Blockchain Will Be A Trusted Military Solution

The US army wants to ensure that the flow of data through terrestrial and satellite networks is trustworthy, and blockchain technology may be the key to an innovative solution. The use of blockchain technology is becoming more widespread in security and military applications. 

Blockchain is a database that is shared across a network of computers. The computers in the network, called 'nodes', check the details of the trade to make sure it is valid.

It is a digital ledger of transactions that can be programmed to record everything of value in order to help exchange various values in a transparent, conflict-free way and it does not use a middleman, and has no need for a central authority to approve transactions. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. 

Now some militaries worldwide want to leverage the super secure nature of blockchain technology in its communications. 
In 2016, NATO’s Communications and Information Agency (NCIA) hosted the 2016 Innovation Challenge requesting solutions such as military-grade blockchain applications. The organisation called for blockchain applications regarding military logistics, procurement, and finance as well as “other applications of interest to the military”.

The US Army’s Space and Terrestrial Communications Directorate (S&TCD) is looking to blockchain to check breaches and cybersecurity issues in communications data. The solution has to include a machine learning-based service that tracks and blocks malicious structured and unstructured messages. It would track messages through the network from producer to consumer and will be able to automatically detect message modification.

Machine learning and blockchain will be used in processes like user authentication and sharing trust information. The plan is to have blockchain consensus algorithms suited for disconnected, intermittent, and limited bandwidth environments, according to sociable.co. 

The authentication service will leverage machine learning, user/system data, and network threat history and status to develop trust measures for each user within a system or network.

As the request for information elaborates, “this authentication service should enable tracking of user trust values within the blockchain while allowing dynamic removal or addition of users to the blockchain during its lifecycle.”

The development will deliver real-time and quantitative analytics upon the receipt of messages or data, while leveraging ML-based techniques on historical data.

“In the coming years, the defense research community is expected to search for new applications for the military based on blockchain technology with predominant candidate areas such as cyber defense, secure messaging, resilient communications, logistics support and the networking of the defense Internet of Things,” evaluates eda.europa.eu.

I-HLS

You Might Also Read:

Communications Satellites Are Vulnerable:

Pentagon Cybersecurity is Falling Behind:

 

 

 

« China’s Dirty Secret - Intellectual Property Theft
Improving Electric Power-Grid Security »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Crowe

Crowe

Crowe is a public accounting, consulting, and technology firm that combines deep industry and specialized expertise with innovation.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

Repello AI

Repello AI

Repello - making AI safe to trust. We help you continuously red-team your GenAI applications against ever-evolving AI threat landscape.