and Applications, edited by N. Kuman, N. Gayathri, M. A. Rahman, and B. Balamurugan. 1-23. Boca Raton: CRC Press. https://doi.org/10.1201/9780429352546.
[52] H. Kumar, M. Manu, R. Indrakumari, and B. Blamurugan. (2020) “Blockchain use cases in big data.” In Blockchain, Big Data, and Machine Learning: Trends and Applications. Edited by N. Kuman, N. Gayathri, M. A. Rhaman, and B. Balamurugan. 111-139. Boca Raton: CRC Press. https://doi.org/10.1201/978042935246.
[53] N. Deepa, Q. Pham, D. Nguyen, S. Bhattacharya, B. Prabadevi, T. Gadekallu, P. Maddikunta, F. Fang, and P. Pathirana. (2021) “A survey on blockchain for big data: approaches, opportunities, and future directions.” arXiv.org.
[54] G. Fareund, P. Fagundes, and D. Jeronimo de Macedo. (2020) “An Analysis of Blockchain and GDPR Under the Data Lifecycle Perspective.” Mobile Networks and Applications 26 (1): 266-76. https://doi.org/10/1007/s11036-020-01646-9.
[55] A. Kott, A. Swami, and B. West. (2017) “The Internet of Battle Things.” Computer 49 (12) (December): 70-75. https://doi.org/10.1109/MC.2016.355.
[56] IBM (2022b) “What is Blockchain Technology?” IBM. Accessed June 12, 2022. https://www.ibm.com/topics/what-is-blockchain.
[57] S. Shetty, C. Kamhoua, and L. Njilla. (2019) “Blockchain for Distributed Systems Security.” 1st edition. Newark: Wiley. https://doi.org/10.1002/9781119519621.
[58] Hyperledger Architecture Working Group (2017) Hyperledger Architecture, Volume 1: Introduction to Hyperledger Business Blockchain Design Philosophy and Consensus. https://www.hyperledger.org/wp-content/uploads/2017/08/ Hyperledger_Arch_WG_Paper_1_Consensus.pdf.
[59] IBM (2017) “How Nodes Reach a Consensus on a Blockchain.” YouTube video, September 20, 2017. https://www.youtube.com/watch?v=DqtzxJP6Y9k.
[60] Hyperledger Performance and Scale Working Group (2018) Hyperledger Blockchain Performance Metrics. https://www.hyperledger.org/learn/publications/blockchain-performance-metrics
[61] Hyperledger (2022) “Peers.” https://hyperledger-fabric.readthedocs.io/en/release-2.2/peers/peer.html.
[62] U. S. Army (2021) “The Army Unified Network Plan.” Arlington, VA: Office of the Undersecretary of the U. S. Army.
[63] N. Patel, U. Patel, E. Hawk II, and K. Kapadia. (2021) “Stitching the Army’s Data Fabric.” Army ALT Magazine (Fall 2021): 14-19.
[64] C. Ferris. (2019) “Does Hyperledger Fabric Perform at Scale?” IBM Supply Chain and Blockchain Blog (blog).
[65] S. Guntur, R. Gorrepati, and V. Dirisala. (2019) “Robotics in Healthcare: An Internet of Medical Robotic Things (IoMRT) Perspective.” In Machine Learning in Bio-Signal Analysis and Diagnostic Imaging (pp. 293-318). Academic Press.
[66] L. Virgos, M. Vidales, F. Hernandez, and J. Granados. (2021) Internet of Medical Things: Current and Future Trends.” Internet of Medical Things, 19-36.
[67] L. Elezabeth and V. Mishra. “Big Data Mining Methods in Medical Applications.” In Medical Big Data and Internet of Medical Things: Advances, Challenges and Applications, edited by Aboul Ella Hassanien, Nilanjan Dey and Surekha Borra, 1—23. Milton: CRC Press. https://doi.org/ 10.1201/ 9781351030380.
[68] S. Cao, G. Zhang, P. Liu, X. Zhang and F. Neri. 2019. “Cloud-Assisted Secure eHealth Systems for Tamper-Proofing EHR via Blockchain.” Information Sciences 485: 427–440. https://doi.org/ 10.1016/ j.ins.2019.02.038.
[69] Military Health System and Defense Health Agency. (2022) “MHS Genesis: The Electronic Health Record.” Heatlth.mil, health.mil/Military-Health-Topics/Technology/MHS-Genesis.
[70] R. Rayan, C. Tsagkaris, and R. Iryna. (2021) “The Internet of Things for Healthcare: Applications, Selected Cases, and Challenges.” IoT in Healthcare and Ambient Assisted Living, 1-15.
[71] Pre-Employment Checks. (2019) “Understanding MASINT and Its Practical Uses.” Pre-Employment Checks. Last modified July18, 2019. https://www. Pre-employment-checks.com/en/understanding-masint-and-its-practical-uses/.
[72] J. Pike. (2020) “Measurement and Signature Intelligence (MASINT).” FAS Intelligence Resource Program. Last modified May 8, 2020. https://irp.fas.org/program/masint.htm.
Cite This Article
  • APA Style

    Johnson, B., Kendall, A., Green, J., Nagy, B., Dogum, G., et al. (2023). Blockchain at the Tactical Edge: Enabling an Internet of Battlefield Things. American Journal of Computer Science and Technology, 6(4), 126-147. https://doi.org/10.11648/j.ajcst.20230604.12

    Copy | Download

    ACS Style

    Johnson, B.; Kendall, A.; Green, J.; Nagy, B.; Dogum, G., et al. Blockchain at the Tactical Edge: Enabling an Internet of Battlefield Things. Am. J. Comput. Sci. Technol. 2023, 6(4), 126-147. doi: 10.11648/j.ajcst.20230604.12

    Copy | Download

    AMA Style

    Johnson B, Kendall A, Green J, Nagy B, Dogum G, et al. Blockchain at the Tactical Edge: Enabling an Internet of Battlefield Things. Am J Comput Sci Technol. 2023;6(4):126-147. doi: 10.11648/j.ajcst.20230604.12

    Copy | Download

  • @article{10.11648/j.ajcst.20230604.12,
      author = {Bonnie Johnson and Anthony Kendall and John Green and Bruce Nagy and Gregory Dogum and Kristin Jones Maia and Michele Meszaros and Jonathan Novoa and Rene Villarreal},
      title = {Blockchain at the Tactical Edge: Enabling an Internet of Battlefield Things},
      journal = {American Journal of Computer Science and Technology},
      volume = {6},
      number = {4},
      pages = {126-147},
      doi = {10.11648/j.ajcst.20230604.12},
      url = {https://doi.org/10.11648/j.ajcst.20230604.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20230604.12},
      abstract = {Future large-scale combat operations against a peer or near-peer adversary will involve a cyberspace domain in addition to the more traditional physical domains of air, land, sea, and space. The role that data and information play at every point in this continuum cannot be understated. Moreover, the ability to communicate effectively and coordinate across multiple domains simultaneously—to enable an internet of battlefield things—is dependent upon accessible and reliable information. This paper presents the results of a study that evaluated the use of blockchain technology to address challenges with increasing amounts of disparate sensor data and an information-rich landscape that can quickly overwhelm effective decision-making processes. The team explored how blockchain can be used at the tactical edge to support an internet of battlefield thing approach by verifying users, validating sensor data fed into artificial intelligence models, limiting access to data, and providing an audit trail across the data life cycle. The team developed a conceptual design for implementing blockchain for tactical data, artificial intelligence, and machine learning applications; identified challenges and limitations involved in implementing blockchain for the tactical domain; described the benefits of blockchain for these various applications; and evaluated the findings to propose future research into a wide set of tactical blockchain applications. The team studied three use cases: (1) blockchain at the tactical edge in a “data light” information environment for long range fires, (2) blockchain to secure tactical medical information in electronic health record, and (3) blockchain for collecting multiple types of tactical sensor data for chemical weapons defense to support measurement and signature intelligence analysis using artificial intelligence and machine learning.
    },
     year = {2023}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Blockchain at the Tactical Edge: Enabling an Internet of Battlefield Things
    AU  - Bonnie Johnson
    AU  - Anthony Kendall
    AU  - John Green
    AU  - Bruce Nagy
    AU  - Gregory Dogum
    AU  - Kristin Jones Maia
    AU  - Michele Meszaros
    AU  - Jonathan Novoa
    AU  - Rene Villarreal
    Y1  - 2023/11/24
    PY  - 2023
    N1  - https://doi.org/10.11648/j.ajcst.20230604.12
    DO  - 10.11648/j.ajcst.20230604.12
    T2  - American Journal of Computer Science and Technology
    JF  - American Journal of Computer Science and Technology
    JO  - American Journal of Computer Science and Technology
    SP  - 126
    EP  - 147
    PB  - Science Publishing Group
    SN  - 2640-012X
    UR  - https://doi.org/10.11648/j.ajcst.20230604.12
    AB  - Future large-scale combat operations against a peer or near-peer adversary will involve a cyberspace domain in addition to the more traditional physical domains of air, land, sea, and space. The role that data and information play at every point in this continuum cannot be understated. Moreover, the ability to communicate effectively and coordinate across multiple domains simultaneously—to enable an internet of battlefield things—is dependent upon accessible and reliable information. This paper presents the results of a study that evaluated the use of blockchain technology to address challenges with increasing amounts of disparate sensor data and an information-rich landscape that can quickly overwhelm effective decision-making processes. The team explored how blockchain can be used at the tactical edge to support an internet of battlefield thing approach by verifying users, validating sensor data fed into artificial intelligence models, limiting access to data, and providing an audit trail across the data life cycle. The team developed a conceptual design for implementing blockchain for tactical data, artificial intelligence, and machine learning applications; identified challenges and limitations involved in implementing blockchain for the tactical domain; described the benefits of blockchain for these various applications; and evaluated the findings to propose future research into a wide set of tactical blockchain applications. The team studied three use cases: (1) blockchain at the tactical edge in a “data light” information environment for long range fires, (2) blockchain to secure tactical medical information in electronic health record, and (3) blockchain for collecting multiple types of tactical sensor data for chemical weapons defense to support measurement and signature intelligence analysis using artificial intelligence and machine learning.
    
    VL  - 6
    IS  - 4
    ER  - 

    Copy | Download

Author Information
  • Systems Engineering Department, Naval Postgraduate School, Monterey, USA

  • Information Sciences Department, Naval Postgraduate School, Monterey, USA

  • Systems Engineering Department, Naval Postgraduate School, Monterey, USA

  • Naval Air Warfare Center, Weapons Division, Ridgecrest, USA

  • Systems Engineering Department, Naval Postgraduate School, Monterey, USA

  • Systems Engineering Department, Naval Postgraduate School, Monterey, USA

  • Systems Engineering Department, Naval Postgraduate School, Monterey, USA

  • Systems Engineering Department, Naval Postgraduate School, Monterey, USA

  • Systems Engineering Department, Naval Postgraduate School, Monterey, USA

  • Sections