1
Associate Professor of the Supperme National Defense University.
2
PhD student at National Defense University
Abstract
The emerging technology of the Internet of Things provides the ability to send and receive data between different objects through communication networks and can be the source of tremendous changes in military equipment and enhancing the efficiency of defense departments. The command and control system is one of the most important areas of defense systems that can be transformed by Internet of Things technology. Command and control is the planning, guidance, coordination and control of the operations based on the effective operation of the operational scenario, so in order to achieve the best result, complete, accurate and timely information is essential. On the other hand, utilizing the Internet of Things technology allows the commanders to get the most accurate and accurate information about the battle scene in the shortest time. This research was conducted with the aim of examining the requirements for exploiting the Internet of Things technology in the command and control system. This study is a descriptive and qualitative descriptive in terms of the purpose of the applied type and in terms of descriptive and qualitative method, using content analysis method. The statistical population of the study was people who were expert and knowledgeable about cyber space and command and control issues, that 30 person of them were selected purposefully and a questionnaire was conducted about them. The results show that in order to use the Internet of Things in the command and control system, it should be in three layers of the program, reception, network and infrastructure, in order to upgrade and localize the software, use dynamic security patches, ensure the health of the microprocessors, provide security of the sensors, utilizing cryptography, providing network availability, matching protocols, network scalability, creating a Private cloud, providing physical protection and energy supply of sensors.
دانشنامهآزادویکیپدیا، "مقیاسپذیریشبکه"،(۱۳۹۷)، برگرفته از https://fa.wikipedia.org/wiki.
دبیرخانه برنامه ملی آیندهنگاری علم و فناوری در حوزه فناوری اطلاعات و ارتباطات، "گزارش شماره 1 از سلسله مطالعات برنامه ملی آیندهنگاری در حوزه فناوری اطلاعات و ارتباطات اینترنت اشیا و چگونگی ارزشآفرینی آن از نگاه موسسه جهانی مکنزی"، (۱۳۹۵)،۳-۴.
دیوسالار، عبدالرسول، "راهبردها و معماری کلان فرماندهی و کنترل در روسیه"، مؤسسه آموزشی و تحقیقاتی صنایع دفاعی، (13۹۵).
Mariani, J., Williams, B.,& Loubert, B., “The past, present, and future of the IoT in the military”, August 06, 2015,
Michaelis, J. R., “Military Internet of Things (IoT), Autonomy, and Things to Come,” 21st International Command and Control Research and Technology Symposium (ICCRTS), pp. ۲-۷, 2016.
RTO Task Group, “Military Applications of Internet of Things (IST-147)” Contact STO/CSO Panel Office, p 2, 2015. Retrieved from https://www.cso.nato.int/activity_meta.asp
S. Department of Defense, December 2016, “Policy Recommendations for The Internet of Things (IoT)”, Chief Information Officer.
Zheng, D., Carter, W. A. (2015), “Leveraging the Internet of Things for a More Efficient and Effective Military”, A Report of the CSIS Strategic Technologies Program, p. 3.
Movahdisaft, M., & Ramadani, R. (2022). Reviewing the requirements for exploiting the Internet of things technology in the command and control system. Quarterly Journal Strategic Studies in Cyberspace, 2(2), 63-80.
MLA
Mohammadreza Movahdisaft; Rasool Ramadani. "Reviewing the requirements for exploiting the Internet of things technology in the command and control system", Quarterly Journal Strategic Studies in Cyberspace, 2, 2, 2022, 63-80.
HARVARD
Movahdisaft, M., Ramadani, R. (2022). 'Reviewing the requirements for exploiting the Internet of things technology in the command and control system', Quarterly Journal Strategic Studies in Cyberspace, 2(2), pp. 63-80.
VANCOUVER
Movahdisaft, M., Ramadani, R. Reviewing the requirements for exploiting the Internet of things technology in the command and control system. Quarterly Journal Strategic Studies in Cyberspace, 2022; 2(2): 63-80.