Blockchain Will Be A Trusted Military Solution

The US army wants to ensure that the flow of data through terrestrial and satellite networks is trustworthy, and blockchain technology may be the key to an innovative solution. The use of blockchain technology is becoming more widespread in security and military applications. 

Blockchain is a database that is shared across a network of computers. The computers in the network, called 'nodes', check the details of the trade to make sure it is valid.

It is a digital ledger of transactions that can be programmed to record everything of value in order to help exchange various values in a transparent, conflict-free way and it does not use a middleman, and has no need for a central authority to approve transactions. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. 

Now some militaries worldwide want to leverage the super secure nature of blockchain technology in its communications. 
In 2016, NATO’s Communications and Information Agency (NCIA) hosted the 2016 Innovation Challenge requesting solutions such as military-grade blockchain applications. The organisation called for blockchain applications regarding military logistics, procurement, and finance as well as “other applications of interest to the military”.

The US Army’s Space and Terrestrial Communications Directorate (S&TCD) is looking to blockchain to check breaches and cybersecurity issues in communications data. The solution has to include a machine learning-based service that tracks and blocks malicious structured and unstructured messages. It would track messages through the network from producer to consumer and will be able to automatically detect message modification.

Machine learning and blockchain will be used in processes like user authentication and sharing trust information. The plan is to have blockchain consensus algorithms suited for disconnected, intermittent, and limited bandwidth environments, according to sociable.co. 

The authentication service will leverage machine learning, user/system data, and network threat history and status to develop trust measures for each user within a system or network.

As the request for information elaborates, “this authentication service should enable tracking of user trust values within the blockchain while allowing dynamic removal or addition of users to the blockchain during its lifecycle.”

The development will deliver real-time and quantitative analytics upon the receipt of messages or data, while leveraging ML-based techniques on historical data.

“In the coming years, the defense research community is expected to search for new applications for the military based on blockchain technology with predominant candidate areas such as cyber defense, secure messaging, resilient communications, logistics support and the networking of the defense Internet of Things,” evaluates eda.europa.eu.

I-HLS

You Might Also Read:

Communications Satellites Are Vulnerable:

Pentagon Cybersecurity is Falling Behind:

 

 

 

« China’s Dirty Secret - Intellectual Property Theft
Improving Electric Power-Grid Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

European Data Protection Supervisor (EDPS)

European Data Protection Supervisor (EDPS)

The EDPS is the European Union’s independent data protection authority. We monitor and ensure the protection of personal data and privacy when EU institutions and bodies process personal information.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.