IOMT -A Variant of IOT for defense and Military engineering

AI-powered IoT can transform the military and Intelligence

Abhishek Biswas
The Generator
13 min readApr 30, 2023

--

IOMT

Introduction: How IOMT Differs from IOT

The Internet of Military Things (IoMT) encompasses a large range of devices that possess intelligent physical sensing, learning, and actuation capabilities through virtual or cyber interfaces that are integrated into systems. The Internet of Battlefield Things (IoBT) is a subset of IoMT that involves the full realization of pervasive sensing, computing, and communication, leading to an unprecedented scale of information produced by the networked sensors and computing units.

The main difference between IoMT and IoT is that IoMT devices are designed for military applications, such as identifying enemies, enhancing situational awareness, improving performance, and accessing weapons systems. IoT devices are more general-purpose and can be used for various civilian domains, such as smart homes, health care, transportation, and agriculture. IoMT devices also face more challenges in terms of security, reliability, interoperability, and scalability than IoT devices.

ALL domains

IoMT Applications in Different Domains:

IoMT encompasses a vast network of interconnected devices, sensors, wearables, and systems that can communicate with each other to provide real-time data and analytics. In this article, we will discuss how IoMT is used in various domains such as land, air, sea, space, and cyber, providing examples of devices, sensors, wearables, and systems that are connected through IoMT. We will also highlight the advantages and disadvantages of each application.

  1. Land Domain: In the land domain, IoMT is used to enhance situational awareness and battlefield management. For example, soldiers can wear connected sensors that monitor their vital signs, fatigue levels, and location in real-time, allowing commanders to make informed decisions based on real-time data. Another example is unmanned ground vehicles (UGVs) that can be used for reconnaissance, surveillance, and delivering supplies to troops in hostile environments.

Advantages: IoMT in the land domain can help reduce the number of casualties and increase the effectiveness of military operations.

Disadvantages: The main disadvantage is the risk of cybersecurity threats and vulnerabilities that can compromise the security of the IoMT network.

  1. Air Domain: In the air domain, IoMT is used to improve the performance and reliability of aircraft systems. For example, aircraft sensors can be connected to a central system that analyzes data to detect any potential issues, allowing for proactive maintenance and repairs. Another example is the use of unmanned aerial vehicles (UAVs) for reconnaissance, surveillance, and targeting.

Advantages: IoMT in the air domain can improve aircraft safety, reduce maintenance costs, and enhance mission effectiveness.

Disadvantages: The main disadvantage is the potential risk of cyber attacks and interference that can affect aircraft systems and operations.

  1. Sea Domain: In the sea domain, IoMT is used for maritime surveillance, underwater warfare, and logistics support. For example, ships can be equipped with sensors that monitor the surrounding environment, detect enemy ships, and detect underwater mines. Another example is the use of autonomous underwater vehicles (AUVs) for mine detection and clearance.

Advantages: IoMT in the sea domain can improve situational awareness, reduce the risk of maritime incidents, and enhance the efficiency of logistics support.

Disadvantages: The main disadvantage is the risk of cyber attacks and interference that can compromise the safety and security of the maritime environment.

  1. Space Domain: In the space domain, IoMT is used for satellite communication and space exploration. For example, connected sensors on satellites can monitor the environment and detect potential hazards. Another example is the use of connected robots for space exploration and maintenance.

Advantages: IoMT in the space domain can improve the efficiency and safety of space operations, reduce the risk of accidents, and enhance the effectiveness of space exploration.

Disadvantages: The main disadvantage is the cost and complexity of implementing and maintaining an IoMT network in space.

  1. Cyber Domain: In the cyber domain, IoMT is used for cyber defense and network security. For example, connected sensors and devices can monitor network activity and detect potential threats. Another example is the use of machine learning algorithms to detect and mitigate cyber threats in real-time.

Advantages: IoMT in the cyber domain can enhance network security and defense, reduce the risk of cyber attacks, and improve response times to incidents.

Disadvantages: The main disadvantage is the potential risk of false alarms and the complexity of implementing and maintaining an effective IoMT network for cyber defense.

The contribution of edge computing and biometrics in IOMT:

Edge Computing

Edge computing and biometrics can enhance situational awareness, risk assessment, and response time for soldiers and commanders in IOMT by:

  • Processing data locally at the edge of the network, reducing latency and bandwidth consumption
  • Providing real-time feedback and alerts based on biometric data such as face, iris, heart rate, gait, gestures, and facial expressions
  • Enabling context-aware authentication and monitoring of soldiers and equipment
  • Improving communication and collaboration among different domains and devices
  • Supporting decision making and intelligence based on data analysis and machine learning

For example, edge computing can help soldiers to identify enemies and allies using facial recognition, monitor their health and fatigue using heart rate sensors, access weapons systems using fingerprint scanners, and communicate with command centers using secure networks.

Biometrics can help soldiers to verify their identity, track their location and environment, detect their emotions and stress levels, and provide feedback and guidance. Edge computing and biometrics can work together to create a smart and adaptive IOMT system that can improve the performance and safety of military operations.

How the Internet of Military Things is changing the game of war (and what you need to know about it):

Imagine a world where every soldier, weapon, vehicle, drone, and base is connected to the internet and can communicate with each other in real time. Sounds cool, right? Well, that’s the world of the Internet of Military Things (IoMT), and it’s not just a sci-fi fantasy. It’s happening right now, and it’s changing the way wars are fought and won.

But what exactly is IoMT, and why should you care? IoMT is a network of smart devices and sensors that can enhance the capabilities and performance of military forces in various domains such as land, air, sea, space, and cyberspace. IoMT can enable faster and more accurate situational awareness, decision making, command and control, intelligence, surveillance, reconnaissance, logistics, and combat operations. Sounds awesome, right?

Well, not so fast. IoMT also comes with a lot of challenges that need to be addressed, such as scalability, interoperability, security, privacy, ethics, and regulation. These are not just boring technical terms. They are real issues that can affect the success or failure of IoMT applications and the lives of military personnel and civilians. Let’s take a closer look at each one:

Scalability

Scalability means the ability of a system to handle increasing amounts of data and users without compromising performance or quality. IoMT devices generate huge amounts of data that need to be stored, processed, and transmitted efficiently. According to some experts, the US Department of Defense (DoD) expects to have more than 7 billion IoMT devices by 2023, which is more than twice the number of devices in 2019. That’s a lot of data!

How can we deal with this data explosion? Here are some tips:

  • Use cloud computing and edge computing to offload data processing and storage from IoMT devices to remote servers or nearby nodes.
  • Apply data compression and encryption techniques to reduce data size and ensure data security.
  • Adopt standards and protocols for data communication and integration among different IoMT devices and platforms.
  • Leverage artificial intelligence (AI) and machine learning (ML) to analyze and extract insights from large volumes of data.

Interoperability

Interoperability means the ability of different systems or devices to communicate and exchange information with each other. IoMT devices come from various manufacturers, use different technologies, and serve different purposes.

Therefore, interoperability is essential for ensuring seamless data flow and coordination among different IoMT devices and stakeholders. However, interoperability is also challenging due to the lack of common standards, protocols, formats, and terminologies for IoMT data.

How can we overcome this communication barrier? Here are some suggestions:

  • Develop and adopt common standards and frameworks for IoMT data exchange and integration, such as Joint Tactical Networking Center (JTNC), Joint All Domain Command & Control (JADC2), etc.
  • Implement application programming interfaces (APIs) and middleware solutions to facilitate data communication and translation among different IoMT devices and platforms.
  • Promote collaboration and coordination among different stakeholders in the IoMT ecosystem, such as device manufacturers, military branches, allies, partners, etc.

Security

Security means the protection of data and devices from unauthorized access, modification, or damage. IoMT devices are vulnerable to cyberattacks that can compromise their functionality, integrity, or availability. For example, hackers can exploit vulnerabilities in IoMT devices to steal sensitive military data, manipulate device settings or commands, or disrupt device operations. According to a report by IEEE Computer Society, more than 80% of military IoT devices have at least one security issue.

How can we prevent these cyber threats? Here are some best practices:

  • Implement strong encryption and authentication mechanisms for data transmission and storage among IoMT devices.
  • Apply regular updates and patches to fix vulnerabilities in IoMT device software or firmware.
  • Use physically unclonable functions (PUFs) or other hardware-based security solutions to prevent device cloning or tampering.
  • Conduct risk assessment and penetration testing to identify and mitigate potential threats to IoMT devices.

Privacy

Privacy means the protection of personal information from unauthorized disclosure or use. IoMT devices collect personal military data that can reveal sensitive information about military personnel’s health conditions, preferences, behaviors, or identities. Therefore, privacy is a major concern for IoMT users who may not want their military data to be shared or used without their consent or knowledge. Moreover, privacy is also a legal requirement that needs to comply with various regulations such as the Uniform Code of Military Justice (UCMJ), the Privacy Act of 1974, etc.

How can we respect and protect the privacy of military personnel? Here are some guidelines:

  • Implement privacy-by-design principles that incorporate privacy considerations into every stage of IoMT device development and deployment.
  • Apply anonymization or pseudonymization techniques to remove or mask personal identifiers from military data.
  • Obtain informed consent from users before collecting or sharing their military data.
  • Provide users with options to control their privacy settings and preferences.

Ethics

Ethics means the moral principles that guide the conduct of individuals or organizations. IoMT devices can raise ethical questions about the impact of technology on human dignity, autonomy, responsibility, justice, and trust. For example, IoMT devices can enable remote monitoring and control of soldiers’ biometrics, behaviors, or actions. This can affect their free will, agency, and accountability. Moreover, IoMT devices can also create ethical dilemmas about the use of lethal force.

For example, IoMT devices can enable remote monitoring and control of soldiers’ biometrics, behaviors, or actions. This can affect their free will, agency, and accountability. Moreover, IoMT devices can also create ethical dilemmas about the use of lethal force, such as autonomous weapons systems that can decide and act without human intervention or supervision. These issues can raise moral concerns about the value of human life, the respect for human rights, and the legitimacy of war.

How can we ensure that IoMT devices are used in an ethical manner? Here are some recommendations:

  • Develop and adopt ethical codes and guidelines for IoMT device design, development, deployment, and use, such as the DoD Ethical Principles for Artificial Intelligence.
  • Implement ethical review and oversight mechanisms for IoMT device testing, evaluation, and operation, such as the Defense Innovation Board (DIB) or the Defense Ethics Program (DEP).
  • Promote ethical education and training for IoMT device users and operators, such as the DoD Cyber Awareness Challenge or the DoD Cyber Ethics Training.
  • Encourage ethical dialogue and debate among different stakeholders in the IoMT ecosystem, such as military leaders, policymakers, ethicists, researchers, etc.

Regulation

Regulation means the rules and laws that govern the activities of individuals or organizations. IoMT devices can pose regulatory challenges due to their complexity, novelty, and diversity. For example, IoMT devices can involve multiple domains of regulation, such as telecommunications, information technology, cybersecurity, health care, defense, etc. Moreover, IoMT devices can also face regulatory gaps or conflicts due to the lack of harmonization or coordination among different regulatory bodies or jurisdictions.

How can we address these regulatory challenges? Here are some strategies:

  • Develop and adopt common regulatory standards and frameworks for IoMT device certification, accreditation, authorization, and compliance, such as the National Institute of Standards and Technology (NIST) or the Federal Risk and Authorization Management Program (FedRAMP).
  • Implement regulatory coordination and cooperation mechanisms among different regulatory agencies or entities involved in IoMT device regulation, such as the DoD Chief Information Officer (CIO) or the Joint Interoperability Test Command (JITC).
  • Engage in regulatory dialogue and negotiation with other countries or regions that have different or conflicting regulatory regimes for IoMT devices, such as the European Union (EU) or the North Atlantic Treaty Organization (NATO).

The Best Practices and Tools for IoMT Systems Development

The Internet of Medical Things (IoMT) is a network of connected medical devices and sensors that can collect, transmit, and analyze health data. IoMT has the potential to improve patient care, reduce costs, and enable personalized healthcare. However, IoMT also requires careful planning and execution to ensure its quality and performance. In this article, we will provide some best practices and tools for IoMT systems development, such as standards, frameworks, models, simulations, software tools, hardware tools, security tools, etc. We will also provide some examples of how these practices and tools can help improve the quality and performance of IoMT systems.

Standards

Standards are sets of rules or guidelines that define the specifications, requirements, or characteristics of a system or a process. Standards can help ensure the compatibility, interoperability, reliability, safety, and security of IoMT systems. Some of the standards that are relevant for IoMT systems development are:

  • Health Level Seven (HL7): A set of standards for health information exchange and integration among different health information systems.
  • Fast Healthcare Interoperability Resources (FHIR): A standard for representing and exchanging health data using a common format and a RESTful API.
  • IEEE 11073: A family of standards for medical device communication and interoperability.
  • ISO/IEEE 11073–20701: A standard for personal health device communication using the Continua Design Guidelines.
  • ISO/IEC 27001: A standard for information security management systems.

Frameworks

Frameworks are sets of concepts, principles, methods, or tools that provide a structure or a foundation for developing a system or a process. Frameworks can help guide the design, development, testing, deployment, and maintenance of IoMT systems. Some of the frameworks that are relevant for IoMT systems development are:

  • Internet of Things Architecture (IoT-A): A reference architecture for IoT systems that defines the functional components, interfaces, communication protocols, and security mechanisms.
  • Open Connectivity Foundation (OCF): A framework for IoT device discovery, connectivity, data exchange, and security.
  • Open Mobile Alliance (OMA): A framework for IoT device management and service enablement.
  • Continua Design Guidelines: A framework for personal connected health devices that defines the use cases, data models, interfaces, and protocols.
  • NIST Cybersecurity Framework: A framework for managing cybersecurity risks for critical infrastructure systems.

Models

Models can help understand, analyze, simulate, optimize, or verify a system or a process. Models can also help communicate or document the design or the requirements of a system or a process. Some of the models that are relevant for IoMT systems development are:

  • Unified Modeling Language (UML): A general-purpose modeling language for software engineering that defines the syntax and semantics of various diagrams, such as use case diagrams, class diagrams, sequence diagrams, etc.
  • Systems Modeling Language (SysML): An extension of UML for systems engineering that defines additional diagrams, such as requirement diagrams, block definition diagrams, parametric diagrams, etc.
  • Business Process Model and Notation (BPMN): A standard for modeling business processes using graphical symbols and flowcharts.
  • Domain-Specific Modeling Languages (DSMLs): Customized modeling languages for specific domains or applications, such as medical devices, health records, sensors, etc.
  • Ontologies: Formal representations of the concepts, relationships, and rules in a domain or an application using a logic-based language, such as Web Ontology Language (OWL) or Resource Description Framework (RDF).

Innovations in IOMT:

  • Smart Vehicles: These are vehicles that can communicate with other devices and systems to improve their mobility, performance, and safety. They can also provide autonomous or semi-autonomous features such as navigation, collision avoidance, self-repair, etc. For example, the US Army is developing the Joint Light Tactical Vehicle (JLTV) that can provide enhanced protection, mobility, and network connectivity for soldiers.
  • Smart Drones: These are unmanned aerial vehicles (UAVs) that can communicate with other devices and systems to perform various tasks such as reconnaissance, surveillance, delivery, attack, etc. They can also provide autonomous or semi-autonomous features such as flight control, obstacle avoidance, target recognition, etc. For example, the US Air Force is developing the Skyborg program that can provide low-cost, reusable, and autonomous UAVs that can act as wingmen for manned aircraft.
  • Smart Bases: These are military installations that can communicate with other devices and systems to improve their security, efficiency, and sustainability. They can also provide smart features such as energy management, waste management, water management, etc. For example, the US Army is developing the Smart Installation Energy Management System (SIEMS) that can optimize energy consumption and generation for military bases.
  • Smart Health: These are health care devices and services that can communicate with other devices and systems to improve the health and well-being of soldiers and veterans. They can also provide smart features such as remote monitoring, diagnosis, treatment, prevention, etc. For example, the US Department of Veterans Affairs (VA) is developing the VA Telehealth Services that can provide access to health care for veterans through video conferencing, mobile apps, online portals, etc.
  • Smart Training: These are training devices and services that can communicate with other devices and systems to improve the skills and knowledge of soldiers and veterans. They can also provide smart features such as simulation, gamification, feedback, personalization, etc. For example, the US Army is developing the Synthetic Training Environment (STE) that can provide immersive and realistic training scenarios for soldiers using virtual reality (VR), augmented reality (AR), and artificial intelligence (AI).

Summary:

In conclusion, the Internet of Military Things (IoMT) is revolutionizing the way military operations are carried out. From land to air, sea to space, and even cyberspace, IoMT is connecting devices, sensors, and wearables to enhance situational awareness, risk assessment, and response time for soldiers and commanders alike. With the help of edge computing and biometrics, IoMT is empowering military personnel to make better decisions in real-time, and stay one step ahead of the enemy. However, scalability, interoperability, security, privacy, ethics, and regulation are all critical issues that must be addressed when developing and implementing IoMT systems. By following best practices and recommendations, we can ensure that IoMT systems are effective, safe, and secure, and that they uphold ethical and legal standards. So, let’s embrace the power of IoMT, and take military operations to the next level!

--

--

Abhishek Biswas
The Generator

Technologist | Entrepreneur | Writer | Mentor | Industrial Ambassador | Mighty Polymath