Blockchain Will Be A Trusted Military Solution

The US army wants to ensure that the flow of data through terrestrial and satellite networks is trustworthy, and blockchain technology may be the key to an innovative solution. The use of blockchain technology is becoming more widespread in security and military applications. 

Blockchain is a database that is shared across a network of computers. The computers in the network, called 'nodes', check the details of the trade to make sure it is valid.

It is a digital ledger of transactions that can be programmed to record everything of value in order to help exchange various values in a transparent, conflict-free way and it does not use a middleman, and has no need for a central authority to approve transactions. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. 

Now some militaries worldwide want to leverage the super secure nature of blockchain technology in its communications. 
In 2016, NATO’s Communications and Information Agency (NCIA) hosted the 2016 Innovation Challenge requesting solutions such as military-grade blockchain applications. The organisation called for blockchain applications regarding military logistics, procurement, and finance as well as “other applications of interest to the military”.

The US Army’s Space and Terrestrial Communications Directorate (S&TCD) is looking to blockchain to check breaches and cybersecurity issues in communications data. The solution has to include a machine learning-based service that tracks and blocks malicious structured and unstructured messages. It would track messages through the network from producer to consumer and will be able to automatically detect message modification.

Machine learning and blockchain will be used in processes like user authentication and sharing trust information. The plan is to have blockchain consensus algorithms suited for disconnected, intermittent, and limited bandwidth environments, according to sociable.co. 

The authentication service will leverage machine learning, user/system data, and network threat history and status to develop trust measures for each user within a system or network.

As the request for information elaborates, “this authentication service should enable tracking of user trust values within the blockchain while allowing dynamic removal or addition of users to the blockchain during its lifecycle.”

The development will deliver real-time and quantitative analytics upon the receipt of messages or data, while leveraging ML-based techniques on historical data.

“In the coming years, the defense research community is expected to search for new applications for the military based on blockchain technology with predominant candidate areas such as cyber defense, secure messaging, resilient communications, logistics support and the networking of the defense Internet of Things,” evaluates eda.europa.eu.

I-HLS

You Might Also Read:

Communications Satellites Are Vulnerable:

Pentagon Cybersecurity is Falling Behind:

 

 

 

« China’s Dirty Secret - Intellectual Property Theft
Improving Electric Power-Grid Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.