Print this page

Internet of Things Vulnerabilities in Military Environments


IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.

Andras Toth, PhD, was born in 1981. He began his military career in an infantry brigade, served several times in foreign missions, twice in Afghanistan, once in Iraq. He has been working at the University of Public Service in Budapest since 2012. Before that, he was a teaching assistant at the National Defence University. He obtained his PhD in network-centric warfare in 2015 and is currently a scholarship holder of the Hungarian Academy of Sciences. He is member and officeholder of Hungarian Academy of Sciences (public member), Hungarian Association of Military Science (member of the electoral board), Scientific Association for Infocommunications, Cyber Security Committee (vice-president), Tivadar Puskás Technical College for Advanced Studies (president) and University Scientific Students’ Council (president).

Country: Hungary


1 comment

FaLang translation system by Faboba