Blockchain Will Be A Trusted Military Solution

The US army wants to ensure that the flow of data through terrestrial and satellite networks is trustworthy, and blockchain technology may be the key to an innovative solution. The use of blockchain technology is becoming more widespread in security and military applications. 

Blockchain is a database that is shared across a network of computers. The computers in the network, called 'nodes', check the details of the trade to make sure it is valid.

It is a digital ledger of transactions that can be programmed to record everything of value in order to help exchange various values in a transparent, conflict-free way and it does not use a middleman, and has no need for a central authority to approve transactions. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. 

Now some militaries worldwide want to leverage the super secure nature of blockchain technology in its communications. 
In 2016, NATO’s Communications and Information Agency (NCIA) hosted the 2016 Innovation Challenge requesting solutions such as military-grade blockchain applications. The organisation called for blockchain applications regarding military logistics, procurement, and finance as well as “other applications of interest to the military”.

The US Army’s Space and Terrestrial Communications Directorate (S&TCD) is looking to blockchain to check breaches and cybersecurity issues in communications data. The solution has to include a machine learning-based service that tracks and blocks malicious structured and unstructured messages. It would track messages through the network from producer to consumer and will be able to automatically detect message modification.

Machine learning and blockchain will be used in processes like user authentication and sharing trust information. The plan is to have blockchain consensus algorithms suited for disconnected, intermittent, and limited bandwidth environments, according to sociable.co. 

The authentication service will leverage machine learning, user/system data, and network threat history and status to develop trust measures for each user within a system or network.

As the request for information elaborates, “this authentication service should enable tracking of user trust values within the blockchain while allowing dynamic removal or addition of users to the blockchain during its lifecycle.”

The development will deliver real-time and quantitative analytics upon the receipt of messages or data, while leveraging ML-based techniques on historical data.

“In the coming years, the defense research community is expected to search for new applications for the military based on blockchain technology with predominant candidate areas such as cyber defense, secure messaging, resilient communications, logistics support and the networking of the defense Internet of Things,” evaluates eda.europa.eu.

I-HLS

You Might Also Read:

Communications Satellites Are Vulnerable:

Pentagon Cybersecurity is Falling Behind:

 

 

 

« China’s Dirty Secret - Intellectual Property Theft
Improving Electric Power-Grid Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.