SYSTEM DEVELOPMENT
Advancing the Internet of Military Things (IoMT) with Software Defined Radio Discussed in this article are the many technologies involved in handling the vast amount of data generated by the IoMT/IoBT devices, including tactical edge servers and software defined radio (SDR). A great deal of challenges exist for these networks, including security, bandwidth, storage and processing limitations.
Figure 1 - Ground Soldier IoMT/IoBT capabilities 22
COTS Journal | September 2021
Information on the battlefield is becoming more and more critical to the success of missions. Recognizing this, military’s around the world, and especially the US Military, are looking to the internet of military things (IoMT) or internet of battlefield things (IoBT). Broadly speaking, IoMT/IoBT is part of the persuasive/ubiquitous computing paradigm; a complex network of various sensors, actuators, and devices found on the ground, sea and in space which provide information technology for combat operations, reconnaissance, and even warfare capabilities. Distributed IoMT technology includes those found on UAVs, drones, robots, human wearable devices, biometric devices, weaponry, armour and a host of smart technologies. With IoMT and the ability to connect ships, planes, tanks, drones, soldiers, and operating bases in a closeknit network, the military greatly benefits in increased situational awareness, risk assessment, and response time. The use of these devices is based on the idea that battles will be fought and won based on who has the most intelligence, cyber warfare capabilities and overall machine intelligence, which may even someday perform autonomously.
Types and Benefits of IoMT/IoBT Intelligence and Sensing There are various advantages, increased capabilities, and benefits accrued from these types of networks of sensors, including the following for ground, air, and sea military services: 1. Ground: • Sensing and computing devices can be worn by soldiers and embedded in their combat suits, helmets, weapons systems, goggles and other equipment • These wearable systems are capable of acquiring a variety of static and dynamic biometric data including facial expression, eye movement, fingerprints ( for instance, drone controller authorization), heart rate, gait and stance, and gestures. • Soldiers are able to obtain fingerprints from a weapon or bomb and upload it to the network in order to identify an adversarial combatant instantly. • Images or visuals of an adversary can be uploaded to a database to confirm the identity of a target. • Soldiers exposed to toxic chemicals, injured in battle, etc. can receive medical assistance. • One such example is the NSRDEC (Now