Contents

1. Joint Communications for Enabling Conventional Kinetic Operations Maj Gen C Mani and Lt Col Vikrant Sharma 11 2. Emerging Platforms for Control in Joint Networks Harpreet Singh 24 3. Conflict in the Instantaneous Age Brig Ashish Chhibbar and Brig Vivek Verma 29 4. Achieving Synergies in Defence Forces Through Network Centric Warfare System Deepika Gupta, Rupesh Rawat, Devesh Mishra and Nitin Gera 40 5. Collaborative Defence R&D: Indian and International Perspective Gopal Bhushan and M Madhusudan 48 6. Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Communication Infrastructure to Empower the Joint Operations N Kishor Narang 58 7. Spectrum Management for Tactical Battle Field Networks Brig Navjot Singh 75 8. Reorganisation of Indian Spectrum Administrator Maj Gen LB Chand, VSM (Retd) 80 9. Cyber and Electronic Warfare: Technology Enablers and Challenges Maj Akhilesh Singh 96 10. Tri Services Training in Joint Environment Col Deven Makhija 105 11. Computational and Correlational Data Analytics for Increased Military Effectiveness Brig A Shridhar 112 12. The Role of SDR as an Enabler in Joint Operations Col Rohit Nandan Prasad 117 13. Threatscape Segmentation: Network Invigilation for Realizing Vulnerable Assets using Neural Analytics (NIRVANA) to Mitigate Zero Day Attacks Lt Col Vivek Bardia, Lt Col Gaurav Upadhyay, Lt Col Raja Vijit, Lt Col Akshay Sati and Lt Col Yogesh Sati 123 14. SATCOM—Last Mile Secure Connectivity to Difficult Terrains of Tactical Battle Area MR Sujimol, Anita Panday and K Shahana 132 15. Mobile Communications using Modified 4G LTE and Futuristic 5G for Joint Operational Environment Col A Oberoi 139

9 Contents Vol. 4 No. 1 2019

16. Developing Synergy and Jointness in Cognitive and Social Domains Col K Pradeep Bhat (Retd) 151 17. A Framework for Implementation of Smart Documents for Armed Forces Maj Kunal Pal and Dr CRS Kumar 155 18. Technology for Standardization of Sensor Data from Legacy Heterogeneous Sensors in Tactical Surveillance Application for Joint Operations Vandana, Sanjay Motia, Pradeep and Anoop Kumar Rai 169 19. Private LTE Networks for Defence Critical Communications and Digital Defence 4.0 Philippe Agard, Public Safety and Defence Segment Leader 179 20. Communication as a Decisive Catalyst for Jointness Lt Col Prabhmeet Singh Manik, SM 186 21. Machine Type Communication & Internet of Everything (IoE) Col Rajesh Kapoor 193 22. Joint Framework for Integrating Disparate Security Solutions Col Munish Tuli and Lt Col Aashish Joon 197 23. Joint Enterprise Cloud for Armed Forces Lt Col Sumit Gupta, SM 202 24. Unified Cyber Security Risk Management Framework for Enhancing Jointness of Operations Lt Col Sudipto Roy 208 25. Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Artificial Intelligence and Block Chain Technologies Lt Col Apurva Bhatnagar 219 26. Practical Solution for Secure Network in a Quantum Computing ERA Anindita Banerjee and M T Karunakaran 232 27. Future of Cryptography: Quantum Key Distribution through Micro-Satellites Col Kapil Jaiswal 247 28. High Performance Network Forensics and Anomaly Detection on Commodity Hardware Kunal Sadalkar, M Hemavathy and M Akila 256 29. HR Strategies in Support of Joint ICT Structures Brig Ramesh Balan 261 30. Utilizing Decentralized Technology for HRM Advancement Avnish Singh Jat, Rajkumar Pandey and Akshay Singh 268

10 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Joint Communications for Enabling Conventional Kinetic Operations

Maj Gen C Mani and Lt Col Vikrant Sharma

Abstract—As the armed forces strive to modernise, paucity of resources will necessitate optimising through

first deciding on the capability needed to be achieved to meet the threat environment. Capability based planning will need to supplement and eventually supplant the current threat based planning paradigm. The acquisition of a network centric warfare capability that seamlessly integrates the sensor-decision maker- shooter grid must therefore be a national priority. Relevant scenarios for joint operation/mission range from low intensity operations, Humanitarian Assistance and Disaster Relief (HADR) Operations to high-intensity combat operations like Amphibious operations, Air Land Operations (ALO) / Battle, Air Transport Operations, partMaritime in operations Air Operations coordinate (MAO) all etc activities against broadacross spectrum all instruments of adversaries of power ranging from fromthe earliest organised stages militaries of the to belligerent regional powers to violent extremist organizations. It is important that services/ agencies taking

preparatory build up and planning process. 1. INTRODUCTION 1.1.2

1.1 General This decision is expected to give an impetus 1.1.1 serviceespecially cooperation to jointness is andweak integration and efforts among for Warfare at the national level consists armed forces. The existing structure for cross- of coordination, orchestration and in duplication of efforts, wastage of resources synchronisation demanding complete jointmanship are proceeding slowly, resulting

1.1.3and delay in decision making. integration of all elements of national power. world, where civilian control over the armed Modern warfare calls for simultaneous In most of the advanced democracies in the and seamless application of all elements of a single point military advisor to the highest warfare, kinetic or otherwise, synergising the politicalforces is decision completely making established, entity of the the role state of

capabilities and resources of the three services. is institutionalised. Peace loving India has NewAll five and domains emerging – land, concepts, air, sea, technologies space and cyber and succumbed to the realities of its extremely space are to be exploited with maximum effect. volatile neighbourhood and the political hierarchy has finally approved appointment techniques must also be employed to use force of Chief of Defence Staff (CDS) for the three cohesively and in an orchestrated manner. coordination,services. The ideaeconomical to have usea CDS of isresources essential and for Joint planning & application, joint training, defence reforms, jointness, multi-disciplinary joint doctrines, compatibility in equipment & procedures and last but not the least joint standardised procurement. 11 communication is a prerequisite. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

1.1.4 again proven their mettle in military as well

Next step required to make CDS effective is as non-military actions in local, regional and creation of Integrated & Joint Commands. multi-lateral operations and exercises. The Theatre commands are the key to transforming Indian Army had covered itself with glory the armed forces as joint forces. Same name, Kennedyduring World was quite War-II, right but when could he not stated repeat that its same regions but different HQ leads to performance in 1962. Galbraith in his letter to diverging strategies. This prevents jointness and seamless performance in times of conflict Indian tactics had not evolved from World War- or war. Without Integrated or Joint Commands II and was ineffective against a China steeped ofthe commands services would will notfurther be able lead to transformto creation into of in guerrilla warfare. The Chinese had perfected a single, war fighting machine. Theaterisation the art of guerrilla warfare after fighting with the Kuo-Min-Tang for 22 long years. The Indians a HQ with joint communications, intelligence, performed exceedingly well when facing frontal 1.2surveillance Aim and air defence systems. attacks as at Bum La, Nuranang, Gurung Hill or Rezang La. The lack of high angle artillery 1.2.1 weapons affected the quality of fire support. openAmmunition or landed which in gorges had to and be resuppliedcrevices from by air using reusable parachutes mostly failed to To establish the requirement of joint communication as an enabler for conduct of where they were almost impossible to recover. joint operations. 1.3 Scope mostThe Chinesecritical factor on the was other the lack hand of offensive were well air equipped with howitzers and mortars. The 1.3.1 all the advantages for employment of air was support. Keeping the IAF out of the war when overwhelming qualitative and quantitative This paper has been laid out in the following forceheld bysuperiority India was andill considered. the quantum However, difference the parts:- in infrastructure development on the two sides (a) Part-I: The Indian Experience of Inter Services Cooperation. (b) Part-II: Communication Planning For 2.2could have had only one result. Joint Operations. (c) Part-III: Barriers To Joint Communication. In 1965, suboptimal utilization of air assets reflected the lack of joint planning and the (d) Part-IV: Way Ahead- Integrated Management ineffectiveness of joint organisations for tactical Communication & Communication air support on the battlefield. Indian air support 2. PART - I : THE INDIAN EXPERIENCE first arrived at 5.30 PM on 01 Sep almost 12 OF INTER SERVICES COOPERATION hours after it was demanded by the Chhamb Brigade Commander, by when it was impossible 2.1 to distinguish friend from foe. The demand for air support was itself inexplicably delayed. Ideally, air support should have been available The Indian Armed Forces have time and 12 Vol. 4 No. 1 2019 Joint Communications for Enabling Conventional Kinetic Operations at dawn, since the attack had commenced

at Jaisalmer air base. Better force application just before first light. This could be condoned could have been achieved if airfields at Uttarlai, since India was taken by surprise at Akhnur. Jodhpur and Nal had been synchronously forWhat go isahead inexcusable with the however, operation is thewas lack given of airon used. The naval power was well utilized, but a support in the Punjab sector when the orders synergized application of the IAF and the Navy 2.4in the bombing of Karachi was absent. 03 Sep, three days before 11 Corps attacked the Ichogil canal. A far more grievous error was to neglect taking out of Pakistan airbases and In 1999, the self-imposed constraint of not radars once the attacks on Punjab had been crossing the LoC ensured that combat power launched. Instead the Pakistan Air Force (PAF) was not employed optimally. The limitation of got the first blow in demolishing 10 aircraft muchnot crossing more casualties the LoC resultedas its approaches in curbing were the andon theJamnagar runway were in Pathankot.not attacked Fortunately, synchronously for effectiveness of the IAF. The Army had to suffer India, the other airfields at Adampur, Halwara inordinately high especially in an environment Navy too was not employed, despite the attack restricted. By any standard these casualties are and hence suffered relatively lesser losses. The where the Pakistan Army formally did not outon Dwarkaroutine bymaintenance the Pakistani again Navy. calls The into fact enter the conflict and the PAF was kept out questionthat India’s the only lack aircraft of foresight carrier as wasthis carryingroutine of the picture. This highlights the lacunae in surveillance, targeting and Post Strike Damage Assessment (PSDA), due to shortage of effective maintenance could easily have been postponed. sensors that could be deployed in high altitude Lack of response to the bombing of Dwarka Port further,areas. The reduced shortage the of synergistic modern communication, application of further emboldened Pakistan by making them interception and direction- finding equipment ofbelieve the Defence that the Minister Pakistani to restrain Navy’s the writ Navy ran for on the Arabian Sea. However, a conscious decision army and air power. The Indian Navy carried out an effective blockade of the Karachi port fear of escalation appears to be the real reason. adding to its political isolation but did not really 2.3 2.5affect the conduct of operations.

1971 witnessed better joint planning. In Therefore, when viewed critically it appears East Pakistan, however, there were 11 IAF that lots more needs to be done to move up squadrons against just one squadron of the planningthe value and chain implementation of cooperation-coordination- is a serious PAF. While fears of Chinese intervention might jointmanship-integration.The lack of joint have been the reason for this, it was an overkill. Thinning out of IAF resources for utilization on lacunae that can only be addressed by the Western Front could have been considered. revamping the existing individual Service A more synergized application of airpower in takespecific time, structures communications and empowering are a fundamental the Chief the Jaisalmer and Barmer sectors could have of Defence Staff (CDS). While this will inevitably resulted in greater destruction of the Pakistani mechanized Forces. The Longewala battle too enabler to integration and need to be addressed was fought only by the four Hunter aircraft 13 on priority. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3. JOINT KINETICS OPERATIONS procedures and ensuring a clearly understood PLANNING

3.1 and recognised lexicon for joint communication procedures. The challenges are perhaps best exemplified in the conduct of amphibious operations. Superimposed on the Service inLack three of jointmanship can be likened to running requirement for command and control of a three-legged race with all the three legs going specific communication system is the additional different directions. The principles for the Amphibious Task Force (ATF) over the communicationsjoint planning have planning: the following imperatives all of which can be empowered through joint Amphibious Operations Area(AOA). Some of the planning considerations are given below: (a) Unity of Effort. (a) Communication planning for ATF should be compatible with tactics and (b) Concentration of Force. techniques employed by each service (c) Economy of Effort. operationsas part of overallon land, force. sea and Operations air involving are (d) Freedom of Action through a directive characterised by peculiar nature of style of command. understood across all echelons of dissimilar forces. Communication setup (e) commandClearly defined permit objectives concentration that areof of command, control, coherence and planned must assure effective exercise

coordination of fire support. kinetic effects. This will also inject the widely separated areas for a particular initiativerequisite within flexibility the tooverall the commandcontours (b) Elements of the ATF may operate across elements and enable them to take the phase of the amphibious operation. laid down by the Joint Task Force (JTF) Communication requirements for every commander. phase, therefore needs to be planned in detail. A measure of duplication will be (f) Security of plans are anetworks imperative will in only this era of information warfare. Multiplicity an inescapable requirement and merit of Service specific n employment of additional resources. The communication plan should also 4. PART-II:increase COMMUNICATION the points of vulnerability. PLANNING PRINCIPLES FOR JOINT OPERATIONS ensure operation by the force without undue interference between various elements. 4.1 forces as a passive measure of def (c) againstSeparation air of& missiles individual increases ships andthe requirement for long range radio The principles for joint operations planning reflect the challenges for the three Services in a complex and uncertain security environment. communications. Accordingly, allocation theCommunications challenges are as in evidentensuring are cross critical cultural to inof communicationthe light of naval equipment and landing on boardforce awarenessconduct of of such the operations.respective Incommunication our context ships must be considered carefully

requirements. The communication 14 Vol. 4 No. 1 2019 Joint Communications for Enabling Conventional Kinetic Operations

equipment allocated for the control of or

planned with particular consideration also provide for establishment of ofuse nature by helicopter of the borneterrain forces and distancemust be communications in the Pier or Beach Areas to control embarkation. Early liaison and coordination must be which may exist initially between area established between corresponding of operation ashore and the amphibious Naval and Landing Force elements to task force. ensure efficient communications during Communication During Rehearsal embarkation. (d) theThe need geographical for special location and alternate of the Phase. amphibious objective area may dictate (h) means of communication to cater for order to test communication systems, equipment and (i) In fading especially in HF long range techniques the overall plan should communications. provide for full scale rehearsal of command, tactical and administrative communications arrangements (e) communicationPlans must requirement ensure that of theall for all elements of the task

elements of the amphibious task force requirements during the conduct of communication circuits and radio force. Communication security netsare metand bythat specific these provisions technical provision are fully of rehearsals may dictate adoption of the following precautionary measures: Communication During Planning coordinated and integrated. Phase (f) ensured. Communicationat the very commencement planning must of (aa) Use of min power for be integrated and same should be transmission. participants from three services at (ab) theChange security of desired frequencies must the planning phase between all major and call signs. However, communication security is essential to plans,the command and maintenance level. Preservation of same is of be weighed against the paramount importance since initially theambiguity operation which as might a result result of during subsequent phases of

planning headquarters are separated by this change. Communication During Embarkation large distances. Phase (i) Communication During Movement To (g) plans must provide for adequate willThe Objective.require naval Plans forces for communications to provide all . Before embarkation commences during the movement to the objective, naval, ground and air forces to integrated communications between particularlyexternal and radiointer shipis severely communications. restricted The use of communication facilities be embarked. The Landing Force to prevent disclosure to the enemy of provisionCommander of (LFC)communications normally willin the locations, movement and intentions be assigned the responsibility of

the embarkation area. Plans must 15 of the ATF. The ATF Commander : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

integrated with follow on naval forces, promulgates the EEP status during airassault force progresses. and logistic It should elements be suitablyfor the thesethe movementrestrictions to and objective provide area.for theCommunication handling of plansimportant must messages cater for desired shore based support in the AOA. (l) Base Development and Garrison within the imposed limitations. Communications. Communications within various (i) Higher HQs may plan to carryout ormovement superimpose groups of the ATF will be provided by helicopters, visual means base development and setting up garrison ashore at the earliest. with the degreed onof radio peace silence time VHF in equipment from three services and UHF radio networks in consonance Communication personnel and

effect. earlyshall beinstallation embarked andof landeda planned with the landing force in order to begin (j) Communication For Naval gunfire support. Plans for communications will require naval forces to provide all advanced base communication during the Naval Gun Fire Support communicationsystems. When such system plans exist,ashore all usable elements of landing force integrationexternal and withinter-ship army communications. artillery units, It would require communication for development of the advanced should be included in the program air force fighter squadron and attack desired softening of enemy positions on base communication. helicopters etc. Unless planned the (ii) These plans may also provide may delay or hamper progress of assault communication ashore for use beach area may not be achieved which uponfor the termination establishment of the ofoperations external

phase. During the assault phase primary and after departure of the ATF (k) Communication During Assault Phase. Commander from the objective area. A joint mobile communication reliance must be placed on radio assigned to the landing force unit for this purpose may be and landing radio forces relay should communications. provide for Communication plans of both naval, air commander for embarkation and During planning, equipping and early establishment ashore. sufficient channels of communications (m) andduring coordination the ship-to-shore which is required movement at all to permit the exercise of command, control duringtraining landing for the and amphibious assault the operation, enemy commander must bear in mind that landing force should cater for the rapid may attempt to deny successful deploymentechelons. Communication and development plans of landing of the force communication system ashore in communication by own forces by means order to ensure facilities to respond to of jamming. Steps must thus be taken to the needs of the tactical situation as the minimise the effect of enemy jamming or 16 interference. These measures include:- Vol. 4 No. 1 2019 Joint Communications for Enabling Conventional Kinetic Operations 5.3 Development of plans for locating Inadequate involvement of Commanders (i) Use of alternate freq and call signs. More often than not the communication (ii) . (DF) enemy jamming stations. for operators from three services planning is assumed to be in place without (iii) Provision of specialised training are laid then the requirements do not meet the giving terms of reference. If terms of reference in anti-jamming procedure. of technological demonstrations and is an desired capability. Capability is independent (iv) The use of authentication Also, communication planning is an important procedures. important aspect of communication planning. (v) superProvisions high forfrequency, other meansinfrared, of communication such as beamed aspect of operational planning and should be adequately addressed. Steps like these may visual, boat/ helicopter messenger. hamper joint communication at an operational to neutralise or destroy enemy 5.4level. (vi) Offensive action to locate and Cultural Awareness strengths and weaknesses of sister services 5. PART -jamming III: BARRIERS stations. TO JOINT . Lack of knowledge of COMMUNICATION communication capabilities is a serious flaw in 5.1 joint planning. Mere visits, sharing of literature and few courses will not bring out the jointness as desired. Non-standardisation of policies The foregoing attempts to bring out the and procedures is also a setback to joint complexity of planning communications for a 5.5communication planning. joint operation. The existing state of integration Security Issues has significant obstacles to achieve seamless communications some of which are described issues due to lack. Lack of of standardised Joint Communication security Planning affects the communication security 5.2below. setup in terms of common algorithms, common Theaterisation of Commands. place theaterisation should see the light of the crypto devices and common/ compatible With CDS in protocol. In turn lack of security can jeopardise 5.6the operational plan. day. Without this, redundant efforts are being made by each service to ensure communication Lack of Joint Exercises for its respective elements. This is leading to . Lack of/ limited poor optimisation of resources and budget. lacknumber of knowledge of Joint Communication of practical aspects Exercises and at primarilyLack of integrationdue to a lack of serviceof will specificas technical data the tri service level leads to non-familiarity, networks like ADN, Navy net and AFNET are familiarity of equipment and procedures for lack of focus with respect to interoperability, solutions exist to integrate at any of the layers of the OSI model. joint operations.

17 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

6. PART - IV: WAY AHEAD: and control and situational awareness. In INTEGRATED COMMUNICATION & this respect, it is of utmost importance to COMMUNICATION MANAGEMENT understand that although personnel with

6.1 Integrated Communication tasks may act on behalf of the commander, the ultimateassigned responsibility joint integrated for JTF communication 6.1.1 rests with the senior leadership. Integrated communication once established Communication specialists must get actively will address a range of issues in order to involved in all analysis, planning, execution/ support the achievement of consistency in management, and assessment/evaluation activity. Communication specialists should be operations and respond to the expectations key actors in the senior leadership’s decision- ofinformation various stakeholders flow throughout in the the JTF. levels Integrated of joint making process. Integrated communication communication also requires the alignment incorporates several processes that need to efforts of all communication agencies within be taken care of by the senior leadership and the JTF and communication between the JTF appropriate assisting functions in order to and other actors for the sake of consistency, be implemented consistently and become credibility, and ultimately effectiveness in effective. These processes should materialise in support of mission accomplishment. Integrated so-called ‘communication management tasks’. communication facilitates JTF HQ internal communication for Command and Control (C2), 6.3 Communication Management staff routine, troop information, and training. Tasks Integrated communication vertically involves reliable and seamless communication of the JTF 6.3.1 HQ Commander and his staff with Higher HQs The following tasks describe the scope of and subordinate commanders to issue, receive communication management for operations/ and clarify direction and guidance, including situations involving more than one service:- plans and orders. In the horizontal dimension, (a) Command and Control (C2). This communication processes will involve JTF to constitutes a communication dependent activity in itself. Designated superiors of understanding, and support of JTF operations. JTF wield power and exercise authority promote JTF objectives and enhance awareness, and direction over subordinates 6.2 Communication Management through communication to convey Anticipated at the Joint orders, instruct and motivate, explain Operational Level the tactical situation and present a role model. Communication is a leadership 6.2.1 function to support unity of effort of It is a leadership responsibility to implement the JTF. Commanders are the supreme superior communication guidance so that communicators and drivers of integrated it becomes effective throughout all levels of communication. Those involved in mission. Integrated communication must build communication management should on helping the JTF senior leadership achieve be authorised to issue direction and guidance to exploit communication their objectives through effective command 18 Vol. 4 No. 1 2019 Joint Communications for Enabling Conventional Kinetic Operations

ensure integration of communication withcapabilities operational and functionsanalysis, planning, and to endsupport state and the actions end-state. undertaken, Effects provide a bridge of reason between Communication Strategy execution and assessment. the context for inter-service/ awareness and understanding (b) . Situational interagency and the orderbasis forto assure continuous this functionality, assessment the Communication Strategy are itof is the important success to of accurately an operation. convey In inextricably entwined. Analysis of the meaning of desired effects to opportunitiesthe Communication and risks, Strategy and provides enables the the identification of requirements, all involved in planning, execution conditionsand assessment. resulting Effects from statements desired transbaseline disciplinary for the assessment and continuous of effects. task, For joint operations it is a cross-dimensional, changesshould thereforein the describeoperational the environment in a comprehensive which needs to be performed by a highly qualified tri services signals staff. way. Effect statements should not Analysis results must be translated and infer how the effect is to be realised. operationalized in order to optimally and functions as well as operation Effects must be measurable and exploit communication capabilities allow to quantify observable system and attribute changes. planners, and finally the Commander. Finally, effects must be feasible, Analysis of the Communication i.e. achievable in terms of timing Strategy includes a variety of different and resources, and assignable to a subjects such as the communication structures and social networks, and it functional lead for their creation. media, IT, leadership, military C2 communication setup, the same (ii) Within the framework of Integrated also significantly overlaps the other areas, e.g. political propaganda and principles must be observed to information infrastructure. Therefore, describe effects to be achieved in the communication domain. andCommunication evolve communication Analysts should strategy involve to in this respect is that effects The most important requirement facilitatevarious Subject materialisation Matter Experts of strategic (SMEs) communication must refer in contributed through integrated Communication for Effect Development objectives. particular to Communications (c) and Information Systems (CIS) (i) thatAn effectresults is from the physicala kinetic and/ or relevantand Command communication and Control aspects (C2) or behavioural state of a system Systems, in order to fully integrate development of effects in the non-kinetic set of actions. An integratedin the planning communication process. Thein effect can be thought of as an intermediate state between the a key task that collectively involves current prevailing state/ situation support of operational objectives is and the military objectives that 19 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

analysis, plans and operational conditions created in the Joint

profound understanding of the of various communication related communicationpersonnel. It must berequirements based on a Communication Setup as a result envisaged, the mandate and carry out an analysis of situation andactivities. end state Communicators desired in order need to identify the actions needed to cause reasonmission that objectives, development as well of effects as the foravailable the integrated capabilities. communication It is for this the signals staff must identify and continuouslythe desired effects.review Subsequently,the resources

fullyneed integrated to be guided with and from phrased a JTF commander’s perspective and mustto be useddetermine in the conductwhether of eachany org comprising of representatives communicationmilitary action. Further,resources the might staff as operational effects. A suitable constituted to include all relevant from three services should be be necessary to support other non- kinetic actions. planning staff will provide guidance functional and capability expertise Contribution To Targeting. All kinetic (ii) It is likely that while the joint and viewpoints. decision of each service to develop (d) Negative effects from failure in actionson the in actions, more detail it willand allocate be the communicationactions are affected can by result communications. in collateral damage, fratricide and especially civilian requires organisational setup to casualties damaging support for the the resources. Activity planning

thedevelop relevant and service de-conflict level to possible create JTF’s mission and attracting attention actions that can be conducted by effectiveof international and securecommunity communication and media. For this reason, the potential effect of identified effects in the Integrated Coordination. Communication Setup. setup should be taken into consideration (f) Coordination is a from the outset of the joint targeting serviceskey task to andpromote main the responsibility integration cycle. Communication analysts and of communication Communicators in all from aspects three of planners, Info Ops and signals staff, should be included at every level of the Communication Activity Planning. targeting process. operations planning, execution and Activity planning constitutes the (e) appropriateassessment. involvement Therefore, considering appropriate and (i) joint signals staff needs to manage the lower end of operational planning. Its aim is to examine the range of keeping in view existing communication capabilities and functions in support of kineticpossible actions (and probable) and desired cause- communication requires harmonisation and-effect relationships between joint operations. Effective and efficient

effects. Effects in communication and synchronization of communication domain may be defined as desired 20 procedures. Vol. 4 No. 1 2019 Joint Communications for Enabling Conventional Kinetic Operations

Communication As A Driver. Driving

(g) dynamic and prompt measurement Each and every member of the ofand effectiveness shaping JTF operationsof communication requires communicateJTF must acknowledge effectively and the lack fact of presently not being able to this in their plans and actions for ofplanning. communication It aids and in related designing activities and of interoperability and implement appropriately adjusting desired effects shaping the JTF’s operations. programs would also serve the to achieve these effects. This task needs analysis of the rapidly changing situation (ii) purposeJoint Signals of promoting Staff educationsituation to be closely linked to the continuous transparency, and a common and activity existing planning communication thus facilitating setup, awareness, information exchange, which provides the baseline for change Training & Education. understanding of the Commander’s JTF msn. intent related to Integrated (h) Communications. Cross-service in all plans and activities and (i) Integration of communication asindividualised it will help training communication should be considered extremely important towards awareness and perception and coordination amongst all advancing the new mind-set requires the assistance of staff elements. It is a primary communicationof the Integrated Communicationspecialists level to ensure such courses are responsibility at each service during staff planning process and working routines as well as subscribed to and in a joint manner general communication training professionalism for provisioning plan more such courses to build

servicesfor personnel signals fromstaff development tri services. understandingof joint communications of individual service and programsInternal signals should leadership enhance and the tri also achievement of a better Literature. A very important measure expectations. to ensure common communication accountability of communicators (i) to the JTF and contribute to ensureoverall missionthat properly success. Ittrained is the procedures between services is to have personnelcommander’s are responsibility empowered to common literature that has been agreed through training and education to and published in both English, Hindi opportunities in order to facilitate and Roman Hindi at a common press. Being able to think, read and act alike layingis a prerequisite down of concrete for establishment procedures for of inthese each requirements. service need Subordinate to involve communication interoperability and educationSignals Cdr and at training the highest programs level that support the development joint operations. A very good example of the same is refuelling of helicopters. It might appear to be a straightforward of the mind-set of integrated task but involves several interrelated tri service communication. 21 aspects adhered to by each service. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Organisational Changes. At the facilitate activity planning, coordination

(j) Apex level there is also a requirement and project communication related of establishment of Staff involved in requirements that have a bearing on Communication Management. Ideally, joint operations. Proposed organisation inthe his SO-in-C appointment should function title since under he theis with authority and defined role is as Director Joint Communications alreadyCDS to dovested justice with to theproviding word ‘Chief’land recommended below:- line communications to all the three (i) Role:

(aa) the senior The Directorleadership Joint in services. With the appointment of the allCommunications aspects of willintegrated assist willCDS performhopefully roles he would other be than allowed spectrum to do his job. This will ensure the existing JCES coordinate communication Joint Communication aspectscommunication. with Hestrategic will Directoratemanagement. composed Alternately, of a Joint it could Director be authorities and direct andexpanded Joint Signals to a Staff selected from communication processes of Joint all internal and external Communication Coordination Working three services. A functional Group (JCCWG) Hethe JTF atwill the operationalcoordinate level communicationon behalf of the commander.efforts with carry out necessary may bestudy set of up current under Joint Communication Directorate to and other organisations and neighbouring commands and future battle requirements and stakeholders in theatre.

Fig. 1: Joint Communication Directorate

22 Vol. 4 No. 1 2019 Joint Communications for Enabling Conventional Kinetic Operations

Authority: communication specialists of (ab) authority Theto Directorrequire JTF HQ staff elements and should be granted the subordinate commands. consultation between JTF or commands and their 7. CONCLUSION(iv) Support Staff from three services agencies (organisations 7.1 representatives) for all issues related to JTF communication. Within his As we try to get better at joint communication, communicationresponsibility for integratingprocesses internal and external we currentlyneed to remember do well in that this Rome arena wasn’t and all built the in a day. There are many gaps between what to directly address all things we would like to do well in pursuit of a he should also be authorised as communication specialists members of the JTF HQ well afully logical mature progression vision of strategictoward closing communication. gaps and It follows from this insight that there should be Deputy Director Joint of subordinate commands. Communications (ii) authority mirrors that of the 7.2building capabilities related to this area. . His role and leadership, and strategic direction coming from director. In addition he exercises Reforms in this area emphasise guidance, command over the Joint Signals Staff and Joint Communication Joint Signals Staff communicationthe top. I also advocateat tactical top-down and operational progress Coordination Working Group. in this area, but when we speak about joint Role: Assist Director Joint (iii) (aa) levels the emphasis should also be for the prospects for bottom-up progress in this area roleCommunications of Director at for lower all intent level and purposes. Mirror the REFERENCESby each service as well. is on coordinating desired IMR, Vol 10 Sep 2019 Issue communicationof competency. support Their focus and disseminate directions on Paper on RMA & Jointness by Arun 1. Sehgal & Vinod Anand. . 2. Authority: behalf of Director. (ab) The staff should 3. USI Journals. be granted the authority to 4. India STRATEGIC Journals. require consultation between

23 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Emerging Platforms for Control in Joint Networks

Harpreet Singh E-mail: [email protected]

Abstract—

We have seen great leaps in digital technology in the recent years. Smartphones, cloud computing, multi-touch tablets, these are all innovations that revolutionized the way we live and work. Technology is evolving at an enormous speed, and it is forcing organizations to adopt these technologies and innovate to stay in business. The new technologies leverage the existing ones, and build on them, while some are completely new. Regardless of the origins, these technologies are designed to bring agility and automation in the world of IT, while dealing with the challenges of securing the IT infrastructures. We shall cover one such innovation in this article viz, Software Defined Networks, that leverages multiple underlying technologies, and try to address its relevance to jointness, which is the theme if DEFCOM this year. 1. SOFTWARE DEFINED NETWORKS (SDN) define policies, and communicate them to 1.1 the underlying network devices to be able to 1.3enforce those policies. anThe emerging Open Networking architecture Foundation that is describesdynamic, Software-Defined Networking (SDN) as toSoftware connect Defined disparate Networks networks generally and provide use the overlay network technologies like VXLAN manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, architecture decouples the network control thesegmentation underlying betweenphysical theinfrastructure various typesalso dynamic nature of today’s applications. This of users. Creating an overlay network on user to any access port on the network, and and forwarding functions enabling the network enforceprovides the the same flexibility set of security of connecting policies for anythe control to become directly programmable and the underlying infrastructure to be abstracted users, regardless of whether they connect to 1.2for applications and network services. the network a wired port, or over a wireless network with different types of users with 1.4network, or even through a VPN connection. varyingWhen we privileges apply this and definition security topolicies, a campus the at the campus level calls for a central policy requirement of a Software Defined Network These networks can be augmented using technologies like Network Behavioral Analysis engine that would define the privilege levels to detect traffic anomalies, any data hoarding wouldof a user/ also device require at the the time central of granting controller access to attempts, or even communication to Command to the network. A Software Defined Network and Control servers, and block network access 24to malicious/ compromised users/ devices. Vol. 4 No. 1 2019 Emerging Platforms for Control in Joint Networks 1.5 upon the security posture of the host depending being run on the devices, and also depending segment different user types on the WAN Technologies like MPLS have been used to upon predefined security policies or even conducting run-time VAPT before allowing wayby creatingof segmenting virtual users routing on andthe WAN, forwarding these network access. Since the entire functionality technologiestables. Although do not this provide is a secure any andisolation scalable or is based on the software defined concept, the rich APIs provided by the control points can be leveraged to add additional elements in the aresegmentation handled in within the same the samemanner LAN. and All hence users/ a authentication workflow and take decisions singledevices compromised on the same user subnet can impact or LAN the segment entire based on additional inputs that are hitherto 1.8unknown to the vendor community. networkLAN segment. topologies Software to segment defined users technologies within in the access networks, can utilize the overlay that there is a central node where all data Having a controller based network also ensures the same LAN segment thereby providing an 1.6additional layer of security and segmentation. ratheris aggregated, than get that discreet can be view correlated of health to gain of insights into the overall network behavior as the central console to provide functions a packet and the policies are enforced at the individual devices. The controller also acts accessTraditional layer networks when the use user IP address connects to identify to the management, and push security policies in network, or when the user reaches the Data asuch coordinated as configuration and cohesive management, manner imageto all centers to access applications. The packets on managed devices. the network are identified solely on the basis 1.9 of IP addresses, and there is no classification/ distinction of packets that belong to different user groups within the same IP address theThe network network in devices the form can of stream metadata, information or even pool. Overlay technologies like VXLAN allow to the controller about the traffic that flows on additional tags to be added to packets, which can be used to identify the origin of the packets the utilization of resources on the devices, or other control plane packets. This rich telemetry and enforce policies based on this additional intelligence and machine learning algorithms, information can be processed using Artificial information in the packets. This allows the packets to carry their identity like an ID badge coupled with the IT best practices fed into all the way on the network, and policies can be the system as policies, to provide actionable enforced at any point on the network. 1.7 networkinsights administrators into the network to proactively health. detect These prescriptive recommendations enable the network access to the users depending upon These technologies can be used to control additionaland remediate feeds incidents such as on threat the network. intelligence The feedsmetadata to contain information risk, and can rapidly be combined detect withand not only the user credentials, but also based on Figure 1 the type of devices that are being used to access the network. The network access can also be mitigate threats. below explains the controlled based on the type of software that is 25 SDN model. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 1 : Software Defined Networks (SDN)

1.10 different networks for its usual (a) In general, the three services uses innovationCisco is in leading the Data this center innovation like Application in the SDN world, and apart from the software defined serviceoperations networks than have it does different for C3Isecurity and intelligence requirements. Different Centric Infrastructure, and Software Defined Wide Area Networks (SD-WAN), Software interoperateprotocols, but are controlling the key the means protocols, to Defined Access (SDA) as a technology can message exchanges and how applications enable organizations realize the benefits of Military networks employ a wide variety policy-based automation, end-to-end secure maintaining control over the networks. timessegmentation, and improve complete resolution network times visibility, and (b) technologies deployed for air, land and automation capabilities to reduce provisioning seaof technologies.operations have The operational communications and

2.enhanced RELEVANCE security onOF the SDNS network. TO EFFECTIVE JOINTNESS security requirements that exceed most meetcommercial strict communicationssecurity oversight operations. and take 2.1 In addition, these service units need to

into account the tactical context and the need-to-know paradigm. managingAgainst theand operating backdrop the of networks the Jointness of the imperative, the problem of designing, planning, (c) asIn in commercial military networks, networks, and network commercial tiers Apart from the need to factor in the nuances are not as firmly defined and separated three services significantly gets complex. practices and protocols, we also need to onorganizations top of their havenetworks; more in complexcontrast of service-specific parameters, operating tosystems the more for identity controlled management and rigorous built consider the following constraints. 26 Vol. 4 No. 1 2019 Emerging Platforms for Control in Joint Networks

encryptionmilitary approach. in military Additionally, networks than there in and segmentation across user groups. is more use of high-end and indigenous Technologies like SD-WAN can be utilized to extend the segmentation in a seamless manner 2.2 commercial networks. across the points of interconnect of. these networks, to ensure that. Policies are consistent not only across one network, but across the Software Defined Networks can provide a firm entire eco-system. hierarchy of network access that is flexible and The following technical benefits can be derived can be adapted to changing requirements of the from a SDN deployment described in this organization. When isolated networks (A, B & document. administratorsC) connect to share have information to deal with and challenges resources to (a) By simplifying the design, planning and using a common IT infrastructure (J), IT management of joint networks, they Figure 2 become more flexible in responding to ensuring end-to-end segmentation and policy changing operational requirements. based access control on the network. (b) Joint networking which need complex 2.3is illustrative. configurations can be enabled by SDN. We need to define interfaces and We can ensure dynamic policy control to software inter-operability points. Software Defined access can help achieve that (c) effectively in such environments. The concept to the remote islands which also have the meet stringent security requirements. of software defined access can be extended requirements of consistent policy enforcement This could also be more responsive and kept simple to ensure it is soldier-proof.

Fig. 2: Flexible Hierarchy of Network Access

27 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

requirements are similar for components, require rapid deployment of monitoring (d) Military operations are fluid and interference between components could dynamismresources across in deployment networks. Flexibilityof network in be reduced and over-provisioning of configuration through software ensures components could be reduced demand, such as in increase of calculation (h) Resources may be reallocated on monitors and choice of metrics. (e) Since device complexity is removed, 3. CONCLUSIONresources or extra bandwidth management of a large number of devices becomes simpler and across 3.1 inter-operable boundaries of multiple vendors. network elements could make use of consideration of security imperatives and (f) Field Data centers with servers and consideringOn the flip that side, military SDN networks requires are likely careful to

SDN technology to allow for network avirtualization, higher degree increased of component network be specifically designed, it is unlikely that this security through common configuration, commercial technology could be implemented consumption “off the shelf,” but would rather need to be interoperability, and reduced energy requiresadjusted, a and high modified degree toof matchopen architectures the needs of the specific service implementation. Joitness (g) We also believe that the network will be cheaper to design and procure as with flexible, inter-operable and extensible the components become more generic, architectures. SDNs meet that requirement.

28 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Conflict in the Instantaneous Age

Brig Ashish Chhibbar and Brig Vivek Verma

Abstract—

The first few years of the twenty first century have witnessed the transition from Information Age to Instantaneous Age, where change is extremely rapid, unexpected and unprecedented with the cyberspace domain being transformed into the most lethal and preferred domain for war fighting. corporations of the instantaneous age wield enormous global influence, wealth and technological advantage and are the new Power Centres of conflict. India with its large demographic and digital dividend is at the centre of major powers rivalry and needs to play its cards very deftly and close to its heart. The time to act is now and here. 1. PART 1: SETTING THE STAGE draining the nation of its wealth through

1.1 Wealth and War creation of trading hubs and strategic logistic 1.1.1 chains based on roads, railways and shipping, thus controlling prices and production. While the World War II saw the vanishing of colonies but it ensured that the strategic structures Alvin and Heidi Toffler in the book ‘War and remained undisturbed. This was replaced by Anti-War’ surmised that the war follows marauders during the medieval times and a neo-colonist model in form of Marshall and the wealth. A fact that India was raided by Molotov plan being practiced by the United States of America (USA) and the Soviet Union was colonized by the European powers was as part of their Cold War competitive strategy all aimed at depriving India of its wealth. The createdto build rivalry alliances across and all new domains supply from chains nuclear for petro-dollar conflict has kept the West Asia resource diversion. The quest to dominate embroiled in a multidimensional conflict to date. The emergence of information as the new to space and deep sea but it was technology domain and data as its wealth-ware has almost which was spearheading the real contest. made it imperative that this ‘new oil’ will shape Military Technological Revolution (MTR) was 1.1.2the future conflicts contours. practiced by the Soviet Union while the United States rechristened it as Revolution in Military 1.1.3Affairs (RMA). Advent of Information and Communication Technologies (ICT) has introduced a new pillar to the existing Trinity model propounded by Some of the technologies shaping the discourse traditionalClausewitz model of Government-Military-Economy. wherein defeating of armies before the end of Cold War in US were Strategic orThe removing wars up the to head World of state War was II followed essential the to Defence Initiative (SDI) (commonly referred as Star Wars programme) and the development of network systems by the Defense Advanced capitulate the nation to surrender. The reliance Research Projects Agency (DARPA). However, was on colonizing and then systematically 29the collapse of Soviet Union prompted : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

and despotic countries gave them the sense internet as it saw the promise in unlocking its Pentagon to scale down SDI and promote towards a model of revenue generation and destinyof empowerment of nations which and in saw the its words manifestation of Gene value as part of the globalization push aimed Sharp an ‘alternative’ and ability to shape the communication platforms not only increased itsconnect penetrative control. power The marriage across ofthe Internet governance with during the Arab Spring in 2010 and - 1.1.4Cambridge Analytica scandal in 2018. and people but it also brought the people and whogovernance was outside structure the tosecurity the fore-front discourse of net the modelInformation with people has redefined as their thefourth Trinity pillar model and frontiers to be guarded. The common citizen of Clausewitz and has given rise to a quad informationwas brought withinto it.the According people in to the Gao democratic Heng, the information overhang across all pillars. The ‘Battle of Depth’ was put in place. The power of evolution of the above model brings to fore following implications (Refer Figure1):

Fig. 1: Changing Nature of Warfare

30 Vol. 4 No. 1 2019 Conflict in the Instantaneous Age

utilising natural resources like manufacturing and supply of oil and minerals has more or (a) People and economy are closely knitted and with no defence mechanism built with them will be the first to be targeted. less stagnated. Real wealth generation is being (b) People and government have close achieved by monetising artificial resources like linkage. Hence, affecting people affects powerdata and centre intelligence. of a state Thirdly,were its thereleadership has been and the government almost instantly. a shift in a nation’s power centre. Earlier, the (c) Information overhang plays on the government. Presently, mega corporations and ‘Observe and Orientation’ loop of the and generate enormous wealth and intellectual private enterprise which have a global presence Observe Orientation Decide and Act capital are the new centres of gravity of a (OODA) loop thus adversely affecting the decision and response mechanism. are the most critical capital and resource of a state. Fourthly, ideas and intellectual property (d) The volatility, uncertainty, complexity have proved time and again that the code or costand option ambiguity of controlling (VUCA) provided and contesting by the state. Major breakthroughs in AI technology information platform makes it a low- algorithm is more powerful than the machine. A the battle space. US $ 35, Rasberry Pi based Artificial Intelligence (e) mannerThe game where will be data played handling in a non-contact systems (AI) system developed by a doctoral graduate mode in both lethal and non-lethal of University of1 Cincinnati was able to defeat a theUS Air shelf Force technology trained pilot and in combat equipment simulation can will add to the efficiency of weapon empowerin June 2016individuals. Fifthly, and easilyweak organisations available off 2. PARTsystems. 2 – EVALUATING THE ENVIRONMENT successfullyto target and target cause and harm destroy to major oil processing states and 2.1 Instantaneous Age organisations. The attack by Houthi rebels to

2.1.1 facility at Abquaiq and Khurais in Saudi Arabia We are presently living in the Instantaneous on 14 instantaneous September 2019 age isis angiving example rise to ofa new this Information age to globaltype of world strategic order empowerment where mega atcorporations low cost. Instantaneous ofLastly, global scale are creating enormous wealth yearsage. The of the transition 21st from Instantaneous age and causing disruptions and paradigm shifts in age happened during the first few previous age based industry and employment each making the agecentury. more The unique, unknown and bases across the globe unprecedentedis characterised fromby a numberthe previous of tectonic known shifts, ages . The wealth which was earlier being generated in decades is now being andof hunter change gatherer has transformed – agriculture from – industriallinear to newgenerated age tech in years gurus and and months innovators, by neo age most Mega of and information. Firstly, the scale of progress Corporations founded in a short time span by

whom1 are teenagers or in early twenties. inexponential the last decade and logarithmic. or so will A more cursory than study prove on emergence of new technologies and businesses Cuthbertson, Anthony. “Raspberry pi-powered AI beats human pilot in dogfight”, Newsweek. 28 June, 2016, from https://www.newsweek.com/artificial-intelligence- this statement. Secondly, wealth generation by 31 raspberry-pi-pilot-ai-475291, accessed on 13 July 2019. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2.1.2 “Digital advances have generated enormous wealth in record time, but that wealth has been concentrated around a small number of These Mega Corporations yield enormous individuals, companies and countries. Under power, overcome and stifle competition, own the current policies and regulations, this trajectory entire eco system and pick flags. There is an all is likely to continue, further contributing to pervasive culture of winner takes it all attitude. rising inequality” 3 Nation states who have a large number of these Intellectual property (IP) and niche technology 2.1.4 based Mega Corporations in turn wield A comparison of the market capitalisation of enormous influence and prosper while states who are serviced by these Mega Corporations reap the benefits of digital empowerment at world’s top 20 companies in 2009 and 2018 grownlow capital and in cost house but generated lose out data on indigenous and more sevenadequately companies proves in the the above oil and statement. gas and In mining 2009, technological advancement, flight of home sector,the top 20three companies companies in the in world technology comprised and of consumer services sector and three companies or less become entirely dependent and at the mercy of the digital eco system created by these of the technology and consumer services sector, in the financial sector. In 2018, eight companies 2.1.3Mega Corporations. only two companies of oil and gas and mining seven companies of the financial sector and What is more surprising is that four of the United Nations Conference2 on Trade and sector comprise the world’s top 20 companies. thisDevelopment tectonic shift (UNCTAD) in wealth creation in their in the “Digital 21st Economy Report 2019” has clearly brought out top ten companies in 2018, namely Amazon, Alibaba, Facebook and did not feature century. It states in the top 100 companies in 2008.

2

2 3

UNCTAD, “Digital Economy Report 2019”from https://unctad.org/en/PublicationsLibrary/der2019_en.pdf, accessed on 25 October3 2019. Ibid, page iv 32 Vol. 4 No. 1 2019 Conflict in the Instantaneous Age 2.1.5

capitalists and angel investors looking to grab Among the world’s 70 highest valued digital a piece of the pie in the formative years. Fifthly, governmental incentives in terms of tax breaks, capitalisationplatforms, bulk share are of based the world in USA in followed this sector by China. US digital companies have a 70% market custom duty exemptions, corporation friendly ofpolicies, the company lenient as bankruptcy well as increasing laws and the ease risk in with the US hosting more than half of the doing business go a long way in fast scaling up 2.2world’s The top 100Age websites. of Mega Corporation 2.2.4taking appetite of the Mega Corporation. 2.2.1

Lastly, once a Mega Corporation is locally well and niche eco system to create and sustain a niche space for its products and services in The Mega Corporations need a very specific established and has been able to carve out of the key ingredients of this recipe are given in them. Herein also lies their vulnerability. Some the hugely competitive global market, there is a need for the government to promote global standards, policies and laws which best serve succeeding paragraphs. 2.2.2 the Mega Corporation’s interests as well as its intellectual property. Then only will the Mega essential ingredients for setting up and whichCorporation results reallyin massive fulfil wealth its global generation ambitions and Peace, stability and rule of law are the most and start creating an exclusive eco system human skill set is the most important asset of sustaining a Mega Corporation. High end niche 2.2.5strategic leverage. these type of new age industries. Such a skill set will never be available in any one region incentivised and motivated to relocate from Since a Mega Corporation requires a very or part of the globe and needs to be suitably generate wealth, a disruption in a part or wholespecific of typethis eco of system eco system will result to sustain in the Mega and different parts of the world and become part of the newly raised company. 2.2.3 Corporation greatly losing out on its wealth 2.2.6creation and strategic leverage. in terms of power, storage, data sets and computationalSecondly, high resource end digital with infrastructurehigh speed Firstly, disruption of peace and stability in the country where a Mega Corporation is based internet access is a key necessity. Thirdly, a will result in a flight of skilled manpower as thriving Science, Technology, Engineering and inwell technology as capital. that Secondly, completely Mega and Corporations suddenly graduatesMathematics and (STEM) research knowledge and development eco system are exceedingly vulnerable to new changes institutionswith large numbers in the geographicalof English speaking vicinity STEM add immense value and potential to new mega overthrow existing technologies, revenue generation models and practices. Introduction of taxi aggregator services like Uber and Ola corporations. Fourthly, funding which was and its effect on local taxi businesses is an a major requirement in earlier years is no example of the above. Thirdly, infringement longer an issue due to large number of venture 33 of Intellectual Property and copying/ stealing : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 of proprietary technology or knowledge will 2.3.2 result in the Mega Corporation losing out on The ITU in its statistical report titled their major leverage to generate clientele and “Measuring the Information5 Society Report wealth. Fourthly, restrictive trade barriers, infrastructure of 192 countries including Volume 2 2018” has done analysis of ICT local laws and policies enforced by countries which host the major clients or generate maximum revenues will also greatly affect the India. The report focuses on three major areas corporation in the long run. Fifthly, change namely mobile services, fixed services and in global standards, laws and trade practices government policy. The report provides some which directly impact the business and interesting observations, namely:- processesrevenue models and lastly, of Mega launching Corporations. investigations, Sixthly, (a) The mobile subscriber base in India is fragmenting the global supply chains and less (87.3%) in comparison with Asia & leadership and mega corporations also add to Pacific (104%) and world (103.6%). In lawsuits and substantial fines/ penalties on spite of this, India has the second largest mobile phones and smart phones in the 2.2.7the list of vulnerabilities. world. It is therefore evident that the only available market for mobile phones and smart phones in the world is India. If a country is able to create a Mega Corporation (b) Our internet access to households and which is capable of giving reasonable individuals is lacking and needs to be competition to an adversary’s Mega Corporation fast tracked. in similar fields then, the winner between the (c) The quality of our internet access in battle of corporations will eventually decide on more than half of population having terms of broadband speed is poor with the net leverage enjoyed by a particular country in the global arena of niche technology. 2.3 India in the Instantaneous Age access speed of 10 Mbit/ sec or less. In comparison, rest of the world’s more 2.3.1 than 80% population enjoys access speeds of 10Mbit/sec or more. The above is an indicator of poor quality of Indian cyberspace is growing at an astonishing 2.3.3 infrastructure. rate with a projected internet population of 6

730 million by 2020. We have the third largest 7 internet population after USA and China and trendsThe Digital concerning in World andsocial Digital media in India usage, report e our internet population grew six times from 2019 by Hootsuite shows some interesting 2012 to 2017 at an astonishing Compounded Annual Growth Rate (CAGR) of 44%. It is commerce activity and mobile usage patterns projected that by 2020, 75% of new internet in5 India. Details of the same are as under:- users would be from rural India and the country ITU Statistical report “Measuring the Information Society Report Volume 2 2018” from https://www.itu.int/en/ITU-D/ 4 will boast of 175 million online shoppers with Statistics/Documents/publications/misr2018/MISR-2018-6 754 % of e-commerce transactions happening Vol-2-E.pdf, accessed on 17 October 2019 Hootsuite report titled “Digital 2019 Global Digital Yearbook” on Datamobiles taken. from cyber security presentation from7 https://wearesocial.com/global-digital-report-2019, by Dr Dr VK Saraswat, member NitiAayog from accessed on 18 October 2019 https://niti.gov.in/sites/default/files/2019-07/ Hootsuite report titled “Digital 2019 India”fromhttps:// CyberSecurityConclaveAtVigyanBhavanDelhi_1.pdf, accessed datareportal.com/reports/digital-2019-india, accessed on 17 on 15 Oct 2019. 34 October 2019. Vol. 4 No. 1 2019 Conflict in the Instantaneous Age

(a) Compared to our population, we have (f) India uses more internet linked banking However,on an average we are lesser the fastestnumber in of the internet world and financial services than the global inas increasing well as active our socialinternet media population users. dueaverage. to our This poor is literacy a very percentages, healthy trend a and needs to be encouraged. However, and second fastest in growth of active (Adding 97,885,001 user in 2018 alone) large number of our internet accessing population becomes susceptible to users (Adding 60,000,000 social engineering and financial cyber in 2018 alone). frauds and crimes. appetite for internet and social media (b) platformsIndians have and shownthis offers an astonishingenormous (g) Indians have shown remarkable digital opportunity to the government as well optimism. They have tremendous services,faith towards provide digitization transparency, and root use out of internet and cyberspace to improve as ICT industry. (c) Our poor literacy figures are a cause of corruption, optimize governance and grave concern as lack of literacy (which distribution of governmental benefits can be considered synonymous to 2.3.4 and enhance overall quality of life. cyberspace literacy) can result in large number of population falling prey to fake news, cybercrime/ frauds and financial All the above information points towards one scams. major fact that India is a major stakeholder in the global ICT arena and has the potential as (d) theIn spite world of andhaving spend poor more internet time speeds,on the Indians generate the maximum data in andwell generate as leverage enormous to create wealth Mega and Corporations, prosperity give competition to existing Mega Corporations internet than the world average. by leveraging its ICT potential including (e) Facebook and You tube are the world’s ofavailability internet access, of a large cloud talent platform pool services of English and most widely used social media apps. educated STEM workforce and cheapest rates India has the largest user base of Facebook in the world with the highest 3.electricity. PART 3 - PLAYING THE GAME growth (YoY). In addition, we have second highest growth of 3.1 users. Our You Tube channels have some of the largest subscriber bases in the world. This all indicates that India is a The 2018 US Defense Strategy and 2019 major revenue provider to global social at the way the competitive strategy is going Chinese White Paper on Defence clearly looks media platforms like Google, Facebook, Instagram, YouTube and WhatsApp. This to be played. While the United States seeks to influence can be leveraged to provide play the game of dominance, China has been India specific infrastructure, resource, calibrating its asymmetric response as a part content and services by the global social of its professed ‘Unrestricted Warfare’. The first media companies. phase of the conflict has unveiled itself as part 35 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 2: Which Regions will Gain the Most from AI?

of the trade-tariff-technology war between Plan,” a three-step development programme the US and China where the Washington has to make China the world leader in artificial accused Beijing of predatory economics and intelligence innovation by 2030, generating stealing of technologies. According to McKinsky more than $150 billion in annual revenue from estimate the AI business potential is between its core AI industry and 10more than $1.5 trillion $3.5 trillion and $5.8 trillion annually across from related industries. China’s goals may be nine business functions in 19 industries. This andambitious, applications but it tohas the put most in motion advanced the levelplan toin constitutes about 40 percent of the overall $9.5 raise its overall artificial intelligence technology trillion to $15.4 trillion annual impact that could potentially8 be enabled by all analytical the world by 2020. In a span of one year from techniques. . Xi in his keynote speech at the 2016 to 2017 the start-up AI investment in real19th Nationaleconomy Congress and advanced of the Communist technologies Party China grew by 11 per cent attracting 48 per called for “deep integration between [China’s] cent of the total investment as compared to 38 9 per cent start-up investment by US businesses. including the internet, Big Data and artificial Moreover, China has also overtaken the US intelligence.” That pledge came on the heels in terms of registering11 AI patents, based on of the July 2017 release by the State Council “artificial intelligence,” “deep learning” and of its “New Generation Notes Artificial from the Intelligence AI frontier: “machine learning.” Applications8 and value of deep learning. 3.2 Michael Chui, J. M. (2018). McKinsky. Retrieved October 30, 2019, from https://www.mckinsey.com/featured- insights/artificial-intelligence/notes-from-the-ai-frontier-9 Why the world should According to 2017 Price Water Cooper (PwC) payapplications-and-value-of-deep-learning#part3. attention to Xi Jinping’s bookshelf Tulchinsky, I. (2018, September 17). analysis, in the total global impact on GDP . Retrieved October 30, outcome due to AI investment China outshines 2019, from World Economic Forum: https://www.weforum. 1011 org/agenda/2018/09/why-the-world-should-pay-attention- Ibid. to-xi-jinpings-bookshelf/. 36 Ibid. Vol. 4 No. 1 2019 Conflict in the Instantaneous Age

the US by garnering 26.1 per cent or $7 trillion tractionaspirations and and increase Gross Domesticshare of involvementProduct (GDP) in with the US coming distant second with 14.5 of the nation needs to be leveraged to generate per cent of GDP or $3.7 trillion. India is way behind with an impact of 10.4 per cent of GDP 3.7the global digital eco system. or $0.9 trillion. (Refer Figure 2). It is quite evident that the 2018 National Defense Strategy theassertion wealth ofgap long-term creation which strategic adversely competition affects Thirdly, India needs to create a large number of with China foundation stone has been laid by Mega Corporations in niche technological areas of AI, block chain, robotics and big data analytics 3.3Washington Courtesy: dominance. PwC Analysis in order to reap the digital dividend of next generational deep impact technologies. These Mega Corporations can only be created if the Tariff-technology war brought about by the US right eco system as elucidated above is created is a well calibrated strategy to kill the running for them to thrive and create space in the global horse. Washington with its leverage is trying to marketplace. One major factor in our favour stifle the Chinese gallop in AI and 5G the future algorithm or code along with vast quantities of datais that sets next as generationalthe primary resource technologies for creatinguse the 3.4of technology. manpower as well as large volume of data is a products and services. The availability of skilled In such a high stake competitive space where considerable traction and lead has been taken major leverage available with us which needs by US, China as well as other technology savvy 3.8to be optimally exploited. countries like Japan and UK, what are the gamealternatives plan is available the moot to question India and which what needs should to be the role of Defence Services in the overall Fourthly, India is situated in the middle of the world’s most violent zone and faces all 3.5be deliberated and answered. available threats and challenges to its peace and security. The challenges range from nuclear showmanship to conventional conflict, Firstly, the primary objective for India is to garner space and elbow room for itself in this cross border terrorism, left wing extremism, maritime security and piracy. Having a peaceful isexclusive critical pie, in whereorder majorityto reduce portion the restslead withand essential ingredient for creating and sustaining US and China. Thus, a whole of nation’s approach and rule based environment is the most approach can only work when the vision, goals increase the speed of chase. Whole of nation’s the Mega Corporation. Herein lies the challenge 3.9for our Defence Forces. and objectives are clearly defined, demarcated 3.6and monitored at each and every step. poorFifthly, digital in spite infrastructure, of rapid progress power made ingrid the andlast generation, demography dividend, large couple of years, India still has a comparatively Secondly, the market size, scale of data cyber security posture. The same needs to be English speaking STEM population and growing 37 fast tracked. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3.10 that war is no longer a massive event that frequently being non-state actors. He argues technologies and products for home Sixthly, need to propagate indigenous 3.12.2achieves well defined political objectives. consumption within India as well as Notwithstanding, the armies across the world becoming the number one choice for ICT are trying to fathom the future course of warfare product and services in the neighbourhood, especially within the Bay of Bengal Initiative for Multi-Sectoral Technical and Economic based on the evolving technologies. Over a Cooperation(BIMSTEC) region is a must in period of time there has been a shift in the 3.11order to become a major regional player. operational doctrine from ‘massing of forces’ to ‘massing of effects’ with quantum reduction in physical contact between adversarial role in international fora, especially those pertainingLastly, there to is promulgationa need to play of a morestandards proactive and forces. The pace of technological reforms in the fields of stealth, stand-off precision targeting, networked Intelligence Surveillance defining global norms, laws and policies in the and Reconnaissance (ISR) and autonomous 3.12cyberspace Understanding dimension. Warfare in the systems have compelled major powers like Instantaneous Age ofthe land, United seas, States, air and Russia outer and space China is overlapping to initiate defence reforms. The traditional battle space 3.12.1 with non- battle space like technological space (Cyber and electromagnetic space), Rupert Smith, a retired British General Officer social space (politics, economics and culture) and cognitive space of human mind. Virtually “weand authorare living of the in abook world ‘The of Utilityconfrontations of Force: Theand Art of War in the Modern World’, asserts that every space is being contested with battlefield in which the clear categories of security and significance. Chaos and complexities added by conflicts rather than one of war and peace; one the non-state actors and mega corporations is used—have merged”12 are affecting security discourse. The reliance defence—the basic purposes for which force of competitive strategy on the use of non-lethal paradigm shift is from interstate. He goes industrial on to argue wars means, asymmetric measures and non-contact that a paradigm shift in war has occurred. This response options has pushed the boundaries of focussed on societies and not states with media 3.12.3conflict across multiple domain using ICT. to war amongst the people. War ‘ends’ are now all elements of national power across multiple platforms bringing the fighting into our living Thus, Non-Contact Warfare seeks to employ therooms. force These rather conditions than achieving have made the conflictsmilitary sovereignty, government structures and timeless with fighting directed at not losing domains to target enemy’s population, with a view to intimidate, paralyse or denude usesobjective. for old Additionally, technology, emerging with opposing threats sides are economy through kinetic and non-kinetic means exploiting new technology and finding new 12 The Utility of Force: The Art of War in the its politico-military response capabilities and Modern World. Smith, R. (2005). enable winning without fighting. In the era of New York City: Vintage. 38 competitive geo-politics, Information Warfare Vol. 4 No. 1 2019 Conflict in the Instantaneous Age

in the instantaneous age are to create, sustain and leverage the wealth and power of Mega deny,will play disrupt the leadand disorientaterole in shaping the battlegovernance space across the continuum of conflict to deceive, demonstrate patriotism and loyalty towards Corporations as these companies pick flags and structures. It will endeavour to create crisis in decision-making where the probability of 4.3their parent country. armed forces being sucked into a subsidiary role may increase. Hence, the challenge for the armed force will be to remain relevant to India is at the cusp of a massive digital revolution engage across multiple domains. 4. PART 4–CONCLUSION and has emerged as a major stakeholder in the global cyberspace domain. It is trying hard 4.1 to make up for lost time and wants to grab a sizeable portion of the global digital eco system pie commensurate with its size, stature and Conflicts in the instantaneous age will one of the most violent hot spots in the world ambition. However, it also lies in the middle of be constant, hybrid, cross domain and which makes the task of creating, sustaining interspersed with moments of extreme violence followed by periods of relative peace, and leveraging Mega Corporations exceedingly createcalm andislands tranquillity. of peace, wealth These and never prosperity ending conflicts will tire out individuals and nations, 4.4difficult and challenging.

4.2around oceans of depravity and violence. contours of instantaneous age and reasons for An attempt has been made to define the

The instantaneous age has given rise to the era conflict and competition in this rapidly changing of Mega Corporations, who wield enormous and evolving era along with options available to gainswealth economically and power across and thestrategically globe. The with nation a India for leveraging its demographic and digital with large number of these corporations dividend. The strategic game being played in this age is highly complex and fast paced and its deep technological divide created between outcome will result in major effects which will the haves and have-nots. Bulk of the conflicts be felt by generations to follow.

39 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Achieving Synergies in Defence Forces Through Network Centric Warfare System

Deepika Gupta1, Rupesh Rawat2, Devesh Mishra3 and Nitin Gera4 E-mail: [email protected], [email protected], [email protected], [email protected]

Abstract Secure and jam proof–Convergence communications in Information anddefence Communication forces in ground Technology, air and (ICT) sea is transforming military operations by providing commanders with information that is unprecedentedinformation in quantity technologies, and quality. Jointness of between the are essential for executing Networksuccessful Centric battlefield Warfare missions. and Asusage the offuture cutting of waredge is communication dependent on technologies such as Software Defined Radiosdefence forces acts as a decisive factor in determining the outcome of a war. This paper elaborates on the enhancing (SDRs) on surface vessels, airborne platforms,C4I2SR groundcapabilities mobile entities and in Ground C4I segments and3D (Tri-services)further its exploitation for Net NCWCentric Command, Control, Communication, Computer, Intelligence, Interoperability, Surveillance, Reconnaissance ( ) for Defence Forces. It also proposes Network Centric Warfare ( ) System architecture and high level solution for development of NCW including C4I2SR capabilities. 1. INTRODUCTION 1.2

cooperation in all the stages of the military Innovation in military is being reinvigorated as processes,Jointness from is research, defined through as cross-serviceprocurement a modern concept despite being conceptualised as integration of strengths of three wings of neededa long time in defence, ago. The during basic peace question time that or during needs militaryand into in operations a coordinated [2][3]. effort It is to also achieve defined a warto be time, answered which iscan that provide when them innovation realistic is scenarios with necessary triggers to move away common goal [4]. It can prove to be a major catalyst in gaining decisive battlefield versatility 1.1from established methods of operation. and confronting uncertainty as joint forces are inherently more flexible and have expanded human warfare to the age of information 1.3capacity as compared to stove piped forces [5]. The modern warfare is rapidly shifting from Jointness also capacitates a new doctrine of warfare known as Network Centric Warfare warfare. The revolution of information (NCW) technology in the field of warfare has provided major thrust for this shift. The Indian armed [6] [7] [19]. NCW is an information forces are one of the most battle-hardened superiority-enabled concept of operations and combat rich force in the world [1]. Lack shootersthat generates to achieve and shared increases awareness, combat increased power of Jointness has been recognized as one of the speedby networking of command, sensors, higher decision tempo of makers, operations, and major weakness and there is an imperative need for an acceptable, pragmatic and implementable Joint warfare structure, system, greater lethality, increased survivability, and a organization and doctrine for armed forces. 40 degree of self-synchronization [6] [7]. Vol. 4 No. 1 2019 Achieving Synergies in Defence Forces Through Network Centric Warfare System 1.4 formed and they provided their consent of the the world. Various committees have been The success of NCW is based on the idea that information is only useful if it enables 2.2importance of joint operations [4] [8] [15] [16]. more effective action. Success key of NCW professionalis not technology mastery but and people mission who willcommand use it requiring– the human high standards dimension, of whichtraining, is education, based on The report entitled ‘Stability in South Asia’ published under Rand Corporation report 1997 raised bundle of points on the capability doctrine, organization and leadership. It is and performance of armed forces [2]. In early about the way people collaborate to share their 1990, report published by committee under managementawareness of strategy the situation is to inimprove order tohuman fight chairmanship of the then Rajya Raksha Mantri more effectively. The purpose of an information challengesSri Arun Singh and alsoimplications raised the on needs Jointness of joint of focus required is the minimum information operation [8]. The report addressed many ability to find data and to understand it. The 2.3defence forces. that needs to be exchanged, how to capture that 1.5information and how to best display it. structure,Synergy between difference defence in operational forces has tactics, many communicationbottlenecks such gap as which different in turn organizational increases To realize net-centricity, there is a requirement to network all airborne platforms, ground sensors and ground C4I system in a single looped the uncertainty among forces while joint Main Net Centric Network through secure IP 2.4operations. criticaland Non information, IP communication including technologies. data from Thethe system will enable disparate units to share is making such a system which networked all The solution for fighting with these bottlenecks battlefield and make speedier decision making. the elements of engaged defence forces and “Network Centric Warfare is the best provide the information according to needs of term to date to describe the way we fight in the Information Age. NCW translates Information superiority into identifyspecific armthe suchsituation as Army, and Air then Force transform or Navy. combat power by effectively linking The system should be intelligent enough to knowledgeable entities in the battlefield” thethem defence as needed forces by to specific work in forces. more integrated Intelligent 2. RELATED WORK networked information technology will enable

2.1 2.5and cooperative manner. coordination among forces in this new era will It is universally accepted that integration and The suggested intelligent Network centric warfare system shall enable the forces to be most needed. Various study reports have perform joint operations in more cooperative been published by defence personals across 41 manner with more flexibility and in more : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

place in the social domain, which is essentially sharing information is happening in real time the convergence of the information, physical, effective way as assembling of forces and among all the heads of deployed wing of force. and cognitive domains. It is here that people This system shall also enhance the resources interact collectively and collaboratively to solve exploitation capability of forces as duplication complex problems. This interaction leads to of resources for various purposes shall be 3.shared NETWORK situational CENTRIC awareness. WARFARE easily identified by the system because of its (NCW) SYSTEM 2.6networked architecture. 3.1 The capabilities associated with network centric warfare [9] [19] and operations are imbedded an intelligent infrastructure to provide real physical and information domains provide the As discussed above, the NCW system defines in the intersection of the four domains. The time monitoring of situation awareness across

Infrastructural and informational foundation different heads of defence forces. This system for information sharing. People perceive and turn it into knowledge; knowledge leads to shall use existing technologies like optical fibre information (which is the cognitive domain) for high speed bandwidth and future technologies like software defined radio for connecting situational awareness. The entire process takes different end elements of defence force.

Fig. 1: NCW Domain Dependencies

42 Vol. 4 No. 1 2019 Achieving Synergies in Defence Forces Through Network Centric Warfare System technologies such as Advanced Decision This system incorporates advanced NCW system is the core part of this information nodes of different forces are shared with sharing architecture. Data of various end most importantly intelligent end user display centralized processing Support Technologies, Tactical algorithms and NCW system for . A 3D strategic NCW ground interface. Components of NCW systems are as theatre view of extended situation awareness Networking Media centre following: - shall be available at . This processed information shall be (a) philosophy with the help of Intelligent Display (i) SDR based Networking distributed to end user as per their operational (ii) Optical Fibre based Networking 4.2Technology. (iii) SATCOM Network open (b) C4I2SR Technology Framework architecture concept and common generic NCW system will be based on (i) Intelligent End User Display interoperability (ii) Advanced Tactical Technologies data format thus enables (iii) Decision Support Technologies the innovation of any particular head of with existing system and does not hamper (iv) Training & Debriefing (c) Security Framework However,defence forces. each head Internally can use all the defence information forces (i) Secure and jam Free Software are self-sufficient and independent to operate. defined Radios as Non IP media media centre which is transformed as per the end (ii) Encrypted data transfer over IP generated from the 3D strategic ground 4. PROPOSED SYSTEM of this system is to generate a Theatre View ARCHITECTURE user operational philosophy. The main focus

4.1 for performing joint operation by sharing real time information [19]. coherent system “NCW is therefore an increasingly framework mainly for tri services which is In this work, we discuss a necessary theory of war to ensure that efficient battle space - critical information gets to those who need it fast, whether it is those on the intelligence,able to present surveillance, a more reconnaissance and awareness built on the ability to integrate battlefield or those making the decisions at HQ [20].” information. All components are connected high level with the help of IP and Non IP based architecture communication technologies. A diagram is given in Fig 2 [10].

43 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 2: High-level Representation of an NCW System 4.3 3D NCW Strategic Ground Centre Reception and transmission - of data, Capabilities (a) 4.3.1 image and video from SDR fitted surface and airborne platforms in a MANET, Theatre View SA generation - other ground C2 system and sub systems. will have high end computing application correlation, association and fusion of The 3D NCW Strategic Centre in Ground (b) tracks as per data received from Performsensors capabilities which will interface with ground C2 system, surface and airborne platform including target extraction through Image Extended Tactical Situation through SDR and also integrate with legacy and Video Processing and Analysis. systems of Indian armed forces. Following are Awareness - (c) the major functionalities of Ground based 3D Picture Generation NCW Strategic Centre. 44 Vol. 4 No. 1 2019 Achieving Synergies in Defence Forces Through Network Centric Warfare System

Search and Rescue SAR the purpose, scope and intensity of (d) search and rescue support ( through) - It can direct be operationsthe enemy. while This entailedplacing premium control over on effectively utilized to provide valuable

communication with non-traditional early action. In unconventional or sub- joint players such as the coast guard, Intelligence Gathering and Targeting conventional conflict, the initiative may local enforcement and rescue crews. not be with the state and pre-emptive (e) and the key to targeting is intelligence- actionSurveillance without proper.and Reconnaissance The key to military power is targeting (h) - intentions, dispositions and the likely operations involve the collection of relating to the potential enemy’s Surveillance and reconnaissance surface and ground sensors regarding pattern of his operations. Intelligence theinformation activities, from forces space-based, and resources airborne, of an strengths,is vital for which identifying in turn thewill enemy’shelp in crucial vulnerabilities, weaknesses and is a systematic and repetitive gathering needs precise intelligence if it is to employ enemy or potential enemy. Surveillance devising an effective strategy. A force radar, infrared, electronic, acoustic of information by photographic, effectprecision and weapons.managing Intelligence change also has a direct bearing on the attainment of Mission Planning or visual means. Information gained operations, mission planning is to from surveillance would be used for (f) integrate military , - In analyse net centric the strategic decision making and building data bases. Aerial reconnaissance atinvolves a particular the visual/photo time to gain information observation elements of battle, coordinate between of specific targets, interests and areas simultaneous operations, re-plan operations on time, evade the conflicts intentions of an enemy about the activities, resources and of resource and maximise the effect of Situation Awareness (SA) rendering– assessmentoperation. It includessystem a decisionand deduction module, which will have an expert system, (i) The composite picture generated is system. Mission planning system tool rendered to the services based on the includes Flight, Route and Airdrop individual context and relevance. planning, Weapon Delivery, Target area planning, Radar predictions, Threat (j) Artificial Intelligence (AI) based Offensive Action analysis, Route fly through etc. inference engine for Intelligence wars, offensive action was the prime gathering and Targeting (g) means of - In conventional (k) Real time training and debriefing seizing the initiative and establishing moral ascendancy over

45 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 3: NCW Capabilities 4.4 Challenges terrain is a crucial element while implementing 4.4.1 Country’s vast size and different physical

the Jointness. Training needs, operational Jointness is a much needed innovation in Jointness shall provide freedom to each head tactics are diverse across the tri-services [18]. military,There is However, not even Civilian a single motivation iota of doubt is thatone Trade-off analysis for their progressiveness and evolveness. of major challenges in adopting the Jointness between Jointness and self- in military especially in case of India [17]. innovation in each head must be done before The services should not have engaged in a adopting such system. Jointness shall not bureaucratic battle over budgetary questions. 46 hamper the revolution in the forces itself. Vol. 4 No. 1 2019 Achieving Synergies in Defence Forces Through Network Centric Warfare System 5. CONCLUSION 7. Office of Force Transformation “The 5.1 Implementation of Network-Centric paper Warfare” www.au.af.mil/au/awc/awcgate/ transformation/oft_implementation_ncw.pdf solution for a distributed monitoring and This has described the NCW system, a 8. Achieving Synergies in Defence, Vinod Anand, control system for the Jointness of defence Senior Fellow, IDSA broad level 9. Network Centric Operations: Background and system architecture, showing that with Oversight Issues for Congress, CRS-48, order forces. We have elaborated the Code RL32411, Congressional Research Service and systems, in addition with advanced 10. John J. Daly, Dr. Andreas Tolk, Modeling andthe help of existing network , technologiestri services and Simulation Integration with Network- intelligent technologies Centric Command and Control Architectures. Paper 03F-SIW-121, 2003 Fall Simulation Triforces Interoperability Workshop sharedinformation can be shared and synchronized 11. For definition of Interoperability, see “Joint commanderoperation canto employ be performed. right capabilities at Vision 2020: America’s Military preparing for picture allows the joint force Tomorrow”, Joint Force Quarterly, also available the right place and at the right time at www.dtic.mil/doctrine/jv2020 philosophy shifts the view of command 12. Aditya Sinha, “Indian Army to Raise US-Type and control community from the system. This Special Forces”, The Hindustan Times, April 20, centric view to the Network Centric View 2003 13. Adams, Gordon and Guy Ben-Ari, Transforming . European Militaries: Coalition Operations and the Technology Gap (Oxford: Routledge, 2006) evolvementNCW system to shall ensure strengthen the innovation inter services in each cooperation with independent-ness of self- 14. Air Force briefing on “Space: The War fighter’s perspective” March 12, 2003; joint briefing by Air Force Maj. Gen. Franklin Blaisdell and army head of forces. Col. Steven Fox, Director Army Space Support “Jointness is future military innovation.” Program.” 15. Mehta, Sureesh, ‘India’s National Security Challenges,’ Outlook India (12 August, 2009), REFERENCES http://www.outlookindia.com/article/indias- national-security-challenges/261738 16. Menon, Narayan, ‘The Ghosts of Kargil,’ Indian 1. Annual Report [2018-19], Ministry of Defence, Defence Review, 25(3) (July-September,2010) India 17. Mukherjee, Anit, ‘Civil-Military Relations and 2. Ashley Tellis, “Stability in South Asia,” Rand Military Effectiveness in India,’ in Rajesh Basrur, Corporation Report 1997 Ajaya Das and Manjeet Pardesi (eds.) 3. Colonel Peter F. Herrly, US Army, “Joint Warfare”, 18. India’s Military Modernization: Challenges and Military Review, February 1992 Prospects (New Delhi: Oxford University Press, 4. Fighting Separately: Jointness and Civil-Military 2013) Relations in India, Journal of Strategic Studies 19. Lieutenant General V K Kapoor, PVSM (Retd), 5. David C. Gompert, Preparing Military Forces for An Operational Perspective of Network Centric Integrated Operations in the Face of Uncertainty, Warfare in the Indian Context RAND Issue paper 6. NCOIC “Network Centric Warfare” https://www. 20. Modern Militaries and a Network Centric Warfare ncoic.org/technology/educational-resources/ Approach Jonjo Robb, Jan 9 2014 network-centric-operations-the-fundamentals

47 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Collaborative Defence R&D: Indian and International Perspective

Gopal Bhushan1 and M Madhusudan2 1Outstanding Scientist and Director, JCB, DRDO, India 2Assistant Professor, Department of Library and Information Science, University of Delhi, Delhi, India E-mail: [email protected], [email protected]

Abstract—

Technology is a foundation that offers new possibilities to produce, store and spread knowledge. While science, engineering and research and development are fundamental to a country’s growth, the defence research and development is a necessity for country’s sovereignty and security. The indigenisation of defence technology is not only an enabler to a country’s self-reliance but also a pivot to a country’s emergence as a regional or global influence in geo-political tug of war.

amongThe research various at entities basic and within applied the levelscountry leading such as to government product development and private for research civil or militaryagencies, purposes academia, is pursued by countries in volume and content as per their affordability and resourcefulness. While collaboration

industry and state-owned establishments is rather straightforward, International , which could thejump-start technological the process advanced of technology countries developmentdo not easily partand technology/productwith such technologies acquisition, which are are important tedious andfor theirlong drawn. Countries through international collaboration focus on areas which are strategic in nature, however,

national security and supremacy. International collaborations also face the brunt of global export controls which restrict the trade of military goods and defence technology acquisition. This paper narrates the role of indigenous defence research and development in a country’s vision of being independent from the uncertainties of arms dependency on foreign countries. This paper also provides a perspective of Defence Research and Development (R&D) and the emergence of Indian Defence R&D; bilateral and multilateral engagements and an overview of global military export-trade controls. It also describes how an innovative defence R&D in India has catalysed the growth of domestic aerospace, defence and civil industry and brought a realisation that having an own defence R&D agency is must for a country’s long-term strategic sustenance. This paper brings out the fact that no country can produce everything on its own and need to pursue a prolific international cooperation for R&D edge and inclusive growth of domestic industry. It has been concluded that defence R&D capabilities of India are seeing trajectorial growth and which has contributed in India’s ascent towards being a regional power. 1. INTRODUCTION and power, we perceive different threats as

1.1 the most pressing. But the truth is that we With rapid technology development and today depends on accepting that the threat whichcannot each afford region to choose.of the world Collective perceives security as diminishing boundaries between countries, nationssecurity1 has become a dominant concern arethe mostinterconnected urgent are and in fact whatever equally sothreatens for all. said,and key“Depending global challenge upon wealth, that confronts geography all oneIn our threatens globalised all world, the threats we face . Kofi Annan, UN Secretary General 2’’ 48 . The military imbalance in Vol. 4 No. 1 2019 Collaborative Defence R&D: Indian and International Perspective

demanding advanced defence research agencies, foreign private defence companies and foreign academia 90s’ resulted in nations 3. and expensive weapon systems and as in nature, countries do not easily part with their defence budget reduced and defence However, the Defence technology being strategic industrial base withered, re-thinking paved wasthe critical way to for re-alignment leaping forward among and nations.without advanced technologies. Having own defence The realisation that foreign collaboration research agencies therefore has never been an option for countries but a necessity for nation international support, self-sufficiency, self- who wish to hold an edge over adversaries. It is reliance, indigenization and the strategic edge more so in the case of India, which is emerging over adversaries would be difficult; countries as a regional superpower and is reasonably explored bilateral and multilateral alliances. self-assured in defence research, development R&D, which was considered the responsibility and manufacturing. The self-sufficiency gives of government agencies, became global and confidence to countries to pursue strategic networked. This led to countries working providesdefence R&D strength and throughmanufacturing knowledge partnerships creation globally to leverage capabilities of others with India. A typical Defence R&D organisation to achieve own sustainable development. agenciesCountries in forged government International and private, R&D academiaalliances safetyand technological and welfare superiority with dual to use the technology country. It with industry, Science & Technology (S&T) complements the country’s civil security, public etc., though within their strategic objective of 2.3and products as well. 2.achieving ROLE self-reliance. OF INDIGENOUS DEFENCE R&D 2.1 In India, the Defence Research Development toOrganisation the needs (DRDO)of indigenised is the soleresearch, government design owned defence R&D organisation which caters Countries realised that military capabilities and development of defence technology and moreare not essential only essentialto deter and for dissuade war fighting, as also but to their ready availability and indigenisation was the technological advanced countries have weapon systems of the country. Likewise, enhance the strategic configuration of military and prioritised them as per their strategic identified the core-areas and non-core areas power. R&D across disciplines especially in defence thus has been recognised as one of the importance to the country. The core-areas are key instruments of a country’s foreign3 policy, pursued by the government research labs while significantly by the developed nations . Space private enterprises that do research, develop, non-core areas are outsourced to industry and countries pursue indigenous military R&D as per their needs and available domestic resources undermanufacture the watchful and export eyes of ofarms, the weaponsgovernment and for their long-term sustenance and view4 the their own security and industrial growth dual use items belonging to non-strategic areas spending on Defence R&D as an investment on . 2.2 2.4agencies. approach are that they recognise the importance The significant aspects of collaborative network DRDO which is a fully government owned R&D organisation carries out defence R&D in of working across International governments 49 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

its laboratories followed by manufacturing in but most importantly6 can also visualize the state owned Defence PSUs and private defence nation’s strategic needs even before such need sector. In USA, the AFRL (Air Force Research 3.2come into existence . innovationsLab), ARL (Army and futuristic Research defence Lab) and research NRL (Naval and Research Lab) carry out the defence R&D agencyIn India, underamong allthe government Ministry of owned Defence civil S&Tthat development. In Israel, it is DDR&D (MAFAT); agencies, the DRDO is the only defence research in UK the DSTL (Defence Science Technology Laboratory); DGA in France; DAPA/ADD in supports Indian Armed Forces with advanced South Korea; FOI in Sweden; DSTO in Australia; fromtechnology foreign and sources military and undertookhardware. veryIndia, limited until DSTA in Singapore, and, DRDC in Canada, mid-1970s, acquired all its military equipment and so on. All these organisations have one similarity, to make the country a self-reliant by indigenous development and manufacturing. establishing a very accomplished defence R&D needsIt was a realized strong and that technologically to strengthen advanced country’s infrastructure, capable of producing the state- defenceposition andagency to secure in the national country interests, to setup India the 3.of-the-art EMERGENCE military goods OF INDIAN in the country. DEFENCE R&D defence technology ecosystem. This conviction7 3.1 shaped the growth of India’s Defence Research and Development Organisation (DRDO). DRDO was established in 1958 with a limited role produceIt is a well them known fact that India’s requirement of advising the Indian Armed Forces. Today, of arms is growing5 but it is still unable to DRDO is credited with empowering India in the . The lack of defence production 3.3emerging geo-political balance. industry has made India the world’s second largest arms importer and it is spending billions of dollars annually. But where imports are not DRDO, gradually over the period of time possible, as in the space, cyber, missile and moved from design and development of small- nuclear realms, India’s indigenous capabilities scale weapon development projects to the are notable. The five biggest spenders in 2018 development of large military platforms. 80s were the United States, China, Saudi Arabia, and onwards, DRDO embarked upon mega India and France, which together accounted projects such as Integrated Guided Missile for 60 per cent of global military spending. Development Program (IGMDP), Main Battle India’s military spending rose by 3.1 per cent in 2018 amounting to USD 66.5 billion. To Tank (MBT-Arjun), Light Combat Aircraft (LCA), Airborne Early Warning and Control meet the ambition of cutting down the import6, System (AEW&C), Submarine, Artillery Rocket andof military at the platformssame time such maintaining as fighter readinessaircrafts, System, Radars, Electronic Warfare (EW) forhelicopters, its colossal warships, security combatneeds and vehicles, not relying etc. System, Assault Bridges, Underwater Systems etc. DRDO kept adding an array of varied onlyentirely has onthe import, capacity India to design, needs develop a solid and programmes in Nations’8 defence preparedness manufacturereliable indigenous world R&Dclass setwar up equipment which not and self-reliance . Further, several world class S&T laboratories with system engineering 50 bases were established. The Indian Armed Vol. 4 No. 1 2019 Collaborative Defence R&D: Indian and International Perspective

6 deliveryForces are vehicles, being continuously sensors, special provided foods, with modest in comparison to countries like, China, medicinesstate-of-the-art and systems,life support weapons, technologies platforms, 4.Russia, INDIAN and the DEFENCE USA . 8 INDUSTRIALIZATION AND INTER- . LINKAGES WITH DRDO Despite the technology denials enforced9 by USA and other countries, DRDO continued to 4.1 pursue high-end R&D in its laboratories .Over the years DRDO’s efforts have brought growth to country’s defence ecosystem spanning10 In post-independence India there was a zero across industry, academia, private and PSUs . announced- defence industrial defence among base. The a range first of Industrial sectors DRDO also conspicuously has come closer11 to Policy Resolution which was drafted in 1948, discharging DARPA like mandate albeit with 3.4lesser autonomy and more constraints. in which the public sector would be the main With gradual economic growth of the country, source of production and manufacturing. The policy was revised in 1956, according to which private sector was not to be involved in the the budget of DRDO also saw an upward trend munitions, aircraft and shipbuilding industries, engineersleading to diversification of R&D portfolio, and to boost indigenous manufacturing, supported8 by a large pool of scientists and government-built ordnance factories and . DRDO’s contribution on account Defence Public Sector Undertakings were set of intellectual wealth under government’s governmentup. Realizing thatopened domestic private defence participation production “Skill Development” and “Make in India” had not progressed as expected, in 2001,14 developmentalinitiatives have efforts, been very a small generously percentage noted However, the entry of domestic and foreign by the government. To support design and and allowed 26% FDI in the defence sector . of DRDO’s annual budget is also devoted to theindustry private in thesector Indian was defence the lack market of access did not to sponsored research in basic sciences through technologychange the narrativefrom western very much.countries What due ailed to DRDO’s various Research Boards and blue- sky research endeavours. Through Technology technology, infrastructure support, funding, Development Fund (TDF), DRDO supports export control and restricted trade of military technologyIndustry to12 create an eco-system in the country 5. in promotion of self-reliance in defence 4.2and confirmed orders 3.5 .

toTo private obviate and the foreign problem, industry MoD/GoI and encouraged further The pace of indigenous R&D in the country is liberalized the Aerospace and Defence sector still very slow. Considering the growing stature stage,and ait is significant prudent for economic, the country political to identify and them for investing in Defence R&D through military role that India will have at the world various modes of acquisition viz., “Buy India/ policy to support the defence ecosystem Buy Global and Make in India/Make Global” and long-term R&D direction, strategy and national13 through the new concept of “Strategic Partner”. . India currently procures approximately 70% of India’s investment in the Defence R&D is very its defence equipment from abroad but aims to 51 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

isreverse however this a balanceneed to promoteand manufacture investment 1570% in the or and private industry have largely been left to more of its defence equipment in India . There assemble knock-down kits produced under license from the foreign maker. With the growth 4.3defence sector both in R&D and production. of India’s defence R&D and manufacturing, the country is now seen as an evolving global hub of defence R&D and manufacturing. It has opened has also added a new dimension to the The production of DRDO developed systems another avenue which is the export of defence 4.5products developed in the country. growth of Indian defence industrialisation. DRDO’s relation with Indian industry has been long standing. It partners with Ordnance andExport strengthening of defence productsits regional plays presence a major Factories, DPSUs, major private industries, and role in building country-to-country relations approximately 1000 MSME’s. It has established growtha self-reliant of knowledge defence and industrial intellectual eco-system wealth from the angle of security imperatives. The and collectively all have contributed in the anddefence competitiveness exports have the among potential todomestic bridge manufacturerstrade deficit andas bringwell qualityas international realization of the country. The total production value of DRDO developed products which have been developed products which have gone through cleared for induction into Indian Armed Forces companies. The advantage of exporting DRDO has reached a staggering8 in excess to rupees ranges2.56 lakh from crore research,. DRDO’s design, engagements development with extensive user trials and user acceptance Industry also involves R&D cooperation which process before being deployed in the Indian for sustenance, maintenance, and upgrades Armed Forces clearly demonstrates that to production and post-production support performance wise these systems have been bench marked with competitive international of DRDO developed products and upgrades includesystems. tactical The systems missiles, which armaments have been & bought from abroad. DRDO amalgamates identified for export among many others backward-forward integration by involving private and public-sector production partners ammunition, radars, avionics, EW systems, from the early stages of the project (forward SONAR, light weight torpedoes, communication integration) and by tapping and developing systems, and EO system. The export of defence academia and private R&D to help DRDO with goods is an opportunity to expand the visibility incremental R&D i.e., add-on development7 after of country’s R&D capabilities and earn return- technological feasibility is established in the on-investment. Offset is another important 4.4laboratory (backward integration) . opportunity available to domestic industry to 4.6enhance export capabilities. avenue for the industry to access the advanced technologies,DRDO’s Transfer processes, of Technology quality (ToT) standards is another and Within the buying and selling realm of defence, the Defence R&D cooperation is seen as a pivot access to T&E facilities. ToT helps building a in a long-term sustenance of county-to-country sizeable domestic industrial base and reduces relations. The Government of India also imports dependency without which DPSUs emphasizes to leverage foreign defence ties to 52 Vol. 4 No. 1 2019 Collaborative Defence R&D: Indian and International Perspective

deepen technology-embedded engagements which India carried out. Despite India’s stature through research collaboration, academia of a responsible country which adheres to interaction and JV. Propelled by the globalization the norms of non-proliferation and respects and of S&T, the international collaborative activity preventinternational the technology-denialspread of materials, regimes equipment (which18 has also evolved in volume and content. DRDO control global defence technology order also undertakes defence R&D collaborative development or acquisition of WMD , projects to overcome technology gaps and wasand technologiesthe most affected that couldagency contribute in the18 country to the 4.7expedite the development process. ) DRDO high valued and technologically challenging due to international trade sanctions. Many The international cooperation is seen as a means pursuing at that time with the international of transforming the narrative of buyer-seller development programs which DRDO was to equitable partnerships which are unique, critical, and transformative. Also, as DRDO’s partners came to stand still. The sanctions technological capabilities rise higher, more could not however deter DRDO. It continued with high-end research and development countries seek to collaborate with DRDO. Asian initiatives and established several world class and Latin American countries have expressed S&T laboratories and system engineering bases. desire to work with DRDO to support them It re-established its core strength in (a) design, building a strong technology capability base in caught the fancy of many foreign countries that development and limited series production (b) their countries. The “Make-in-India” has also are encouraging their defence companies to innovative R&D and technology development; (c) development of strategic and tactical systems; (d) research in life sciences to support partner with DRDO and Indian companies for facilitiesman behind19 the machine; (e) optimizing the in-country development and manufacturing.16 combat effectiveness; (f) test and evaluation The organization has thus become pivotal to 5.2 . India’s foreign policy and national security . politicalDRDO is consciousappropriateness to keeping and its Internationalgeopolitical cooperation17 within the permissibility of India’s gains The removal of sanctions took mammoth efforts of the Government of India by synergizing both . 5. GLOBAL MILITARY EXPORT-TRADE threepolitical out and of diplomaticfour multilateral channels. regimes However, that CONTROLS AND INDIA it was not until recent admission of India into

5.1 India is now being treated differently. The admission of India into three regimes i.e., Missile Technology Control Regime (MTCR), Post 1974 and 1998 India’s nuclear tests Wassenaar Arrangement (WA) and Australia brought a new paradigm in country’s quest for Group (AG) have made India to be recognized indigenisation of defence R&D and domestic as a responsible state and atth par with member production capabilities. Country faced arms 42countries.nd India was accepted into MTCR embargo and trade sanctions led by the USA. club in June 2016 as its 35 member,rd became The government agencies, DRDO, ISRO, DAE, member of WA in Dec 2018 and in Jan 2018, certain DPSUs and private industry faced India was admitted into AG as 43 member. global hostile conduct because of nuclear tests 53 The Nuclear Suppliers Group (NSG) is the only : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

6.2 non-proliferation regime of which India is not a member yet, mostly due to China’s objection DRDO has International engagements with to India’s bid. With these developments and about 40 countries. Traditional partners are India’s recognition as a country which is Russia, USA, Israel, France, Germany, UK, Italy, thecommitted access of to advanced the cause and of niche non-proliferation, technologies Canada, Singapore, Sweden, Republic of Korea, DRDO and similar S&T agencies stand to gain Brazil, Czech Republic, Hungary, etc. Some new countries are Spain, South Africa, Vietnam, 5.3which were hitherto outrightly denied. Australia, Chile, Japan, Malaysia, Egypt, and countries from African continent. DRDO’s automatic approval of transfer of any control international agreements are always equitable Subjectively, multilateral regimes do not favour in technical contribution and funds and lays down basic rules of cooperation in terms of item to its members, however as a member of administration, IP sharing, information sharing, multilateral treaties exudes the confidence of third party involvement, deliverables and post being a responsible country25 and committed development aspect of commercialization, to non-proliferation ethics . Lately, another etc. A Master Agreement provides an overall impediment that is looming large on India is governance to specific Project Agreements US’s Countering America’s Adversaries Through and Information Exchange Agreements which Sanctions Act (CAATSA), which was signed are signed subsequent to the signing of the mandatesinto law in to August punish 2017 those by entities the US which President are 6.3umbrella agreement i.e., the Master Agreement. and went into effect in January 2018. CAATSA 26 engaged in significant transactions with the A Security Agreement provides security 6.defence BILATERAL or intelligence AND sectors MULTILATERAL of Russia . coverage in the protection of classified ENGAGEMENTS OF DRDO information which could be exchanged through Project/Information Agreements. DRDO’s 6.1 major international collaborative projects are, the Brahmos, India-Russia Cruise Missile under the JV arrangement, in which DRDO has At government level, the Defence R&D the major equity stock holding of 50.5% and collaboration is considered a strategic alliance Russian has 49.9% stakes; Israel–India/DRDO21 between countries and is pursued under the co-developed LRSAM (long Range Surface to ambit of Government-to-Government dialogue. Air Missile for Indian Navy) and MRSAM In Indian context, the DRDO takes the lead in (Medium Range Surface to Air Missile for Indian forging defence R&D partnerships with foreign Air Force). The LRSAM21 and MRSAM systems are pursueddefence with research the full entities involvement in government/ of MoD and jointly developed by DRDO and IAI Israel under private sectors. Proposals/discussions are G-to-G agreements ; with Brazil, the acquisition hasof Embraer hosts of technologyaircraft and development integration of programs DRDO’s isForeign preferred Ministries in outright from purchases, both sides. consultancy The other developed AEW&C System; with Russia, DRDO commercial routes are global tender/RFP which and leasing of Russian T&E facilities; with and design auditing; Joint Ventures20 (JVs) for co- the US DoD, DRDO has several ongoing R&D development and co-production . projects and likewise with other countries 54 Vol. 4 No. 1 2019 Collaborative Defence R&D: Indian and International Perspective programs for the scientists in foreign academic 22 which also. DRDO also sponsors research and training seeksR&D, itto wasdevelop important a network that of basic partnerships ethos of strategy of ‘Working with Others’ 6.4institutions. for delivery and capability sustenance was followed complemented with International best practices involving (a) equitable sharing cooperation;Annual bilateral new proposals meetings are are presented, held on of the cost of R&D and deliverable; (b) sharing resolutionregular basis to totechnical review andand evaluate administrative ongoing a larger and more diverse pool of scientists of R&D facilities and training; (c) access to constraints discussed, policy directions, cross- and engineers; and, (d) exploitation of foreign linkages with research laboratories, academia 7.2industry for mutual benefit. and industry are explored. DRDO also participates in Inter-Ministerial consultations for keeping the organizational interest active It is also true that no country can be built theand intervention updating DRDO’s at the strategic highest tie-upslevel in withthe and secured through imports. In the past MoD and MEA and seeks wherever needed, decade, India accounted for about 10% of global arms sales. The imported platform or 7.government. INTERNATIONAL DEFENCE R&D weapon made India hostage to the supplier COOPERATION TO ACHIEVE nation for spares and service for years. India INDIGENIZATION OF DEFENCE R&D —must from ensure space the to missiles success — of where “Make it in already India” and advance its capabilities in frontier areas 7.1 However, the prevailing security environment boasts impressive indigenous technologies. enhance its capacity to defend its nation with A country to become a great power must andnecessitates hardware that through India domestic besides developingresources indigenous capability in defence technology own resources. While it was understood by countries that there was no alternative to being should also establish a dynamic and product self-reliant and self-assured to meet the military centric (involving research, development needs, however, as defence budget reduced and and production) International cooperation. defence industrial base withered, re-thinking Domestically countries establish eco-system waspaved critical the way for to leaping re-alignment forward among and nations.without encompassing government defence R&D The realization that foreign collaboration limitationsagencies, private of resources and public the enterprises international and supporting academia but due to inherent international support, the self-sufficiency, self-reliance, indigenization and the strategic collaboration plays an important role in edge over adversaries would be difficult and achieving return on investment by developing delayed if not improbable, countries explored R&D collaboration and producing affordable technologicalbilateral and multilateral strength a alliances.foreign partnershipThe foreign defence equipment leading to export potential. alliance thus began to be measured by1 the orInternational need strengthening alliances alsothrough provide complimentary an access to advanced S&T which countries either don’t have brought to both partners (Annan, 2005) . To better appreciate the uniqueness of Defence approaches. 55 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

7.3

least 50% from present 30% indigenization. It will also force the Indian companies to develop In the Indian context, the defence R&D would also propel the indigenous content unprecedented growth and have achieved a their expertise and capabilities that probably capabilities of the country are seeing an of the will to research and innovate, the goals enhanced investment in R&D. In the absence commendable level of self-sufficiency. It has time and again proved a pivot to India’s ascent efforts have catalysed the growth of domestic engineeringof self-reliance development cannot be metfor byproduction DRDO alone. and as emerging geo-political power. DRDO’s R&D defence and civilian industries as well as participationThe DPSUs and in private the design sector and will development have to take innovations prove the value of having a and the impact made by those technological from early stages of project conceptualization. The Indian industries must set up their own onDRDO its maintainedown cannot byresearch, the Government develop and in R&D capability, instead of a foreign tie up. In service to the Indian Armed Forces. Yet, India the US about 70% of defence R&D comes from 23 the private sector, 30% from the government. visionproduce that everything a country in shouldthe country. visualise A prolificfor the In India, 80% comes from the government, International cooperation must thus be the and 20% from the industry. That scenario must change. Setting-up defence eco-system, sustenance of strategic R&D edge and inclusive encouraging military industrialization; self- growth of country’s researches and industry. reliance in defence/military weapons systems DRDO also must endeavor to transform into to meet with country’s strategic intent using an agency that visualizes the country’s needs International collaborative R&D leading to self- before those needs come into existence; an reliance and enhancing domestic capabilities of organization that could research and develop ACKNOWLEDGEMENTR&D and production should be prioritized. 8.the weaponCONCLUSION systems of the future.

8.1 This paper is based on the experience which With the slow shifting of convention paradigm the author has acquired while working abroad at the Indian mission and as Director of REFERENCESInternational Cooperation at DRDO HQ. into “Make in India” with the vision to build a In Larger Freedom: Towards military industrial base in the country, the high Development, Security and Human Rights for arepotential unique, of co-developmentcritical, niche and and transformative co-production 1. All.Annan, Kofi. “ under G-to-G arrangement in technologies which ” 2005, pp. 1-6. www.un.org/en/events/ pastevents/pdfs/larger_freedom_exec_summary. must be encouraged. Collaboration under pdf. G-to-G is an opportunity to pool resources, 2. A More Secure World: Our Share Responsibility, share risk and access world market for export Report of the Secretary General’s High Level of equipment/weapon 24 systems produced Panel on Threats, Challenges and Change https:// www.un.org/ar/peacebuilding/pdf/historical/ jointly and above all enhance government to hlp_more_secure_world.pdf government commitment. It is also hoped Strategic Engagement in Global S&T: Opportunities 3. for“Globalization Defence Research. of Science and Technology.” that relaxed multilateral regimes would be helpful in DRDO’s quest for self-reliance The National Academies and indigenisation. As India aspires to be a press, Washington D.C., 2014, pp. 7-26. technology hub, the aim should be to achieve at 56 www.nap.edu/read/18816/chapter/3#211. Vol. 4 No. 1 2019 Collaborative Defence R&D: Indian and International Perspective

Strategic Engagement in Global S&T: Opportunities for 4. Defence“Global S&TResearch. Engagement by the DOD.” 15. Vivekanada International Foundation, Setting “Make thein India:requirements Through of indigenous Armed Forces, Research Models and The National Academies AdoptedDevelopment by Some by Foreign DRDO/Industry.” Countries press, Washington D.C., 2014,pp. 27-54. www.nap.edu/read/18816/chapter/2#2. , pp. 19. 5. MinistryDesai, Nishith. of Defence “Primer on the Indian Defence www.vifindia.org/sites/default/files/vif-task- Industry: Regulatory, Legal and Tax Overview.” force-report-make-in-india_0.pdf Bharat , July 2017, pp. 10. www. 16. Shakti:Chatterji, Self-Reliance S. K. “DRDO in Defence, mission mode projects nishithdesai.com/fileadmin/user_upload/ are the pivot for Make in India program.” pdfs/Research_Papers/Primer_on_the_Indian_ 27 Mar 2016. Defence_Industry.pdf. Institute of www.bharatshakti.in/drdo-mission-mode- 6. DefenceCowshish, Studies Amit. and “13th Analyses, Five-Year Defence Plan projects-are-the-pivot-for-make-in-india- (2017-22) – A re-run of the past.” program-dr-s-christopher-dg-drdo IDSA, 31 July, 2017. 17. Ghosh, Ranjit. “Defence ResearchInstitute andfor www.idsa.in/idsacomments/13th-five-year-Harbingers of Change, DefenceDevelopment: Studies Internationaland Analysis. Approaches for defence-plan-2017-22_acowshish_310717.292. Analysing the Indian Programme.” 7. “Engineering Watch.” IDSA Occasional March 2013, www.drdo.gov.in/drdo/English/ Paper No. 41, 2015. pp. 1-54. www.idsa.in/system/ dpi/articles/Engineering_Watch_March_2013. files/opaper/OP41__RanjitGhosh_140815.pdf pdf. 18. Singh, Rahul. “Policy dive: Sanctions force India 8. “DRDO Annual Report 2016.” www.drdo.gov.in/ to do US-Russia balancing act.” Hindustan drdo/pub/ebooks/drdo-annual-report-2016. Times. 19 July 2018. www.hindustantimes. 9. Singh, Rahul. “Policy dive: Sanctions com/india-news/policy-dive-sanctions-force- force India to do US-Russia balancing india-to-do-us-russia-balancing-act/story- act.” Hindustan Times. 19 July 2018. 8i5w77NVIrj7D4z96on53N.html www.hindustantimes.com/india-news/policy- 19. Anderson,The Robert University S. “Nucleusof Chicago andPress Nation:Books, dive-sanctions-force-india-to-do-us-russia-html Scientists, International Networks, and Power balancing-act/story-8i5w77NVIrj7D4z96on53N.Institute for Defence Studies and in India” Analyses. GoogleScientific Books Networks, Nehru, and Defense Research 10. Nayan, Rajiv, and Development, June 2010, pp. 205-226. DRDO Directors ConferenceThe Pentagon’s on 30 , www.books.google.co.in/books/ Brain:December An 2017. Uncensored History of DARPA, about/Nucleus_and_Nation.html?id=3BcKqXO 11. America’sJacobson, Annie.Top-Secret “The EvilMilitary Things.” Research Agency, eSbAC&printsec=frontcover&source=kp_read_ button&redir_esc=y#v=onepage&q&f=false. Google Books 20. Sen, Ronen, “National StrategyInstitute Lecture of -Defence India’s Little, Brown and Company, 2015, pp. 1-560. studiesDefence and Cooperation Analyses with its major traditional ,books.google.co.in/books?id=0_ & New Strategic Partners” UUrgEACAAJ&dq=The%20Pentagon%27s%20 , 01 April, 2011. www.idsa. Brain%3A%20An%20Uncensored%20 in/event/INSP/AGrandStrategyforIndia.Israel Affairs History%20of%20DARPA%2C%20 21. JournalSharma, Ashok and BingDov. “India–Israel America%27s%20Top-Secret%20Military%20 relations: the evolving partnership.” Research%20Agency&source=gbs_book_other_DRDO , vol. 21, no. 4, pp. 620-632, 2015. https:// versions. doi.org/10.1080/13537121.2015.1076189 12. “Technology Development. Fund.” , 2018. 22. Science Diplomacy. www.en.wikipedia.org/wiki/ www.tdf.drdo.gov.in. Science_diplomacy.Institute for Defence Studies and Analyses, 13. Siddhharta,Institute V “The of Peace Roles and and Conflict Dimensions Studies, 23. NewMallik, Delhi1 Amitav.st “Role of Technology in International of Science and Technology in India’s Foreign Affairs.” Policy.” Ed., vol. 1, Pentagon Press, 2016. 5 June 2017. www.ipcs.org/focusthemsel. www.idsa.in/system/files/book/book_role-of- php?articleNo=5290. Confederation of technology-in-international-affairs_a-mallik_1.pdf. 14. IndianKalyani, Industry Baba N.CII-KPMG “Opportunities in the Indian 24. Sen, Ronen, “National StrategyInstitute Lecture of -Defence India’s Defence Sector: An Overview.” studiesDefence and Cooperation Analyses with its major traditional , 2010, pp. 1-78. www. & New Strategic Partners” kpmg.de/docs/Opportunities_in_the_Indian_ , 01 April, 2011. www.idsa. Defence_Sector.pdf. 57 in/event/INSP/AGrandStrategyforIndia. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Communication Infrastructure to Empower the Joint Operations

N Kishor Narang Mentor & Principal Design Architect, Narnix Technolabs PVT. LTD.

Abstract—

To achieve the vision of ‘integrated approach’ of jointness, in which there is unity of command and effort wherein the three Services operate under a single commander; the joint operations integrated by communication networks shall be the key to overcoming the wide and fluid assortment of threats our defense forces have to deal with. However, disparate & heterogeneous communication networks integrated on incremental & need basis shall never meet the changing and ever increasing requirementsa holistic, from the iterative, Communication discovery Infrastructureprocess that helps for firstefficient defining & robust the right unified problem operation. in complex It’s imperative situations to andfirst then develop in finding a comprehensive elegant, well-designed & granular Architectureand working solutions.using the ItSystems incorporates Approach, not only which engineering, advocates but & enumeratesalso logical human and social aspects.

particularly those involving large scale infrastructure now demand a top down approach to design, starting at The multiplicity of technologies and their convergence in many new and emerging domains, however

the system or system architecture rather than at the product level. This paper shall delve into the merits and description of the Systems Approach followed by the characteristics of the Unified Secure &Resilient Digital Information & Communication Infrastructure & approach to develop the Comprehensive & Granular Architecture for the Scalable Critical Digital Infrastructure required for efficient & robust Jointness of the three defense forces. It shall provide insights into strategies to identify the Pivotal Points of Interoperability, as well as, Zones of Concerns in the Infrastructure Architecture and achieve the comprehensive Interoperability amongst all stakeholders of the nation-wide unified Information & Communication Infrastructure, be it at Semantic, Syntactic or Data Sharing levels. 1. INTRODUCTION

1.1 (c) Business process transformation- necessary to capitalize on the investments in new technologies. making three classes of transformations: 1.2 Large Scale Infrastructures now find themselves Jointness is an overarching concept, which

(a) Improvement of infrastructure – to make functions; operations, planning, intelligence, demands Tri-Services embodiment across all it resilient & sustainable. training, logistics, force structuring, essence of the operational efficiency; and procurement, technology management and (b) Addition of the digital layer- which is the 58 Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations

Human Resources Development (HRD). Since (a) The organization of the work and currently, even any single Defense Service itself, allocation of responsibilities many different domains and infrastructures, components are effectively integrated is a complex “system of systems”, involving (b) The process for ensuring all the organisations and activities.All of these need into a unified system, and andto be there integrated are many and levels work at together which integration effectively system for that infrastructure to become efficient, (c) Processes for operating and evolving the 3. SYSTEMS OF SYSTEMS PERSPECTIVE needs to take place. This is not just integration at a technical level, but also about integration of 3.1 business processes, management and strategic and regulatory integration.It is imperative that monolithic systems from system of systems all of these need to be integrated and work Characteristics that distinguish large together effectively for that Operations to (per Mark Maier [2]) are: 2.become SYSTEM efficient ARCHITECTURE & seamless in the real sense. elements (a) Operational Independence of the 2.1 elements (b) Managerial Independence of the systems can deliver integrated information to Networks and distributed client-server (c) Evolutionary Development compositemanagement, of elementskey staff, customerssome purchased, and business some (d) Emergent Behavior developedpartners. In in many house, cases and thesome final that system reside is in a (e) Geographic Distribution management control, different classes of Based on the above characteristicsDirected, and the structure,third party the organizations. architecture, of The the opportunitiessystem is not Collaborative and Virtual correctare great these but critical so are systems the risks. may never If the deliver basic system of systemscan be defined as - than the technical design and includes: One relevant example of the Systems of Systems the expected benefits. The architecture is more and their classification is described in examples in tables below:

59 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Table 1: Integrated Air Defence and System-of-System Properties Air Defence and System-of-System 1: Integrated Table

60 Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations

Table 2: The Internet and System-of-System Properties

Table 3: Intelligent Transport System and System-of-System Properties

61 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

4. JOINT COMMUNICATION 5. SYSTEMS APPROACH INFRASTRUCTURE AND SYSTEM-OF-SYSTEM PROPERTIES 5.1 4.1 convergence in many new and emerging domains,The multiplicity however ofparticularly technologies those and involving their Using the above 3 examples, we may define large scale infrastructure now demand a the Joint Communication infrastructure and top down approach to design, starting at the its System-of-Systems Properties and its system or system architecture rather than at classificationTable 4: Joint as Communication the following Infrastructure tabulated. and System of Systems Properties Discriminating Applicability 5.2the product System level. Approach Concept Factor

Managerial 5.2.1 Component systems are acquired by separate program offices and run Independence by separate operation units. These of the Elements organizations are not even connected by common membership or any structure. Concept that considers that functional and Operationmanaging thewill system, be managed however independently goals and morestructural and moreengineering, important system-wide due to the increasinginterfaces by each independent organization and compositional system properties become central command center constraints will be set for each period by a Operationalof the elements Independence complexity, convergence and interrelationship Efficienciesthrough negotiation will be achieved of policies by for 5.3of technologies. What is a System? autonomousachieving goals organizational according to systems constraints Use of Design Principles 5.3.1 infrastructure is dynamic, with nodes A group of interacting, interrelated, or The structure of joint communication interdependent elements forming a purposeful Stable andMain systems protocols being are addeddesigned and to removed allow Intermediate continuouslyevolution through and on replacement their own volition. Form structures and work methods in order to supportwhole of applications a complexity and that services requires relevant specific to Oversightcommunication body (Centralinfrastructureand command) what exercises control on the vision of the joint departments through various ecosystem Policy Triage services are offered to forces’ members & 5.3.2the stakeholders. partners.Architecture There is is at an its effort interfaces to form and the interfaces centrally directedinformation multi transferservice system. Leverage at the technical model of command and control A System is more than a collective entity. The Ensuring Largely will beClassification achieved through socio System is the product of the interactions of its Collaboration have properties that none of its parts have parts, rather than the sum of its parts. Systems a nodal agency is set up to develop, deploy Integrated Command and Control Centre (emergent properties). The performance of a Directed + and manage Digital Infrastructuresolutions. The common purpose is expressed through system depends on how the parts fit not how the joint doctrine vision and similar goals Collaborative documents.However other components of the they act taken separately. (a) The Systems Approach helps finding jointcommunication system may evolve elegant, effective solutions to complex and be managed on its own. 62 problems. Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations t operates as a holistic, iterative 5.4.3

(b) I discovery process of the real problems Critical Communication Infrastructure of even a that need to be resolved withsingle the Defense following Force characteristics: is an uber-complex, socio- (c) It incorporates not only engineering, but technical system of cyber-physical systems also the logical human and social aspects. Huge volume of digital data and information (d) Systems Approach is increasingly needed (a) but increasingly challenged in the quest to make future systems scalable, stable, 5.4 Systemsadaptable, Approach and humane. in Today’s (b) Software-intensive Challenges (c) Distributed and decentralized ms Approach is central when (d) Great influence on Forces’ operations (e) requirementsAbility to interact with the physical world (a) andSyste quality of life (f) Seemingly mutually contradictory aiming at improved system capabilities 5.5 Four Levels of Architecting

(i) systemsThe awareness of the criticality 5.5.1 of the human element in complex it is recommended to use the following four (b) Ambitious projects! levelsIf the futureof architecting: solutions are rather complex, then (i) Large Infrastructures – Grids, Cities, Communication Networks… framework for understanding concepts (a) Reference Model is an abstract 5.4.1(c) Systems of Systems (SoSs) and relationships between them in a deriving from relying on: particular problem space (actually, this Systems Approach helps to address risks is terminology). potential solution architectures, which (b) Reference Architecture is a template for (a) Immature Technologies Note: (b) Combinations of technologies with realizes a predefined set of requirements. 5.4.2 incompatible objectives/ assumptions. Reference architecture uses its reference model (as the next higher level of abstraction) and provides a common sy (architectural) vision, a modularization Hence, a reference Framework for a complex and the logic behind the architectural stem of systems such as a Joint Information & decisions taken. Communication Infrastructure for our Defense architecture of the future system Forces shall provide a framework that captures (c) Note:Solution Architecture- is foundationthe key domains for the and construction their interdependences. of a whole rangeIt does of thisuseful in suchviews a and way architectures as to provide and a version A of Solution a particular Architecture reference (also known as a blueprint) can be a tailored infrastructure works from the point of view of amodels particular that domain, each describe or level how of integration the complex or architecture (which is the next higher level of abstraction). Implementation is a realization of the future system. specific use case. 63 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

The dependencies between these 4 levels are shown in illustration below:

5.5.2

(b) Provide a common methodology for architecting the system-of-interest in the The presence of some “loops” of this illustration particular problem space, thus different confirms the complexity of architecting. For people in similar situations find similar example, there is no guarantee that the original artifacts or propose innovations. thus,high-level collecting requirements of important have a concepts high-quality in In case of the “very complex systems” to be thecontent, reference e.g. based model on may a prefect necessitate terminology; some implemented in several projects and the developnecessity a reference to collaborate solution architecture and coordinate and, modifications in the high-level requirements to between those projects, it is recommended to align their terminology. following: if required, a reference implementation. It The purpose of the reference architecture is the helps to identify smaller systems elements (e.g. services, data, etc.) and relationships between (a) Explain to any stakeholder how future them (e.g. interfaces) thus they can be shared implementations (which are based on 6.between CURRENT projects. CHALLENGES herthe referencepersonal, architecture)professional canand address social his/her requirements and change his/ 6.1

life for the better; for example, via an explicitly link between stakeholders’ The current state of Information & high-level requirements and the Communication Infrastructure has several gaps principles of reference architecture. 64 that need to be addressed: Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations

Closed Solutions:

(a) Available solutions defensedefined forces for to the work various in an integrated, physical are extremely closed with an ecosystem infrastructures to be deployed in the that is highly locked-in by vendors application, platform, communication, Dichotomy: i.e., a single vendor owns the vertical harmonized and optimized manner. (f) There is a dichotomy services, and data. While convergence between, on the one hand, the need of technology, unified standard, for investment in R&D for new interoperability, etc., are necessary to markets are essential for competitive, Architectureproducts, systems when and there solutions is basedlittle ensure customer-centric systems, open on an integrated and secure System stakeholders, and on the other hand, the affordable and sustainable solutions. awareness about the problem among The existing ecosystem allows minimal Force-Fitting Solutions developed for or no flexibility. Different Markets: creation of a unified System Architecture (b) and Framework where there is no developed for other countries There is & a regions natural demand due to ignorance about the tendency to force-fit existing solutions 6.2 problem at hand. Application Domains Landscape: such as Russian, European & American, diverse requirements of all the stakeholders etc., to the different defense forces in given the requirements, constraints and within the defense forces, the DefenseTo meet services the India. This may not be the right approach have to create infrastructure and provide fora collection of as many vertical domains as one challenges in India. India specific needs should be factored-in upfront in the Inappropriate Last Mile Solutions: architecture of these solutions. cadres,can imagine. as well However, as address in view the thecore core & strategicvalue of (c) networks are undergoing rapid change requirementsimproving the qualitythe respective of life for forces, the officers some & of other the toExisting meet lastradical mile lower technology levels forof capitalsensor and operation cost and much higher level Water services that need to be catered for are: (a) of reliability for mass usage in critical Waste Management (b) Energy andinfrastructure. migration We tomay successfulneed to contract new approacheswisely to encouragerather than experimentation get locked into (c) (d) Transportation (e) Surveillance a high cost solution such as the Dabhol Deployment Diversity: Different Power Station. (f) Connectivity (d) (g) Command & Control Centre services are expected to contract However, all these Current Applications live in separately but we need a method to 6.3silos… benefit from some commonality and Non-Standard Disharmony: Creating a Common Visibility of Interrelated Service-to-Service arrangements. no common framework and architecture Issues: More often than not creating a (e) There is 65 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

7.2 consuming, service providing, and governing uniform visibility of various issues among the Integrated Management for Common stakeholders reduces creation of multiple lines Visibility of Interrelated Issues – At its very of communication and resultant cacophony foundation, it will integrate with and ingest

various data models, processes and tools and plansand noise. and Atefforts present are such also platform, multipoint which andcan ensuredata from quality all with possible an aim sources, to provide then insight apply create inclusive visibility of issues, resolution and intelligence on various city resources and implementation there is lack of transparency andvertical resultant specific. mistrust, Additionally, suspicion, due dissonance to vertical a sharing and serving mechanism for all informationservices while resources at the same and timeservices establishing in any earmarked geographical territory or across and scope of manipulation and corruption. toThis governance lack of transparency layer and in whatstrengthens is transpiring the multiple distributed locations. manipulativewithin a silo extendselement bothwithin to consumerthe vertical and 7.3

together, in some ways compensating their own 6.4domain. Different sources of information can blend Interoperability Among the Cross Domains: deficiencies, enriching the larger information pool and therefore providing the ability to offer services more efficiently. Once even when a common visibility can be 8. THE INTERPLAY – UNIFIED SMART obtained, there can be several issues which are INFRASTRUCTURE – UNIFIED SMART FORCES thussufficiently delays structured,inherent to thatmanually automation intervened and cross domain integration can be achieved and 8.1 actions can be avoided, and greater operational efficiencies achieved. 7. THE WAY FORWARD: UNIFIED The relationship between Unified Smart ARCHITECTURE Infrastructure and Unified Smart Forces needs to be understood in this context: “In smart forces, 7.1 beyond the strategic & core services, energy, concertwater, transportation, to support smooth public operation health and of critical safety, infrastructureand other key serviceswhile providing need to be for managed a clean, in From a siloes approach to a converged common economic and safe environment in which to ICT infrastructure pool - Coordination, collaboration and harmonization can be better communicationimplemented by technologies the effective that use allows of open, the 8.2live, work and play”. creationcommon of anda truly shareable, interconnected information system with and has undergone a paradigm shift with advent ofHence, convergence the perspective and networking in Infrastructure technologies, Design seamless communication between services. solutions for information, communication, ofEven common though infrastructure the services andto achieve applications this entertainment, security and surveillance; can be diverse, they could leverage the use objective. 66 which are beginning to have a profound impact Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations

can severely impair the overall success of the on the way we look at the Buildings’ Design the sub-optimization of sub-systems, which (be it residential or commercial) and Town Planning, be it for civic infrastructure or the project. Organizations can mitigate this risk by 8.3strategic infrastructure. taking a far-reaching, structured, and detailed approach to project planning. By encapsulating Defense forces are intricate composite the requirements of all stakeholders (both environments and the manner in which forces the impacts of change, and tracing requirements within and outside an organization), modeling the impact of different decisions in the planning throughout the project, it is possible to quantify operationsare operated, are financed, multidimensional regulated and and comprise planned ofare multiple extremely stakeholders complex to whosesay the dependencies least. Forces stages, rather than realize mistakes once the and interdependencies affect and ultimately 8.6project has been completed.

8.4determine the built & operational environment. complementary,The relationships reinforced of diverse or informationredundant dependencies and interdependencies though resources are complicated and could be known,The various in their departments efforts and mostly focus overlook of providing these historicrelationships. data and The other data gatheredactivities canperformed further be processed and modelled, correlated with their services and of being answerable only for coordinatedthe services theymanagement provide. Part of ofresources the answer and to on it before it can be made insightful and can making forces ‘smarter’ is a more all-embracing be presented to offer MIS, analysis, decision 8.7support or forecasts. infrastructure, a collaborative approach to a improve the operational efficiency of its 8.5strategic deliverables to the nation. There is also a recursive cycle to the data thatin any is largeconsumed organization which in or turn infrastructure. adds to Information that is generated is information thatThe oversights hugely complexin the planning nature phase of can a cause large infrastructure project creates a very real risk the information generated which becomes information used again.

67 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

8.8An example Seven of Layers recursive of natureInformation of Data Flow – from Data to Knowledge

Mapping the Smart Infrastructure 9. JOINT DEFENSE SERVICES NEED Philosophy to High-level Functionality - ENTERPRISE ARCHITECTURE management in the large infrastructure,To 9.1 analyze the relevance of Big Data & Information gamutwe need of use to contextualizecases to convert this the “Seven diverse Layer and Information Flow & Processing” with the entire Any complex system e.g. a building needs to be carefully designed, using a systematic heterogeneous data collected in Defense Forces approach, to describe in detail its structure, all to knowledge that would in turn be further the processes needed to fulfill the purposes of processed to provide the Actionable Insights to the building and all the subsystems within it the Strategists, Planners and other stakeholders. how its design meets the different functional (water, waste, electricity, telecoms, etc.) and This is achieved by mapping the “Seven layers” to the various Pillars of Defense services framework – Physical Infrastructure, Social howrequirements luggage is of moved its users. around, For howinstance, passengers for an Infrastructure, Institutional Infrastructureand getairport to their there plane,needs tohow be detailed fuel is provided,descriptions how of differentlast but services not the applications least the need core changes Warfare as planes are serviced, how security is managed, partInfrastructure.The of the user requirements detailed analysis to derive shows value that

etc., as part of the overall architecture of the from different infrastructure pillars but the ICT backbone remains the same. building complex.

68 Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations 9.2 infrastructures that support them, also need

This is needed at the construction phase to structuresto be carefully and processesdescribed canand effectively reviewed. support Only in ensure that the building is properly designed thethis deliveryway is it possibleof its strategies to ensure and that outcomes its business and to enable it to fulfill all the requirements of its purpose. However, it is also needed to to allow these to change and adjust to changing alterationssupport the and on-going upgrades management needed to meet of thatany building and to support the design of any 9.4requirements and opportunities. change in requirements or to benefit from new 9.3technologies to fulfill existing requirements. Enterprise Architecture is the definition and description of an enterprise from the combined viewpoints of its strategy, business structure, softwareThe aims andapplications strategy, businessand communications structures and business processes, information systems and business processes of an enterprise and the technology, both in terms of how it is at present, and of how it needs to be in the future.

Enterprise Architecture: EA = S + B + T The analysis and documentation of an enterprise in its current and future states from a Strategy, Business, and Technology perspective.

69 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

9.5

way Forces work in order to ensure that the Developing an Enterprise Architectural processes deal with all of the key issues. Clearly Framework and a Key Definitions Framework layeradaptations would be needed - for instance we for Joint Defense Forces would need to draw might add an Environment and Infrastructure on existing best practices describing the Translating the Digital Infrastructure Architecture Schema to Technology Layers

EA defines how business and Information (people or process) to drive an ongoing systems alignment should be achieved. It strategy or desired outcome. SOA is recognized is where business capability (financial and as a methodology optimized in applications market goals) and technology capability architecture or Service architecture, with a (products, vendors, and functionality) are view to deliver one of the domains within EA tied together with organizational capability namely the applications architecture.

70 Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations 9.6 The Paradigm Shift: From Siloed to Unified - From Vertical to Horizontal maintain the Lifecycle Cost / TCO (total cost of ownership) of these individual components 9.6.1 9.6.2within viable economic thresholds. All sectors in the infrastructure framework know that they cannot rely on traditional Forces that are serious about getting smart are influenced by the unified ICT backbone each communication use case is propped up andparadigm. truly However, homogenous a common system infrastructure with ways of doing things. Vertical rollouts, where pool enables the creation of a interconnected by a dedicated network, use case-specific data seamless communication between Services. exchange mechanisms, and single-use devices, As defense services strategists strive for greater Coordination, collaboration and harmonization do not scale. can be better implemented by the effective use of standards based open, common and shareable, cross-departmental synergies, it is essential that information and communication technologies. variousnetworks functions, and devices, such as devicewell as management, data, can be nowThe disconnecthomogenous amongst smart infrastructure technological trendsneeds securityused for andmore communication than one purpose. management, Even better can if being pursued by the stakeholders of the to be bridged without any further delay to be shared by multiple applications.

A converged common71 ICT Infrastructure Pool : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

10. SMART CITIES ANALOGY TO SMART DEFENCE FORCES are cities in themselves, and much more. It 10.1 would be interesting to review how cities are transforming into smart, sustainable, secure Architecture& resilient urban to meet habitat. their The imperatives cities are now of The Defence Forces have lot common with the embracing the Unified Digital Infrastructure cities, beyond their core & strategic operations in defending the sovereignty of the nation. sustainability, security, resilience along with Their base stations and cantonment areas much needed operational efficiency.

…Classic Saucer Champagne Glass Architecture: Typical Data Layer Architecture for a Smart City

Classic Saucer Champagne72 Glass Architecture Model Systems Approach Imperatives for Designing the Unified Secure & Resilient Digital Vol. 4 No. 1 2019 Communication Infrastructure to Empower the Joint Operations 10.2

support it. Some of the earliest deployments of “Classic digital infrastructure have proven to be not so SaucerThe evolved Champagne Comprehensively Glass” Unified ICT Architecture can be modelled as a systems,smart. Most impacting deployments overall have performance failed to identify and with a wide Flat dependencies or interactions with adjacent Bottom Base depicting the multitude of Field Devices & sensors etc. The Saucer Shaped 11.2restricting functionality. Bowl on the Top depicting beingLong filledStem withdepicts an allever-increasing the Common spectrum Layers of City Applications technologies, particularly in new and emerging and Citizens’ Services. The The convergence of multiple networks and viz.: The Unified Last Mile Communication, Common Standardized markets involving large-scale infrastructures Gateways (application or Vertical Gateways Agnostic),, require a top-down approach to standardization, asCommon well as, Servicein the Cloud layer representing the starting at System Architecture rather than at Common Service Functions in the 11.3product level. and the Smart City 10.3Middleware & City Data Reservoir in the Cloud. The systems level approach recommended above in design is likely to not only enable NarrowIt is the “LongNeck inStem” the of“Hourglass the “Champagne Model” Glass that newer and better services, but also allow Architecture Model” instead of the Short & far greater synergies and cost-effective thedeployments, civic infrastructure reducing of the the lifecycle Defense (total)forces brings the comprehensive harmonization, cost of ownership of any Infrastructure, be it standardization & interoperability in the Architecture leading to optimization in or the Warfare Infrastructure, with attendant operational efficiency & Life Cycle Cost of the environmental benefits, including carbon 10.4ICT Infrastructure in any Smart City. 11.4reductions and building system resilience.

This architecture model helps reduce the standardsAn integrated throughout approach the to Digitaltechnical Infrastructure community security,carbon footprint as the infrastructure of the ICT infrastructure, is well architected and assets can help define and strengthen the System last but not the least, enables comprehensive to ensure that highly complex market sectors hence all the vulnerability surface areas are can be properly supported for the increasing 11.well CONCLUSION identified, hence well protected. conformity, harmonization and convergence isof a bothneed Informationto focus on the Technologies creation of (IT)a secure, and 11.1 Operational Technologies (OT) systems. There

standardized and open infrastructure model are often connected to other aspects of Communication Infrastructure projects 11.5for the delivery of services. systems of systems, the success of which relies infrastructure and should be thought of as large The proposed jointness of Communication on the optimization of all the sub-systems that 73 Infrastructure amongst the Three Services : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 shall need a systemic approach to develop a comprehensive & granular architecture to 4. Lapalme, J., Three Schools of Thought on Enterprise Architecture, IT Professional, vol. 14, no. 6, pp. 37–43, Nov.–Dec. 2012, doi:10.1109/ meet the current, near future and long-term leveraging the latest disruptive technologies MITP.2011.109 requirements of the Indian Defense Forces 5. Ivar, Jacobson., Enterprise Architecture Failed Big Way http://blog.ivarjacobson.com/ea-failed-big- like Big Data, Machine Learning, Artificial way/ Intelligent, Digital Twin, 5G and Quantum 6. Service-Oriented Architecture, The Open REFERENCESComputing etc. in a very structured manner. Grouphttps://www.opengroup.org/soa/source- book/soa/index.htm 7. Pre-standardization Study Report on Technical 1. IES-City Framework https://pages.nist.gov/ smartcitiesarchitecture/ Requirements Analysis of Unified, Secure & 2. Maier, Mark W. Architecting Principles for ResilientICT Framework for Smart Infrastructure. Systems-of-Systems. November 2017, Version 1.0. Bureau of Indian 3. http://www.infoed.com/Open/PAPERS/ Standards. http://www.bis.org.in/other/USR_ systems.htm, 1996. ICT_FSI_V_1_0.pdf

74 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Spectrum Management for Tactical Battle Field Networks

Brig Navjot Singh

Abstract— 2, which

Military operations are complicated by increasingly complex demands on the EM spectrum is a physical medium through which joint forces conduct operations. The EM spectrum is a highly regulated and saturated natural resource. The Defence services use the EM Spectrum for operation of its command and control systems, modern weapon systems, electronic sensors like RADARS and weapon platform operations. Due to the unique characteristics of frequency spectrum and joint operations of the future war, central management of the electromagnetic spectrum among Tri-services is essential. 1. INTRODUCTION

1.1 importance of the EM spectrum and its relationship to the operational capabilities needs to be properly understood, addressed In the years to come, in any modern Army/ frequenciesand optimally of electromagnetic utilised. The EMradiation spectrum and forcesArmed Forces,functional the concepts warfighting of requirementsperspective includes the full range of all possible of the organisation are identified in the Armed spectrum access, throughout the operational environment,there is a requirement among various for coordinating stakeholders, EM allplanning modern and armies force development. will need to In orderprocure to including Doordarshan, Airports Authority of equipment,support the futuristicwhich warin turnfighting will capabilities, require

isIndia, a challenging Min of Communication, task during peace Dept time of Space and an exponential increase in the use of the assumesand within even the greater Armed importance Forces . Thisin a tactical is as it electromagnetic (EM)1 and spectrum. uses of wireless Recent yearsvoice have witnessed an explosion of spectrum- based technologies 2.2battle field environment. dynamicand data communicationsand has ever increasingsystems by thedemands Army, as it transforms to a battlespace that is more Rationale for Automation . There is a need to for information. This requires an effective and efficient system for Management of EM systematichave an EM planning,Spectrum managing,Management engineering, System in the Tactical Battle Area (TBA), to assist in the 2.spectrum TACTICAL in the tactical BATTLEFIELD battle field. EM SPECTRUM MANAGEMENT and coordinating use of EM spectrum by units SYSTEM engaged in combat and training for combat. At each level, the signal officer is responsible 2.1 to the commander for spectrum management. Existing Methodology At Division, Corps, and Command levels, (and possibly later at theatre levels also, . All modern armed should the concept of Theatre Commands be forces depend on EM spectrum and the 75 implemented), specially trained members of : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

the signal staff section perform the day-to-day (b) The present system is highly dependent functions for management of EM spectrum. The noon interference the personal prediction expertise and hence of the it spectrum manager is responsible for coordination providesindividual limited concerned. guarantee There isagainst how ever the with higher, subordinate, and adjacent units assigned frequency interfering with and with other staff sections. The end state other equipment in the intended area aims to exploit, attack, protect, and manage resources within the EM spectrum and resolve use is suited for the era where density electromagnetic interference (EMI) in order to of operations. The system presently in achieve the commander’s objectives. There is a was sparse and is not likely to function 2.3felt need to automate this complex activity. optimallyof communication-electronic in the current technologyequipment Management of EM Battle Space

. There heavy battlefield scenario, especially during hostilities. helpis need to automate to procure the and spectrum deploy amanagement web based unimpeded operation of these critical system to manage the EM battle space. This will (c) systems,The present when system used simultaneously cannot guarantee in and assignment issues to achieve EMC in the battlefield. This would be a comprehensive an actual battlefield environment. solution for management of the EM battle space, reuse and sharing of spectral resources (d) The present system does not optimize for the three Defence Services i.e, Army, Navy, Air Force and HQ IDS. Such a system would in time and space. The spectrum is be launched hosted on the existing secured as a very costly and scarce natural assuming more and more significance Defence Communication Network (DCN) to provide connectivity to the users in the HQ resource. Thus wastage of such a and field. It would be a web based system with deployed, the proposed system would manage precious resource cannot be allowed in minimal footprints on the user machine. Once the present and near future. electromagnetic emitters and receivers present high end specialised software solution, (e) Thus, the need of the hour is to procure a inand the optimize complete frequencygeographical assignments area, on a near for real all customised to the user requirement in calculating the spectral density at any location could address these procurement in a reasonable time frame, which andtime carrybasis. outIt will the also interference aid the spectrum analysis manager for all 2.5 imperatives. 2.4the emitters and receivers in India. Capability Expectations Procurement Imperatives for System . The capability being Envisaged sought to be inducted should help in:- Management process and frequency . These are listed as under:- (a) Automation of the Spectrum system of frequency assignment with assignment process for frequency (a) aThere view is a toneed achieve to automate higher the spectralpresent ranges from 10 KHz to 450 GHz. and procedural efficiency and avoid (b) Quick assignment of frequencies to interference during joint operations. 76 the users of the three Services & HQ Vol. 4 No. 1 2019 Spectrum Management for Tactical Battle Field Networks

there is a pressing need for its central manner that minimises the interference Strategic Forces Command (SFC), in a system presently in use is suited for the management among Tri-Services. The between various emitters. assignments and emitters in the area (c) Maintain a secure database of all isera not where likely densityto function of communication-optimally in the electronic equipment was sparse. This of responsibility. The database could be made accessible to authenticated users current technology-heavy battlefield on a need to know basis, on a secured scenario. Once such a system is procured, it could be deployed on a secured media media. Automation network (i.e, DCN). (d) Capability of performing Radio Network Planning, including Electro Magnetic (b) Management . process Once procured,for frequency the Interference / Electro Magnetic system would automate the Spectrum Compatibility (EMI/EMC) analysis automate the frequency assignment at any specified geographical area of processranges fromthrough 10 KHz simulation to 450 GHz and India through interactive Geographical Information System (GIS). spectral density of the entire country modelling to achieve spectral efficiency. (e) andThe generate system should propagation be able models to map for the all The system would be performing Radio Network Planning including EMI/EMC the terrain and atmospheric conditions analysis at any specified geographical tothe emitters.ensure effective It would takemanagement into account of area of Indian Sub Continent through an interactive Geographical Information Accessible to Multiple Users System (GIS). spectrum in the battlefield and also during the peace time. With this readily (c) . The available database, joint mission system would be a web based system planning can be undertaken more capable of being hosted and seamlessly functioning on the existing network 2.6 effectively and without any interference. of the defence Forces. This web based Payoffs Envisaged system would be capable of servicing Optimum Utilisation of Scarce multiple users. Authorised users will . Resource be able to access the database and carry (a) out the analysis of technical feasibility of command . and The control Defence systems, Services modern use installing various base stations and links weaponthe EM spectrumsystems, electronicfor operation sensors of their and used by Indian armed forces, remotely Visual Display of EM Spectral over the web. Occupancy of the growing commercial demand for (d) weapon platform operations. In view with individual. The emitterssystem would and receiverscalculate natural resource is limited and is likely electromagnetic influences associated the spectrum, the Services share of this characteristics of frequency spectrum and display the same on a suitable to shrink even further. Due to the unique map display for ease of decision by assignment authorities. The user would and joint operations of the future war, 77 be able to easily discover technical : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

characteristics associated with emitters

predict and display the electromagnetic and maintaining record of requests. spectraldisplayed onoccupancy the screen. at It a would selected also (b) Analysing the EMI / EMC for the Aiding the spectrum manager in taking requested frequency.

proposedgeographical system point would based manage on defined and (c) the decision on the existing users and optimisepropagation frequency criteria. assignments Once deployed, for theall Data keeping and maintenance of all electromagnetic emitters and receivers estimation of spectrum occupancy. present in the complete geographical (d) station information in a central database Web Based Spectrum Management system with online-query capabilities. area on a near real time basis. given frequency pool or suggestion of System (e) Searching for free frequencies out of a (e) consist of spectrum management application. The software, proposed systemalong wouldwith frequencies to be applied. centralised server equipment and requests, authorised frequencies, (f) allocations,Maintaining parameters a database of of allvarious the emitters and spectral density at various associated hardware/software components. This secure web based geographical locations. system would be hosted on the existing assigning frequencies to the three secured network maintained by Defence (g) DefenceTracing ofservices the requestfor each process and every and Services for user connectivity and would seamlessly integrate into the existing Management of the radio frequency residenetwork on servers architecture. placed Theat two application locations, specific system. and the associated databases would (h) access the application through a secure to cater for redundancy. The users would spectrum. access rights management mechanism (i) Coordinating the frequencies with the web browser with comprehensive Wireless Planning and Coordination Wing (WPC) and within the three 2.7 for ensuring data security. Services and any other organisation. (j) Estimation of spectrum occupancy. Tasks Automated of stations and networks as well as shall automate the spectrum management (k) Technical analysis and preplanning and frequency assignment. The to proposed achieve spectral system extensions of networks. (l) Generation of reports in the user systemefficiency would and manage ensure and optimise Electro frequency Magnetic specified formats. assignmentsCompatibility forin theall electromagneticbattlefield. The proposedemitters 3. CONCLUSION help the spectrum manager in achieving the 3.1 and receivers on a near real time basis. It will Accepting and processing requests for following tasks:- The system proposed is necessary to facilitate frequency allotment from various users optimise the planning and utilisation of (a) the management of EM Battle Space and 78 Vol. 4 No. 1 2019 Spectrum Management for Tactical Battle Field Networks scarce spectral resources across space and

the spectrum monitoring system. This should time in an intense, dynamic and mobile battle facilitate the identification of authorised users environment. The system will help maximise the and find if there are any unauthorised emitters spectrum efficiency and minimise interference. causing interference. This is thus the way ahead By capturing the EM characteristics of all for the Armed Forces for ensuring both spectral ofequipment demand it andwill helpassignment populate of a databasefrequencies for REFERENCESefficiency and effectiveness. the same. The same would result in automation

1. Chapter 4 of US FM 24-2; Article on Tactical offrom allotment field user of levelparticular till respective frequency Service spot Battlefield Spectrum Management; www. toHeadquarters, the same equipment on a real time or otherbasis. Theequipment effects globalsecurity.org/military/library/policy/ army/fm/24-2/Ch4.htm 2. The United States Army Concept Capability Plan for Electro-magnetic Spectrum Operations for characteristics,in the battle spacepropagation would models, be simulated, terrain the Future Modular Force 2015-2024; Version based on operating frequency, equipment 1.0 dated 28 December 2007. 3. Army Electromagnetic Spectrum Management. and environmental models. This would in turn Operations, Washington, DC, 5 September Military2006;www.bits.de/NRANEU/others/amd-us- tactical radio planning and spectrum help in developing a geo-spectral database, archive/fmi6 02.70(06).pdf depending on existing and required frequency 4. assignments, which is the need of the hour. management; http://ieeexplore.ieee.org/ document/209228/ The information about authorized emitters 5. Electromagnetic Spectrum Operations would be stored in the central database and Management Process;https://fas.org/irp/ compared with the information available from doddir/army/fm6-02-70.pdf, May 20, 2010

BIBLIOGRAPHY

1. Lt Gen Michael A Vane, Director, U.S. Army Capabilities Integration Centre; The United States Army Concept Capability Plan for Electro- magnetic Spectrum Operations for the Future Modular Force 2015-2024; Version 1.0 dated 28 December 2007. 2. US Army Joint Publication 6-01 on Joint Electromagnetic Spectrum Management Operation dated 20 March 2012.

79 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator

Maj Gen LB Chand, VSM (Retd) E-mail: [email protected]

1. PROLOGUE

“Electromagnetic Spectrum (EM) is an inexhaustible, reusable yet quantitively finite resource”

“Spectrum can neither be created nor destroyed. But it use can certainly be destructively intrusive or wasted if not properly administered”

“Spectrum has been categorised as a National Natural Resource and controlled through Administrative License”

“Most countries adopt an administered system of allocation, which may be in the form of first come first served (FCFS) methodology, beauty contests or lottery.”

“Chawla Committee on Allocation of Natural Resource (CANR) - 20111 recommendations are still pending acceptance by GoI. However, the favoured method of allocation by the Government of India is Auction”

“CANR opines - The experience of countries in Europe, who auctioned 3G spectrum in the first decade of this century at high bid prices led to large destruction in firm values and delay in roll out.”

“CANR - The choice of the appropriate method of allocation of spectrum, therefore, depends critically on the context, market conditions and the objectives of extant telecom policy. However, given the current state of development of the Indian telecom market, the Committee has recommended that in future, spectrum for telecom access services should be made available through suitable market related processes.”

“CANR- The other significant recommendations of the Committee are that all future telecom

1

Chawla Committee Report – Committee on Allocation of Natural80 Resource 2011. Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator

licenses should be unified licenses and also de-linked from spectrum; and, effective measures should be taken to ensure continued efficient usage of spectrum inter alia through re- defining the appropriate geographical units for allocation. At the same time, vacation and re-farming of spectrum for commercial services should be expedited to ensure availability and certainty of adequate spectrum to facilitate optimal usage and revenue realization. Finally, a comprehensive and integrated legislative frame work for spectrum management – both in respect of commercial and non-commercial frequency bands - should be put in place to ensure optimal and efficient use of country’s spectrum resources.”

“Spectrum worldwide has been allocated through Administrative License – India is no Exception”

“National Frequency Allocation Plan was established 1981. Till 1989, the allocation was user based and Defence Services, along with Other Security Forces having lower priority were Categorised as Major User. With the formalisation of New Telecom Policy - 1999 (NTP) the Spectrum Allocations became Service Based from User Based”

“Services Based National Frequency Allocation Plan (NFAP) - 2000 was promulgated in 2000. NTP 2012 was promulgated”

“In accordance to the MoU of May 2009, between MOC&IT and MoD on Release of Spectrum by Defence, Defence Band was formulated by a Committee Co-chaired by Secretary MOC&IT and SO-in-C ion 2010 and was promulgated with certain foot notes in 2014”

“Milestones and timelines for release of Spectrum by MoD have not been adhered to. There are inordinate delays. This has a cascading delaying effect of Vacation of Spectrum by MoD and refinement of Allocation of Spectrum procedures from within Defence Band and most importantly optimum utilisation of spectrum for International Mobile Telephony (IMT) Services”

“Unilateral Decision by Wireless Planning Coordination Wing (WPC) on Spectrum allocation from within Defence Band and delay in implementation of Network for Spectrum (NFS) is complicating the Spectrum usage and is nullifying the extensive efforts of the past in cleaning up and coordinating Spectrum utilisation. If not checked it will adversely impact the National Security.”

“The very nature of EM Spectrum being an invisible commodity, can very easily lead to its theft and encroaching into spectrum band not in use”. WPC has adequate resources and

81 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

organisations to resolve spectrum interference, encroachment and misuse internationally (ITU through Monitoring Stations) and nationally (Wireless Monitoring Organisation- WMO). In comparison, Defence and other Security Forces are totally blind wrt their Defence Band monitoring. They are reactive, based upon physical interference experienced and totally dependent on WMO, WCP.

Joint Communication Electronic Staff, HQ Integrated Defence Staff (JCES, HQ IDS) is and has been the lead agency for spectrum harmonisation, coordination, allocation and assignment for Defence use. For Defence Forces monitoring of EM Spectrum was done by WPC. This procedure was adequate till Defence was the major spectrum user. With rapid growth of IMT, the demarcation of EM Spectrum bands for national security and commercial use has blurred. Promulgation of Defence Band has necessitated establishment of Spectrum Monitoring Organisation by Defence.

Long Term Evolution (LTE) and 5G has resulted in harmonisation of additional bands and re- farming for LTE and 5G. Internet of Things (IoT), Machine to Machine (M2M) etc have placed additional demand on EM Spectrum. The only method to meet this ever-increasing spectrum demand is spectral efficient technology – more bits per hertz and harmonisation of Higher Spectral band (> 30 GHz).

To complicate the issue developing nations consider EM Spectrum as a readily available source of revenue for the government. Unfortunately, this is a myopic approach and with negative fallout in longer terms.

Abstract

—Post Promulgation of Defence Band there is a necessity to have Armed Forces playing a greater role in Administration of EM Spectrum and particularly the EM Spectrum reserved for Defence. The growing pressure on definite supply of EM Spectrum on one hand and the monopoly of Wireless Advisor over EM Spectrum, as laid down by archaic Indian Telegraph Act 1939 has not only denied adequate EM Spectrum to Armed Forces but also resulted in harmonising spectrum for spectrally inefficient technology. The objective of the paper is: - (m) Based upon the Internationally successful Spectrum Allocation (Federal or Defence Band: USA, UK and other countries) recommend reorganisation of Defence Spectrum Management. (n) Suggest a Defence Wireless Monitoring Organisation. (o) Changes necessitated in the existing Act and Rules of Business. (p) Recommend method to ensure EM Spectrum is not wasted during Peace Time due to it remaining un- utilised. And more importantly to ensure that the release of spectrum for Defence use is not delayed when required for National Security. 2. INTRODUCTION

2.1 Economic importance. Radio Spectrum does not respect Military or Commercial or for componentthat matter of any almost other man-madeall military boundaries.operations Radio Spectrum is a limited Natural Resource Radio spectrum is a key input and an integral with extraordinary Strategic, Social and 82 Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator and military applications that need radio Defence band, the agencies competing over the spectrum for command, control, navigation, share of spectrum have intensified their efforts communications and information systems, to stake their claim on Spectrum. The advent of LTE and now 5G has put additional demand surveillance, reconnaissance and targeting on EM Spectrum. With only commercial and IT (wireless LAN), intelligence gathering, revenue generating objective in view TRAI, spectrum supports a very wide range of vital an independent regulatory body, is making militaryetc. Within requirements the Indian Armed including Forces, peacetime the Radio its recommendations on Spectrum without training and operations, use for internal security consulting MoD, the Major Stake Holder of In the Spectrum (Defence is the major stake holder context of Radio Spectrum having tremendous in all Nations without exception). Though the commercialand preparations value forbut majorwith no operations. physical form/ concept of Defence Band has been promulgated, boundaries/ physical holding the Management but the required modification in the mechanism of the Radio Spectrum gains Prime Importance. of its administration has not been put in place. No The issue is complicated many times over due to the conflicting interests between Economic, Societal and the National Security Needs. representative of JCES (which is the agency that National Security being the paramount factor, has expertise in SpectrumIn Administrationtrue sense, concept with Governments world over have significant Radio ofin DefenceMoD) was Band never has consulted not been whenput into NTP effect 2012 in Spectrum Reserved for its Defence Forces. In Indiaor even as the yet NFAPand in 2012. India it being a new concept UK MoD has the Management Rights to 35% there may be a lack of clear understanding in of the Radio Spectrum2; in USA National the minds of many decision-making bodies. Telecom Information Administration Office A committee, headed by Shri Ashok Chawla, of Spectrum Management (NTIA) manages was constituted to look into the National 32% of the spectrum as Federal Band3. Natural Resources Management, which includes Radio Spectrum. This Committee 2.2 was tasked to look into the Natural Resources allocated/ allotted by GoI; suggest measures to optimise such utilisation; suggest changes In order to meet these large-scale requirements in legal system and suggest measurers of Defence Services, most of the countries have for promoting transparency. It should be earmarked separate bands out of the complete appreciated that the allocation of spectrum is spectrum for its Defence needs. In USA, the as important as its assignment. The National Radio Spectrum is Classified as Government Security interests and requirements must be Exclusive (Federal4 use), Non-Government addressed at the initial stage of allocation Exclusive and Government/ Non-Government itself. The pull and pressure of organised Shared bandsIn Indian; and Context in UK , itfor is the classified first time as Cellular bodies and operators cannot colour anMilitary exclusive 5 use, Defence Civil use Band and has shared been Military/ jointly the vision of the GoI. workedCivil Use out. between MoD and MoC &IT. While the Defence Band is awaiting the right of 2.3 Defence Spectrum Managers to Administer the 2 At the outset it must be mentioned that the 34UK Defence Spectrum Management. Federal Table of Frequency Allocation, USA. fault lines are not existing in WPC, TRAI, MOC 5NTIA, Office of Spectrum Management. &IT alone. They are constantly blamed by UK Freq Allocation Chart. 83 Armed Forces and MoD for the not honouring : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

their commitment spelt out in MOU between command and control on the move. Availability forgedMOC&IT ahead and and MOD are on resisting Network coordination For Spectrum of of adequate quantity of spectrum becomes (NFS) or Project KRANTI. Armed Forces too have the prime governing factor in NCOs. Defence Spectrum Managers must have the resources Cellular Band Spectrum amongst them. Delay in and the ability to manage and monitor the implementation of NFS, which incidentally was radars,spectrum sensors, for both weapon communications systems, systemsweaponised and to be completed by 2013, has sowed the seeds non-communications systems. This includes of mistrust within Armed Forces. The unilateral decisions on spectrum, without co-opting drones and guided missiles to name a few. Defence theImmediate major user corrective of EM Spectrum measures while are suchThis mustas satellites, also encompass unmanned all aerial dimensions systems of requiredformulating to streamNTP or lineNFAP the is Administrationonly complicating of the battle space including airborneIn the Civil platforms as well Spectrumthe issue. by major all Stake Holders as military domain 5G, Autonomous Vehicles, Machineand subterranean to Machine, systems. IoT etc have increased the 2.4 . EM Spectrum demand many folds. To meet these high-speed demands Harmonisation of Spectrum of the spectrum and in working out the in Extremely High Frequency bands. USA is the leader in the concept of Auctioning 3.2 spectrum dividends. They first auctioned their spectrum in 1994, based upon an auction model designed by McAfee, an authority on This has the effect of further reducing the Industrial Organisation. USA also has a well- spectrum is available critical to for national use. As security a result, for defined organisation and process/ laws in place efficient use and control of the available to manage and utilise the Radio Spectrum. In Effective spectrum management this paper, Spectrum Management procedures isboth fundamentally Information Operationsessential for(IO) all and types Combat of of USA and UK have been studied and analysed operationsOperations. and should ensure that operations 3.as oneCONCEPT of the governing OF SPECTRUM factors. are conducted with minimal unintentional MANAGEMENT IN DEFENCE friendly interference (fratricide) and without negative Electromagnetic Environmental Effects 3.1 (E3). coordination may have a disastrous effect upon Military transition into Future Force Lack of concise, pre-planned frequency upon the premise that the information is based dominance will provide an advantage to the primarilyoperations. in Asspectrum part of spectrummanagement management activities in India currently, Defence is incorporated and relatively less emphasis is paid on the other Armed Forces to amass a superior force at the that are focused upon Spectrum Authorisation apoints Network of decision. Enabled In orderForce to achieve this Armed intoForces Network are moving Centric towards Operations transformation (NCOs) into areas like Spectrum Allocation, Formulation capable of engaging Theof Policies fact that on Defence Spectrum, was not Identification incorporated and in . The so as to provide seamless sensor to shooter formulationearmarking of of the spectrum National forFrequency commercial Allocation use. networked force has the ability to interconnect Plan 2008 and 2G spectrum was released for capabilities; situational awareness and effective 84 Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator commercial use without coordination with Defence bears testimony to this. Thegoverns act radioestablished spectrum duality use inin thespectrum United The creation managementStates of America in the and US its between possessions the President (US&P). of Defence Band and its management by MoD this for federal government stations and the Federal is a major step in addressing the National is the first time that Defence has got exclusive Communications Commission (FCC) under Security needs. However, considering that Defence Band adequate care and research the direction of Congress. The FCC regulates must be undertaken before the National the spectrum use of non-federal operated Policy on Spectrum Management is finalised. radio stations, common carriers, and private Study of the International methods will assist organizations or individuals. in formulating the best suited procedures/ processes for management of Spectrum in By Executive Order Indian context. 12016 of 1978, the President delegated his functions under the act to a new organization, 4. SPECTRUM MANAGEMENT IN USA created as the National Telecommunications 4.1 NTIAand Informationadministers the Administration spectrum requirements (NTIA), and of Federalplaced them Users. under See Figure the Secretary 1 for a diagram of Commerce. of the organization’s architecture6 National Spectrum Management. The Communications Act of 1934, as amended, .

Fig. 1: USA National Spectrum Management6 6

US Army Manual on Army Spectrum management Operations (FMI 6-02.70 (FM 24-2)) & Army Electromagnetic Spectrum Operations May 2010 (FM 6-02.70) 85 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 2: NTIA

National Telecommunications and Information radioOSM, assistsstations the and Assistant in developing Secretary and in Administration (NTIA). Through the NTIA, the assigning frequencies to US government President controls all frequency resources in and technical criteria pertaining to the the US&P and authorises foreign governments allocation,executing policies, management, programs, and procedures, use of the assignedto construct to these and operatestations fixedonly if service it is in radio the nationalstations atinterest their and embassies. if foreign Frequencies governments are . Figure 2 spectrum. illustrates the organisation of the NTIA7. (c) Office of Policy Analysis and grant reciprocal privileges to the US Development(OPAD). The OPAD is the domestic policy division of the NTIA. The salient components of NTIA are as follows:- OPAD supports NTIA’s role as principal (a) Office of Spectrum Management (OSM). telecommunicationsadviser to the Executiveand information Branch and the Secretary of Commerce on plansThe OSMand formulatespolicies that and ensure establishes the current and long-range spectrum and analysis, and prepare policy policies. They conduct research effective, efficient, and equitable use recommendations. The domestic policy of the spectrum both nationally and innovation, competition, and economic office generates policies that promote internationally.

7 (b) Inter-department Radio Advisory growth for the benefit of American Committee (IRAC). IRAC, under the businesses and consumers. Refer http://www.ntia.doc.gov 86 Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator functions of technology studies, administration including the development, review, ofAll technologyother components opportunities listed above programmes perform andthe andguidance recommendations for the services to in theseappropriate bands

recommend and provide guidance and enhance US companies capability to compete proceduresallotment to plans. ensure The the effective MAG shalland 4.2globally. Defence Spectrum Management8 efficient operation and management of spectrum-dependent devices that access Department of Defence (DoD) is one of the major the MAG bands. users in the Federal Spectrum. Specific Service requirements of all stakeholders in the (Army, Navy, Air Force and Marines) frequency (b) Be cognizant of the operational assignments within the Continental United bands, especially the unique military theirState (CONUS)respective are donefrequency by NTIA, managementthe requests Manage assignments as they relate to for which are routed by formations through tactical and training requirements. (c) offices. For, joint services assignments within the allotment plan for the MAG bands. the CONUS, applications are routed through (d) Coordinate spectrum policy guidance Defence Spectrum Office (DSO) to NTIA. Military involving the MAG bands with the Communication Electronic Board (MCEB) is the members of the applicable NTIA single window for Chairman Joint Chiefs of Staff subcommittees and ad hoc groups. (CJCS) to resolve inter-services coordination (e) Provide minutes of all MAG meetings and interference resolution issues. Outside the to the FAS Chair, Secretary and CONUS, the Combatant Cdrs are the authority representatives. In order to facilitate for allotment/ assignment of spectrum in their coordination and access to the MAG 4.3respective Area of Responsibility (AORs). bands, and to minimize interference among electronic systems, the FAS Military Assignment Group (MAG) and the MAG shall observe established . The MAG 4.4 coordination procedures. is established under the cognizance of the NTIA, theIRAC management Frequency of Assignmentthe MAG bands Subcommittee, which are of (FAS) to provide guidance and procedures for A detailed study of the USA spectrum allocation chart (available at http://www.ntia.doc.gov/ primary concern to the military departments. osmhome/allochrt.PDF) reveals following:- The MAG consists of one primary and one (a) USA has concept of shared band, other alternate member from the Army, Navy, Air than Federal and non-Federal bands. The Force and the Federal Aviation Administration shared band is available for use to both (FAA). The functions of MAG include:- whether or not applications for commercial and Government agencies. (a) The MAG is responsible for determining (b) In addition to the Federal band and shared band, the USA Defence forces frequency assignments in the MAG when undertake operations in NATO bands should be approved by the NTIA. nations, they have NATO band also 8 The MAG shall provide spectrum-related available at their disposal. http://www.ntia.doc.gov/osmhome/redbook/redbook.html. Is the official “Manual of Regulations and Procedures for (c) USA has moved its Defence applications Federal Radio Frequency Management” 87 in the higher bands. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

4.5 5.2 safeguarding, relocations and groups to There are various acts in place in USA for The UK Frequency Allocation Table covers the radio spectrum from 9 kHz to 275 GHz. It is manage Spectrum. Some of the important acts published by Ofcom on behalf of the National are enumerated below:- Frequency Planning Group, a sub-committee of (a) Relocation of Federal Government Radio the Cabinet Official Committee on UK Spectrum Strategy. The table identifies responsibilities actSystems gives indetailed accordance procedure with Commercial for auction services showing whether they are managed Spectrum Enhancements Act 2004. This for the management of frequency bands or

of spectrum held by federal agencies as by Ofcom, the Ministry of Defence, or another also relocations cost / estimates and Government department or Agency. It also timelines. includes The International Telecommunication amended from time to time gives details Union Table of Frequency Allocations contained (b) ofThe the Communication organisational structure Act of 1934, as well as in the current Radio Regulations. Public sector bodies (such as the Ministry of Defence and the will manage spectrum as a National Civil Aviation Authority) manage spectrum for as various groups / committees which defence, aviation, shipping, science and public safety. Spectrum assignment often follows resource. 5. DEFENCE BAND IN UK 5.3strict international standards. 5.1 The Defence Band in UK is managed by Ministry of Defence (MoD). MoD being crown agency The regulator Ofcom (The Office of telecommunications regulator and competent in UK is exempted from licensing. However, Communications, is the independent coordination for Defence operations within the coordination is required with other users. This authority for communication industries in UK) grants spectrum licences, giving users the right 5.4UK territory is done with the help of OFCOM. tomanages operate civil over radioa set locality spectrum at ain selected the UK range and

of frequencies. UK has also divided its spectrum9 A detailed ukstudy of the UK spectrum allocation table (available on internet at http://www. requirements in three categories viz, Military from band, non-Military band and shared band . The ofcom.org. /radiocomms/isu/ukfat reveals following:- were2003 Communicationsto negotiate and adhereAct formed to international Ofcom agreements,5 existing regulatory ensure the bodies. spectrum Its responsibilities is used in the (a) UK has concept of shared band, other than Military and non-Military bands. market mechanisms, where appropriate, to The shared band is available to both interests of citizens and consumers, and employ commercial and Government agencies. (b) In addition to the Military band and secure optimal use of spectrum resources. shared band, the UK Defence forces, 9 when undertake operations in NATO http://stakeholders.ofcom.org.uk/spectrum/spectrum- nations, they have NATO band also management/UK-FAT-Table-2010/ - UK Frequency Allocation available at their disposal. Table 2010 88 Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator

(c) UK has also moved its Defence mutually identified between MoD and MoC & 6. SPECTRUMapplications MANAGEMENT in the higher bands. IN IT by end 2010, however formal notification INDIA and promulgation was done only in 2015 with conditional Foot Notes. Now that Defence Band 6.1 and DIZ have been promulgated, there would evolvingbe requirement of firstly, reorganising National Spectrum Administration and secondly, a comprehensive “Standard Operating WPC under MoCIndian & IT Telegraph is the nodal Act empowers agency in Procedure on Defence Band Management”. WPCIndia tofor issue frequency all wireless assignment licenses andin India spectrum 6.3 management. Analysis of spectrum Management in . WPC India is also responsible for formulating all the policy on efficient spectrum management. . In India, the importance of spectrum All wireless users in India including Defence management and its efficient utilization as a Services and Govt departments apply for scarce natural resource was identified as early frequency assignments to WPC. National as in late 90s. Accordingly, some procedure Frequency Allocation Plan (NFAP) is published and methodology in terms of NTP and NFAP by WPC from time to time taking in views of have been devised. These Organisations and all stakeholders. However, it has been felt that Procedures continue to be as if DB isfirstly non-, Defence Services viewsUnlike as USA,major the stake Spectrum holder makeexistent. amendments In various meetingsto the Indian the standWireless of WPC Act administrationof spectrum are fornot Defencebeing incorporated and Non-Defence in the 1939has been which that stipulates there would that be Wireless a need to Advisor usersNFAP is documents. done by one agency WPC – which more has been delegated the powers to Administer often than not has day to day commercial National Spectrum, Further delegation would usage pressures colouring their decisions. require changes by an act of Parliament; and In this Organisational structure “Conflict of secondly, The rules of Business do not assign Interest” is unavoidable. the task of Spectrum Administration to MoD.

6.2 7. ORGANISATIONAL STRUCTURE WCP

7.1 No Exclusive Defence Band exists in India. In NFAP-81, some of the sub bands were earmarked were in Defence was the major user, The author has been heading JCES during however after NTP-99, the subsequent NFAP the busy times of carving out Defence Band, has been made service specific and no exclusive Defence Interest Zone and the Inter-Ministerial band such as Defence Band exists. In Dec 1998, Group-2 (IMG) meetings to finalise the revised a Report of Spectrum Management Committee scope of NFS. IMG-2 was necessitated due to recommended re-farming of spectrum and the grossly inaccurate projection of NFS cost creation of Defence Band and Defence Interest by BSNL in IMG of 2009. There seemed to be a Zone (DIZ). Subsequently in May 2009, a MoU total lack of clarity in Spectrum Administration was signed between MoD and MoC & IT wherein andback ineffectivethen. Spectrum to meet was beingthe very administered high rate byof promulgation of Defence Band and DIZ was the old SOPs. These SOPs were time consuming agreed to. A Defence Band and DIZ has been 89 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 applications for spectrum assignment and entire radio frequency spectrum with a viewWPC. toIts provideprimary the task requisite is to monitor technical the Standing Advisory Committee of Frequency Allocation (SACFA) clearance. The procedure in the enforcement of the National was unduly delaying the roll out of Mobile data logistic support to the WPC Wing Cellular Infrastructure. Delays in return of Changesinvestments were made in Spectrum in SACFA Clearances Price by through cellular and International Radio Regulatory automation.operators was The detrimental No Objection to MobileCertificate turn (NOC) over. and statutory provisions for efficient from Local Military Authority (LMAs) could never management of Radio Frequency be obtained in the stipulated window of raising serviceSpectrum which, and Geo-Stationarythough not revenue Orbit. observation/ responding. In most cases, NOC was This is in the interest of vital national deemed to have been granted by LMAs. Instances of preventing erection of cellular towers by utilisationbearing, yieldsof the considerable radio frequency indirect LMAs, even after SACFA clearance was given benefits through promoting the efficient increased. The mismatch between National Spectrum Custodian and Defence Spectrum spectrum and the geostationary orbit. Coordinator needs to be suitably addressed Its headquarters is located at Pushpa on an urgent basis. The eco-system required Bhawan, New Delhi. Under it, there by LTE or 5G will worsen the situation. are 28 Wireless Monitoring Stations (WMSs) (including five International 7.2 Monitoring Stations, IMSs) and 1 International Satellite Monitoring Earth WPC Station (ISMES), Jalna, Maharashtra . The function organisation of WPC is: - strategically located all over the country. as Licensing and Regulation New These monitoring stations carry out (a) WPC is divided into major sections such Technology Group Standing 7.3 monitoring in MF, HF, VHF, UHF, SHF. Advisory Committee for Frequency (LR), Allocation (NTG) and Joint Communication Electronic Staff (JCES) allocation issues (SACFA) and formulation which makesof the . JCES is an organisation that was frequencyrecommendations allocation on plan, major among frequency other set up, in 1949 primarily Electronic to manage Warfare Radio Frequency Spectrum for Defence use. The for issuing amateur radio licenses, (Joint Electronic Warfare Board – JEWB), Joint current role of JCES covers allottingfunctions. the The frequencydepartment spectrum is responsible and Electronics and Communications and EMI/EMC (JEMCAB). Defence continues to be the major as well as nationally important user of spectrum. monitoring the frequency spectrum. Therefore, JCES continues to be the lead agency in The WPC is headquartered in New Delhi Spectrum Coordination, Director JCES normally and has regional branches in Mumbai, chairs these meetings. The SACFA clearance Wireless Monitoring Organisation for Defence is also routed through JCES. JCES is Chennai,10 Kolkata and Guwahati. (WMO) also an important member in various Working (b) for monitoring all wireless transmissions Groups of World Radio Conferences – ITU. and is essentially, set up in the 1952, eyes is andresponsible ears of

Wikipedia To 10 perform all the Spectrum related roles JCES 90 has one Joint Director each for Spectrum and Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator for Wireless Monitoring against encroachment present rates for spectrum charges and SACFA. JCES has no resources or capabilities a need for the DoT and DoS to review the With the promulgation of Defence Band MoD urgentlyor misuse needs / interferencing to acquire the source capability locating. of transponder charges. Wireless Monitoring Organisation - WMO for (e) The Committee thinks effective Defence Band. measures should be taken to ensure continued efficient usage of spectrum 8. COMMITTEE ALLOCATION OF usageby providing including appropriate stipulation incentives/of rollout NATURAL RESOURCE REPORT – AN disincentives for efficient/inefficient 11 OVERVIEW levels, consideration of appropriate geographicalobligation, disincentives unit for forallocation lower usage and 8.1 measuring usage and a rigorous oversight

Though the CANR Report has not been notified mechanism including audit, etc. by GoI, de facto its recommendations are being (f) The Committee sees the need for followed. Hence, it is important to elucidate the more liberal mergers and acquisitions 8.2highlights of CANR’s recommendations. (M&A) guidelines keeping a minimum A Spectrum Act number of service providers to ensure competition. Spectrum sharing should is being formulated for efficient be permitted and suitable conditions use of spectrum. The Committee expressed its should be laid down in this regard in concern in the delay in implementing NFS as consultation with TRAI. The issue of delaysper the in timelines vacation agreed of frequencies to by all in parties commercial in the spectrum trading should also be looked MoU of 22 May 2009. The delay is leading to into at an appropriate stage. (g) In the opinion of the Committee, the bands that are occupied by Defence. The promulgation of Defence Band and recommendations are: - Defence Interest Zone (DIZ) needs to be (a) The Committee recommends that expedited. all future telecom licences should be a comprehensive and integrated (h) The Committee sees the need for unified licences and spectrum should be legislative framework for spectrum de-linked from the licences. (b) The Committee suggests that vacation management to be put in place to ensure and re-farming of spectrum for optimal and efficient use of country’s adequatecommercial spectrum services toshould facilitate be expedited optimal 8.3 spectrum resources. to ensure availability and certainty of Deductions from CANR recommendations that relevant to the scope of usage and revenue realization. . The salient (c) In future, spectrum for telecom access A comprehensive and integrated services should be made available through this paper are: - suitable market related processes. 11 (a) (d) In the context of space services, there is Legislative frame work is to be put Committee on Allocation of Natural Resource (CANR) Chapter 7 91 in place for optimal and efficient use : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

While formulating the legislation rep of MoD, ideally JCES mustof spectrum. be incorporated (Defence is Development and Commercial needs often the single largest Spectrum User, are give more priority by WPC, MoC &IT than any dilution will impact National the security needs, insufficient legislations Security). / laws and Standard Operating Procedures economicfor Spectrum and social Management, needs of itsour allocation,country a assignment and audit. To meet the strategic, (b) MoD needs to set up its own WMO to administer its Defence Band. best practice model for Indian scenario needs 9.2to be evolved. (c) Since a fresh Spectrum Legislation is being in acted – MoD must become the Licensee and Administrator of Spectrum usage has become a daily life necessity Spectrum within Defence Band and this would be in lines with the Spectrum because daily use electronics/ appliances like Rules of Business notified accordingly Administration in USA and most of other mobile, wireless hot spots, links countries( etc need EM Spectrum. All these appliances revenuehave direct generated impact for on the the government society. Optimum to meet ). To avoid a conflict between cost has to be arrived at, that balances the commercial and non-commercial requirement of spectrum WPC cannot its societal responsibilities, cost burden on be Spectrum administrator of Defence low,common not only citizens, is the operating revenue generated and capital for costthe Band. on the Telecom sector etc. If one prices it to (d) MoD must be represented in the process of Formulation of NTP and NFAP. government adversely effected but even the In addition TRAI, should not be the operating cost is impacted in the long run. Spectrum is a premium resource and regulating agency for Defence Band. Spectrum charges are no longerUnfortunately, to compensate is scarce. MoD must also formulate only the organisational cost of Spectrum (e) DOT till 2008 was satisfied with recovering procedures to ensure that there is no theAdministrator Spectrum Administration Department. organisational idle Spectrum in commercial band cost or for that matter to meet the urgent only during peace time. While doing requirement of the government to minimise so, it must be assured that the transition deficit financing. In many countries like USA, from Peace Time to War is not delayed UK and other the base auction price is arrived at due to vacation by commercial users. based upon a study carried out by an independent The concept of shared band, within risk analysis expert agency. For example, in 1994 Defence Band, needs to be considered. USA arrived at the base price for auction of spectrum based upon the recommendations of 9. SUGGESTED ORGANISATION OF study carried out by MacAfee. DEFENCE BAND ADMINISTRATOR India too needsTo 9.1 safeguardto arrive at thethe interestbase auction of Defence, price through to advise an major theindependent government risk on analyst the National expert group. Security drawbacks in terms of independence perspective linked to spectrum usage by The current system in India has the defence; formulation of NTP and NFAP and to in Spectrum Management; Economic 92 Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator ensure no encroachment into Defence Band there is an urgent need to establish a WMO for the instances of misadministration of spectrum Defence Band. The suggested organisational made then, the probability of reoccurrence of model is given below in Figure 3. notexperienced have the incorrect 2008 prospective is very high. of spectrum MOC&IT, 9.3 which has the responsibility of only ICT will

utilisation by other agencies like Defence, The necessity of Defence Band administration 9.4Atomic Energy and other Strategic agencies. is indisputable. By whom is more important. For better transparency and effective administration of EM Spectrum, more teeth Defence Band can only be managed in an needs to be given to the National Spectrum inunbiased commercial manner, or withoutsecurity conflictrelated ofutilisation interest, elucidatesAdministrators. the importance Wireless that Advisor is given reporting to this when the Apex Body is not directly involved to Member Telecom in MOC&IT very clearly Allof spectrum.aspects of Defence Harmonisation Band must to therefore allocation, be administrative body. The administration body administered by an agency answerable to MoD. needs to be independent and be directly placed under Cabinet Secretariat (akin to the case in assignment, vacation and re-farming with in USA, UK and other countries). The model that Defence Band must be done by a restructured was adequate to handle user-based spectrum JCES. The erstwhile Radio Monitoring administration (allocation) till early 90s is Organisation, MoD needs to be restructured not adequate to administer Services based to perform the role of Defence Band WMO. A Frequency Allocation. If these changes are not new section needs to be created that looks at

Fig. 3: Defence Band Spectrum Administration

93 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

representation of India on National Security (b) Defence Band and the Non-Defence at ITU-R and WRC. There is also a great need Band should be separately managed but to incorporate Armed Forces representatives jointly coordinated by an independent in formulation of ITU Standards. In case of 5G, agency under the Cabinet Secretariat. which has tremendous potential for Indian The Defence Band should be managed Army for Tactical Communication System (TCS), by an agency under MoD. mechanism put in place to coordinate Indian Armed Forces went unrepresented in (c) theThere spectrum should usage be for a Defence coordination and various Study Groups on 5G as well as IMT 2020. 5G Standards formulated are devoid of the security of location of the 5G entities. This itself commercial use. The coordination should will be a limiting factor in exploitation of 5G as be done by an independent agency under FWS-TCS (Field Wireless system). If 5G is used, PMO, with appropriate representation 9.5major changes will be required in the 5G stacks. from major stake holders. The suggested model of Figure 3 above can (d) Defence WMO under MoD needs to be only be enabled by an Act of Parliament established to monitor use of Defence Band. This WMO will ensure efficient . utilisation of Spectrum by Armed Forces Under the provisions of ITU-R, National and Central Security Agencies as well Security is given topmost importance in as will protect Defence Band against Harmonisation of Spectrum. Even the ITU-R encroachment. standards are governed primarily by National Security. There is therefore a need to first build (e) Armed Forces need to paly more active capability within Armed Forces in formulation role in WRC as well as in formulation of ITU-R Standards through Study representationof ITU-R and ITU-D of these standards. personnel After developingin various this capability, the next step is for focused Groups. (f) A suitable administrative mechanism, Working Groups both Regional (ITU) as well as viz, a Spectrum Planning Subcommittee, 10.Global RECOMMENDATIONS (WRC). managementunder an & appropriate allocation of spectrum Secretariat in may be formulated to look into the 10.1 non-Defence Band and apportionment of spectrum space between or among Considering the need to efficiently administer the government and non-government the Non-Defence and Defence Bands judiciously activities in India. there is a need to fine-tune the WPC. The (g) A Committee needs to be formed by recommendations are: - thePMO, withcommittee a task toreport, reorganise process Spectrum of (a) The Indian Defence Band that has been Administration in India. Based upon practiceworked outand jointly the betweensame needs MoD andto MoC & IT, is in line with the international amendments to various Acts should be initiated. Administered as per the best practices (h) There is a need to adopt the concept of worldwide. Shared Band, akin to USA, at least in the 94 TMT Bands. Vol. 4 No. 1 2019 Reorganisation of Indian Spectrum Administrator 11. CONCLUSION

11.1 studied) have an independent spectrum regulatory body at the apex level of President and Crown respectively. The spectrum for Spectrum requirements of different Defence Defence and Federal use is managed and services differ and cannot be generalized, as REFERENCEScontrolled by Defence / Federal organisations. the requirements are peculiar for each nation. However, Defence Forces should ensure that 1. www.fcc.gov the spectrum is used efficiently, as it is a scarce 2. www.ntia.doc.gov/osmhome/allochrt.PDF natural resource and is also required by other 3. www.ntia.doc.gov agencies. ITU-R constitution provisions for a 4. www.iop.org/activity/policy/Publications/ Accordingly,Nation’s freedom the incountries use of spectrumhave constituted for their file_24906.pdf Military Installations vide Article 36 and 48. 5. www.ofcom.org.uk/radiocomms/isu/ukfat/ ukfat08.pdf their Spectrum Management Organisations 6. Committee on Allocation of Natural Resources and processes. Both USA and UK (the models (Chapter 7).

95 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Cyber and Electronic Warfare: Technology Enablers and Challenges

Maj Akhilesh Singh

Abstract—The EW-cyber environment is now so fundamental to military operations and so critical to our national interests that we must start treating it as a war fighting domain. The convergence of these two capabilities provides for Cyberspace Electromagnetic Activities, which are activities leveraged to seize, retain, and exploit an advantage over adversaries in both Cyberspace and the electromagnetic operational environment, while simultaneously protecting the mission command system and denying and degrading our enemies’ use of the same. Convergence creates opportunities for Cyber and EW to overlap; however, convergence also creates potential for training, resourcing, and employment changes to dilute skills currently inherent in the EW and Cyber workforce as well as resources.

1. INTRODUCTION

1.1 intelligence,ineffectiveness. communication,Theatrisation of commandssurveillance will involve the creation of joint HQ with common Modern warfare calls for simultaneous and seamless application of all elements and air defence systems. To be successful in kinetic,a technology synergetic driven integration battlefield, of non–contactthe armed of warfare and synergising the capabilities warfare, using means that would often be non- and resources of the three Services. All five domains – land, air, sea, space and cyber 1.3forces is required, which is lacking. space – are to be employed with maximum learning,effect. New network and emerging centric warfare technologies tools and controlled, directed, and commanded weapons techniques like artificial intelligence, machine The proliferation of modern electronically other elements must be exploited to use force has caused a rapid expansion in the field of cohesively and in an orchestrated manner. Joint science that is generally called `Electronic planning and application, joint training, joint inWarfare’ all parts (EW). of theThe electromagnetic basic concept of spectrum EW is to doctrines and compatibility in equipment and exploit the enemy’s electromagnetic emissions 1.2communications are a prerequisite. (EMS) in order to provide intelligence on principlethe enemy’s is that order victory of battle, in any intentions, future war and needIn the for future a single era headquarters of “CDS and coordinating Jointness”, capabilities. A generally accepted military diverseintegrated elements Commands in willthe besame the geographic imperative will go to the side that can best control and manage the EMS. The use of EW and cyber as space. The present arrangement – with 17 a force multiplier is a well-established and geographically separated single Service employCommanders it as atan all integral levels understand part of their the overall Command Headquarters and two integrated capabilities of this potent force multiplier and ones-is clearly a recipe for operational 96 Vol. 4 No. 1 2019 Cyber and Electronic Warfare: Technology Enablers and Challenges

data via networked systems and associated plans. However, due to the changing façade of the EMS to store, modify, and/ or exchange the digital battlefields of today, there is a need thereto look is beyondan understanding the brute forceemerging capabilities of the networkphysical infrastructures.to instruct a controller A classic to example shut off canthe exerted by the existing systems. Increasingly, be, sending a digital signal stream through a Management and the close coordination commonality in Cyberspace, EW, Spectrum power flow, while sending a high voltage surge telecommunications and computer networks, athrough digital thestream electrical of computer power cable code to or short a pulse out required between the three. The blending of the power supply is considered EW. However, referred to as ‘Convergence’ has resulted in the adversaryof electromagnetic computers, power which or ais combinationessentially previously distinct domains of EW and Cyber, of both can be used to create false images in merging to become one and the same. This convergence becomes much more relevant Cyber EW. Cyber EW consists of the following in the Tactical Battle Area (TBA) where the three activities: Cyber Electronic Attack (Cyber entry point for both is the EMS. Looking at the EA), Cyber Electronic Protection (Cyber EP), world over, the Chinese have integrated the two and Cyber Electronic Support (Cyber ES). These through their Integrated Electronic Warfare three activities are defined as follows:- (INEW) campaign. The US has coordinated 4. CYBER ELECTRONIC ATTACK and integrated Cyber, EW and EMS Operations (CYBER EA) developthrough Cybersimilar Electromagnetic and complementary Activities (CEMA). As Cyberspace and EW Operations 4.1 capabilities, it is imperative to plan, integrate, and synchronize these with military operations electromagneticUse of electromagnetic spectrum energy with to the attack intent an 2.especially SCOPE in joint operations. adversary’s electronics and/or access to the

2.1 of degrading, neutralizing, or destroying an enemy’s ability to store, modify, and/or exchange data via networked systems and The scope of this service paper is to suggest a 5.associated CYBER physical ELECTRONIC infrastructures. PROTECTION model for exploiting the cyber and EW (CEW) (CYBER EP) in enabling jointness, whereby the military can exploit ibid core elements of Info Warfare with 5.1 3.this CYBERintegrated AND capability. ELECTRONIC WARFARE (CEW) The passive and/or active means taken to 3.1 protect electronics and/or access to the EMS from any effects of friendly or enemy use of spectrum to control the domain employment of Cyber EW that degrades, CEW is any military action involving the neutralizes, or destroys ability to store, modify, and/or exchange data via networked systems characterized by the use of electronics and and associated physical infrastructures.

97 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

6. CYBER ELECTRONIC SUPPORT (CYBER ES) (h) Language specialists/translators and 6.1 interpreters. Any action to search for, intercept, identify, 8. (i)CYBER CEW support EW IN to AN national OPERATIONAL strategic assets. ENVIRONMENT unintentional radiated electromagnetic energy radiatinglocate, or from localize electronics sources used of to intentional store, modify, and 8.1 An operational environment is a composite of for the purpose of immediate threat recognition, and/or exchange data via networked systems the conditions, circumstances, and influences 7.planning, CHALLENGES and/or conduct of future operations. analysisthat affect of thean employmentoperational environment of capabilities must and bearing on the decisions of the commander. An 7.1 consider the five domains and the EMS. The four traditional domains (air, land, maritime, perspectiveAs the services would provide greatly most offacilitate India’s EWthe and space) and the EMS exist naturally. The fifth assets, a basic understanding of each service’s sharedomain, information, cyberspace, communicate, is man-made. integrate, Cyberspace and and the EMS provide commanders the ability to planning and coordination of EW at the joint level. Doctrinal support for joint operations synchronize operations across all war fighting inneed place to befor examinedan effective to impacthighlight at theall levelstraining of functions and echelons. Conversely, cyberspace operationsaspects as alsoto includethe institutional strategic, support operational to be forand recruitment, the EMS provide information adversaries activities, and training, enemies and tactical keeping in mind the scope of an effective, inexpensive, and anonymous means

and command and control. Cyber EW provides applications,joint operations hardware in the electronic Indian context.components The commanders with the ability to gain and maintain future battlefield therefore is the software 9.an advantageFEW EXAMPLES in cyberspace OF and LATEST the EMS. TECHNOLOGY and the wireless networks. This is the target of CEW, which can be defined as the conduct 9.1 of CW on an adversary using the techniques of EW for ingress or incapacitation. Some of the followed and developed to conduct future challenges in the jointness are as listed below. Few examples of latest technology being (a) Planning, coordinating and integrating CEW for joint operations. operations10. COUNTER are:- ELECTRONICS HIGH POWERED MICROWAVE (b) Doctrinal guidance for joint CEW. ADVANCED MISSILE PROJECT (c) Issues of interoperability. 10.1 (d) Maintenance of data bases. (e) CEW in joint exercises. (f) Development/procurement of equipment. In 2012, Boeing released footage of its weapon, the Counter Electronics High Powered (g) Management challenges. 98 Microwave Advanced Missile Project (CHAMP), Vol. 4 No. 1 2019 Cyber and Electronic Warfare: Technology Enablers and Challenges

cruise missile with an electromagnetic war

whichsignals. monitors DRFM equipmentand collects may information also include on head disabling a bank of desktop computers. an Electronic-Intelligence (ELINT) capability It merges EW and cyber warfare by conducting ‘protocol-based attacks,’ where you actually get 12.enemy POWER signals andDOWN jammers. into the system and displace ones and zeroes to break that communication chain between the 12.1 trigger and the (radio-controlled) IED receiving 11.those DIGITAL ones and zeroes.RADIO FREQUENCY MEMORY (DRFM) Electromagnetic weapons could also be used to disable enemy vehicles or in the case of the 11.1 US Active Denial System (ADS) be used to repel 13.humans. AIRBORNE PLATFORMS latest technology; one can create false targets 13.1 Digital Radio Frequency Memory (DRFM) is the or hide real targets using the enemy’s own wave EW equipment is gradually shifting from the forms against him. DRFM jammers employ a magneticground-based interference platforms management, to airborne especiallyplatforms computer-based ‘library’ of known threats that due to miniaturisation and better electro- are used to identify and neutralize incoming

99 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

those dealing with Electronic Support Pods (like the MQ-9 Reaper with a Northrop functions such as interception and monitoring. Grumman Jammer Pod) brings in an entirely Increasingly, EW equipment is now based on new dimension in which the spectrum battle can aircraft and drones because of its inherent abe gradual fought shiftin an when integrated some mannerof the functions using both of advantages. Airborne systems, though limited ground and aviation assets. The future may see by size and power output, have the advantage of range and reach. Jammer pods used in EW aircraft are taken on by capable, multirole dedicated EW aircraft were generally more ofUAV eavesdropping platforms. The on EA and 18G disrupting Growler electricalis the US capable than those mounted on other kinds of Navy electromagnetic warfare plane, capable aircraft. Fifth generation aircraft such as the US F-35 are capable of stand-off as well as stand-in 14.systems, STRIKING such as those AT A in DISTANCE guided missiles. jamming using power outputs almost ten times that of legacy fighters including dedicated 14.1 EW aircraft. Reports indicate that such truly 16. Defence firms are also looking to build multi-role aircraft operating in high threat AD long range weapons, such as missiles with environment will be more effective than single electromagnetic warheads. mission electronic attack legacy aircraft. The pairing of existing UAV platforms with Jammer

100 Vol. 4 No. 1 2019 Cyber and Electronic Warfare: Technology Enablers and Challenges 15. JAMMERS

15.1 Russian EW units. USA is now deploying new radars like Q-53 system that can detect and identify such small objects and then initiate the To the layman, a jammer is synonymous 17.kill chain ARTIFICIAL using laser INTELLIGENCE weapons. (AI) with EW. It is undoubtedly the most visible component of EW. Modern jammers are 17.1 significantly different from their decade-old cancousins. generate Equipment very high such power as the output Krasukha-4 over or the Turkish KORAL ground-based jammer Reacting quickly involves being able to patch systems quickly. Army can’t spend days or a broadband of frequencies which can be weeks on those tasks, but AI can help human analysts do better work and spend time more whicheffective had at distanceslimited ranges up to 300km;and effectiveness a big jump from the previous generation of jammers efficiently rather than having to sit through data. For instance, the application of AI could reports also suggest that equipment such as while in broadband jamming mode. Some help reduce the time needed for EW/Cyber accesssystems to to spectrum reconfigure and and information change techniques systems the Russian communications suppression (or tools) to enable and protect friendly forces’ station Murmansk-BN is capable of jamming while denying adversaries access to the same. about 20 spot frequencies at ranges up to AI could do this by integrating into EW/Cyber 5,000km. In order to achieve these high ranges, systems and quickening the OODA loop well jammers are no longer restricted to the line-of- beyond human capabilities. AI could also enable sight mode and even use reflected signals from dynamically identify threats, close the gap and enhance dynamic planning and execution, the ionosphere. Shoot and scoot capability is available to these high power jammers based on between technology and operator capabilities, high mobility trucks with built-in generators. and minimize focus on data analysis to enable a Such mobility was feasible earlier in low power 18.shift toFUTURE execution. EW SYSTEM stand-alone jammers. Future jammers are likely to be expendable (including air dropped) 18.1 16.and mountedDRONE/SWARM on unmanned COUNTERS ground vehicles.

16.1 Some of the essentials features required in the future EW sys are as listed below. (a) Fielding of Integrated Non- Drone swarm’s offensive could be blunted Communications EW systems for the through the use of countermeasures like EW Indian Army. andtechniques, concealment cyber-attacks, or pitching laser a andcounter microwave drone (b) Dedicated EW systems for LICO in both weapon systems, small arms fire, camouflage Northern and North- Eastern sectors. (c) Elevated EW platforms for enhanced swarm. In January 2018, Russia confirmed a range and area coverage. swarm drone attack on its military base in Syria. (d) Track based EW platforms to support fast Six of these small-size UAVs were reportedly moving and highly mobile mechanized intercepted and taken under control by the101 forces. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

weapons system to damage or destroy (e) adversaryDevelopment equipment, of Directed facilities Energy (DE)and The US Army has updated its field manual and released FM 3-12 on “Cyber and Electronic Warfare Operations” in April 2017. The EW personnel by a beam of concentrated EM systems of the future will have Cyber Offence radioenergy frequency or atomic orweapons subatomic and particles. particle and Defence capability and will operate at the Possible applications include lasers, cutting edge of the TBA, a distinct shift from the strategic level at which cyber operations are beam weapons. offfocused the air presently. into the Such networks equipment of the will adversary have the (f) Satellite Communications and Cellular capability to carry out cyber malware injection Communications monitoring systems at Acquisitions of systems to take on the field level. 20.including CEW air SUPPORT gapped and TO off-line SPACE systems. BASED enhanced frequency coverage, use of (g) OPERATIONS 20.1 ‘frequency hopping’ ‘communication equipment’s, induction of ‘Software Defined Radio’ sets and growing Space is inexorably becoming the new high sophistication of anti-jam propagation ground and Star Wars are no longer in the techniques. realm of science fiction. Physical destruction, (h) Qualitative technological improvement laser blinding and cyber and EW are all likely of Direction Finding (DF) sub-systems to to be employed to deny the enemy the use of achieve greater accuracy and flexibility satellites and to safeguard the use of one’s 19. BREACHINGin its deployment. THE ELECTRONIC – own satellites for their force multiplier value. CYBER – OPTICAL GAP India is on the threshold of entering a new era in space exploitation. There is a need to 19.1 deliberate on how best the space assets could roadbe integrated map for theinto Armed our military forces operations. in the realm The of spaceDefence includes Space Vision intelligence, --2020 which reconnaissance, outlines the The term ‘spectrum warfare’ is being used surveillance and navigation as the thrust areas areto denotesimultaneously the blending emerging of electronicin mainstream and optical warfare, while Cyber-EW systems to restrict or deny freedom of access to and operationsin its first in phase space (2007-2012). is no longer Thelimited ability to military space. Spectrum warfare seeks to combine EW technologies such as electronic systems and the means to counter them is opticaljammers, technologies interception, such as radars, infrared electronic sensors, global military powers. Knowledge of space spoofing and deception along with electro- acquireincreasingly the means available to disrupt on the or international destroy an multi-spectral and hyper spectral sensors, market. Nations if they wish can possess or visible-light sensors and laser technologies. The satellites in space, their communication nodes convergence of Cyber and Electronic Warfare is onadversary’s the ground space and systemsin space, byor ground attacking nodes the a natural progression. While EW is the coarser and close-in tool, Cyber Warfare is more targeted and specifically focused on chosen that command the satellites. The reality is that computer systems, networks and applications.102 there are many extant capabilities, such as Vol. 4 No. 1 2019 Cyber and Electronic Warfare: Technology Enablers and Challenges 22. SOFTWARE DEFINED RADIO measures, Jamming, use of micro satellites, (SDR) BASED EW hackingAnti-Satellite and nuclear Weapons, detonation Denial andthat Deceptioncan deny, disrupt or physically destroy space systems 22.1 and the ground facilities that use and control

SDRs have transformed the way radios are them. More and sophisticated technologies used in the battlefield. These sets are agile for jamming satellite signals are becoming and the same platform provides the ability to available. For example, it is learnt that Russia use different frequency bands, modulation is marketing a handheld GPS jamming system. versatility,schemes, FH these Rates, sets FH can Bands, switch power over output,to the A one watt version of such a system, the size gain and other parameters. Due to their of a cigarette pack is able to deny access to GPS out to 80km; a slightly larger version can traditionalEW role while radio free inventory from communication of armies across role. receiverdeny access signal, up towhich 192 could km. Both disrupt are compactmilitary Now that SDR is a reality and increasingly the and powerful enough to jam an aircraft’s GPS the world is being changed to SDR, many short missions or create havoc at an airport. Such range and discrete EW functions are likely to indicators of the potency of EW need to be be taken over by such sets in the TBA. The SDR taken cognizance of and appropriate defensive thussets areenhancing also likely the to effectivenessbe deployed closerto interfere to the enemy forces than traditional EW equipment, 21.steps DIRECTED initiated. ENERGY WEAPONS (DEWS) 23.with theCONVERGENCE enemy links. OF COMINT AND 21.1 ELINT 23.1 Development of DEW has been in progress communication is reducing due to since the 1940s with the development of the Information value from intercepted haveGerman not experimentalseen commensurate weapons. translation Successes achieved in the laboratory and the test ranges communication systems switching to better spectrum which can disrupt communication FH schemes, use of non-standard protocols, links,into the navigation battlefield. links Use and of DEWtelemetry in the links RF encryption and other ECCM techniques. Staging areas near the international boundaries are previouslynow extensively practiced connected methods using of opticalpicking fibre up and against small, mobile platforms like and other non-radiating media. Hence the UAVs, is indicative of the things to come. disrupters as protection against drones enemy Order of Battle from radio transmissions The development of Radio Frequency (RF) made during mobilisation and preparations at the use of the spectrum to achieve kinetic upthe stagingsignatures areas of will enemy not yieldradars any anddividends. other has tremendous potential. It also signifies ELINT, on the other hand, depended on picking effects, a significant shift from traditional EW transmitters and compare the same to existing philosophy. libraries in order to evolve a larger intelligence

103 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

25. CONCLUSION picture. Gradually, we can see a perceptible 25.1 shift in the way modern EW systems are looking at COMINT in the same way as ELINT. analysis of enemy communication transmitters with wireless networks providing the media andAdvanced radar receiverstransmitters can carryand carry out ‘fineout grain’radio The future tactical battlefield will be replete

for battlefield management systems in the finger printing. This can involve receivers informationalised combat environment. The based on UAVs, special aircraft, ground-based logic of a more integrated approach to cyber or satellite-based. This also involves advanced and electronic warfare is not just functional or 24.data managementBIG DATA IN capability THE MILITARY and automation. operational -- it is also financial, and would lead DECISION MAKING PROCESS environmentto rationalisation is now and so budgetaryfundamental optimisation to military operationsin defence and procurements. so critical to The our EM-cybernational 24.1 interests that we must start treating it as a war demands that the commanders have access fighting domain on par with-or perhaps even toEffective timely, commandrelevant and and accurate control information in war more important than-land, sea, air, and space. The increasing convergence of electronic, continuously. The primary staff products are cyber and optical domains will require a perceptible shift in war fighting techniques. information and analysis and can be visualized In this paper, the author has combined the as data sets characterized by their ‘variety’ of existing methodologies of CW and EW, and type (structured & unstructured data), ‘volume’ propagated the converged concept of Cyber (terabytes to petabytes) & ‘velocity’ of change reach correct situational awareness results, we theseElectronic techniques Warfare so (CEW). that this It isdomain imperative of future that (speed of analysis & presentation). In order to the same specialists be now trained on both must analyze correct data coming from correct wars can be fully exploited and commanders source and produce information from raw data. are presented with a battle winning option, This will enable commanders to take swift and REFERENCESboth for offensive and defensive operations. better decisions thereby reducing the OODA loop. A few sectors where Big Data can find its place in the Indian Army are listed below:- 1. www.rand.org. 2. Military & Aerospace Magazine www.tripwire. (a) Operational Planning. com. (b) Counter Insurgency Operations. 3. Defence Industry News, Elbit System. 4. Networks and EMS (NES) Roadmap Navy EW and (c) Big Data War gaming. Cyber Convergence. 5. Joint Publication 3-51, “Joint Doctrine for (d) Cyber Warfare. Electronic Warfare”, 7 April 2000United States of (e) Disaster Management. America. 6. Joint Publication 3-13.1, “Electronic Warfare”, 25 (f) Manpower Management. Jan 2007, United States of America. (g) Logistics Management. 7. Joint Publication 3-12, “Cyberspace and Electronic Warfare Operations”, April 2017, (h) Cognitive Analytics. United States of America.

104 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Tri Services Training in Joint Environment

Col Deven Makhija E-mail: [email protected]

Abstract— Human resource development in armed forces is a continuous process for the development of

skills of personnel and entire organization. Training in joint environment has its own challenges due to varied ethos and silos of services. Joint services institutes and framework for joint training needs to be promulgated based on national security strategy and operational directives. Joint training requirements, planning, execution, validation and assessment needs to be modeled. This paper has proposed a model and framework for joint training along with few envisaged fields for participation by academia and industry to enhance the skills of tri services for joint operations. The nature of warfare has changed over years and is ever evolving. Jointness in operations in present era has evolved and is an important prerequisite for success. Jointness has to be based on operational philosophy andin terms mandated of optimisation strategic and of forceoperational structures, directives acquisition based onprocesses, national training security. methodologies, Jointness of Army, and Airresearch Force and Navy is about effective, efficient and optimal utilisation of resources that dictate various requirements training and development on strategic capabilities. Four major aspects for jointness thus incorporates operational, organisationalTraining (or structural), , and doctrinal shift. is an important facet as command and control, planning, coordination and operational execution at all levels is assured by well rehearsed and trained personnel. Training is achieved by imparting instructions and applied exercises for acquiring and retaining knowledge, skills, abilities, and attitudes necessary to complete specific tasks. Joint training is training, including drills of individuals, units, and staffs using joint doctrine and tactics, techniques, and procedures to prepare joint forces or joint staffs to respond to strategic, operational, or tactical requirements. 1. INTRODUCTION

1.1 endeavorsstrategic, operational and an essential and tactical prerequisite levels. Joint for training will thus be the bedrock for all future services must develop structure and framework Joint environment strategy emphasizes jointness. In order to fight together the tri that all future wars need to be conducted in such a manner that the Land, Air and Naval 2.to supportSTAGES joint OF training JOINT and TRAINING operations. commandCommanders and control jointly structure formulate, and orchestrate push for a and implement war plans. It mandates unified 2.1 tri-service approach for modernisation of the have different ethos and infrastructure for armed forces. Human resource development The Services have evolved in silos and to ensurepersonnel requisite of tri skill services set, abilities, for conduct attitude, of knowledge and experience is imparted operations is an essential component for training. Thus training in joint environment achieve jointness, it is essential that needs deliberate planning, development of personnel from the three services serve and train infrastructure and models. The important stages togetherjointness. To of training envisaged in joint environment are in organisations across the military- as depicted at Figure 1 below. 105 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

•Education • Competitive Examinations •Pre Commissioning/ • Promotion Cadres Enrolment Training • Seminars & Discussions •Structured Training • Regimental Exposure • . Online Courses • an . Distance Learning

Individual Self Training Development

Service Specific Joint Training Training

• Joint Training Institutes • Joint Staff Courses • Joint Exercises •Special to Arms/Service • Theatre Specific •Staff Officers Course • Operations Specific •Junior, Senior and Higher Command/ Leadership • Domain Specific • • Diplomacy Technical/ Domain Specific

Fig. 1: Stages of Training

2.2

Individual Training. Elements of education and training are most structures like academic, education, pre This incorporates often blended in application to achieve desired learning objectives, ultimate results and Education focuses on the instruction of outcomes. Virtually all training institutes and personnelcommissioning to enhance and regimental their capacity centre to training.perform courses include elements of both education and training in their academic curriculum. general aspects of knowledge and develops mindspecific for functions application and tasks; to a education wide spectrum imparts Education and training thus, are partners in the environmentgeneration and will sustainment ensure development of an individual’s of ethos, through the cognitive domain and fosters camaraderie,abilities to perform. spirit Individualde corps training and cohesive in joint of endeavors. Education is largely defined anddiverse innovative perspectives, thinking, abstract particularly reasoning, with bond for rest of career in Services. Thus, in critical analysis ambiguity and uncertainty joint environment it is imperative to ensure availability of joint institutes and infrastructure respect to complex, nonlinear problems. at all stages of training. 106 Vol. 4 No. 1 2019 Tri Services Training in Joint Environment 2.3 training institutes assume competent service Self-development. in professional specialities and diplomacy. Joint their own professional Empowering growth is a individuals necessary with responsibility to actively participate in educated, trained, and experienced individuals as the training audience. Joint performance knowledge accelerates individual development, and positive step. Self-study in pursuit of reflects the successful application of what individuals learn via joint assignments, joint and allows flexibility and accommodation to education and training, joint exercises and self-development and is essentially based on 2.4individual needs and desires. 3.theatre JOINT and LEARNINGoperational directives. PROTRACTION Service Specific Professional Training. MODEL It empowers the personnel on service specific, 3.1 encouragedtechnical, staff to andunderstand leadership the roles.intricacies In joint of environment cross training in these fields is proposed model for coordinated progression ofThe integrated, Joint Learning structured Protraction and (Figureunstructured 2) is a each field and enhance the cognitive horizon on learning processes and events to prepare 2.5limitations and capabilities of each. Joint Training. tri service personnel to specified joint academic; it is the application of the acquired performance standards. This protraction of Joint war fighting is not professional learning instills habits of mind, operational environment where increased skills, abilities, attitudes and values through knowledge, ability, aptitude and skills in an education, training, self-development, and experience. The learning model ensures human levels of experience correspond directly with resource development by continued training increased levels of proficiency and performance cycles. It focuses on creating and sustaining joint trainingof theatre, is operationalessential for or all domain personnel specific preparing tasks. qualified personnel and joint leaders capable To maximize joint readiness, joint professional of effectively integrating and synchronizing national capabilities to successfully implement for assignment on a joint staff, including officers national security and military strategies.

Fig. 2: Joint Learning Protraction

107 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3.2 mentors can use varied state of art techniques, resources, technologies and training aids to collective preparation through learning cycle ensuresThe integration effective of individualintegration preparation of education, and readinessfacilitate achieving are achieved specific through learning the objectives.integrated applicationImprovements of those in jointelements, preparation systems, and training, self-development, and experience to achieve preparedness for joint tasks and processes. Commanders at each successive level operations. 3.3 must exploit the training aids and determine monitoring,how best to managing, efficiently reachand pinnaclesintegrating of development throughout the career as experience and performance. Model ensures The systematic approach to professional individual, and collective joint preparation embodied in the model is important to ensure by commanders, and training institutions availability of trained human resources to improve joint operational capability and for joint tasks. Trainers, commanders and achieving joint readiness.

Fig. 3: Joint Training Framework

108 Vol. 4 No. 1 2019 Tri Services Training in Joint Environment 3.4 4.2 Joint Training Framework Tri Service Communication Infrastructure.

. The joint training communication interface for integration in aframework methodology (Figure to 3) plansupports and implementation implement a The existing training structures need to have of the Joint Learning Protraction by providing all aspects of human resource development operationsaddition to and joint is trainingthe start structures. point for Joint forcomprehensive personnel to training include program.elements Itof supportstraining, communications are pre requisite for joint wherein industry can facilitate networks Training Structures. Few suggested measures education, self-development and experience. Training requirements are based on felt need, operational requirements and strategy. The and communications for joint training are maptraining consistent directive with is formulated command at apexpriorities, level establishment of Common Web, Tri Service One based on joint capability development road Network, Common Standards and Protocols, Joint Encryption systems, Common GIS, planrequired facilitates capabilities, the adoption and available of an integrated, resources developmentCommon Data of Sharing plug and Platforms, play model Standard for and formulates joint training calendar. Training communicationPolicies and Procedures at the theatre for communications, level and tri method for aligning individual and collective operational capability requirements-based services Command, Control, Communications, methodologyjoint training for programsassessment withand validation assigned Computers, Intelligence and Reconnaissance operational roles. Framework provides conferencing studio, seamless networks of training and operations at all levels and the (C4ISR) by data sharing. Holography, video incorporation of lessons learned, emerging and integration of communication facilities technologies, shift in concepts and doctrine of training institutes can be facilitated by 4.across ROLE the organisations.OF ACADEMIA AND 4.3industry. INDUSTRY Electronic Training

4.1 . Self development of Joint Training Structures. Joint training personnel is an important facet in joint training toprotracted support self model development and framework. through certificate Academia and industry has varied expertise and platforms initio to attain greater training and operational courses, e Learning and Online Courses. institutes need to be earmarked or raised ab Study synergy amongst the three services. Few Webs of Active Learning for Young Aspiring specialized training institutes could straightaway avoid duplicity of effort and resources, such Minds (SWAYAM) platform for hosting Massive be centralized amongst the three services to as training of law, intelligence, musician, Open Online Courses (MOOCs) has been fielded by Government of India duly developed by catering, provost, space, cyber, and logistics. Information Technology industry. Similar Expertise with academia and industry in fields exclusive platforms with security overlay for e of intelligence, space, cyber, nuclear, chemical Learning and online courses for joint training and biological training needs to be exploited to of armed forces personnel may be proposed by upgrade the Joint Training Structures. 109academia and industry. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

4.4

Academics, Research and Development. publications, articles, experiences, lessons learnt, books and precis. Digitisation of existing andlibrary training infrastructure material and with fielding security an integratedoverlay is leadership,Specialisation national courses security in niche and domains national like environment for library, e books, journals aviations, cyber, space, project management, 4.6feasible with latest tools and platforms. reputedstrategy canacademic be subscribed institutes by and tri services online learning directly based on memorandum of understanding with Simulation and Wargames. like simulators and computerised wargames Training aids firms. Annual Management Study Board for brain storming seminars on niche technology are effective and ensure optimum utilization and Armed Forces Technology Board can be Jointof resources. live, virtual, It saves augmented on wear andreality tear and of explored for problem statements and its solution. operational equipments and is economical. Development of new projects and research and development on varied fields can kick start constructive training capabilities, war games, 4.5based on Technology Board recommendations. table-top exercises, assessment, and training E Library. ranges are recommended to be developed to conduct or support joint training. Joint training The integration of training and hubs incorporating simulators and wargames structures for joint training mandates may be deployed for faster, efficient and requirement of integrated database of research, economical joint training.

Fig. 4: Role of Academia and Industry

110 Vol. 4 No. 1 2019 Tri Services Training in Joint Environment 4.7

Automation with CDS is likely to take firm decisions on giants have plethora of opportunities and jointness. Aspects like Integrated Theatres can play pivotal. Information role inTechnology automation software and inand place joint of capabilityservices training development commands are may on forefront. Joint training command or theatre development of tools related to joint training. Some applications envisaged are Virtual Labs, be brainstormed in addition to expeditious Web based Knowledge Sharing, Training changinginstitutionalisation scenarios, ofdoctrine Indian and National strategy; Defence thus Validation, Evaluation of Training Effectiveness, JointUniversity training (INDU). protracted The forces model have with to associated adapt to Course Report Generation, Cadre Management etc. Used cases for same can be built based in coordination with active participation of on expertise available with Tri Services and training framework needs to be implemented solutions on problem statements can be proposed by industry. academia and industry. Joint training needs 5. CONCLUSION to be given due impetus so that trained and capable human resources are made available 5.1 REFERENCESbattle ready for joint operations. implementation of long standing recommendationsGovernment of of India various has committees announced on 1. Joint Training Manual for Armed Forces of United States, CJCSM 3500.03E, 20 April 2015. 2. The Defence Training Model, Australian defence post of Chief of Defence Staff (CDS). Jointness force publication 7.0.2, 14 July 2006. amongst the three services has to be top driven 3. Open source information https://www. and once the intent is clear the organization bharatshakti.in; assessed on 17 Sep 2019. would systematically embrace the spirit 4. Archived articles https://www.thehindu.com; assessed on 18 Sep 2019. of jointness. The integrated headquarters

111 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Computational and Correlational Data Analytics for Increased Military Effectiveness

Brig A Shridhar

Abstract—

The future battlefield would be increasingly complex with emerging and enabling technologies, sophisticated systems, flexible communications and enhanced computing power being pushed to the forward edge of the battle field. Military commanders have always lived and died by information, both for quantity and quality. Hence, while these systems would enhance the Intelligence, Surveillance and Reconnaissance (ISR) capability resulting in increased battlefield awareness and battlefield transparency paving way to network centric and nonlinear operations, they would also exponentially increase the amount of information and data generated. Increasingly high momentum and speed of operations due to complex emerging and enabling technologies being pushed into the battlefield would result in shorter and shorter decision cycles or the ‘OODA Loop’. The military concept of decision making places information flow at the heart of all activities from operations to logistics. With information so central to all activities, the military is naturally hungry for 1.technology INTRODUCTION or tools that improve processing of information or data. predictions of future activities with veracity 1.1 fromcorrelations this voluminous, and also variety attempt of high reasonable velocity

Emerging technologies bring with it 1.3data being generated. importanceorganizational of data and in security modern challenges warfare poses that threepresent distinct both opportunities challenges forand aobstacles. commander, The As technological options , the difficulty produced, secondly integrating numerous militariesin choosing worldwide the right, are the faced best with and the the much most firstly handling the sheer volume of data efficient technologyGuns Versus also Butter’ multiplies. macroeconomic Almost all intypes military of data decision into onemaking coherent due to battlespaceshortening publicized ‘ picture and finally handling the time pressure of the decision cycles and increasing volumes debate. This aspect particularly gains greater importance in a developing country like India. It would not be worthwhile to experiment with 1.2of data. technologies only to dump them later. Each technology will have to be carefully studied, weighed and compared to extract the best bang outcomesTechnologies from for storing,large quicklyvolumes retrieving of diverse and supported with increased computing power getting out meaningful analytics and desirable for the buck. Computational data analytics the seat of pants approach in military decision and disparate data need to be identified and would significantly add value and substance to mastered. Data analytics would go a long way in adding value, by identifying hidden patterns, making.

112 Vol. 4 No. 1 2019 Computational and Correlational Data Analytics for Increased Military Effectiveness 2. DATA ANALYTICS

2.1 garner the confidence of commanders on the 2.4analysis of data before a decision is made. of sensors and communication systems for Future battlefield will rely on a virtual net Military data analytics can be broadly classified The Data Management Layer. informationbattlefield awareness is the need and attransparency. every level, Hence, right into three layers as under:- fromdemands an infantry for accurate, patrol timelyto the highest and actionable level of (a) andThese is technologiesfairly mature are with driven multiple by the Information Technology (IT) industry churningplanners out at thevoluminous planning data desk is tooverwhelming make well- The Data Analytics Layer. atinformed present decisions. for any meaningful Proliferation analysis of sensors due options to choose from. (b) These technologies are immature and niche. to lack of tools to efficiently process, store, involves huge costs, with suspect It is primarily driven by the military, analyze, and retrieve vast amounts of data. Existing automation tools do not aid users in outcomes. It is this area where one needs finding complex and adaptable threats within The User Interface Layer. to concentrate on. mission critical timelines. Robust networks to informationaccurately detect, from unstructuredidentify, geo-register, data is the classify, need (c) These store, retrieve, search, mine and exploit explicit andtechnologies is fairly are mature again drivenwith multiple by the Information Technology (IT) industry 2.2of the hour. 2.5 options to choose from. information struggle to effectively scale to the Data Analytics is not only important in the volumeCurrent and defense characteristics systems of for changing processing data environments and the range of applications logistics,field of militaryadministration operations, and logistics it would and yield can these challenges requires fundamentally new much more visible results in operational for any kind of data analysis. Overcoming such as suicide prevention, maintenance of weaponbe of other platforms, welfare planning and administive of convoys, domains patrols approach is required to be adopted for data science, including distributed computation and 2.3interactive visualization. 2.6searches, terrorist strikes etc the list is endless. Indigenous Industry Participation analytics does not require imported equipment immenselyEmerging technologies large, disparate in data and analytics analyse need the . Data to provide us with the ability to leverage with data analytics are claiming to provide correlation, cognitive computing and other or technology, our very own Indian firms dealing data with the help of enhanced visualization, intelligence output to support a decision or a this kind of intelligence. Infosys cofounder advanced analytics into creating a refined Mr Kris Gopalakrishnan has also invested in an Artificial Intelligence (AI) and Predictive course of action. The key challenge here is to113 Big Data Analytics Chennai based startup M/s : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2.9

Crayon Data. Hyderabad based Modak Analytics provided BJP the much needed social analytics what happened’ In most cases, the analytics platforms developed and during their election campaign in 2014. There what is likely to happen’ would evolve from a descriptivehow to‘ increase the are over 200 plus data analytics firms in India, to a predictive ‘ most focusing on increasing sales and profits. chances of desired outcomes incrementallylater to a prescriptive as these needs ‘ arise is a more Some of the other major players include Mu ’ analytics. Building Sigma, Latent View, Absolut Data, Manthan, also leaves open the opportunity to tap into Brillio, Gramener, Bridgei2i, Tata iQ, Fractal logical approach. An incremental approach 2.7Analytics, Cartesian Consulting, among others. Commercially Available Software. ongoing concurrent innovations worldwide. aTechnology single track platforms may cost represent us the opportunity a fast-moving, to Try before you buy’ ever-changing landscape, hence committing to Exploiting commercially available software permitting ‘ such as IBM i2 2.10leverage something newer and better. Enterprise Insight Analysis, Microsoft Power At the same time, the opposite approach of openBI, Google source Earth architecture visualization, with Predictiveindustry participationAnalysis by SAP gradually is a good graduating start point. into niche Later and proprietary protocols for the nation frustratingbuilding each and component ineffective, individually with much and of then the costintegrating and effort the components,spent on integration can be equallyof the should be attempted. This architecture should 1 inenable the rapidmanagement integration and of analysis existing of and military future components. Here, the US DARPA initiative exploitation tools to achieve a new paradigm differentof the XDATA data infrastructure, Program is data worth analytics emulating and which is experimenting with approximately 35 2.8data. 2.11data visualization tools each. inIt shouldresults also for be the understood diverse thatenvironments one particular the algorithm / architecture would seldom bring effective analytics provide insight into what happened,It is by now why reasonably it happened, well what understood is likely that to enterprise analytics platform may seem like a happen and also include the factors that could logicalIndian Militarydecision, is aoperating. way to ensure Opting consistency for a single

help shape different outcomes. But when it and cost-effectiveness across all the analytics initiatives. However, an all-encompassing, one- comes to the ‘how’ of analytics – including which technology platform or platforms will be Moreover,size-fits-all asplatform the military is unlikely commanders to succeed anddue to the sheer diversity of military analytic needs. used to support them – there is less clarity as there are fundamental challenges in building in analytics, they would demand advanced military analysts get comfortable and proficient analytics capability, including the pros and cons of investing in all-encompassing technology features and capabilities. platforms.

114 Vol. 4 No. 1 2019 Computational and Correlational Data Analytics for Increased Military Effectiveness 3. MILITARY COMPUTATIONAL ANALYTICS computed utilizing advanced software. Complex 3.1 optimization problems such as utilizing minimal scarce resources to achieve maximum Modelseffect both to emulate in operations tactical and situations, in logistics weapon can be computed. Game Theory and Queueing contentionExploitation for of high computational mathematical analyticscontent system analysis, logistics and economics can as a solution for military has been bone of important to the military planner is the fact that be formulated and solved. However, more computationalinvolved in modeling analytics and solvingrequiring for powerfulanswers. With increased computing power available, the implications of the theory can be brought to computing algorithms can now be done at 3.4bear on more complicated military situations. decisionthe forward situations edge of involve battle fieldallotting to savescarce on With these algorithms and mathematical mission critical time and effort. Most military models and enhanced computing power in resources to competing alternatives. Selection and veracity of the data that enters the analytics of strategic targets by enhanced computing place, the next challengearbage is ensuring in, Garbage the quality out’ algorithms to identify the maximum capacity of an adversary’s road /rail / air/ communication engine. The phrase ‘G thesenetworks, networks juxtaposed would with yield the rich minimum dividends effort for applies here. If data is of poor quality, the required to disrupt the maximum flow through output too will be of poorer quality resulting in 3.5military commanders losing faith on analytics. 3.2which mathematical algorithms exist. Analysis of military situations with multiple andSome implemented of the areas to cut where costs computationaland improve analytics has been successfully2 exploited strategies with multiple probabilities including simulatedposterior probabilities and mathematically of selecting agamed particular to effectiveness are4 ARMOR in 3 Los Angeles strategy or a course of action can be computed, International Airport, PROTECT for the US coast guard,5 IRIS for Field Air Marshals and determine the best course of action including GUARDS in theIntelligence US Transportation Analysis Summit’ Security. 6 is sequential moves over time. Decision support Realizing the vast potential of data analytics in systems with multiple criteria which may be the military an ‘ complimentary / contradictory, qualitative being organized at Washington D.C, USA, from / quantitative or tangible/intangible can encouraging30 Apr to 02 military May 2018 participants by the International from round be computed with advanced computing Quality and Productivity Center, New York, USA algorithms. Complex logistical and supply chain when mathematically modelled and solved by 4.the worldCONCLUSION to participate. exploiting enhanced computing power will 3.3result in quantum improvement in efficiency. 4.1 Although data analytics and computational data

Shortest and the best routes for reconnaissance, visits, campaigns, tours etc. can be easily115 analytics, have been dealt with differently in : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 the paper, they are meant to achieve the same, REFERENCES improve military effectiveness by optimizing 1. https://opencatalog.darpa.mil/XDATA.html. emergingscarce military technologies resources. in the We forward now neededge toof 2. Assistant for Randomized Monitoring Over focus our energies towards exploitation of the Routes (ARMOR), http://teamcore.usc.edu/ ARMOR-LAX/default.htm. 3. Port Resilience Operational / Tactical the battle field by effective data analytics both Enforcement to Combat Terrorism (PROTECT), computational and correlational. Enhanced http://teamcore.usc.edu/projects/coastguard/ computing power available at the forward edge default.htm of battlefields would make this a reality in the 4. Agent Security for the Federal Air Marshals IRIS, http://teamcore.usc.edu/projects/fam/default. near future. A specialized team is recommended htm. to be set up for interacting with available 5. Game-theoretic Unpredictable and Randomly industry and academia so that available Data Deployed Security (GUARDS), http://teamcore. Analytics strategies can be adopted by the usc.edu/GUARDS/default.htm. Indian Army for effective exploitation. 6. https://intelligenceanalyticssummit.iqpc.com/.

116 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 The Role of SDR as an Enabler in Joint Operations

Col Rohit Nandan Prasad

Abstract—

Any modern fighting force consists of the fighting elements that deliver combat potential and support and logistical components that sustain the fighting components during operations and in peace. Unless synergized by an agile and responsive nervous system, both these components are ineffective and will not perform their intended role. The backbone of an effective fighting force is an effective Command and Control structure and the spinal cord joining command and control system with the forces is an agile, responsive and robust communication system or network.

smooth,In today’s unimpeded fast paced, inter multidimensional force communications operations, so whichfar was necessitate the usage diverse of different forces hardware, to operate secrecy in synergy, and the role of seamless and failsafe communications assumes greater importance. The biggest impediment to

protocols by each organization. The deployment of Software Defined Radio (SDR) will change this paradigm. 1. INTRODUCTION of operations where armed forces are engaged

1.1 in actual conflict. Even so, there are a number of different forces deployed in any conflict zone The modern battlefield encompasses multiple today. These can range from the traditionally domains and dimensions. In earlier wars, deployed Army, Navy and Air Force to the Coast conflict was restricted in time and space to the Guard, Border Security Forces, Civil Police, period of hostilities in the battlefield. The scope CAPFs, Fire Brigade, Medical Staff, Rapid Action of conflict too was restricted to the armed Forces, Special Operations Groups, Intelligence areoperations fought in carried a space out time by soldierscontinuum in isolatedwithout Agencies, Home Guards, etc. Operations today theaters of operations. In contrast, today’s wars demand jointness, not only within the Armed Forces but also with these other forces and break, simultaneously in multiple domains and organizations. dimensions. The ingredients for success in the 1.3 modern battlefield are simultaneity, speed and 1.2surprise. in synergy towards the common national, The spirit of jointness implies that forces work operations assumes more critical proportions effective, dominance across the entire spectrum political or strategic objective. Synergy in For a contemporary fighting force to be

today, since even a small action by a soldier or disparateof conflict domains is of paramount such as economic, importance. perception The chain of events that will potentially change the spectrum of conflict encompasses widely tactical unit has the capability of triggering a factors in the domains of perception, economic restrictand political the analysis over to and the geographical above the military theater course of the conflict inexorable by influencing dimension. For the purpose of this paper, we 117etc. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

1.4 2.2 which seeks integration of the various service computer equipped with a sound card, or Thus, Joint Warfare is a military doctrine A basic SDR system may consist of a personal branches of a state’s armed forces into one ofother signal analog-to-digital processing are converter, handed precededover to theby some form of RF front end. Significant amounts larger,unified national ambi-dexterous scale, in force. which Joint complementary warfare is in essence a form of combined arms warfare on a general purpose processor, rather than being forces from a state’s Army, Navy, Air and Special candone receive in special-purpose and transmit hardware widely (electronic different Forces are meant to work together in joint circuits). Such a design produces a radio which operations, rather than planning and executing radio protocols (sometimes referred to as 1.5military operations in isolation. 2.3waveforms) based solely on the software used.

The biggest deterrent to successful planning different communication systems hardware, As already brought out earlier, successful protocols,and execution frequencies, of joint modulation operations techniques was the systemsplanning hardware, and execution protocols, of joint frequencies, operations modulationwas impeded techniques by the different and secrecy communication algorithms setand of secrecy equipment algorithms and protocols deployed would by differentnot have forces. Merely replacing these with one common anddeployed transform by different a platform forces. centric Induction force of SDRinto of tactics, training, command structures and will help bridge the divide between forces sufficed because each force has a different set communication system that could transform its a network centric force. The nature of SDR variousstrategic technical objectives. parameters What was in response needed wasto the a enables it to swiftly deploy different waveforms on the fly in order to communicate with different military entities. Quick changing of waveforms 2.situation, THE CONCEPTtactical grouping OF SOFTWARE and role. regroupedand security and algorithms redeployed allow in different the SDR totasks be DEFINED RADIO used by forces which are swiftly and frequently

2.1 2.4under different commands. Software Defined Radio SDR communication system where components military and commercial communication service ( ) is a radio SDR based systems have significant utility for the demodulators and detectors that were traditionallylike mixers, implemented filters, amplifiers, in hardware modulators, are providers, both of which must serve a wide 2.5variety of changing radio protocols in real time. instead implemented by means of software on a personal computer or embedded system. In the long term, SDRs are expected by renderWhile the practical concept many of SDR processes is not new, which the rapidly were proponents like the SDR Forum to become the evolving capabilities of digital electronics dominant technology in radio communications. SDRs, along with software defined antennas are once only theoretically possible. 118the enablers of the futuristic cognitive radio. Vol. 4 No. 1 2019 The Role of SDR as an Enabler in Joint Operations 2.6

(d) Wireless mesh network can be enough to avoid the “limited spectrum” added radio increases total capacity and engineered using SDR, where every assumptionsA software-defined of designers radio of previous can be kinds flexible of reduces the power required at any one enough power needed for the message node. Each node transmits using only transmittersradios, in one to or transmit more ways. in the Spread same spectrum place on to hop to the nearest node in that theand same ultra frequency wideband with techniques very little allow interference, several direction, reducing the near-far problem typically combined with one or more error and reducing interference to others. This detection and correction techniques to fix all enables frequency reuse and optimizes the errors caused by that interference. 3. JOINTspectrum OPERATIONS usage. AND SDR Some additional features offered by SDR are as 3.1 below:- (a) lockIn SDR, onto software a directional defined signal, antennas so that can be designed and deployed to adaptively In the realm of Joint Operations, the term from other directions, allowing it to Battlespace is more relevant than battlefield. receivers can better reject interference armedBattlespace forces is a forterm the used military to signify theater a unified of military strategy to integrate and combine detect fainter transmissions. deployed, wherein each radio measures and information domains to achieve military (b) theCognitive spectrum radio in techniqueuse and communicates can also be operations including air, sea, land, cyber, space that information to other cooperating radios, so that transmitters can avoid goals. It includes the environment, factors, and conditions that must be understood to successfully apply combat power, protect the connectsmutual interference to a geographical by selecting location unused 3.2force, or complete the mission. frequencies. Alternatively, each radio spectrum occupancy in its location and, database to obtain information about the friendlyThis understanding armed forces, ofinfrastructure, joint operations weather, in terrain,the battlespace and the includeselectromagnetic both enemy spectrum and flexibly, adjusts its operating frequency within the operational areas and other areas and / or transmit power not to cause interference to other wireless services. the understanding of the military operational (c) toSDR effect technology dynamic transmitter permits power smart environmentof interest. Thus, has transformed over the last from few primarily decades, algorithms to be deployed in order a time and space driven linear understanding communicated from the receivers, loweringadjustment, transmit based power on information to the (a “battlefield”) to a multi-dimensional system 3.3of systems understanding (a battlespace). minimum necessary, reducing the near- far problem and reducing interference to others, and extending battery life in This system of systems understanding implies portable equipment. 119that managing battlespace has become more : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 importance of the cognitive domain, a direct complex, primarily because of the increased based thinking, system of systems analysis, and competing Observation Orient Decide Act actionsresult of on the the information operational age. environment Today, militaries as a 3.6(OODA) loops. are expected to understand the effects of their whole, and not just in the military domain of As brought out earlier, battlespace agility is their operational environment. 3.4 integratedenabled and into catalyzed the command by SDR which and enablescontrol tactical units to be swiftly regrouped and transformsBattlespace knowledgeagility refers into to actionsthe speed for at desired which communications structure by loading the the war fighting organization develops and appropriate waveform and secrecy algorithm. SDR also facilitate the freer flow of information ateffects doing inthe the right battlespace. actions at the This right essentially time and 4.in allBATTLESPACE dimensions as brought AWARENESS out earlier. implies that must be better than the adversary 4.1 place. Inbuilt into this understanding is that battlespace agility is not just about speed, but it relativeis also about to achieving executing the the desired most effective impact onaction the Battlespace awareness is a practice of military (ways) in the most efficient manner (means) philosophy that is used as a valuable asset by joint component and force commanders, to 3.5system (ends). predict courses of action before employing troops into a prescribed area of operation. It utilizes the intelligence preparation asset on the quality of situational awareness and recent, current, and near term events in his At all times, battlespace agility is dependent to assist the commander in being ‘aware’ of a holistic understanding of the battlespace 4.2battlespace. ato renaissance determine theof interest best actions. in the Thisquality logic of that has become the driving force behind communications are heavily linked to the Battlespace awareness is based around military communications. Effective military knowledge and understanding obtained by the Intelligence, Surveillance, and Reconnaissance theirability targets, of intelligence as networks analysts in order and operationalto facilitate area(ISR) — system. the environment, It is another factors, methodical and conditions, concept aplanners faster, and to understand more accurate their shared battlespace, situational and includingused to gain the information status of friendly about the and operational adversary understanding. This in turn increases targeting forces, neutrals and noncombatants, weather efficacy and helps retain the overall initiative. and terrain — that enables timely, relevant, Battlespace agility as a concept has its roots andcomprehensive unconventional and accurate operations assessments. in successfully It has in the more generic Command & Control become an effective concept for conventional (C2) agility concept, but works specifically with an agility concept within the context of projecting, or protecting, a military force, and/ warfighting only. Hence it is framed by effects or completing its mission. 120 Vol. 4 No. 1 2019 The Role of SDR as an Enabler in Joint Operations 4.3 5.4

centric operations informationThe SDR is an gathering enabler of node Battlespace and a surveillance Awareness. Network-centric warfare, also called network- Each soldier carrying the SDR becomes an or net-centric warfare, is a military doctrine or theory of war pioneered by outpost. It is not necessary for the soldier to the United States Department of Defense in the be aware of this aspect of his mission. The use 1990s. of applications embedded within the SDR will 5.5 enable automatic gathering, processing and collation of data at every level. The inherent computing capability of the SDR enables intoIt seeks a tocompetitive translate anadvantage information through advantage, the computation to be done in situ; thus enabling enabled in part by information technology, 5.fail safeBATTLESPACE and distributed DIGITIZATION node computing. robust computer networking of well informed 5.1 5.6geographically dispersed forces. improve military operational effectiveness Battlespace digitization is designed to theThe operationalideas of networking pause, enhance sensors, precision, commanders, and and shooters to flatten the hierarchy, reduce by integrating weapons platforms, sensor increase speed of command were captured in networks, Ubiquitous Command and Control (UC2), intelligence, and network-centric warfare. This military doctrine reflects that in 5.7this document. the future, military operations will be merged Modern information technology permits the into joint operations rather than take place rapid and effective sharing of information to in separate battlespaces under the domain of such a degree that “edge entities” or those that individual armed services. 5.2 are essentially conducting military missions

Intelligence Preparation of the Battlespace to reduce uncertainties concerning the enemy, centralisedthemselves, agencies should be attempt able to “pull”to anticipate information their environment,(IPB) is an analytical and terrain methodology for all employedtypes of from ubiquitous repositories, rather than having

5.8information needs and “push” it to them. operations. Intelligence preparation of the battlespace builds an extensive database for each potential area in which a unit may be 5.3required to operate. highestThe doctrine level of of guidance network-centric from the warfare concept forof “teamthe United warfare”, States meaning armed the forces integration draws and its determine the impact of the enemy, environment andThe terrain database on isoperations then analyzed and presents in detail it toin across the various services, ranging from Army synchronization of all appropriate capabilities graphic form. Intelligence preparation of the to Air Force to Coast Guard. This is part of the battlespace is a continuing process. 121principle of joint warfare. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

5.9 6. CONCLUSION 6.1

The tenets of network-centric warfare are as under:- Thus SDR can be seen as the major technology facilitatingthat enables the a forcetactical to transitionsoldier or from unit being to (a) Tenet 1: A robustly networked force communicateplatform ready and to deploy network applications ready. Other with value than improves information sharing. effective sharing of information to such a degree (b) Tenet 2: Information sharing and information and shared situational thatadded “edge services, entities” SDR or also those permits that are the essentially rapid and collaboration enhance the quality of conducting military missions themselves, are

awareness. forable other to collect entities information, across the process spectrum it and to push pull (c) Tenet 3: Shared situational awareness it to central repositories where it is available enables self-synchronization. and utilize. This is the single largest factor that (d) Tenet 4: These, in turn, dramatically singles out SDR as the game changer for modern increase mission effectiveness. forces in contemporary warfare.

122 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Threatscape Segmentation: Network Invigilation for Realizing Vulnerable Assets using Neural Analytics (NIRVANA) to Mitigate Zero Day Attacks

Lt Col Vivek Bardia, Lt Col Gaurav Upadhyay, Lt Col Raja Vijit, Lt Col Akshay Sati and Lt Col Yogesh Sati

Abstract— 1 2 This research paper highlights how technologies like Big Data, AI&ML can be used to enhance the

Cyber Security Posture by detecting and mitigating Zero Day Attacks orchestrated by motivated3 state actors, such as foreign governments and issue-based organizations using asymmetric warfare thereby improving our national cyber security posture. The increasingly digital nature of our everyday work and personal lives have driven a demand for ubiquitous and frictionless access to data and networks thereby, making cyber- attacks an increasingly attractive option because our valuable data & the number of devices connected online is increasing by the day, providing countless new windows into our networks & lives. The concept caches

upon User Collaboration, Data Visualization4 and Analytics for faster detection, segmentation and mitigation of threats and vulnerabilities in networks and systems aided by humans to perform faster outlier detection

reducing the Window5 of Vulnerability which is the key for mitigating zero day attacks as even the latest AV, IDS, IPS & UTM do not guarantee mitigation of Zero Day Attacks as they rely largely on signature & behaviour based methods to identify malicious code before the malicious code can cause harm to computer systems. However, signature & behaviour based mechanisms are in effective against zero-day exploits since the signature of zero-day malware is, by definition, unknown as the malware has not previously been identified as such.

1

2Artificial Intelligence (AI) is decision making. Machine Learning (ML) allows system to learn new things from data. It leads to develop a system to mimic human to response behaviour in a different circumstance. A zero-day vulnerability is an undisclosed computer-software vulnerability that is unknown to the vendor which hackers can exploit to adversely affect computer programs, data, additional computers or a network. It is known as a “zero-day” because it is not publicly reported or announced before becoming active. This security hole is then exploited by attackers before the vendor becomes3 aware and hurries to fix it—this exploit is called a zero-day attack. Asymmetric Warfare is war between belligerents whose relative military power differs significantly, or whose strategy or tactics differ4 significantly. This is typically a war between a standing, professional army and an insurgency or resistance movement militias who often have status of unlawful combatants. The time from when a software exploit first becomes active to the time when the number of vulnerable systems shrinks to insignificance,5 is known as the Window of Vulnerability (WoV). AV: Anti-Virus, IDS: Intrusion Detection Systems, IPS: Intrusion Prevention Systems, UTM: Unified Threat Management Systems.

123 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

1. INTRODUCTION 1.3 was 1.1 8 Compiling the above study, NIRVANA conceptualized wherein a Security Behaviour With technology at our fingertips waiting6 overObservatory years in addition (SBO) was to the established latest threat to feeds store to be exploited, the past decade saw the processed user data & computer behaviour revolutionizing Human Computer Interactions (HCI). The ease with which a user could from Threat Intelligence Platforms to identify interact was the Unique Selling Proposition on the presentation of the same in the easiest and mitigate the risks. The study also9 focused (USP) of every sales7 team. HCI have many & the end underlying parameters like Data Visualization and Presentation as some to deal with. With opportunityand the fastest to mannerthe end userto the to NSoC understand the the race, on for better and faster presentations, users with minimal time delay. We gave an forevolved user manyfriendly frameworks applications, to more be widely and more used softwareby all software professionals developers. were As lured the need into grew the complete flow of data packets in and out of his system & other process activities being carried usout to by attest attaching that meaningfulcollection of information a wide array to front-end sophistication domain. Application packets, sessions & processes. This study led frameworks have evolved to such an extent time & involvement of users in real time that with just a few clicks and feeding values of data on user & computer behaviour over as per requirements we are able to produce a commercially usable application in a few segments the threat canvas faster for a more lines of codes in minutes which leaves a exponentially enhances machine learning and minutes. These frameworks generate quantum contrail of bugs to be discovered in the future. 1.4reliable output. We have also succumbed to the benchmarking A layered approach implementation in Software Quality Metrics and have made ourselves comfortable with buggy software’s to 1.2be rectified in future. encompassing the End Users & using Analytics at the Apex Level NSoC tries to solve the Zero Day activelydetection participate & mitigation in problem.protecting This themselves method commonA study similarity of the variouswherein Threateither users Detection, have empowers the fence-sitter users with tools to Protection and Mitigation Systems revealed a attentionfrom threats. of Thehighly alerts trained by users professionals & their system to been totally ignored or the systems rely heavily 6 raise a priority flag at the NSoC and draw the andon theuse userof computer inputs technology, for its correct focused functioning. on the interfaces Human–computer interaction (HCI) researches the design address the same. betweencomputers people and design and computers.technologies Researchers that let humans in the interact field of HCI observe the ways in which humans interact with 8 7 9NIRVANA: Network Invigilation for Realizing Vulnerable withinvolves computers producing in novel images ways. that communicate relationships Assets using Neural Analytics. Data Visualization is the graphic representation of data. It Network & Security Operations Center (NSoC) is a communication is achieved through the use of a systematic among the represented data to viewers of the images. This orcentralized facility is unita central that location deals with from securitywhere staff issues supervises on an organizational and technical level. A NSoC within a building mapping between graphic marks and data values in the creation of the visualization. 124the sites beyond the confinement of the four walls. Threatscape Segmentation: Network Invigilation for Realizing Vulnerable Assets Vol. 4 No. 1 2019 using Neural Analytics (NIRVANA) to Mitigate Zero Day Attacks

Fig. 1: Lateral Sharing Retaining Autonomy in NIRVANA Architecture

2. NIRVANA FOR MILITARY NETWORKS 2.3

2.1 NIRVANA frame-work derives its power from User Collaboration to segment the threat scape; Military networks are by design hierarchical and the greater number of users – more reliable have always striven for an optimised jointness is the output derived. NIRVANA proposes in operations. This templated hierarchy also has to integrate NSOCs of the various Military homogeneity in operations. For example, the Networks; NSoC (Army), NSoC (Navy), NSoC role of a dispatcher of a Brigade Headquarters (Air Force), NSoC (SFC)etc. laterally allowing would be similar to the role of all dispatchers in organization to maintain autonomy over their all Brigades of the Army. Similarly, the role of an own NSOCs. The NIRVANA framework is highly Exchange Operator in a Battalion Headquarter Military critical infrastructure networks like scalable and can further integrate with non- would be similar to Exchange Operators across all Battalions of the Army. This hierarchy at times hampers the synergy due to operational/ that of the Power Grid Corporation of India, 2.2functional requirements. Railways, Nuclear Plants, etc. can also be plugged-IN and contribute as well as derive benefits of the yet larger threat scape. sharing for critical operation tasks like sharing 2.4 Lateral sharing takes priority over hierarchal and mitigation measures for the same to information on a new threat/zero-day attack The results thereof, both interim as well as final, are designed to be shared among contain the threat and minimize the damage in all the feeder networks’(NSoC). Thus, any facethe network.similar kind The of officials threats manning and are systems& at same threat/vulnerability detected in any part of sub-systems in all three services generally the network will be disseminated in real- time through autonomous NSoCs, thereby level of technical competence. The task and presenting a Threat Intelligence Platform for capability of a data clearance official in Army joint evaluation of threats to Military Networks will be similar to that of the official in Navy or Air Force. This similarity translates to a in a de-centralised yet synergised manner. This similar set of actions by the service personnel integration will not only enhance the jointness (end users in this case) upon encountering any of the Military Networks, but will draw its unusual behaviour in the system, unrecognised power from the jointness of the users manning occurrences/events. 125the sub-systems of the network. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 2: Proposed NIRVANA Architecture

3. NIRVANA BUILDING BLOCKS

3.1 Phishing Database). These databases contain historic data useful to perform both real-time and historical analysis. The analysis process is supported by a big data analysis engine like The NIRVANA platform is composed by several is used to perform search, count, aggregation, Hadoop using a map-reduce model. This engine building blocks. As illustrated in Figure 1, NIRVANA allows to collect data from different correlation and regression analysis operations. data sources. These data sources, also referred 3.4 as data feeds are divided into external data and 3.2internal data. frameworksThe communication from the open between source userscommunity and the platform is made via well-established

The resulting data is enriched, i.e. it is to make it a fully qualified modular solution. The complemented with geo location, WHOIS, DNS real-time alerts generated provides insightful and reverse DNS lookups, hashing, autonomous 3.5visualization and analysis over the data. systems name and number, DKIM and SPF records and file and URL analysis data. This data is important to get context around the Combining real-time with historic analysis; threat event under analysis. 3.3 toallows remediation organizations services; to: gainunderstand situational the All of this data is then analysed and stored indicatorsawareness; of discover compromise, organizations methods requirement of infection, on different database systems (e.g, Malware pinpoint the internal root cause for the problem DB, Social Media Database, Email Database,126 and follow the remediation steps. Threatscape Segmentation: Network Invigilation for Realizing Vulnerable Assets Vol. 4 No. 1 2019 using Neural Analytics (NIRVANA) to Mitigate Zero Day Attacks

4. SECURITY BEHAVIOUR OBSERVATORY (SBO) AT NSOC or deleted file’s size, last date modified, Installed software and operating permissions and other related information. 4.1 system updates: maintains a list of (b) and other related data, to determine what Security Behaviour Observatory (SBO) installed applications, version numbers, tunewould as be per the the heart severity of the and decision-making criticality of process. Neural Network algorithms auto areprivacy installed, or security and whether software they (e.g., are anti- up virus, firewall, ad blockers, anonymizers) the user/infrastructure set. The historical data is saved and every work done by users to date. The SBO also tracks which (and infrastructureacross the organization designed to iscollect logged a wide and array sent how soon after their release) operating to this Observatory. This is a client-server system updates and patches have been panel of hundreds of participants over several installed. This allows us to measure the of data on user and computer behaviour from a duration and severity of client machines’ Processes: Monitors which processes vulnerability to security threats. years. The SBO infrastructure is designed to First (c) fulfill several requirements. when(e.g., all programs, processes start applications) and terminate, are (a) , the SBO scales with the desired andrunning can on provide clients’ machines.additional It capturesprocess length, breadth, and depth of data Second collection. ensure the security and privacy of the (b) , extraordinary care is taken to status information at regular intervals. alsoPrimarily, collects this general data willcomputer assist usage with collected data, which will inevitably the detection of malware. The SBO include intimate details about our security and privacy work, such as Third participants’ behaviour. statistics that may help prioritize future Security-related events (c) over the, the course SBO of is time, adaptable as when to ourthe towards frequently-used applications. collectedinterests, data which is analysed will inevitably & interpreted change (d) : SBO also notes it may suggest further lines of inquiry & general security-related events, such as account-related events (e.g., logins, settings changes, password changes), 4.2 other data collection points. registry modifications, wireless network authentications, firewall changes, and potential attacks detected by the operating Our understanding of computer and user includingsystem. This the will security provide valuablemeasures insights users behaviour, with respect to security and privacy, employon multiple on their usable computers, security potentially topics, thehas following: largely been based on studies of short duration and narrow focus. The SBO caters for File system types and frequency of attacks that occur dangerous program behaviour, and the (a) : Track changes to the file system, including the added, modified, on machines.

127 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Network traffic network packet headers sent and models in very high dimensional (e) : SBO captures all (b) how to create accurate approximation would allow us to detect various network received to client’s computers. This data using stream/live data, without the need 5.2 to store the entire data set. traffic types that may be risky (e.g., peer-to-peer file transfers, dangerous incorporating users at the correct intersections websites) or suspicious (e.g., malware, asWe human tried toheads address have botha supercomputer, the challenges tuned by intrusion attacks). We could thereby verify whether risky Internet behaviour is correlated with a higher probability of by evolution over hundreds of millions of years, 5. NIRVANA:an attack orUSER infection. AID & and superbly adapted to understand the visual COLLABORATION world. Users over two decades of exposure in andsome are way proactive or other toto technology protect themselves have become in 5.1 seasoned to understand the basics of threat

the manner which they understand as best. One of the central tasks in scientific computing This human evolution has raised our basic is to accurately approximate unknown target understanding benchmark for technology and functions. This is typically done with the help threats which would be used to identify Zero statistics this falls into the realm of regression of data — samples of the unknown functions. In Day Threats and surpass the intelligence of 5.3machines that learn. and machine learning. In mathematics, it is the central theme of approximation theory. The emergence of Big Data presents both Users can play a vital role in identifying threats. opportunities and challenges. On one hand, big It is not necessary for the user to be highly unknowns and, in principle, allows us to create data introduces more information about the qualified for the role of threat identification and mitigation for his surroundings. Users more accurate models. On the other hand, behaviour is known to him best and he can data storage and processing become highly find out outliers in his pattern faster than a certain corruption errors, in addition to the challenging. Moreover, data often contain machine which learns and uses a far bigger toand segment complicated an unknown canvas to threat produce canvas acceptable would to present numerical algorithms that address results in the same time frame. End users aid standard noisy errors. Yet another challenge is pave the way for segmenting the threat canvas two issues: how to automatically eliminate and deploying the available resources in the (a) most vulnerable place for further investigation; corruption/biased errors in data; and hence shortening the WoV.

128 Threatscape Segmentation: Network Invigilation for Realizing Vulnerable Assets Vol. 4 No. 1 2019 using Neural Analytics (NIRVANA) to Mitigate Zero Day Attacks

Fig. 3: Interactive Dashboard Panel

Fig. 4: Interactive Task Manager

5.4

possible metadata was added to processes running before being fed to a visualization Users in this study were presented with an report maker by giving users realizable names interactive dashboard with a world map to computers with the power given to mark these and probable reasons for their running in the visualize near real-time sessions on their system by using lexical, syntax analyzers, log parsers, filtering and cleansing techniques. sessions as suspicious or as clean. It also had systems functioning encompassing the services, systemsUsers aided as the with users this had interactive an eye to dashboard identify an interactive task manager to visualize the outperformed the latest AV, IDS, IPS and UTM 10 system logs and other SIEM data. Maximum outliers with their basic understanding. 10 SIEM: Security Information and Event Management (SIEM) (Security Information Management) and SEM (Security Event is an approach to security management that combines SIM129 Management) functions into one Security Management System. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Table 1: Packet Data

Table 2: Session Data

5.5 6. COMPILATION OF CONFUSION MATRICES FOR ZERO DAY ATTACKS

User data was collected over time was 6.1 enrichmentincrementally done, returned deduplication back algorithms to them from run, Network Awareness: SBO as Systems Opinion with metadata added, to identify the outliers and mark them as suspicious in almost allUsers cases wereand further quick clustering and uniformization performed to get a final output for storage and retrieval of the also amalgamated and displayed to all other and security they went further marking a same. Subsequently, data from other users were being extra cautious about their own privacy subjects during the period aiding their decision whopping 15 % False Positives too, as shown 5.6making to give a feel of collaborative learning. 6.2in Table. Process Awareness Humans knew exactly what they were doing to identify the outliers and mark them as : Users were quick on their systems and were extra cautious while scrutinizing actions and had even flagged rudimentary cache files, cookies, automatically securitysuspicious they in wentalmost further all cases marking and further a whopping being downloaded updates as suspicious. They had extra cautious about their own privacy and an eye to identify outliers with their basic Table 3 & 4: Confusion Matrix understanding. 25 % False Positives too, as shown in Table.

130 Threatscape Segmentation: Network Invigilation for Realizing Vulnerable Assets Vol. 4 No. 1 2019 using Neural Analytics (NIRVANA) to Mitigate Zero Day Attacks

6.3

of latest and most advanced AV for protecting our end user systems. As the study primarily wouldThe above facilitate methods the growth when usedof the in sensor conjunction canvas most innocent programs and services in a with the latest AV, IDS, IPS and UTM systems computer,focused on a little Zero help Day from Attacks the end which user look can thedo by involving users exponentially to provide the cutting-edge solution for mitigating zero-day 7.4the trick of segmenting the vast threat canvas. attacks which is the biggest problems in today’s cyber threat canvas. The help from end users commercial Antivirus systems which totally would act as catalysts and contribute to the neglectTo the continuous best of ourinteractions knowledge with end we users have Security Professionals, Experts and Analysts work and by segmenting the abysmal data and 7.focus CONCLUSION their attention to mitigate threats. in the gambit of ease of use in real time and 7.5update their datasets accordingly. 7.1

This work focused more on the presentation spotThe valueinteresting of storing events volumes and oftrends, data dependssupport of data along-with analysis carried out by ML on our ability to extract useful reports, manner& AI superimposed to the end inuser the with Security minimal Behaviour time Observatory in the easiest and the fastest decisions and policy based on statistical services of the system to let the user have no analysis and inference, and exploit the data delay. Further to say, we did not interrupt any to achieve business, operational, or scientific goals. There will always be a shortage of degraded performance issues while being a Security Professionals, Experts and Analysts as 8.subject FUTURE in the test. SCOPE 7.2we inch forward into this Digital Era. 8.1

Large databases of digital information are Management framework which integrates ubiquitous. Current hardware and database seamlesslyWe further with proposeother security a Configuration needs and diversity,technology velocity allow and efficient veracity and of data inexpensive presents reliable data storage and access. The vast Managementfacilitates regular, which recurringis concerned scans. with We dataunique which challenges is generated to implementing in a manner efficienteasy to understandingalso propose tothe implementsecurity Vulnerabilityposture of understandand reliable and mechanisms comprehend to present reducing colossal the

an organization with respect to known 7.3decision-making time. vulnerabilities. It involves collecting Maintaining integrity on a computer is information regarding vulnerabilities and patch levels of assets across the enterprise. The information is regularly fed into aggregate weextremely are left with challenging, little help when from the it comes environment to the reporting, and may also be used to do targeted highly sophisticated zero-day attacks wherein or large-scale remediation of discovered vulnerabilities. 131 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 SATCOM—Last Mile Secure Connectivity to Difficult Terrains of Tactical Battle Area

MR Sujimol, Anita Panday and K Shahana Delhi Earth Station, SNGG/SAC, ISRO, New Delhi-110021, India E-mail: [email protected]

Abstract—

Satellite Communication usage has become predominant throughout the country for various within,applications and in in support terms ofof coveragetactical forces and keeping outreach. in Tacticalview of Communicationthe changing tactical technology situations provides and varying secure communications such as voice, data and video among mobile/static users to facilitate command and control

environmental conditions. The last mile connectivity in the Tactical Battle Area (TBA) provides highly reliable connectivity, as it is meant to empower the soldier who is at the cutting-edge of our forces. ISRO provides last mile connectivity in difficult terrain of TBA by launching communication satellites for mobile services. The high power, high gain satellite of ISRO provides four different types of service viz, reporting service, two- way voice service, two-way multimedia service and broadcast service in the S-band spectrum for strategic purpose. ISRO has also launched a satellite for South Asian Countries to provide portable Ku x Ku VSAT network in that region for better communication, weather forecasting, tele-medicine and response to disaster management. The Portable Satellite Terminal, VSAT is capable to link with Last mile connectivity for secure and seamless communication in difficult terrains of TBA. This paper describes ISRO’s capability of SatCom applications, which can provide last mile secure connectivity in the entire Indian subcontinent, adjoining Oceans for empowering forces. 1. INTRODUCTION

1.1 Such communication can be used securely for voice, data and video transmissions both for locations that are static and by users that are a platform for various needs today, including technology has matured in terms of power and mobile. Over the past three decades, ISRO’s communication,Space segment isnavigation, increasingly intelligence being used and as surveillance, education, weather prediction band width substantially and now finds use and disaster management amongst many Defence sector has used this technology minimallyin a large numbertill now of commercialand thus has applications. a scope others. It can play an important role in the providing redundancy to terrestrial networks communication desired in Tactical Battle Area to utilizing this extensively specifically for (TBA). The tactical domain is extremely fragile and communicating in inhospitable areas daywith communication rapid mobility intools a hostile play a and crucial dynamic role environment. In such an environment, modern where the forces operate. help ground forces perform their operations ISRO’s communication satellite launched in as they ensure1 constant information flow that 2015 features a high power, high gain and are generally employed to provide direct or unfurlable on board antenna of six meters in efficiently . Military tactical communications usediameter.2 This paves way to use of smaller and low power hand-held terminals for strategic indirect support to forces deployed in TBA.132 . Vol. 4 No. 1 2019 SATCOM—Last Mile Secure Connectivity to Difficult Terrains of Tactical Battle Area 2. SATCOM FOR STRATEGIC USERS and satellite link is the best and reliable means of communication during this adverse conditions. 2.1 2.2.1 Handheld Reporting Service The prime requirement of military satellite communication is encryption, reduced probability Terminal of interception, ruggedized ground terminals and anti-jamming capabilities3. In dynamically supports tracking and real time position varying tactical situations and environmental The Handheld Reporting Service Terminal conditions, ISRO’s communication satellite it supports emergency messaging through provides secure communications (voice, data and reporting of Vehicle/Vessel. Additionally, video) in the form of reporting service, two-way voice communication, multimedia and broadcast soft keys, data collection and SMS services. services on a mobile terminal. The reporting terminal is primarily a TBA communication services are broadly S-Band transmitter transmitting its position categorised as either mobile or static periodically (1 sec interval min.) at 1200 bps to communications. ISRO’s Mobile Satellite Services respective Hub through high gain satellite along (MSS) is used for mobile communications, with secured short messages for tracking. From while Portable Satellite Terminal(PST) for static the hub the information is delivered to the User communication. Both these systems independently through GSM / web portal. provide last mile connectivity. These terminals support short messages edited from key board, UART or USB interface and 2.2 Mobile Satellite Service Bluetooth along with co-ordinates5 from GPS/ Mobile Satellite Services in India has been of utmost NavIC (multi-Constellation) . One potential importance for Tactical Battle Communication as isusage mounted is Fleet on the Management vessels to transmit and Monitoring position terrain at border area are inaccessible, have harsh wherein the MSS terminal with NavIC receiver environment and difficult terrains and even it is difficult to connect with terrestrial links. Also information via a satellite to fleet management during disaster, the terrestrial link fails completely control Web portal as shown in Fig-1. These terminals are battery based and can operate on AC power supply also.

Fig.1: RT Integrated with NavIC Receiver for Vessel Tracking and Monitoring

133 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2.2.2 Reporting Service Terminal:

All updates/events from RT are received at transmit and receive to receive events like This terminal is upgraded version with both NMS using MFTDMA mode and emergency messages, like accidents, attack, SOS etc., in nearest medical Centre/medical aid in case ALOHA mode. For emergency messages, the of injury, the distance to be travelled for next NMS coordinates with emergency services camp etc. These terminals have connectivity on though GSM/GPRS gateway or through Satellite 4G network(optional). Terminal and sends acknowledgement to RT. The NMS generates periodic reports on the hub The network should have the following efficiency (received and transmitted messages) Security of service is ensured by commissioning (a) MSS Terminals for vehicle as shown in Fig-2 of the terminal at the hub by its unique ID, (b) MSS transponder information is viable/visible only to the end- (c) Hub station user. (d) 4G network terrestrial link(optional)

(e) Leased communication channels between RT firmware/ can be Hub and Control station (optional) remotely upgrade/patched using 4G n/w Events from Reporting Terminal (RT) without manual intervention. One of the transmitted in MSS network is received by MSS requirementpotential application of coastal is security, Two Way tracking Reporting of Network Management System (NMS) at Hub Service for Coastal Surveillance to meet the and delivered to Control Station (user)through dedicated link in real time for dissemination. sub-20 m boats for coastal surveillance. The The baseband of hub comprises of IP based cost-effective, rugged, reliable two way RTs MSS NMS Software, proprietary protocols, can be mounted on Sub-20 m boats to track its communicates with a gang of modems, burst position and support to exchange emergency demodulators through UDP interface for messages from RT-Hub (vice versa) as shown transmission and reception of messages. in Fig-3.

Fig. 2: Efficiency of RT Services

134 Vol. 4 No. 1 2019 SATCOM—Last Mile Secure Connectivity to Difficult Terrains of Tactical Battle Area 2.2.3 Two-Way Voice Communication: Satellite Mobile Phone voice communication terminal designed by SAC/ISRO. The terminal can support voice & data communication at 2700 bps with inbuilt In the TBA, Satellite based mobile voice GPS. The user friendly terminal is interfaced communication is inevitable using small with Android Smartphone for display as shown portable hand held battery operated two-way in Fig-4a & 4b.

Fig. 3: Two Way RT for Coastal Surveillance

Fig. 4a: Two Way Terminal Voice Communication for strategic purpose

135 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 4b: Two Way Terminal Voice Communication for Strategic Purpose

An app on android phone performs the front

communication,disaster management response front, to the disaster VSAT to struck VSAT end functionality of satellite phone, viz. areasconnectivity and also can provide also besecure utilized hotlines for during secure registration, making calls, messages etc. The terminal can be used for transferring secured text to another terminal or Hub or to a group 3.2disaster and other tactical situations. of soldiers. This is a proof of concept terminal and can be scaled up for user’s requirement 3.without PORTABLE changing FIXany hardware.SATELLITE SERVICE The extended coverage foot print of South FOR LAST-MILE CONNECTIVITY Asian Satellite can be utilized for tactical communication using VSATs especially in 3.1 border areas. The Ku band VSAT star network is standard DVB-RCS format where forward network can provide secure connectivity among link from centralized Hub to user is DVB/ A Satellite based DVB-RCS/customized VSAT MPEG-2 format and return link from user command and control in various modes like to Hub is Multi-Frequency– Time Division users for exchanging real time information, Multiple Access (MF-TDMA) scheme, for two- way exchange of information. The forward link text, voice, images, video, broadcast services, offers 1 to 45 Mbit/s and return link 64 kbps to tovideo-conferencing the troops deployed etc. in Itthe willforward facilitate areas 4 Mbps per carrier. To establish communication communications from Corps Headquarters at remote VSAT location, user requires Satellite modem, LNA, BUC and typically 1.2 m Ku-band and to offensive formations operating beyond reflector. The antenna and ODU are required to the borders in the enemy territory. On136 keep outside and others units can be inside. Vol. 4 No. 1 2019 SATCOM—Last Mile Secure Connectivity to Difficult Terrains of Tactical Battle Area

Fig. 5: Portable Fix Satellite Service

meet the needs of secure communication in scheme to access the network and participate changing tactical situations and environmental The VSATs employ a scheduled MF-TDMA in bidirectional communications. The MF- conditions. The reporting, monitoring and TDMA allows a group of VSATs to communicate tracking of tanks, vessels and fleet is feasible through the Hub using a set of carrier frequencies, each of which is divided into time- with indigenous satellite based infrastructure slots. The Hub allocates to each active VSAT a irrespective of geo-location. Reliable voice, series of bursts each defined by a frequency, data and video connectivity among mobile/ bandwidth, start time and duration. Video static users facilitates command/Control conferencing can be established between two within, and in support of tactical forces. In VSATs in remote strategic location and with high power satellite serves strategic users in case of VSAT, the antenna and ISRO’s high gain, the control centre where Hub is located as well. hostileSuch VSAT locations, networks access ensures to other connectivity geographical to the conjunction with readily deployable Portable last mile as shown in Fig-5, internet facility in providing seamless communication in tactical Satellite Terminal (PST) and VSAT together for information using India’s Geo-platform Bhuvan and meteorological data access using MOSDAC battle area. Future thrust is to launch high portal of SAC makes it a vibrant platform. 4. CONCLUSION throughput satellites with Ku-band spot beams, Ka-band high potential Gateways to foray and 4.1 deliver a wide Spectrum of applications. In as powerful platform, tool delivering products general, India’s Space Programme has emerged SATCOM renders excellent, secured mobile & fixed services, precise location information to for Social, Scientific and Strategic purpose. 137 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

ACKNOWLEDGMENT 2. Annual Report, ISRO 2016 -2017 (English) 3. Satellite and Space Applications in Defence Special thanks to all the members of SAC, Sector, Colonel NS Yadav, A journal of Defence ISRO involved in the design and testing of MSS Information and Communication Technology, terminals and NaVIC receivers. Also indebted 2017 to all people involved during the various field 4. GSAT-9 Brochure, ISRO. REFERENCEStrials. 5. Indian Regional Navigation Satellite System, 1. Tactical Communications Command and Control Signal in Space ICD for SPS, version 1, 2017. Dilip Kumar Mekala , New Delhi 6. Study report on National Disaster Management Network June- 2014.

138 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Mobile Communications using Modified 4G LTE and Futuristic 5G for Joint Operational Environment

Col A Oberoi

Abstract—

The pressing requirement in a joint operational environment of connecting the battle space over a high bandwidth, highly resilient, intelligent, secure and pervasive wireless network calls for the Indian Armed Forces to explore options of procuring commercially available 4G LTE solutions for the forward edge/ tactical battlefield area. However, committing to this technology for large scale induction might not be the most optimal . 4G LTE is a developing technology with Release 13 ,14 and 15 in the adoption pipeline. Mission critical requirements of latency and security should be factored in when a wireless roadmap is chalked out for joint mobile network. Also, future development of Military Internet of Things (IoT) would require omnipresent ultra-reliable connectivity for which we must plan for inducting futuristic 5G technologies. This paper endeavours to touch upon 4G LTE, its recent releases, vulnerabilities, and futuristic 5G standards. It recommends that the framework for providing a joint mobile network should incorporate use of civil cellular 4G LTE network in the hinterland, while relying on a captive tri-services mobile network at the forward edge. Further, it suggests evolving a tweaked 4G LTE standard for joint military requirements of security and protection against jamming. 1. INTRODUCTION needspectrum to talk efficient to each network other at seamlessly the forward while edge 1.1 of the battlefield. These applications would centric data with the entities operating at the simultaneously exchanging operational info- Today the Indian Armed Forces are poised towards becoming joint wherein shared 1.2forward edge. situational awareness will take predominance. connected to facilitate applications to share A All entities will always require to be ubiquitously REN (Army Radio Engine­­ered Network) in relevant data amongst themselves. Each the Indian Army for Strike and Pivot Corps Service (Indian Army / Indian Navy and the communications have outlived their life. It is communicationIndian Air Force) in have respective put in placeoperational unique voice centric with negligible support for data network architectures for provision of mobile applications. Various heterogeneous solutions inusing formations COTS (Commercially to meet Availablecommunication Off the environments. Varied applications such as the Shelf) equipment have been incorporated IACCS (Integrated Air Command and Control System), MDS (Maritime Domain Awareness) requirements. The MCCS (Mobile Cellular , upcoming Tac C3I (Tactical Communications Communication Systems) inducted in the Control Computers and information) the Indian Army for static operational corps1 has CIDSS (Command Information Decision been deployed in two Corps with plans to Support System) which incorporates the BMS induct the same in three more corps. The (Battlefield Management System) and many AFCEL (Air Force Cellular Network) is a others require a scalable, reliable, resilient and139 WCDMA (Wideband Code Division Multiple : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

coordinate with the industry for tweaking it for 2 for Air Warriors at Access) based 3G network that provides secure end-point connectivity military specific applications while at the same all stations. The navy is looking forward to a time be ready to exploit futuristic technological similar mobile network in its mission critical 2.developments. PROPOSED MOBILE NETWORK 1.3ports and fighting platforms. ARCHITECTURE UNDER JOINT OPERATIONAL ENVIRONMENT

With considerable deployment costs, it is 2.1 Existing Mobile Networks requirementsworth taking with a stock the ofaim available of proposing options a 2.1.1 today and analyze the present and futuristic road map for exploiting 4G LTE (4G Long the three services reveals the following issues An analysis of the status of existing networks in Term Evolution) while adapting it to specific military requirements. At the same time, we as depicted conceptually in figure 1: need to spell out upgrades for incorporating 5G 1.4technologies in future. (a) Existing 2G and 3G mobile networks of the Indian Army are disjointed with limited capability of transporting data. requirement is very interesting especially in the The relationship between technology and (b) AFCEL (3G) existing in pockets across various Air Force stations has limited military. The best available technology in the data carrying capability and is not drivingcommercial technological world may notdevelopment be the most asoptimal also connected with any army network. for the military. With the commercial sector (c) Backbone support for tri services network is not available since the networks in with limited R&D available for defense within hinterland are not seamlessly connected. the country, the Indian Armed Forces cannot be expected to roll out a fresh tailor made (d) End to end secrecy over mobile networks wireless communication standard. Therefore, is not available to facilitate operational we must home on the best suited technology, communications.

Fig. 1: Existing Mobile Networks and Voids

140 Vol. 4 No. 1 2019 Mobile Communications using Modified 4G LTE and Futuristic 5G for Joint Operational Environment 2.2 Conceptual Framework for Joint 2.3 Envisaged Application of 4G LTE Mobile Network Networks

cater for inter and intra system requirements cellularFor supporting network joint for operations,the three services the desirable with Robust 4G LTE solutions will holistically end-state is to have a seamless common requirements which the cellular network will facilitatewhile executing are as follows: joint operations. Some of the realend toworld end secrecy.due to Thisresource however and ismanpower a utopian solution which may not be realizable in the and staff during operations and integration (a) Mobile communications for commanders constraints. Therefore, the proposed strategy should be to achieve seamless connectivity with Combat Net Radio. through available civil cellular networks in the (b) High bandwidth surveillance data transfer Ahinterland conceptual and depiction utilize captive of the cellular same is networks given at for the forward edge of the operational space. from the forward edge. (c) Mobile operations especially for the Strike Figure 2 below. The captive Tri-Service Cellular and Pivot Corps of the Indian Army. networks must be based on 4G LTE modified to (d) Data centric applications existing today meet the requirements of bandwidth for joint such as the ACCS (Army Artillery Combat battlefield applications. End to End secrecy Command and Control System), IACCS using robust applications on hardened mobile (Integrated Air Command and Control devices must be utilized to facilitate exploitation System) , IMMOLS (Integrated Maintenance of civil cellular networks. The mobile network Management On Line System) and many must be seamlessly integrated with the combat others can be fruitfully utilized if seamless net radio as well as the terrestrial networks. IP connectivity is provided using LTE. For this standards and interfaces would need to be specified. Select high bandwidth and (e) Seamless cellular communications on mission critical applications can be supported Naval Platforms for Intra and Inter system by futuristic 5G over short ranges. communication and battle space awareness.

Fig. 2: Conceptual Framework for Seamless Cellular Tri-Service Connectivity

141 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3. 4TH GENERATION LONG TERM 3.2 EVOLUTION (4G LTE) AND ITS 4 SUITABILITY FOR JOINT MOBILE NETWORK G LTE has been widely adopted by major telecom providers in India to provide higher 3.1 bandwidths and an all IP platform for data driven applications. LTE network Infrastructure rd providers have been making efforts to gain The 4G LTE Standard was finalized by the 3GPP and its earlier versions were commercially inroads for absorption of their systems into (3 Generation Partnership Project) in 2008, the Indian Army. The requisite spectrum for deployed in 2009 in Stockholm and Oslo. It both LTE FDD (Frequency Division Duplex) as well as LTE TDD (Time Division duplex) evolved to Release 310 and was named as LTE has been allocated. Although both standards supportAdvanced for in mission 2011 . critical As of todayservices LTE4, however Release 14 has been frozen in Jun 2019 which involves aim towards duplexing, the main differences between the two and its military implications it has not been completely introduced in the can be summarized as follows. market.

 Feature FDD Higher, since timeTDD slots are shared MilitaryImplications Applications for Military require and downlink low latency especially for Latency Lower,frequencies since uplink mission critical data, therefore are used between uplink and downlink. simultaneously FDD should be preferred. 

Spectrum Efficiency Inefficient Relatively more efficient Spectrum is a scarce resource in the battlefield and would require to be judiciously  Distance does not utilized.

Distance Preferability of the system Astime distance slots for to uplink the base and station downlink FDD will be more robust to affect the efficiency increases,increases duethe guardto propagation interval between delay varying distances in battlefield conditions.

and increased multipath. Therefore  Dynamic efficiency decreases.

for increasedUnbalanced Downlink Factor/ Numberdynamically of time and slots therefore allocated the Flexibility of TDD is desirable Dynamic Adjustment adjustment not to downlink can be increased for military applications. possible traffic system can be tweaked to specific  requirements.

MAC Layer and Less complex More complex due to requirement of Lower complexity is desirable Timing Complexity accurate timing requirements. for military applications. or to separate Equipment Cost Requiresfrequencies a duplex and Cheaper as no duplex or needed therefore more

 Device to Device costly. although D2D is communications since single military applications where Less suited, More suitable for D2D D2D is a desirable feature for (D2D) communications not render the user equipment feasible. frequency is used. in absence of base station will

useless. 142 Vol. 4 No. 1 2019 Mobile Communications using Modified 4G LTE and Futuristic 5G for Joint Operational Environment 3.3 their own inherent advantages for military for beyond line of sight connectivity needs to We realise that both FDD as well as TDD have be carefully planned. Use of lower frequency real time requirements of a primary concern window in the LTE band, of about 700 MHz applications. Latency for mission critical and would make it possible for providing longer ranges under obstruction by vegetation or and therefore FDD is a desired technology. built up areas. However the number of users at uplinkHowever and spectrumdownlink and efficiency, requirement dynamic of restricted and therefore for smaller more dense bandwidth or capacity configuration between cellsthese in frequencies areas where for headquarters a single base arestation located, gets communications for devices such as Military simple MAC (Medium Access Control) layer higher frequencies with smaller micro/ pico IoT, TDD is more suitable. A recommended cells would be ideal. approach would be to have a co-deployment 3.5 scenario with both TDD and FDD with inter- solutionsworkability in theoptions market and today traffic load balancing as per requirement. Nokia 5 is offering such The evolution of various incremental releases 3.4 Frequency Considerations. of LTE forecasted till induction of 5G is given in the following diagram. It is foreseen that by Utilisation of 4G LTE by the Indian Armed 2020, 5G wireless standard would be adopted Forces for static as well as mobile operations by most global service providers.

Fig. 3: 4G LTE Release Versions and Timelines8

143 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

4. TECHNOLOGICAL ISSUES IN USE OF COMMERCIAL LTE AND PROPOSED ADAPTATION FOR THE THREE critical connected mobility applications SERVICES with stringent latency requirements. This issue is presently being addressed Latency by 5G in “Make before Break”, “Multi Cell Connectivity” and “Synchronised (a) : In wireless networks latency Handovers”. Certain modifications of is of two types, the Control Plane LTE presently have been tried with latency (Network access by end user experimental equipment for ultra-low Vulnerabilities of 4G LTE latencyequipment- which the involvestime it takes the todelay establish from latency handover performance. the connection) and User (End to End) (c) : Several real time mission critical applications in independent studies have been conducted the gateway to the service provider. For relevanceto to existing military vulnerabilities applications in andthe systems, air defence and remote piloting 4G standard. Some of these which are of a joint operations, such as fire control and Drones, latency considerations are which must be further studied by Indian of UAVs (Unmanned Aerial Vehicles) Army are as follows. end latency is also dependent on the of prime importance. While the end to (i) Vulnerability to Smart Jamming Attacks: LTE utilises OFDMA robustness of the terrestrial network, (Orthogonal Frequency Division the control plane latency needs to be Multiple Access) for the downlink as minimum as possible. 6 However the and the SC-FDMA (Single Carrier 3GPP standards have set the control consistsFrequency of Division control Multiplechannels Access) which andplane therefore latency tocontrol 100ms plane. This latency might carryfor the critical uplink. handshakeThe LTE air andinterface data not suffice for time critical applications learn the network timing and channels. Smart jammers can standards are required to be spelt out. 7 For 5G, the control plane latency desired Handover Performance control channel configuration. Two is 10ms or less. concepts have been often discussed (b) : LTE with jamming strategy as ‘cheater’ implements ‘Break before Make’ and a ‘saboteur’. It has been shown handover. The ITU (International that the performance of the LTE Telecommunication9 Union) target is 30- network gets severely affected by this60ms time and observedmay increase to be typicallyto as much 49.5ms as actionsmart of jamming four types approach. which include This . Also if a handover is unsuccessfulr approach consists of a combined

200ms.Jamming This Types may for become LTE an issue fo theProposed following. Solutions

Barrage Jamming FDM Based solution Partial Band Jamming TDM based solution Single Tone Jamming Transmit power control solution Multi Tone Jamming Frequency hopping solution Asynchronous off-tone jamming Pilot tone jamming and pilot nulling 144 Vol. 4 No. 1 2019 Mobile Communications using Modified 4G LTE and Futuristic 5G for Joint Operational Environment

Fig. 4

Attack Target Attack Type Solution Proposed

LTE Security User Identity and Privacy threat Modified key exch algorithm. – Control Plane data modification – eNB attacks, unauthorized access to the network. Denial of Service – Redirection attacks/false base station attacks Use of M(Modified)EPS AKA – Evolved Packet System Authentication and Key Agreement (EPS AKA ) weakness exploitation approach False Base Station – Initial attach procedure Modified IMSI exchange – Inter-EPS (Evolved Packet Core) handoffs – Fake base station requesting IMSI of user equipment. VoLTE Attacks – SIP security threats including SIP flooding Use of signature based VoLTE – Signaling bearer attacks 5. 5TH GENERATION AND ITS UTILITY 8 IN THE FUTURE (ii) Attacks on LTE Networks : LTE networks have been found to be susceptible to the following types of attacks. It is therefore prudent 5G has been thought to be much more than proposed solutions for induction foreseen that the n to explore options for including the tahe simple corresponding incremental data advance rates onwill 4G. grow It is umber of devices and into the Indian Army. exponentially and reach hundreds of billions. In order to meet the surge in demand, 5G standardization activities are being undertaken. The motivating factors for 5G is shown in the 145following figure. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 5

5.1

The aim of 5G would be to provide ubiquitous though 4G LTE or legacy technologies and those13 high-rate, low latency network connectivity which need 5G is given in the following figure . while at the same time integrating with WiFi The tactile internet meant for military use lies in standards and LTE. A comparison between the9 two when being used in the commercial world the region supported by 5G. The requirements can be appreciated in the following figure of tactile internet are high bandwidth combined which depicts the sub-ms latency which 5G with ultra-low latency. Indian Armed Forces networks5.2 will promise. for the forward edge wireless connectivity must therefore aim towards exploiting 5G

A number of applications will ride on 5G and a in the tactical battlefield and work towards brief analysis of services which can be delivered absorption of relevant standards.

146 Vol. 4 No. 1 2019 Mobile Communications using Modified 4G LTE and Futuristic 5G for Joint Operational Environment

Fig. 6

Fig. 7

147 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

5.3

5G Technologies: (f) Full duplex: Instead of using FDD and TDD as is the case in LTE the proposed A number of challenging 5G systems will be able to use full duplex technologies have been foreseen to form part take place at the same frequency as Millimeter waves schemes. The transmit and receive will of the backbone of 5G. These are as follows. (a) : The traditional well as the same time thereby greatly sub-3GHz spectrum has become cancellationenhancing spectrumtechniques efficiency. and electrical This hugecongested spectrum and which its limit can ofrevolutionise utilization will be possible using RF interference has been reached. MM waves offer 6. FUTURISTICisolation. REQUIREMENT OF wireless communications. For example LTE ADVANCED PRO AND 5G FOR in the 60GHz range there is 9 GHz of INDIAN ARMED FORCES unlicensed spectrum available for being exploited. Also mm Waves call for very 6.1 verysmall small antennas area and which afford can high be packeddegree W as MIMO arrays on the handsets in a willith greaterrequire emphasisconnectivity on jointoptions operations with of beamforming. 28 GHz and 38 GHz in the battlefield, the Indian Armed forces Howeverbands are mm presently waves being suffer utilized from severe by 4G standard for fixed wireless applications. high degree of reliability, very low latency and flexibility in terms of bandwidth and path loss, fading due to and obstacles connectivity with base station. Some of the and therefore strategies for exploiting applications which will require ultra-reliable these are presently being explored. low latency communications as guaranteed by (b) hundredsMassive MIMOof antenna This arrays is an for evolving spatial LTE Advanced Pro (release 14) and 5G are as technology which proposes to utilize follows. (a) Provision of high speed data transfer highermultiplexing data rates so as to achieve space and with swarms of Drones and UAVs. time diversity to exploit the channel for (b) Ubiquitous connectivity for Narrow Band IoT applications for battlefield (c) Spectrum Sharing: Distributed and surveillance, monitoring, battlefield centralized spectrum sharing techniques medical and health applications. are proposed to be utilized to ensure (c) Push to Talk setup for communication better efficiency to utilize free time of with combat net radio. available spectrum emergencies involving real time video spatial reuse of frequency and higher (d) Casualty evacuation and medical (d) Small Cells: Smaller cells will enable links and high definition image transfers. white spaces in the spectrum under density affording higher data rates. d (e) Dynamic Spectrum Access utilizing (e) Beamforming: Capability of Massive MIMO will enable beamforming an heavy interference and enemy jamming. BDMA (Beam Division Multiple Access) (f) End to end security protocols for secure schemes. 148 Vol. 4 No. 1 2019 Mobile Communications using Modified 4G LTE and Futuristic 5G for Joint Operational Environment

encryption at physical layer and all controlresilient and links. signaling 5G willinformation support would true availability for joint battlefield applications. accommodateA Backbone Frameworkfuturistic tactical is required applications, to be established for the same. Further, in order to also be encrypted. additional nodes automatically Military IoT and Real-time mission critical (g) Self-organizing network setup with implementations we must be ready to deploy and optimally utilize 5G solutions. configuring themselves as these get 7.4 deployed in the battlefield. communications for sensors, drones and (h) M2M(Machine to Machine) It is therefore recommended that induction of 4G LTE for Tactical Battlefield communications logistics. should be brainstormed and a modified (i) D2D(Device to Device) including relay in standard specific for Indian Armed Forces areas where users go out of range. must be evolved. In addition, development of communications for high speed for future requirements and corresponding (j) V2X (Vehicle to Everywhere) joint battlefield applications must be factored

connectivity for mobile commanders in 5G technologies should be earmarked. For facilitating seamless mobile connectivity for joint 7. CONCLUSIONthe battlefield. operations we must be able to utilize the 4G civil 7.1 cellular network across the length and breadth of the nation. The Industry must be taken into As a part of strategic planning, we must take confidence to incorporate military hardened

rd standards and an ‘Experts Committee’ should be cognizance the recent developments in 3GPP setup as a standardization group. Collaboration (3 Generation Partnership Project) and 4G with US Army / NATO may be explored to gain LTE especially the releases 11, 12, 13 and 14. knowledge about similar endeavours for US We must avoid a situation wherein the Indian Mil Standards. We must therefore lay down the following as the “way forward”. Armed Forces are left with fate accompli ensure that all procurement policies towards procuring commercially available 4G (a) Formulate customized standards and LTE platforms without the requisite reliability 7.2and security built into the systems. conform to the standards. (b) Press hard for end to end encryption for mobile devices so as to be able to ride on A thorough understanding of available 4G civil cellular networks. requirementLTE options, for its relevant vulnerabilities personnel and involved of options in of military hardenings an inescapable (c) Closely collaborate with the industry, academia and specialists by spelling out conceptualizing, planning and operating joint clear requirements and standards. 7.3mobile communication networks. (d) Optimise our investment strategies for R&D. (e) Lay down roadmap to facilitate adoption In order to utilize 4G LTE it is imperative that of future technology trends such as 5G military specific standards be evolved which (future proof). will ensure interoperability, security and149 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

REFERENCES 7. Resilience of LTE Networks Against Smart Jamming Attacks: A Game-Theoretic Approach By 1. http://www.thehindu.com/news/national/ formations-getting-snoopproof-mobile- Farhan Muhammad Aziz ,2017 network/article6853561.ece 8. Silvere Mavoungou , Georges Kaddoum Mostafa 2. Press info Bureau, Govt of India, MoD https:// AccessTaha and Georges Matar, Survey on Threats and pib.gov.in/newsite/ PrintRelease.aspx? Attacks on Mobile Networks June 2016, IEEE relid=100250 3. https://en.wikipedia.org/wiki/LTE_ 9. Understanding 5GPerspectives on future (telecommunication) technological advancements in mobile – GSMA 4. http://www.3gpp.org/specifications/releases Intelligence , Dec 2014 5. https://onestore.nokia.com/asset/200265/ Nokia_TD-FDD-LTE_Co-existence_White_Paper_ EN.pdf 6. From LTE to 5G for Connected Mobility, Mar 2017, IEEE Communications Magazine, Mads Lauridsen, Lucas Chavarria Gimenez, Ignacio Rodriguez

150 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Developing Synergy and Jointness in Cognitive and Social Domains

Col K Pradeep Bhat (Retd) E-mail: [email protected]

Abstract—

The Joint Doctrine for Indian Armed Forces published by HQ Integrated Defence Staff in Apr 2017 describes how, with Jointness, “a high level of cross-domain synergy is attained that vastly enhances success potential”. The doctrine also describes “’Integration’ as the integration of ‘processes’ across all operational domains, towards optimisation of costs and enhancing readiness”. Many other studies also point out that trust (a cognitive characteristic), culture, teamwork and collaboration (social characteristics) are essential to success in today’s high-paced operations. This paper explores why and how synergy and jointness have to be tackled in the cognitive and social domains, and how leaders have to adapt themselves to ensure its success. Technology frameworks that can support these two domains are also discussed. 1. INTRODUCTION 1.2

1.1 All large enterprises visualise the Vice Admiral Arthur K Cebrowski, US Navy, implementation of their organisational who first coined the term “Network Centric technologyWarfare”, describes4 NCW as primarily about three dimensions of people, processes and human behaviour as opposed to information goals, objectives and strategy through the . Warfare is about human behaviour in a context of organised violence directed generallytechnology. tried The to Defence address Forces, Jointness traditionally through toward political ends. Hence, the focus has technologyused to Service-based to integrate siloed entities, operations, coordinate have to be on human behaviour in the networked their actions and develop shared understanding treatedenvironment, as a noun, rather rather than treaton the “to network network” itself. as In other4 words, the “network” is not to be limitations in the sense that it does not fully tacklethrough the joint “people” training. dimension This approach at the cognitive has its 1.3a verb . and social levels. This aspect is recognised in theVice physical, Admiral information, Cebrowski alsocognitive contended and social that activelythe Joint invest Doctrine in people, for Indian time Armedand resources Forces, conflict in the modern battlespace encompasses which mentions that “Commanders need to domains.4 The relationship between these to develop jointness amongst personnel of the domains of conflict are shown in the figure Armed Forces”. below .

151 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2. UNDERSTANDING THE COGNITIVE DOMAIN their respective military ethos, traditions enhanced in the individual Services through 2.1 and other key intangibles inherent in their respective organisational histories. individuals and the leaders, where perceptions, 2.3 The cognitive domain is in the minds of the reside and where, as a result of sensemaking, decisionsawareness, are understanding, made6 beliefs and values The culture of jointness can be developed by extending the “military spirit” beyond the 2.2 . individual Services. Organisational culture is a nebulous concept that manifests itself through havethe behaviour their own of unique individuals, organisational teams and cultures leaders of the organisation. Each of the three Services theirThere motivationis a unique spiritand commitment inherent in the to Indianserve theArmed nation, Forces their readiness personnel to thatlay down embodies their common understanding and appreciation of and the way to bridge the same is through a lives for the security of the nation, and their ungrudging acceptance of physical and emotional hardships that they have to face in each Service’s culture, capabilities, strengths amongstand limitations. individuals This of different effort has organisations, to further would agree that this spirit is fostered and extend to encouraging and developing trust their line of duty. Human behaviour analysts who form part of joint groups. 152 Vol. 4 No. 1 2019 Developing Synergy and Jointness in Cognitive and Social Domains 2.4

can lead to serious dysfunctional relationships. and shared appreciation have to percolate from It is important that the common understanding Formal and informal leadership again plays an 3.3important role in the resolution of conflicts. tothe sustain top leadership the same, of thewhen Services some downevents to andthe frontline troops. An even bigger challenge is Measuring the success of jointness at the social incidents take place, which causes a build-up level is easier than that at the cognitive level. of distrust. Leadership then plays a major role Both quantitative and qualitative analysis to contain the build-up of negativity and regain techniques will have to be used to design 2.5the lost trust. 4.appropriate SUPPORTING measurement TECHNOLOGIES mechanisms. 4.1 analysisMeasuring techniques the success and trained of jointness analysts atwould the cognitive level is very difficult. Behavioural theEnterprise cognitive Social and social Collaboration domains, platformsspecially be required to design appropriate measurement are best suited for supporting jointness at 3.mechanisms. UNDERSTANDING THE SOCIAL DOMAIN andacross sustain multiple their federating human networks organisations. within Such and platforms enable individuals to digitally build 3.1 individuals share their professional details, across organisations. The platforms also let

Jointness is less about grand architectures and knowledge and expertise with others, provide domainsystems, plays and a morevery important about day-to-day role to develop living sucha ‘face asto a teamname’ rooms,through businesscommunities, cards, and synergiesin a culture amongst of interdependence. individuals within The socialand provide collaborative spaces for engagement,

discussion forums. Such forums also enable across various organisations. Lifetime bonding leaders to connect better with their command likebetween the individualsNational Defence of different Academy services and is the 4.2through a non-rigid hierarchy. raison d’etre of our tri-services institutions

Defence Services Staff College. It is important empathyThe enterprise and common social collaboration understanding platforms that that similar social bonding is extended to all are useful for organisations to build trust, individuals of the three Services through some forums. It should be further extended to other additionalrevolves aroundtechnological non-classified mechanisms information. to ensure organisations, with whom the Defence Forces Classified information however needs have an inter-dependent relationship. 3.2 and organisations around the “need to know” andthat “need trust isto retainedshare” critical between and individuals sensitive information, typically centred around It must be recognised that social collaboration is operations, intelligence and operational prone to inter-personnel conflicts, many times triggered off by mismatch in understanding of organisational cultures. This, if not controlled,153 logistics. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

4.3 6. CONCLUSION 6.1 Technology by itself is not sufficient to tackle individualsthe issue of and trust. organisations It also needs share research or decline and Synergy in the cognitive and social domains toanalysis share information, of human behavioureven when asthey to are why aware do is vital for achieving Tri-Service jointness. It has to be driven primarily from the people perspective, duly supported by processes and that it is for the larger common good. A great technology. It has to also extend beyond the Defence forces to other arms of the Government, deal of work is happening in this area, globally REFERENCESfor synergy to be achieved at the national level. and in India, but it is limited to non-military 1. Joint Doctrine for Indian Armed Forces, 2nd enterprise domain. Similar research is required 5.for theROLE military OF HUMAN domain too. RESOURCES 21st Century Warfare: Edition, FromHQ Integrated “Battlefield” Defence to Staff, “Battlespace” Apr 2017. MANAGEMENT 2. Lt Gen (Dr) R S Panwar, th , http:// 5.1 futurewars.rspanwar.net/21st-century-warfare-Network-Centric Warfare:from-battlefield-to-battlespace, Its Origin and Future 6 Oct 2017. 3. Cebrowski AK and Garstka John, The Implementation, US Naval of InstituteNetwork are targeted towards imparting of skills Proceedings, Annapolis, Maryland, January 1998. The HRD programs in the Armed Forces Centric Warfare and knowledge that is essential for each 4. Cebrowski AK, , Office of Force Transformation,Network CentricUS DoD, WashingtonWarfare: Developing D C, 05 Jan 2005.and Leveraging 5. AlbertsInformation DS, GarstkaSuperiority JJ, and Stein FP, progressive rank and appointment held by an individual. Joint training programmes , 2nd Edition (revised). DA,Washington, Understanding DC, DoD InformationCCRP, Feb 2000. Age Warfare, are focused on efficiency and effectiveness 6. Alberts DS, Garstka JJ, Hayes RE, and Signori of teams and groups. There is little focus on in aspects like understanding their own Washington, DC, DoD CCRP, 2001. enabling cognitive thinking in individuals et al, Team of Teams 7. General Stanley McChrystal, US Army Retired, The, PenguinFive Dysfunctions Books ISBN of a 978-1- Team, behaviour and that of the others, handling 59184-748-9. 8. Patrick Lencioni, inter-personal conflicts, and collaborative Jossey-Bass Publications, Wiley reprint. leadership. This aspect needs to be addressed 9. HCL Connections- https://www.hcltechsw.com/ too, on our road to jointness. wps/portal/products/connections

154 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 A Framework for Implementation of Smart Documents for Armed Forces

Maj Kunal Pal1 and Dr CRS Kumar2 E-mail: [email protected]

Abstract

—Intelligence is the process of planning, collection, collation, analysis, interpretation, and dissemination of collected information. The security of this information in any military operation is of prime importance for the success of the mission. Providing the right information at the right time and at the right place is very important for the Commanders at all levels to enable them for a better decision making to achieve their objective. This sensitive information is provided by numerous sources spread throughout the battlefield in a hostile environment. In such an environment, an adversary endeavors to manipulate the information to disrupt our planning. So, it is of extreme importance to ensure that the information provided by any source in a highly contested environment is verified for its integrity, authenticity and that the information is reliable, immutable and available as and when required. Thus, in this paper, a method of sharing information using Smart Documents embedded with a Quick Response (QR) code which will contain the Digital is proposed Signature of the originator to provide an efficient mechanism for verification of the document. The use of Block chain technology will provide a secure, immutable and verifiable model for the storage of these Smart Documents without depending upon any third party. Also, the paper proposes a viable framework for the creation of a Smart Documents and verification of the same. 1. INTRODUCTION 1.2

1.1 via documents with all the intelligence agencies The information from these sources is shared

Colonel John Boyd of U.S. Air Force developed createdfor better and command send to and them control individually of the situation. where a decision making cycle called the OODA Loop Thus, multiple copies of these documents are and[1] (Observe-Orient-Decide-Act) react to a sequence of unknown which events enable of Commanders at all level to rapidly, observe they are handled separately with updates/ centralisedchanges to themstorage also solutionshandled separately. to store Mostthis informationof the organizations which suffers are using from independent inherent the adversaries by getting into the his decision making cycle and gaining advantage.The first data generated, stored and transferred from step in the OODA Loop is to Observe. At this aweaknesses centralised of storagethe trust-based system model.into a Thus,military the point, the main aim of any Commander is to network may have issues related to integrity, gain an accurate picture of a given situation by using all the information sources available with him. Information will be available via various 1.3availability, and authenticity of data. sources like Human Intelligence, Imagery Intelligence, Technical Intelligence, Signals Intelligence, Open Source Intelligence and lastly This paper proposes an architecture for the Measurement and Signatures Intelligence[2]. creation of QR code and digital signature based

155 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2.2

Smart Documents with the help of blockchain mechanism for easy storage, access, and retrieval centralised control platform where the security oftechnology. documents The and proposed at the architecture same time provides provides a Most of the military equipment is based on a

of this equipment is based on the trust of the a transparent and auditable environment for information provided by various intelligence verification of integrity and authenticity of the sources. These intelligence sources may include documents. The proposed methodology to create intelligencevarious documents reports, thatoperation may beplans, classified maps a Smart Documents is by embedding a QR code or unclassified like the dispatch document, [3]on the required document to be verified. The QR code due to its high data storage capacity and of the hostile area, aerial/satellite images, fast readability makes the process of verifying a etc. These documents are usually generated, document simple. This QR code will contain the shared and stored by various departments. digital signature which will enable authentication Each department handled these documents of the issuing authority. Also, the documents hash theseparately centralised with environment updates/changes has various to them issues also value and its unique ID along with credentials to handled separately. The data, when stored in verify the sender are stored in the blockchain framework that enhances the credibility of the like a single point of failure, data availability document. 1.4 2.3and denial of service (DoS).

The rest of the paper is organized in the Various techniques like the use of barcode and following manner: Section II covers the mitigate the issue of authenticity and integrity proposed method and the technologies that public key encryption have been proposed to literature review. Section III describes the of documents both in the hard and soft copy are used in the creation of Smart Documents. proposed the use of digital signatures to verify of the document [9,10].In [11] the author has Section IV covers the method of creation of a Smart Documents and verification of the same. have given the solution to verify the integrity the authenticity of a document. In [12] they Section V discusses the testing and evaluation of a document using cryptographic hashing, of the proposed framework. Finally, Section VI 2.gives LITERATURE out the conclusion REVIEW of the paper. of2D encrypting barcodes, Opticalthe complete Character document Recognition only (OCR) and digital signatures. In [13]instead 2.1 header, addressee, date of signature, etc are the basic details of the document like the title, use of crypto currency sector initially proposed Blockchain technology is expanding beyond the 2.4used to create a digital signature. areby Satoshievolving, Nakamoto there are a [4] few in emerging the Bitcoin directions white relevantpaper. As to the defence concepts applications of blockchain where technology research Many blockchain based methods have been proposed for the secure storage of documents. is being carried out is, tracing of defence related The simplest method to store a file using a shipments and contracts [5], secure messaging blockchain is to store the complete file in the [6], cyber warfare [7], and protecting weapons block. However, it will result in a large block systems in defence networks [8]. 156size due to which there will be high latency Vol. 4 No. 1 2019 A Framework for Implementation of Smart Documents for Armed Forces

print the digital signature of the owner on the in the network thus making it inefficient. Nick Szabo in [14] has proposed the creation document. A digital signature can be easily aof computer a blockchain to digitally based smartvalidate contract and impose which verified from an electronic document however thecomputer performance generated negotiation contract agreed that enablesin the they cannot be verified directly from the hard copy of the document. The use of QR code in Smart Documents helps us in overcoming contract. The clauses in the contract are codethis problem.scanner and The retrieve QR code the embedded details from in the havetrackable, proposed irreversible a method and intamper-proof which the data due tois Smart Documents can be scanned by a QR splitthe use and of stored blockchain in multiple technology. computers In [15] of they the distributed, immutable, reliable blockchain as the data is replicated among several nodes of 3.2network for verification purpose. same network. The method provides reliability technologies that are used in the creation of the network and can be retrieved even if one of The succeeding paragraphs cover the the nodes goes down. However, to achieve data consistency and synchronization, the method Digital Signatures: Smart Documents. proposed in [15] requires complex algorithms. Digital signatures are equivalent In [16] an Inter Planetary File System (IPFS) (a) has been used that connects all the computers (i) which offers far more security as using a P2P (peer-to-peer) network. The single to a handwritten [19] signature large file is divided into small size and the hash of these files is distributed using the P2P techniquethey cannot it begives copied the recipient or forged. a network among all computers. In [17] they have By using encryption and hashing proposed a method known as Storj in which onP2P to cloud the cloud storage using has anbeen encryption used that technique does not strong cause to believe that the rely on any third party. The client stores his data duringdocument transmission was created or bystorage the thus,owner providing which has authentication not been altered of and is responsible for the key management. In the originator and integrity of the [18] the author has carried out measurements of efficiency between Hyper ledger and SQL database in terms of throughput, latency and message. Also, since the digital execution time and found that Hyper ledger is signature has been created using the 3.more PROPOSED efficient for aMETHOD data intensive application. keyprivate of thekey originatorit can be only and be thus, verified the originatorusing the cannot corresponding deny signing public the 3.1

document. This property is called aimsIn this at paper,verifying a methodthe authenticity for the creationand integrity of a non-repudiation. A unique digital ofSmart a document Documents and hasat the been same proposed time provide which asymmetriccertificate [22] key is cryptography,required to create also a *mechanism for easy storage, access, and a digital signature that is based on retrieval of documents from a transparent standardknown as for public-key the use cryptography. of digital RFC 5280 [20] gives out the current and auditable environment. To provide a simple verification process, it is required to certificates X.509. 157 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 1: Working of Digital Singnature

illustrates how to sign the document the same then the digital signature (ii) The diagram shown in figure 1 both the hash digests are found to be document passes the document to and verify it. The owner of the is verified else it can be said that the QR Code: document has been tampered with. be signed through a hash function Hash digest is then encrypted using (b) which gives out a unique hash digest. (i) The QR (Quick Response) [21] code proposed to be used is a two alongthe owner’s with privateits digital key which signature gives dimensional bar code that was first isout sent a digital to thesignature. recipient The documentwhere he hasdesigned more bydata Denso storage Wave capacity in 1994 and for decrypt the digital signature and get the automotive industry in Japan. It uses the public key of the owner to provides an efficient mechanism isa hashalso digest.passed Simultaneously, through a hash the for encoding the information. The document received by the recipient diagram as shown in [21] and given in figure 2 shows the key features of function to create a hash digest. If158 the QR code: - Vol. 4 No. 1 2019 A Framework for Implementation of Smart Documents for Armed Forces

positioning detection helps

(aa) Version information: There are currently 40 different QR us find the correct position of has a different module Alignment pattern: A large code versions. Each version the QR code. (ae) with its orientation, the use configuration that can store a ofQR alignment code may pattern have in issues the different size of data in them. contains the information (ab) ofFormat the encoded information: patterns to It QR code help with the same. (af) Timing pattern: It is used to enables the rest of the region the dimensions of the data Data and error correction find the width of the code or to be decoded [21]. (ac) data that is encoded in the matrix. area: It contains the actual (ag) Quiet zone: This spacing is used to separate the QR code QR code. A conventional digits whereas a version from its surroundings. barcode can store upto 20 (ii) QR codes outperform other one- 40 QR code can store up to dimensional barcode standards 7089 numeric data, 4296 because of its high capacity, strong usedalphanumeric for error data, corrections and 2953 error tolerance, fast readability, binary data. This area is also and flexible encoding options, thus qualifying it to be a suitable scheme which are based on Reed- informationfor URL sharing, sharing contact at tourist sharing, and Solomon Codes [23]. business card, Wi-Fi access point, (ad) Positioning detection pattern: QR code can be scanned from public places, electronic payment, any direction. The use of ticketing, and shipping services.

Fig. 2: Features of QR Code

159 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Blockchain: technology that contains valid (c) (iii) transactionsBlockchain isthat a distributedare recorded ledger into (i) The concept of blockchain was proposed by Satoshi Nakamoto a block by the nodes, and these toin the 2008 introduction [4]. The of emergence decentralised of that makes tampering of them blockchain technology can be linked blocks are linked together in a way

crypto-currency for the internet like difficult. The participating nodes can Bitcoin [4]. sequentially append additional blocks over the legacy centralised storage [4] to the existing chain of blocks. (ii) The advantages of using blockchain (iv) The diagram in figure 3 shows what Table 1: Advantages of using Blockchain Over the a block in a blockchain contains and Legacysystem Centralised are shown Storage in table1. System how they are linked together. The Centralised Characteristics Blockchain Storage System first block in a blockchain is known Storage Decentralised passingas the genesis the document block [24]. through Each a block hash Data replicated function,contains athe hash hash digest of generatedthe previous by across various Centralised Reliability point of failure nodes Potential single

Security central authority block and the transactional details. Established via Thus, every succeeding block of the Cryptographic keys Administrator Trust blockchain is linked with the hash Immutable records of the previous block that prevents Control consensus based Authority controlled the new block from being altered or Basemechanism on the Centrally adding in between. So, each block Not required due to Audit required added into the blockchain strengthens Regular checks the verification of the previous block Architecture immutable records and hence the entire blockchain. Client-Server Peer to Peer(P2P) The method makes the blockchain Based tamperproof and immutable.

Fig. 3: Contents of a Block in a Blockchain

160 Vol. 4 No. 1 2019 A Framework for Implementation of Smart Documents for Armed Forces

Fig. 4: Blockchain

(v) To add a block into the blockchain e.g. Proof-of-Work, Proof-of-Stake, network a predefined rule based Practical Byzantine Fault Tolerance, consensuson a consensus mechanism mechanism is [25]an Knowledge Proof, Proof-of-Authority, algorithmis used as that given ensures in figure that updates 4. The Proof-of-Capacity, etc[25]. (vi) Blockchains can be public, private or consortium based [26]. A public andto the the blockchain same is communicated are agreed byacross the anyoneblockchain on thealso internet called a forpermission reading, themajority entire of network the nodes thus, participating providing less blockchain. It can be used by

writing, and auditing. They are typesa transparent of consensus and mechanisms auditable transparent and can be viewed by environment. There are various anyone on the network. A consensus mechanism like Proof-of-Work being used in the blockchain system161 (POW) and Proof-of-Stake(POS) : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

may be used for example Lit coin hash function (H) (e.g. SHA-1, MD- [27]. Private blockchain also called a 5, Whirlpool and SHAi 256) to create permissioned blockchain is specific a hash digest (HD ) which is then to any individual or an organization. encryptedA (E) using the private key The members or participants have (PR ) of user A (A) to create a digital à(A)Di to be authorized before they can signatureA i(DS ). (A)Di access the services. All participants E(PR (HD )) DS Di (2) may not be part of the consensus (iii) A unique identity (X ) and the time mechanism for example Bankchain stampi (T ((X) Di)) of the documentDi [28]. Whereas in a consortium or along with the digital signature the selected consortium are given the (D ) is created. Unique identity (X ) federated blockchain members of

(DS(A)Di) mentioned in equation (2) is access rights to *run the blockchain used to generate the QR code whichi network. Thus, instead of any one a group of peoples or companies is embedded in the document (D ) individual being in charge there are who come together for the decision mentioned in equation (1) to create à a Smart Documents.i i (((DS) A)) Di || (X) Di) SD SD (D || iQR ) (3) themaking proposed process, method, for example, the use Energy of a Web Foundation (EWF) [29].For (iv) forThe validation block (B that) is consists sent to of everyhash node in the blockchain network private blockchain like Hyper ledger i Di 4. SMARTFabric DOCUMENTS [30] will be done. digest (HD ), unique identity (X ), timei stamp (T ((X) Di)) of the document 4.1 (D ) along with hash digest (HD) of the previous block (HDi-1), and || HD proposed framework for the creation and publici keyi (PU) of user DiA (A). In the following paragraphs, we cover the B= A (HD i-1 || X || T ((X) Di) verification of Smart Documents as shown in ||PU ) i (4) (a) Creation of Smart Documents: figure 5 and figure 6 respectively. (v) Once the block (B ) is validated based on consensus by the majority of the i i (i) Let us say user A (A) wants to create nodes in the blockchain network à D (1) a document i(D ) then the block (B ) is added to the j || blockchain (BC ) i i+1 User A i BCi+2j = (……Bi-2 || Bi-1 || B || B (ii) The document (D ) mention in equation (1) is passed through a B ……) (5)

162 Vol. 4 No. 1 2019 A Framework for Implementation of Smart Documents for Armed Forces

Fig. 5: Preparation of Document

Verification of Smart Documents: A

(b) k (iv) The public key (PU )found in as shown under is received for (i) Let us say a Smart Documents (SD ) equation (10) is used to decrypt(D) the digital signature (DS(A) Dk) found k à in equation (8) to get a hash digest verification:k k à HD (HD )A k (((DS) A)) Dk || (X) Dk) SD SD (D || QR ) (A) Dk D(PU (DS )) (11) (6) Documents is scanned to retrieve (v) authenticatesSuccessful decryptionand gives (D)out the of (ii) QR code (QR) in the Smart (A)Dk Dk the digital signature (DS )

unique identity (X ) and digital k non-repudiation of user A (A). signature (DS(A) Dk) of the Smart k k à Simultaneously, the document Documents (SD ) Dk (D ) of the Smart Documents (SD ) (((DS) A)) Dk || (X) Dk)à received in equation (6) is passed QR X (7) r (((DS) A)) Dk || (X) Dk) (A) Dk through the hash function (H) to QR DS Dk (8) à D createk ka hash digest (HD ) k k (iii) Using the unique identity (X ) of (((DS) A)) Dk || (X) Dk) A SD (D || QR ) the document (D )found in equation k à HDr K (12) (7) the public key (PU ) of the user A n k (A) is retrieved from the block (B ) H(D ) (13) à || r of then blockchain (BC ) k k+1 (vi) If the hash digest (HD ) given in k+2 k-2 k-1 equation (11) and hash digest (HD ) BC (……B || B || B || B || HD given equation (13) are found to be Bk ……)k Dk (9)A integrity of the document is intact the same, then it can be said that the à A B (HD k-1 || X || T ((X) Dk) ||PU ) PU (10)163 and thus, the document is verified. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 6: Verification of Document Use of Blockchain in the proposed

framework: n (c) was used, Intel(R) Core (TM) i7-8550 CPU, help us in verifyingThe blockchainthe integrity (BC and) 1.80–1.99 GHz, 8 GBRAM, 64-bit Windows 10 authenticitymentioned inusing equation the (9)hash will digest also Operating system having 1 TB of a hard disk. k k The tools and software used were Oracle Virtual (HD ) for a given document (D ) which 6.0, Image of Kali Linux 2018.2 vbox-i386, k openssl library in Linux, QR-Code Studio 1.0, is distributed and storedn by all the consensusnodes. Since mechanism the block so (B it) waseliminates added 5.2Adobe Acrobat Reader DC. theto theneed blockchain for any trustless (BC ) based centralised on the

controlling authority. The record of the To create a Smart Documents a test case has transactions is available publicly and been prepared in which a file which contains transparencycan be viewed of by the all creation the participants of the given in text, images, graph, word art, and smart art has framework works for all type of contents in the blockchain network thus providing k been created so as to check that the proposed

altereddocument or deleted (D ). Once as the the copy transaction of these transactionshas been added is toheld the withblock everyit cannot node be the file. Using openssl library available in Kali Linux,anX.509 digital certificate is created using the 4096 bit RSA Private key. A digital present in the blockchain network thus certificate so generated is then used to sign the 5. TESTINGproviding AND immutability. EVALUATION file. In the next step, the digital certificate and 5.1 a unique ID of the file are provided to the QR code generator. QR code so generated is then For testing the proposed framework, a system embedded to create a Smart Documents as with the following hardware configuration164 shown in figure 7. Vol. 4 No. 1 2019 A Framework for Implementation of Smart Documents for Armed Forces

Fig. 7: Smart Document Created using the Proposed Framework 5.3

few changes were made to the file and a new To verify the file for its integrity, authenticity, modified file was made and a similar procedure and non-repudiation the PKCS7 signature is was followed to verify it. It was, however, extracted out of the digital certificate. The PKCS7 infound evaluating that the the verification correctness of theof the modified proposed file signature is then used to verify the file based on failed and thus, the above procedure helps us the digital certificate. As shown in figure 8, the verification for the same was successful. Then,165 framework. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 8: Verification of the Original File was Successful Whereas the Verification of the Modified File was a Failure 5.4 success of a mission in any military operation, Since this information is very critical for the network, it is proposed to use Hyperledger a framework is required that will provide To test the performance of the blockchain

Fabric which is an open source blockchain the same. The paper proposes a QR code and network. Hyperledger caliper [30] is a Digital Signature based Smart Documents using Blockchain technology for Armed Forces. These transactionsbenchmark toolper that second, is used throughput to compare and the and authenticity of information using Digital performance of the blockchain in terms of Smart Documents can ensure the integrity storage, access, and retrieval of documents carriedlatency. outHowever, and the at same this point,is proposed the testing using andthe Signatures and provide a mechanism for easy evaluation of the blockchain have not been in a transparent and auditable environment 6.Hyperledger CONCLUSION caliper. using the Blockchain technology. The proposed solution will facilitate the verification of 6.1 documents both in its electronic and paper form. Thus, the complete framework will aid the givingCommanders them assurance at all levels of integrity, in the faster authenticity, decision environmentThe security ofwill information always have generated, issues concerning shared, making process to achieve their objective by and stored by any source in a highly contested and availability of information in an immutable its integrity, authenticity, and availability. and transparent military network.

166 Vol. 4 No. 1 2019 A Framework for Implementation of Smart Documents for Armed Forces REFERENCES 12. Sthembile Mthethwa, Nelisiwe Dlamini, Dr. Graham Barbour “Proposing a Blockchain- 1. Grant T Hammond, “On The Making of History: based Solution to Verify the Integrity of John Boyd and American Security”, The Harmon Hardcopy Documents”, International Conference Memorial Lecture, US Air Force Academy, https:// on Intelligent and Innovative Computing www.usafa.edu/app/uploads/Harmon54.pdf Applications (ICONIC) on 6 and 7 December accessed on 12 Sep 2019 2018. 2. Bang, Martin, “Military Intelligence Analysis: 13. Gourab Saha “D-Sign Digital Signature System for Institutional Influence”, Doctoral Dissertation, Paperless Operation”, International Conference Finnish National Defence University, October on Communication and Signal Processing, April 2017. 6-8, 2017 3. Denso-Wave, “About 2D Code” https://www. 14. “Smart Contracts Whitepaper”, https://github. qrcode.com/en/history/ accessed on 10 July com/OSE-Lab/learning-blockchain/blob/ 2019 master/ethereum/smart-contracts.md, accessed 4. Nakamoto, Satoshi. “Bitcoin: A peer-to-peer on 09 Aug 2019 electronic cash system.” written in 2008, accessed 15. Pavel Bzoch - “Distributed File Systems”, Technical from https://bitcoin.org/bitcoin.pdf accessed on Report No. DCSE/TR-2012-02, University of West 20 Aug 2019 Bohemia Department of Computer Science and 5. Sam Mire,”Blockchain For Military Defense: 7 Engineering University, Pilsen, Czech Republic, Possible Use Cases”, https://www.disruptordaily. June 2012 com/blockchain-use-cases-military-defense/ 16. J. Benet, “IPFS - content addressed, versioned, accessed on 10 July 2019 P2P file system”, ArXiv 2014, accessed on 11 Aug 6. Daniel Kuhn, “US Defense Department to Develop 2019 Blockchain Cyber security Shield”, https://www. 17. Shawn Wilkinson, Tome Boshevski, Josh Brandoff, coindesk.com/us-department-of-defense-is- Vitalik Buterin “Storj - A Peer-to-Peer Cloud developing-a-blockchain-cybersecurity-shield Storage Network”, written on December 15, 2014 accessed on 13 Aug 2019 v1.01, https://storj.io/storj.pdf, accessed on 13 7. Victoria Adams,” Why Military Blockchain is Aug 2019 Critical in the Age of Cyber Warfare”, https:// 18. Onno W. Purbo, Sriyanto, Suhendro, Rz Abd. Aziz, media.consensys.net/why-military-blockchain- Riko Herwanto, “Benchmark and Comparison is-critical-in-the-age-of-cyber-warfare- between Hyper ledger and My SQL”, Informatics 93bea0be7619, accessed on 09 Aug 2019 & Business Institute Darmajaya, Indonesia, Sep 8. Premayogan, “Blockchain Military Applications: 2019 The Future Of Military Defense”, https://www. 19. Eliza Paul, “What is Digital Signature- How it pentoz.com/blockchain-military-applications/, works, Benefits, Objectives, Concept” written accessed on 11Aug 2019. on 12 September 2017, https://www.emptrust. 9. Husain. A,Bakhtiari .M, and Zainal. A, “Printed com//benefits-of-using-digital-signatures Document Integrity Verification Using Barcode,” accessed on 15 July 2019. Journal Teknologi, August 2014, pp. 99-106. 20. D. Cooper, RFC 5280 - Internet X.509 Public 10. Eldefrawy MH, K. Alghathbar K, and Khan MK, Key Infrastructure Certificate and Certificate “Hardcopy document authentication based Revocation List (CRL) Profile, https://tools.ietf. on public-key encryption and 2D barcodes,” org/html/rfc5280 , accessed on 10 July 2019 In Biometrics and Security Technologies IEEE 21. Denso-Wave, “About 2D Code” https://www. International Symposium, March 2012, pp. 77-81 qrcode.com/en/history/ accessed on 10 July 11. B. Karanjia, A. G. Karanth, S. Veerapaneni, S. 2019 Goswami, A. Sharma, and M. Boda, “Blockchain 22. Julian Brackins and Mengyu Qiao Department in the Public Sector – Transforming Government of Mathematics and Computer Science South Services through Exponential Technologies”, Dakota School of Mines and Technology “A Secure White Paper presented in MTECH 2018 organized QR Code Scheme”,http://www.micsymposium. by FICCI in association with Deloitte, January org/mics_2017_proceedings/docs/MICS_2017_ 2017. paper_32.pdf, accessed on 11 July 2019

167 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

23. I. Reed and G. Solomon. “Polynomial Codes Over on Advanced Computing and Communication Certain Finite Fields”, J Soc. INDUST. AL. MATH. Systems (ICACCS), 2017, pp. 1-5 Vol. 8, No. 2, June, 1960 pp:300– 304. 27. The crypto currency for payments, https:// 24. Yash R, Jainam B, Kavish G, Bhargav S, Chawan, litecoin.org/ accessed on 13 Aug 2019. “A Survey on File Storage & Retrieval using 28. Bank Chain is a community of banks, http:// Blockchain Technology”, International Research www.bankchaintech.com/ accessed on 13 Aug Journal of Engineering and Technology, Volume 2019 5, Oct 2018. 29. Blockchain’s potential in the energy sector, 25. Sankar, L. S., Sindhu, M., & Sethumadhavan, M, “Survey of Consensus Protocols on Blockchain https://www.energyweb.org/ accessed on 13 Applications”, 4th International Conference Aug 2019 on Advanced Computing and Communication 30. Praveen Jayachandran, “The difference between Systems (ICACCS), 2017, pp. 1-5 public and private blockchain”, https://www.ibm. 26. Sankar, L. S., Sindhu, M., & Sethumadhavan, M, com//blockchain/2017/05/the-difference- “Survey of Consensus Protocols on Blockchain between-public-and-private-blockchain, Applications”, 4th International Conference accessed on 13 Aug 2019.

168 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Technology for Standardization of Sensor Data from Legacy Heterogeneous Sensors in Tactical Surveillance Application for Joint Operations

Vandana1, Sanjay Motia2, Pradeep3 and Anoop Kumar Rai4 E-mial: [email protected], [email protected], [email protected], [email protected]

Abstract—

In any command and control system used for decision support, data is obtained from heterogeneous sensors, legacy sub systems as well as external systems residing at various echelons with different interfaces, formats to process information in the form of text, audio, video, image and intelligence reports gathered by recce. The processed information is disseminated to peer echelons as well as higher echelons and vice versa to get a complete tactical picture for planning and executing the offensive or defensive operations. This paper analyses the challenges involved and proposes a technology to standardize the information received from various sources after envisaging the various possible scenarios. 1. INTRODUCTION

1.1 complex, thereby making the development of higher echelon software systems complex and 1.2difficult to handle[7]. legacyDue to lowsensors maintenance, which ruggedizedhave already operations, lived high efficiency and accurate detection many on very old and outdated operating systems world tactical surveillance applications in In addition, the legacy sensor systems are built their useful life, are still being used in real- consumer(with no or systems very little such support as decision available) support which many developing countries. These sensor has limitations in integration with today’s Mostincludes of these legacy sensor radars, either electro have optictraditional (EO) devices, thermal imagers and many more. outor commandof them as and they control are initially system[8]. developed Some for of the legacy systems even don’t output any data sensorRS422/232 systems interfaces communicate or only on a the few messages support and their integration along with information wired/Ethernet interface. Generally, these standalone operations driven by the operators as defined in proprietary Interface Control sharing to any external system which was not Document (ICD) from original equipment these issues, there is an utmost requirement sensors systems vary in their communication envisaged at that time. To help in mitigating interfaces,(sensor) manufacturers commands and (OEMs). types Usually, of data these they of developing an integration utility or software sense, capture and communicate to external systemstechnology and novelty module and that dynamic acts asoperations a bridge of between the robustness and accuracy of old-age formatssystems. and The contents inherent of heterogeneity the different in legacy terms state of art technology driven consumer or end of OEMs[1], communication interfaces, data sensors makes their integration difficult and169 user systems. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

1.3 for many years for tactical surveillance thermal imagers and radars being utilized command and control systems, generally Furthermore, the recent decision support covers logical sensor interfacing via operator application in tactical domain. The technology veryexpect crucial standardized for the input integration data in a standardsoftware moduleformat liketo output NMEA standard or ASCII. data So itformat becomes for variousdriven configuration,important physical data and collection environmental (as text, messages, images defining information on andseamless development system integration requirements and of data sensor flow and for parameters under observation) preprocessing, necessary information sharing. The design system integration module, includes interfacing informationformat conversion captured to standardized from the legacy data sensorsformat. The standard data format includes necessary sensorvia interface data collection, configuration preprocessing, for both sensorsformat formatbundled makes into single these data sensor packet devices having and standard systems and respective communication interface[9], data frame format. The standardized data conversion for standardization data output/ accessible in a unified way making it easily packet built from processed inputs from such as command and control system or any integratable into any third party application 1.4heterogeneous sensors and systems. tactical decision support systems. technology is to develop a mechanism of data proposed mechanism of sensor integration and In view of the above, the purpose of this Figure 1 depicts the block diagram of the integration from legacy sensors such as EO, data standardization.

Legacy Sensor Integration Module

Fig. 1: Conceptual Diagram of the Proposed Technology of Legacy Sensor Integration

170 Technology for Standardization of Sensor Data from Legacy Heterogeneous Vol. 4 No. 1 2019 Sensors in Tactical Surveillance Application for Joint Operations

1.5 Diverse communication interfaces, commands and types of data as sensor A generic data dissemination technology for (c)

systems are from different OEMs/ acquisition of data, image and video has been only caters for data collection from state of art Vendors and have different ICDs/ proposed for joint operations. The technology No mechanism to take data out from Integration mechanism. sensor interfaces but doesn’t cater data format (d) conversion into a standardized data format[10]. Sensor system which is standalone in In addition, it doesn’t cover the data handling nature from operation point of view[2]. from message based legacy sensors whose (e) Non-standard output from legacy sensor interface requirements have been defined in system causing difficulties in integration standard output from sensor systems causes Different encoding schemes of output Interface Control Document (ICD). The non- with systems that requires standard inputs. (f) difficulties in interfacing as well as integration. 2.1.2 dataSummary from sensor of Scope/Key system. whereIntegration on one of end such there legacy are sensors legacy interfaces is one of Concepts in Proposed Solution andthe majordata communication challenge for mechanism sensor integrators and on the other hand third party consumer software communication interface (a) Configures the sensor system and data has capability only to accept data in standard encoding schemes. (b) Logical data integration from sensor system over configured communication The work is structured as follows: interface. Section 2: Challenges in integration of data. (c) Provision for data capturing from Section 3: Technology solutions. standalone legacy sensors via text and Section 4: Standardisation of data by format images. conversion. (d) Seamless data collection and command transfer over serial interfaces (RS 2. SectionCHALLENGES 5: Features and Technology. Data collection and command initiation 422/232) with error check and control. 2.1 (e) over Ethernet interface over standard solution for integration of data from legacy UDP/TCP communication protocols sensorsThe summary is as follows: of challenges and proposed (f) Integration of data over diverse communication interfaces, ICDs as 2.1.1 Summary of Challenges defined by different OEMs/Vendors (g) informationData extraction out of form sensor sensor system systems due where no mechanism to extract (a) Standalone legacy sensors with single operator use with no data output. someto system sensors limitation. systems to Fortake example,data out (b) Data flow through serial interfaces ofsometime them due no to mechanism standalone isnature defined from in (RS422/232) making data integration and processing complex and cumbersome. 171 operational point of view. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

transfer and handling for image as well (h) Data processing of text, images (e) The soft mechanism also handles file and message data to extract useful information for end use. as text files. (i) Protocol conversion and data bundling (f) The design of the integration software data format (j) Data packet formation into standardized utility is based on the sensor interface, their data types (stream, message, files) 3. PROPOSED TECHNOLOGY and, interaction capability with external system. 3.1 the software utility and the higher level (g) The communication interfaces between

In the proposed work, a technology for data external systems are classified into the serial, and ethernet. collection, pre-processing and storage is the software utility and high layer presented which collects the real-time sensor (h) The communication protocols between legacydata from interfaces legacy with sensors proprietary [RADAR, interface EO and thermal imager (TI)] operating on different application is based on SERIAL/UDP/ TCP/IP. and data communication protocols as defined the technology not only eases the end system (i) Once the software utility acquires all the by the respective OEMs. The employment of data variables, it converts the data into a standard NMEA data format (through application development but also improves the unit and protocol conversion) before quality of the decision support and real-time the proposed work are as follows: transferring to next higher level software monitoring [4]. The research contributions to contain a timestamp t which represents thesystem. sampled The time, data the transferred data value shallof a

(a) A soft mechanism (software utility) datafor data format collection, is presented pre-processing which supports and sensor at time t, the identification of the theformat common conversion interfaces into of standardizeddecades old 3.2 sensor.

sensors, instrument and systems. access primitives, which hides many The technology is governed by a software utility (b) detailsThe software of the utilityhardware provides and thus the uniformrelieves 3.3which Scenario-1 handles following real-world scenarios:

3.3.1 the developer from dealing with them. (c) forThe different soft mechanism consumers also cum offers data the analysisoutput data software, in a standard which NMEAcan facilitate format The proposed technology has the capability to extract data from sensors and systems which decadeseven do notold havesensor capability which todo output not give any direct data. integration with todays’ systems. The software utility which when loaded at the and systems which do not have direct (d) The software utility also handles sensors access. The architecture design of the software accessibility or that does not have any utility is depicted in figure 2 The steps involved in data integration[9] of these systems are: means to output data. 172 Technology for Standardization of Sensor Data from Legacy Heterogeneous Vol. 4 No. 1 2019 Sensors in Tactical Surveillance Application for Joint Operations

3.3.2 Software Utility at Sensor End retransmission of valid data packet in replacement of corrupted or erroneous

(a) On initialization configure itself as per continues till all the valid data packets the details in configuration data. data packets. This iterative process (b) Checks the health status of software are received by the software utility at isapplications used to atcheck both application ends (sensor health and consumer end. data consumer system). Periodic polling (f) technologyIf the sensor also and caters the consumer for conversion system of status. locationhas different data into geo-references, geographic coordinate then the (c) Validation of connection status over the configured interface. Periodic polling is system which is used universally. used to check health status. (g) The formatted data is stored in in local (d) Collects the image (as captured by the screen fordatabase formation or local of standard memory. data The format data from for operator via print screen command) of local database and memory is extracted

(e) Extracts the useful information from the usage in consumer system. Same process image file and forms a textual report of if utilized to take the data for sensors useful information. which do not give direct accessibility but (f) Sends both the text and image files 3.4 Scenario-2have ethernet interface. dataover packetsserial (RS232/422) with assigned interface checksum, after to thefragmentation similar software of both utility the files on intothe othersmall 3.4.1

3.3.3 endSoftware (consumer Utility software). at Consumer The proposed technology also collects data from Software End nosensors installation and systems or porting which of havesoftware capability utility tois output any data to external system. In this case data integration of these systems are: (a) On initialization configure itself as per required at sensor end. The steps involved in the details in configuration data similar to configuration details of software at (a) On initialization configure itself as per corresponding sensor end. interface the details in configuration data. (b) Receives the data stream on serial (b) Receives the data stream on configured interface (serial or ethernet) using (c) Checks for no of data packets, packet communication protocol (SERIAL/UDP/ number, missed, erroneous packets, the valid data packets to form the image TCP) (d) Validates the checksum and assemble (c) Checks for sensor type and data details and text file. (stream, messages, files) (d) If stream or data packets of file (image/ (e) toIn casesoftware the data utility packet at is sensorto be corrupted, end for negative acknowledgement is sent back text) is received then data startup word, end word and checksum is checked. 173 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

for formation of standard data format data from the data stream (i) If checksum is valid, then extracts for usage in consumer system. missed, erroneous packets, 4. FORMAT CONVERSION INTO (ii) no of data packets, packet number, STANDARDIZED DATA FORMAT

4.1 (iii) Stores the extracted data in local memory or local database After acquiring data from the sensors and packets gets received (iv) Process repeated until all the data systems[5], the software reorganizes the sensor form the data structure from stream (v) Assemble the valid data packets to data [6] and converts into the standard data format before transferring them. In the data and image/text file. standardization, an NMEA data frame format is processed and data is stored in local is designed which basically consists of start (e) If message is received, then message and end data attributes termed as preamble and termination bytes. The remaining part of database or memory the data frame contains three types of data, (1) (f) technologyIf the sensor also and caters the consumer for conversion system of Number of sensors, (2) sensor details (sensor locationhas different data into geo-references, geographic coordinate then the type, sensor name, sensor number) (3) sensor data details (type of data (ASCII, Message, File), (4) Sensor Data (stream, Message), (5) system which is used universally. Separator, (6) checksum. Table-1 describes (g) The formatted data is stored in in local each element of standard data format. The data database or local memory. The data from transmission rate is configurable (Default data local database and memory is extracted transmission rate is one second).

Fig. 2: Class Diagram of the Proposed Technology of Legacy Sensor Data Standardization

174 Technology for Standardization of Sensor Data from Legacy Heterogeneous Vol. 4 No. 1 2019 Sensors in Tactical Surveillance Application for Joint Operations

Table 2: Standardized Data Format for Data from Heterogeneous Legacy Sensors

Attribute Attribute Details

! Startup byte

No of Sensors separatorIndicates no of sensors to be integrated

#

Sensor ID-1 separatorSensor Identification No

#

Sensor Name-1 separatorName of the Sensor

#

Logical ID-1 separatorLogical ID of the Sensor

#

Sensor Type separatorType of Sensor (RADAR,EO, TI)

#

Output Accessibility separatorYes(1)/No(0)

#

File Availability separatorYes(1)/No(0)

#

File Type separatorImage(1)/Text(0)

#

Sensor data type separatorData stream(1), Message(2)

#

Sensor Data Payload separatorRefer Note-1

# ●● ●● ●●

175 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

separator Sensor ID-N Sensor Identification No # separator Sensor Name-N Name of the Sensor # separator Logical ID-N Logical ID of the Sensor # separator Sensor Type Type of Sensor (RADAR,EO, TI) # separator Output Accessibility Yes(1)/No(0) # separator File Availability Yes(1)/No(0) # separator File Type Image(1)/Text(0) # separator Sensor data type Data stream(1), Message(2) Data Details # Refer Note-1 # Separator Time Stamp Time stamping details (Date/Time) @ Checksum Checksum (CRC16) Note 1: Termination Byte Sensor Data Stream (Table 2)

Table 3: Data Stream Content of Standardized Data Format

Attribute Attribute Details 0x55No of data chunks Chunk startup byte Total number of small size data packets Max chunk size Max Size of chunk (200 byte) configurable Chunk Number-1 Identification No of chunk Current Chunk-1 Size Size of Current Chunk Chunk-1 Details ●Variable● ●● ●●

Chunk Number-1 Identification No of chunk Current Chunk-1 Size Size of Current Chunk Chunk-1 Details Variable Checksum Checksum (CRC16) 0xAA Termination Byte 176 Technology for Standardization of Sensor Data from Legacy Heterogeneous Vol. 4 No. 1 2019 Sensors in Tactical Surveillance Application for Joint Operations

Sensor Data Message (Table 2)

Table 4: Message Content of Standardized Data Format

NoAttribute of Messages Attribute Details

Total number of Messages as per ICD of Sensors

Message ID-1 Identification Number of Message

Message-1 Type Status(0), Location (1), Target (2), Characteristics(3)

Status Message(0), Location Message(1), Target Detection Message (2), Sensor Message-1 Name Characteristics Message (3), Command Message

Message-1 Size AsVariable per Message as per Message Type Message-1 Payload Details ●● ●● ●●

Message ID-N Identification Number of Message

Message-N Type Status(0), Location (1), Target (2), Characteristics(3)

Status Message(0), Location Message(1), Target Detection Message (2), Sensor Message-N Name Characteristics Message (3), Command Message

Message-N Size AsVariable per Message as per Message Type

Message-N Payload Details 5. SALIENT FEATURES OF THE speeds up the development and PROPOSED TECHNOLOGY

debugging process of the monitoring (a) The standard packet enables and decision support system. interoperability between systems for (d) The technology caters variety of joint operations. sensor and system interfaces (mostly acquisition from variety of legacy sensors (b) promotingIt offers a uniform seamless interface sensor forand the system data legacy instruments) with multiple communication protocol (SERIAL/UDP/ and decision support systems can share TCP) theintegration. data from Thus the same different data monitoringacquisition (e) Handles file format (Image/Text) mediaefficiently and withalso support optimum supports use of available sending bandwidth in wireless communication sensor and system. vice versa (c) The technology developed for data of text message to central agency and standardization not only drastically 177 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

REFERENCES delivery of status, location and target (f) informationMakes the from real-time sensors capturing and systems and 1. Aamir Shaikh and Siraj Pathan,Research on Wireless Sensor Network Technology, possible. International Journal of Information and Education Technology,Vol2,No 5,October 2012. (g) The technology also enhances the 2. Yaw Wen Kuo,Cho Long Li, Jheng Han Jhang, Sam andthroughput correction as packettechniques loss foris minimized receiving, ApplicationsLin ,Design of a wireless Sensor Network Based processingby handling and errors sending via the error information detection IoT Platform for Wide Area and Heterogeneous over serial interface in wired as well as 3. Akyildiz, Ian F., Tommaso Melodia, and Kaushik R. Chowdhury. “A survey on wireless multimedia sensor networks.” Computer networks 51.4 wireless communication media [3]. (2007): Pg. 921-960. (h) The latency required in these 4. Clark, Vern. Sea Power 21: Projecting decisive safeguarding systems of land is up-to joint capabilities. Department of The Navy Washington DC, 2002. one minute and thereby met as sensors 5. Ghataoura, Darminder S., John E. Mitchell, and transmit at one second. interface technology for wireless sensor of receiving data of entity which is George E. Matich. “Networking and application (i) This technical solution is capable network surveillance and monitoring.” IEEE from central agency to make equipment Communications Magazine 49.10 (2011): Pg. 90- movecontinuously from one moving. location It receivesto another input or 97. to make equipment track a particular 6. Ruzzelli, Antonio G., Gregory MP O’Hare, and Raja Jurdak. “MERLIN: Cross-layer integration of MAC and routing for low duty-cycle sensor networks.” 6. CONCLUSIONentity. Ad Hoc Networks 6.8 (2008): Pg. 1238-1257. 7. Pham, Tien, et al. “Intelligence, surveillance, and 6.1 reconnaissance fusion for coalition operations.” 2008 11th International Conference on Information Fusion. IEEE, 2008. 8. Freris, Nikolaos M., Hemant Kowshik, and P. R. higherThe technology end applications developed such acts as asmonitoring a bridge Kumar. “Fundamentals of large sensor networks: andbetween decision legacy support sensors/systems systems and as can well ease as Connectivity, capacity, clocks, and computation.” the overall system development in the light Proceedings of the IEEE 98.11 (2010): Pg. 1828- 1846. 9. Shah, Ghalib A., Weifa Liang, and Xiaojun Shen. “Cross-layer design for QoS support in wireless of numerous well proven, robust and efficient multimedia sensor networks.” 2010 IEEE Global fromlegacy diverse sensor sensors and systems. which can Furthermore, facilitate their it Telecommunications Conference GLOBECOM integrationintroduces standardizedwith current stateview ofof art collected monitoring data 2010. IEEE, 2010. 10. Pottie, Gregory J., and William J. Kaiser. “Wireless integrated network sensors.” Communications of and decision support systems. the ACM 43.5 (2000): Pg. 51-58.

178 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Private LTE Networks for Defence Critical Communications and Digital Defence 4.0

Philippe Agard*, Public Safety and Defence Segment Leader Nokia Networks, 7th Flr., Bldg. 9A, DLF Cyber City, Gurugram-122 002, Haryana, India E-mail: *[email protected]

Abstract—

Today, wireless networks play a major role in personnel mobility, ubiquitous communications and the expansion of the Industry 4.0 by enabling the exponential rise of connected objects which transmit data over the air. Armies and the Defense sector at large are following this trend and, as specific use cases here require increased control, security and resilience, private LTE has become an ideal technology for the digitalization of modern Defense organizations. In Defense, security, availability and resilience are stringent requirements that make WiFi and public LTE too weak in numerous situations. A direct control via Private LTE allows organizations to accustom the network to their own security policy, resources allocation, etc… Private LTE has therefore become a very attractive option for Defense organizations and this article discusses its benefits for the main use cases of interest and the relevant deployment models applicable. 1. INTRODUCTION

1.1 securityauthentication, network traffic architecture encryption) and ofdeploy the User, Control and Management planes, design

Among the many reasons why private LTE specific equipment (firewalls, military-grade encryptors, etc..) accordingly. highlighted:fits well the specific requirement of Defense 1.2.3 organization, the following are worth being 1.2 Better Control LTE is by design a standard that allows a 1.2.1 configurable Quality of Service (QoS) where parametersthe LTE Quality at multiple Class Identifiersprotocol layers; (QCIs) this are allowsmapped the onto network pre-configurable administrator sets to of assign nodal With a direct thumb on their own network infrastructure, a Defense organization gets a better control on security and network QoS characteristics (scheduling priority, packet 1.2.2engineering. delay, packet error loss rate, etc...) adapted to 1.3specific Coverage services/applications. & Capacity and roaming policies allows the network Controlling the subscribers database 1.3.1 users access according to custom strategies, whilstadministrator a direct to access regulate to andthe quicklyinfrastructure adjust As LTE technology was maturing over the past 10 years, manufacturers’ equipment permits to monitor the protection (nodes179 capabilities as regards compactness and radio : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

performance have improved, opening brand requirements, and better control the total cost new possibilities in terms of set up and use 2.of ownershipDEFENSE (TCO) MAIN of theUSE network. CASES andcases can for operate Defense in players. tens of Radiodifferent base frequency stations are now available in a wide range of form factors 2.1 National and Bases Coverage bands, offering radio coverage from 10’s to 2.1.1 hundreds of meters with pico-eNBs, up to more than 100 kms range with macro eNBs in specific cases. With data throughputs commonly in the Digital Transformation of Defense Forces range of 100’s of Mb/s, LTE has become the often starts with providing advanced ICT mobile broadband technology of choice for technologies and enabling ubiquitous, secured broadband communication mobility on the mobile use cases requiring high bandwidth Military compounds to reach the next level of such as video applications. Furthermore, its efficiency in the processes and productivity. low latency which can be as low as 10ms, Ability to do maintenance accessing manuals on enables true real-time applications which are tablets at bottom of aircraft, ability to connect essential to military forces in many cases (eg ships in the dock via radio connection ability for voice PTT/PTV applications) and will be to improve Perimeter protection by deploying even more when considering AR/VR-based 2.1.2rapidly several sensors LTE connected etc., 1.3.2wireless applications.

As military bases are generally large areas, The above are general characteristics that a wide zone must be covered and LTE is apply as well to LTE networks deployed by onideally licensed suited spectrum for both offers the coveragemore guarantee (indoor public operators, but a private network allows or outdoor) and the capacity issues. LTE being the Defense organization to optimize the design and deployment accordingly to their specific against interferences.

Fig. 1

180 Vol. 4 No. 1 2019 Private LTE Networks for Defence Critical Communications and Digital Defence 4.0 2.2 Naval LTE

2.2.1 communications on a vessel’s deck, inside the ship as well as around the ship. Adjusting radio shipcoverage for their accordingly, own communications naval groups canor for benefit ship The concept of using LTE for mobile broadband tofrom ship LTE communications, coverage as provided using almost by the standard master vesselscommunications when they inside are on military mission bases and cansailing be further extended to provide LTE coverage on and low altitude aircrafts, helicopters and UEs. Similarly, communications with low speed far away from their home base. With a compact equipment featuring a complete LTE network drones can be transmitted over such an LTE and embarked on a ship, an autonomous LTE bubble, significantly augmenting the projection bubble can be created to ensure broadband capability of naval forces.

Fig. 2

2.3 Tactical LTE 2.3.2

2.3.1 Military forces operating on the ground Light LTE solution do now emerge to address moving LTE tactical bubble or man-carried LTE bubble such as in a backpack. There is no one need to enable more advanced situational high compactness are qualities required when thesize lower fits all the solution, requirements but the in generallyterms of coverage the use awareness. Extreme mobility, low weight and cases are such that the smaller the size needed, dealing with tactical use cases. Transportable and capacity. LTE technology compactness, equipment is in most cases enough to enable hardeneduse of virtualization, to operate in tough makes conditions it possible small to the setup of temporary camps or for at-the-halt package equipment in a medium-sized rack data, voice and video communications. 181 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 3

enough to fit into vehicles, with the option of assets via satellite or microwave backhaul in an using telescoping masts for extending radio ad-hoc2.4 IoT manner, & Defense as use case4.0 dictates. coverage at the halt. Combining Pico or micro 2.4.1 eNBs with compact servers running LTE core allows to get very small configurations that can be hand-carried or even fit within Since a few years the number of connected a backpack. Such setups can provide several objects has grown exponentially to reach billions 100’s of meters coverage for 10’s to 100’s of of devices, and the scope of Internet of Things LTE users depending on the applications and (IoT) and analytics applications has expanded characteristics of the equipment. These tactical drastically in all sectors, creating new business bubbles can be connected to remote military opportunities referred to as the Industry 4.0.

Fig. 4

182 Vol. 4 No. 1 2019 Private LTE Networks for Defence Critical Communications and Digital Defence 4.0

Fig. 5 2.4.2

14 and beyond bring additional capabilities for large-scale IoT and further IoT management otherIn the sectors Defense such 4.0 as IoT assets, spawns wastes, from energy, back- optimizations. All in all, the LTE all-IP managementoffice and logistic and predictive applications maintenance, like those to in architecture makes it perfectly suited for IoT and can scale from narrowband highly efficient tactical ones like collaborative assisted combat, power consumption IoT applications up to swarm robots monitoring, unmanned vehicles ultra-high data rates for high-performance and mass IoT services. 2.4.3remote control, etc… 3. SPECTRUM CONSIDERATION 3.1 Smart bases perfectly illustrate the Defense 4.0 trend; they integrate all digital applications convenience of the managed assets and services Originally, LTE is a technology designed to that improve the performance, efficiency, and operate in licensed spectrum. As was the case with the previous mobile technologies (GSM, of military premises and operations. 2.4.4 UMTS, CDMA), it has been deployed over the years by mobile service operators (MSPs) approachwho have isacquired the superior spectrum quality licenses of service by their that The release 13 of the LTE standard introduced local regulator. An inherent benefit of this narrowband mechanisms optimizing IoT, namely LTE-M/eMTC and NB-IoT, and releases183 can be expected from the use of dedicated and : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 players have spectrum that does match an unshared chunks of spectrum. Most defense example Navy needed to operate their LTE network while in a foreign harbor. Multe Fire theexisting corresponding standardized 3GPPequipment band. Inecosystem few cases radio equipment is progressively becoming though, it may not be standard spectrum and 4.available DEPLOYMENT from the main MODELS LTE manufacturers. may not exist yet. Based on the consideration 4.1 that spectrum is a scarce resource, that LTE wirelessadoption’s technologies exponential operatinggrowth is furtherin unlicensed fueling spectrumthe need forhave spectrum, tremendous and success that short-range too, the Public Safety and Defense forces have at least one thing in common: they need reliable and resilient communications systems. The idea of operating LTE in unlicensed bands has approach might be different though with the emerged. Different modes exist (LTE-U/LAA- growing interest of public safety players in eLAA/LWA-eLWA) to combine unlicensed with leveraging existing homeland MSP networks, licensed spectrum and have been deployed by in a try to secure access to LTE anywhere they various operators around the globe to bring go while also optimizing their budgets (RAN more capacity to their LTE service. Multe Fire sharing with owned PS core, or fully relying on newtechnology perspectives has been to players developed not owning to operate any MSP networks). Most often complementing this LTE entirely in an unlicensed band, opening capability with their own LTE deployable gear to cope with critical situations (disasters or spectrum or for some specific use cases as for overload of legacy operated networks).

Fig. 6

184 Vol. 4 No. 1 2019 Private LTE Networks for Defence Critical Communications and Digital Defence 4.0 4.2 Defense players have even more stringent the utmost security and confidentiality during requirements as regarding privacy and 5.all theCONCLUSION duration of a mission. confidentiality. Because communication links 5.1 to the external world create by nature a risk for security (e.g., data breaches, eavesdropping or hacking), private LTE networks have become LTE is gaining grounds as a future proof Mission 4.3their favorite approach. Critical Broadband solution in Public Safety, Homeland Security and Defense use cases. The standardization by 3GPP started in 2013 Solutions like Nokia NDAC (Nokia Digital networkswith key features scenarios like like Mission national Critical coverage, Services and Automation Cloud) have been designed to has enabled roll outs for fixed territorial address such pLTE configurations more effectively. Simple to deploy and operate, NDAC servicesdeployable/transportable complementing proprietaryversions are military now in allows to mix a full range of radio eNBs with use in some armies for “tactical” broadband various LTE core (ePC) configurations running on compact servers (DA edge) together with radio. 5G availability makes a 3GPP based applications, to best serve the target use case. solution even more attractive, with ability to pLTE networks can be small tactical bubbles, plan later updates and address next stage of LTE networks for temporary camps or a large extreme latency requirements (<1ms), extreme LTE network for the coverage of a military Mobile Broadband (~Gbs or more depending commonbase. All data pLTE center networks located can in be the coordinated cloud and on spectrum available) as well as enabling to and configured via remote backhaul link to a REFERENCEScater for very large number of IOT devices. autonomousfully owned and and managed data communications by defense authorities. remain When configured, all pLTE networks are fully 1. https://www.nokia.com/networks/solutions/ private-lte/ within the pLTE created network, thus ensuring 2. https://www.3gpp.org/

185 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Communication as a Decisive Catalyst for Jointness

Lt Col Prabhmeet Singh Manik, SM

Abstract—

There is growing understanding among the military planners that human warfare is entering the stage of Information Warfare (IW). The concept of jointness among various organisations has become widespread in recent decades in Defense and civilian establishments and represents change in organizations’ modes of activity in complex and challenging environments. Jointness occurs in environments characterized by networks, that is, by numerous connections between the various establishments and organizations. Communication plays an important and vital role for jointness among various organizations and is a decisive catalyst to produce an effective response to the threats and challenges in all present and future warfares. 1. INTRODUCTION and is a decisive catalyst to produce an effective response to the threats and challenges in all 1.1 the technological and operational concepts present and future warfares. Needless to The Revolution in Military Affairs mainly to emphasis that Revolution in Military Affairs (RMA) cannot occur substantively unless has resulted in Militaries of major countries to it is accompanied by a joint and integrated rapidrespond development and identify in latest high technologies technology towith be approach backed by a vigorous and robust incorporated in its study. RMA has identified 2.communication AIM plan. 2.1 changesInformation in the Technology military field (IT) as a at strategic its core and as the means to bring about revolutionary

The aim of this paper is to study the impact militaryoperational planners necessity that to meethuman the warfare challenge. is There is growing understanding among the of Communication as a Decisive Catalyst for 3.Jointness SCOPE in Military Operations. entering the stage of Information Warfare 3.1 (IW). The concept of jointness among various organisations has become widespread in recent decades in Defense and civilian establishments four parts: The scope of this study is covered in following and represents change in organizations’ anmodes organisation of activity in in which complex elements and challenging of more environments. Jointness signifies activity or (a) Operational view of Jointness Impacting Communications. than one service participates. Jointness occurs (b) Reforms in Military Affairs & in environments characterized by networks, Communication for Joint Operations. that is, by numerous connections between (c) Technologies and Aspects Enabling the various establishments and organizations. Jointness. Communication plays an important and vital (d) The Joint Spectrum: From Non-Joint to role for jointness among various organizations186 Joint Armed Forces Vol. 4 No. 1 2019 Communication as a Decisive Catalyst for Jointness 4. OPERATIONAL VIEW OF JOINTNESS IMPACTING COMMUNICATIONS Hence, India requires a different warfare articulateapproach altogether.its operational A time philosophy frame needs through to be 4.1 indicated on where to invest. Military needs to widespread in recent decades in Defense, technologicalthese documents changes more that explicitly are necessary and bring in The concept of jointness, which has become about forceful jointness. The importance of intelligence and civilian establishments, warfare are required to be included in the represents change in organizations’ modes Joint Doctrine of Warfare wherein Information of activity in complex and challenging Technology and Modern Communication environments. Jointness occurs in plays a critical role as a decisive catalyst for Techniques incorporated in all three services environments characterized Jointness is bydifferent networks, from that is, by numerous connections between Jointness in warfare. the various actors. 4.3 Cooperation wherein later preserves the Communication as Catalyst for Jointness however,distinct organizationalis a process of frameworks,fusion that creates their powers and areas of responsibility. Jointness, . synergy that is greater than the sum of all The future war systems are likely to be new organizational configurations and a optionsdominated for military by unmanned applications systems for a instrategic, which operationalArtificial Intelligence and tactical (AI) canlevel provide planning multiple in whichthe existing elements capabilities. of more Thethan wordone service “joint” signifies any activity or an organisation in autonomous unmanned systems, data analysis, informationmany of the functionsprocessing such and as Intelligent intelligence and participates. Jointness was a term coined by armsthe US in armedthe military forces coordinated to describe intertowards service one cooperation. It’s a combination of at least two analysis, training war gaming, etc. Three principles of war, namely, Inter-Service common goal. To coordinate among various cooperation, Economy of Effort and Unity in command and control(C2) would continue arms and organizations, communication plays to be key imperatives of knowledge age an important catalyst for jointness. 4.2 warfare. The campaigns of Gulf War I and II has indicated that greater degree of jointness and integration achieved by the American optimalFundamentally utilisation as of the resources nature and of that warfare will networkedand coalition command forces was and a key control battle elements winning dictateevolves, various jointness requirements is about efficiencyin terms andof factor. Further, improved ISR capabilities, optimisation of force structures, acquisition processes, training methodologies and research with long-range precision strikes are best exploited by a joint and integrated effort of the three Services. Whether it is Network-Centric & development on strategic capabilities is Warfare (NCW), Effect-Based Operations (EBO) strong. If that is the governing factors then or information Needless warfare (IW),to emphasis the synergies that the starting point of a joint doctrine should be at operational level are best obtained by a based on operational philosophy. The nature of unified effort. war in India is different from any other nation Revolution in Military Affairs (RMA) cannot because of the simple difference of terrain.187 occur substantively unless it is accompanied by : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

has allowed force structures and systems a joint and integrated approach backed up by (b) The second perspective is that the RMA a robust communication plan with integrated 4.4network among various organizations. to become more streamlined. This has been possible through rightsizing and readjusting force structures leading to The evolution of the joint doctrine could not force optimization with stronger combat have been but influenced by the fundamental capabilities. elements of RMA. RMA emphasize the need (c) andThird, control a consequent(C2) systems, result of which above for jointness, even though in practice, the havehas beenincrementally automation moved of command from torequired have advanced levels in of technology jointness in areservices lacking. like Further, comparatively speaking, RMA seems (C3I) Command, Control, Communication Indian Air Force (IAF) and Indian Navy (IN) as and Intelligence (c4I), to Command, 5.compared REFORMS to the INIndian MILITARY Army (IA). AFFAIRS Control, Communications, Computers AND COMMUNICATION FOR JOINT and Intelligence , Command, OPERATIONS Control, CommunicationC4 ISR) and now and Computers, Intelligence, Surveillance 5.1 and Reconnaissance ( Command, Control, Communication and (C4I2SR)Computers, in order Intelligence, to meet Information,the demand mainlyMilitaries to ofthe major technological states are respondingand operational to the Surveillance and Reconnaissance Revolution in Military Affairs (RMA) debate, for real time, robust, reliable and growing understanding among the military efficient command and control systems. plannersconcepts that propounded human warfare by the is US.entering There the is of warfare, from traditional three (d) Fourth this has led to spatial expansion dimensional that includes in addition, the stage of Information Warfare (IW). The essence dimensions, i.e., land, sea, and air, to five of this shift is provided by the revolution in information technology in the field of warfare whospatial controls and electromagnetic the information dimensions. will gain 5.2backed by a robust communication setup. Implication of above is that anybody Features of Revolution in Military Affairs the initiative in high tech battlefield. . (e) orientedFinally, requiring and most not only importantly, a high RMA is not only an important military, but operations are becoming more system- also a political and strategic tool for global integrated application of power in all and regional security policies of the future. degree of system integration but the RMA has five distinctive features. transformed into completed operations five dimensions leading to warfare being (a) inFirst, precision weapons guided and long equipment distance attacks have arebecome increasingly more intelligent playing aoriented, critical rolewhere in increasingly impacting on the need for of system versus systems. This is

operations as main form of attack. integration and jointness. 188 Vol. 4 No. 1 2019 Communication as a Decisive Catalyst for Jointness 5.3 Jointmanship & Integration Among conceptThis is becauseof information proper usesuperiority of information leads Agencies is as lethal as other kinds of power. Further, emerging technological environment that . It is in this fast changing and consideredus to attainment as important of decision as sea, superiority. land and India has to come up with reasonable response Information operations are increasingly be to the latest RMA. The underlying perception in India is that response of necessity to toair psychological operations. The operations Information to Operationscomputer the RMA debate will be structured taking (IO) could vary from physical destruction into account not only the changing global military trends but also its regional security net work defense. Well conducted joint information operations with new RMA toenvironment. incrementally The deal fact with that technologically given close collusive relationship with China we will have technologies, improved organizations and doctrine would greatly contribute to a with improved information, surveillance, advanced military Pakistani military 6.successful TECHNOLOGIES and decisive AND outcome. ASPECTS command and control elements with long ENABLING JOINTNESS rangereconnaissance precision (ISR) fires capabilities, and greater networked degree 6.1 of system integration. In such a milieu, jointmanship and integration among the technologyThe benefit ofis thelikely development to provide of a technologies mechanism Indian Armed Forces and other defence forenabling armed joint forces military to interact activities and reach is that a deepersuch a support agencies would be the two major leitmotifs of RMA under Indian conditions to 5.4meet the challenges to our security. understanding of the nature of jointness for its importance and implementation. From this deeper understanding, guidance may be and converting it into intelligence is derived to enable the more effective conduct fundamentalNeed of Joint toEfforts good. Gainingplanning of andinformation success of joint military activities. In the contemporary military context joint is defined as ‘activities, firepower of modern weapon platforms in operations. The long- range precision operations and organizations in which whichelements refers of atto leastarmies, two navies, services air participate’.forces and would be of no use without information and The key word in this definition is ‘services’, assets;intelligence. without In factthese instruments eyes and ofears military they power derive their power from their ISR other paramilitary organizations including CRPF, ITBP, Coast Guards, etc. The definition would be powerless. Attaining information of joint is service-centric and is not based on superiority has become one of the most environmental mediums or domains (land, ofimportant information objectives superiority to be achieved is somewhat in the sea, air, space, etc.), therefore it determines analogousera of knowledge to similar age warfare. concepts The conceptof air whetherthat jointness their isactivities institutional, are taking being place based in on a cooperation between services regardless of superiority, superiority at sea or in space. single domain or in many domains. 189 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

6.2 integration has occurred in areas where each of the services. Often organisational Accordingly, the term ‘joint military activities’ include joint military campaigns and trainingthere had and previously personnel been agencies duplication are within different services – logistics, operations, in both warlike and non-warlike conditions. These endeavours include the establishment and perpetuation of peacetime integrationtypical areas of where elements joint organisationalof the higher structures have been established. The militaryjoint organisational education and training structures courses within and the an command arrangements of each service armed force, the conduct of joint professional has also occurred in some militaries as an additional way to develop a more 6.3production of joint doctrine. The Four Aspects of Jointness operationalcohesive joint and organisational command structure. aspects The key difference between the . The four organisational, educational and doctrinal not directly operational, even though aspects. of jointness are the operational, of jointness is that the latter aspect is Operational have indirect implications for the joint organisational reforms frequently (a) directly with . the The conduct operational of campaigns aspect andis the operations aspect involving of jointness more concerned than one conduct of campaigns and operations. For the purposes of subsequent analysis, forces have traditionally worked together the line between the operational and service. When armies, navies and air campaignsorganisational and operations, aspects ofand jointnessdeclared is drawn between forces conducting it has generally been in the pursuit of Educational campaign or operational objectives. ‘operational headquarters’. educational Such cooperation has traditionally (c) . The third aspect of been limited to ad hoc and short term jointness is . To cultivate arrangements driven by operational hasfledgling typically joint cultures,accompanied the establishment the move imperatives, and joint command and of joint military education institutions control arrangements have usually been established from scratch with the onset Organisational to jointness. This is especially the case of each new campaign or operation. organisational aspect, regarding mid-level and senior officer (b) . The second aspect of amalgamatingeducation. Sometimes previously joint separate education single jointness is the institutions have been established by which involves the establishment of hasjoint a organisationalmuch more recent structures lineage that than are service institutions. The Joint Service not directly operational. This aspect Command and Staff College opened by the British armed forces in 1997 is a underthe operational the remit aspect of this and aspect most have joint good example of such an amalgamation. reforms that could be assessed as falling measuresDuring the earlywere 1990staken joint to institutionsencourage were given an expanded role and occurred. Generally these reforms have been achieved by integrating, to various members of each service to enrol in their extents, formerly separate elements of190 courses. Additional reforms were also Vol. 4 No. 1 2019 Communication as a Decisive Catalyst for Jointness implemented to encourage single service 7. THE JOINT SPECTRUM: FROM NON- educational institutions to change their JOINT TO JOINT ARMED FORCES curriculums to include a greater focus 7.1 All of these reforms are elements of the on the joint components of operations. operational, organisational, educational and Considering jointness using the four aspects—

educationalDoctrinal aspect of jointness. doctrinal—enables a determination to be made the development and proliferation of as to what constitutes a fully-joint military, a (d) . The doctrinal aspect involves partly-joint military and a non-joint military. in most Western militaries from the early If each aspect is imagined on a spectrum, the joint doctrine, something that occurred progressionabsence of eachtowards aspect achieving from an each armed aspect force would be at one end and the maximum possible 1990s. Due to the prominent operational integration—the pointwould beat atwhich the other. individual This theoretical services maximumcease to focus that characterised post-Gulf War is just before the point of jointness, joint operational doctrine has been (and continues to be) the most allexist domains and are replaced by a single, amalgamated tactical doctrine usually remaining prominent type of joint doctrine, with andservice the thatrelative is responsible position and for characteristics all operations inof . Figure below shows this spectrum,

within the purview of single services. a ‘non-joint’ force and a ‘very joint’ force. Armed Often, the production of doctrine itself forces that could be described in a similar way has coincided with the establishment to the description given at the very joint end of either as a separate organisation or as of a joint doctrine development centre, the spectrum could be said to be ‘more joint’ than those that could be better described in a similar way to the description given at the non- part of an existing joint organization. joint end of the spectrum.

Fig. 1: The Aspects of Jointness Imagined as a Spectrum, Showing the Relative Position and Characteristics of a Non-joint Force and a Joint Force

191 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

7.2

guidance may in turn be derived to enable the more effective conduct of future joint military The descriptions of the non-joint force and the activities. Yet despite ongoing and significant very joint force highlight that the very joint joint reforms within most Western militaries force has several advantages over the non- scale while reducing organisational costs, and since the late 1980s, and the conduct of detailed joint force in terms of enhanced economies of historical studies of joint military operations, and doctrine that perpetuates and enhances joint military activities theory has remained in creating a ‘joint language’ through education and win in its own distinct domain; even though therean embryonic are several state. points Each where service these exists domains to fight a culture of joint operational success over the and therefore the operational requirements longer term. Furthermore, by applying the four aspects and the spectrum itself, one can begin of each service overlap. The aim of jointness to evaluate the jointness or otherwise of a ought to be to maximize the chances of success 8.country’s CONCLUSION armed forces. by fostering cooperation, creating efficiencies and capturing then implementing inter-service 8.1 lessons learned. To coordinate among various As operations during the last century have arms and organizations, communication plays shown, Western militaries are more effective REFERENCESan important catalyst for jointness. when their services achieve high levels of

1. Achieving ‘jointness’ among Indian Armed Forces (2017) by Observer Research Foundation, Delhi joint cooperation. The development of a (www.orfonline.org). providetheory ofa jointmechanism military for activities these armed is therefore forces 2. Jointness-A-Journal-on-Intelligence- Methodology-Issue-No.-1-May-2017 toimportant reach a deeper because understanding such a theory of isthe likely nature to 3. The Four Aspects of Joint- A Model for Comparatively Evaluating the Extent of Jointness in Armed Forces of jointness, why it is important and how to 4. www.idsa.in – RMA and Jointness by Institute of implement it. From this deeper understanding Defence studies and Analysis.

192 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Machine Type Communication & Internet of Everything (IoE)

Col Rajesh Kapoor

Abstract—

This paper provides an overview of the development and possible use-case scenarios of the new generation of mobile communication systems known as Next Generation Mobile Network (NGMN). 5G will become a chronology platform that will enable the development of new applications, business models, industries, such as massive machine-type communications. This will be possible primarily through the creation of acceptable ecosystem that could provide a massive machine-type communication using a single platform based on the Internet of Things (IoT) concept. NGMN enables the integration of all so far known and used machine-type communications, creating an environment of smart cities and a fully networked society under the new concept of Internet of Everything (IoE). However, such network also poses specific performance requirements reflected through higher transmission speeds, higher data volumes, reduced energy consumption, higher quality of service and growth in the number of services and users of currently deployed mobile generation. 1. INTRODUCTION

1.1 environment and a fully networked society by simple increasing the number of networked millions,machines. and Currently, the annual total growth number rate is around of all existing networked machines is hundreds of importantNowadays, factor mobile in economic communications development have and a significant impact on the society and are an 25%. As a result, it is expected that by 2020 computerization of society. After a number of the total number of networked machines generations and the current commercialization (equipment, vehicles, goods, etc.) will reach of 4G mobile communication systems (MCS) it 50 billion. Therefore, network operators will is expected that the upcoming 5G is going to be able to expand their business activities, be operable by 2020. Up to this period, 5G is hasservice a high portfolios potential and forincrease the development revenues. This of emerging as one of the main fields of research technology, combined with the existing ones, 1.2and development. 2.future 5G applications. MOBILE COMMUNICATION SYSTEMS The goal is to consolidate all so far known and 2.1 used machine-type communications (MTC, onMachine the idea Type that machines Communication) have a growing through value a single infrastructure. MTC technology is based With every new MCS generation, it was possible to experience two times higher speeds of data proportional to the number of the networked requirementstransfer than itare was the in theincrease previous of data generation. speeds units. This would result in the concept of IoE In NGMN system, i.e. 5G MCS, one of the main and the possibility of creating a smart cities 193 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3. PERSPECTIVES TOWARDS MASSIVE MACHINE-TYPE COMMUNICATIONS and capacity with the significant reduction of AND 5G latency level. The integration of new services and applications is just as important as 3.1 thatincreasing uses itsthe architecturespeed of data and transfer functionalities and / or reducing the level of latency. 5G will be the MCS 5G MCS will enable a complete implementation to enable the full implementation of services of the IoT concept, along with the advance of based on the IoT concept. This will result with all machine-type communications through a completely new communications between a single infrastructure. Although most of the different types of machines (M2M, D2D, V2V, applications (such as M2M) transmit a small etc.) regardless of whether they’re mobile, far volume of data between end-devices it is apart or interconnected with different IC access predicted that a number of these new end- 2.2technologies. devices in the next few years will reach up to 50 With the advent of new services and the billion. As a result, this will make maintenance and planning of today’s telecommunications terminalnetworks devices expensive will and increase complicated. the volume During of increase of the number of terminal devices, the same period, an increase in the number of 5G MCS will increase the range of access requests for a mobile connection to the 4.generated INTERNET data traffic OF THINGS up to ten times.(IoT) Internet network (MBB, Mobile Broadband). rangeRequired starts transmission from a very speedslow level vary for sensor based 4.1 systemson the volumeto very ofhigh the level transferable for the transfer data. The of

IoT is the concept of the information and Ultra High Definition (UHD) video files. These communication network, where objects requirements are reflected in the expected (“things”) from diverse environments are level of latency that will have to be low, as for mutual connected into a single large-scale security applications (emergency services, network based on the Internet Protocol (IP). e-call about a car accident, alarm systems As a result, all these connected objects are e-maintenance, etc.). However, there will also environmentspart of a single such converged as smart ecosystem.homes, roads, The varybe services from smalland applications to large, depending that will be whether latency IoT is the basis for the development of smart agnostic. In addition, the size of the packets will 4.2factories, cities, etc. it’s a smartphone applications or file transfer 2.3application, respectively. IoT consists of smart machines interacting access to a wide array of services and software with other machines, objects, things, MCS 5G will enable ubiquitous provisioning of environment and infrastructure. Therefore, on daily routines, thus allowing continuous M2M communication it’s often associated with solutions. As a result, this will have an impact MTC IoT concept, which is the integral part of today’s IoT concept. The common characteristic progress of the overall society with a significant of IoT and M2M concepts is the remote device reduction in energy consumption. access. IoT connects the computer with the 194 Vol. 4 No. 1 2019 Machine Type Communication & Internet of Everything (IoE) 5.3 systems,things (machines, analytical devices,systems, sensors,data warehouses, products, etc.), systems (business applications, support There is extraordinary potential of the IoE concept. 99.4% of physical objects that will one control systems, etc.),and people (customers, day be a part of the IoE concept aren’t currently 4.3employees, partners and customers). interconnected. Not only that these objects (things) do not make the connection, but they thataren’t would even aresult part ofwith the the IoT interconnection world. This is primarily because there are no such services productivity,IoT usually integratesservice, and the increase sensor production data with analytics and business applications to improve of these devices. Connection of the objects that accompany the implementation of will most commonly be performed through and market share.Some of the main challenges 5G MCS with the use of full communication and trust, managing heterogeneity, limited functionality of machines such as the MMC, networkthe IoT capacity, concept managing include security,large amounts privacy of People to Machine communications (P2M), information and processing large amounts of 6.V2V, MASSIVE direct D2D MACHINE-TYPE (dD2D), etc. COMMUNICATION data in order to provide useful information / 6.1 services and enable the efficient regulatory policy in the field of IoT. 5. INTERNET OF EVERYTHING (IoE) Through the IoE concept, MMC communication 5.1 will enable the connection of tens of billions of IP-based devices through 5G MCS. For example, an5G willimpact be a onsystematic smart networked part of the Smarthouseholds, Cities In contrast to IoT, IoE includes interconnection in which 5G services and applications will have of people, objects, things, data and processes. IoT will reach its full potential during the next smart/intelligent vehicles, tele surgery, fun, five years. In fact, IoT concept is a transitional and time-critical applications that require an technology. On the other hand, IoE concept 6.2immediate reaction. encompasses a number of technologies 5.2including the IoT as a transitional technology. MMC concept includes a set of radio ICT and techniques, thus enabling the expected growth The usefulness of IoE will result from the impact technologiesrate in the numberare divided of terminalinto three devicestypes: and related services and applications. These access createobtained new by interconnecting opportunities people, for processes,providing and data over IP network. IoE concept will (a) Direct access. services to various individuals, organizations, (b) Terminal devices connect and communities and countries. communicate via direct access.

195 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

(c) Node, Aggregation point access and MTC communication within the IoE ecosystem. With 7. DIRECTcommunication DEVICE between TO DEVICE devices. the development and implementation of 5G, COMMUNICATION several V2V requirements will be met, such as low latency of 1ms, default 99.999% reliability 7.1 of communications, high availability and 8.dependability CONCLUSION and low failure rates. 8.1 tendThe MMCtoward communication the creation of and a fully the supportingnetworked IoT / IoE services provided via 5G platform will present an insight into future developments, The main objective of this paper was to and connected society. In a fully connected ecosystem enabled by 5G, the important role possible implementation and key features of will play the ability to connect objects via D2D, the massive machine-type communication & i.e. dD2D technology. D2D communication Internet of Everything (IoE) by introducing 5G. is implemented within the 4G MCS but it’s It is expected that in the next five years, mobile not widely operable, mainly because of its networks are going to experience a significant still limiting performance (level of latency, change compared to the current state. MTC capacity, data rate, the level of confidence, etc). Consequently, D2D will not become a part technologies such as M2M, D2D and V2V are of everyday operable technologies primarily becoming a reality and an everyday need because due to these limitations when themthrough to communicate the concept of directly IoT. Communication with and without of compared with its direct competitor - V2V all these things through the IoT concept allows solutions based on VANET (Vehicular Ad-Hoc 7.2Networks) technology. human intervention. IoE concept will bring a significant change for the society. It will change disadvantages, they are developed for the the way people live and contribute to the higher Although the VANET solutions have their REFERENCESquality of life. specific environment and their usability in V2V J. Comput. Netw. communication is currently more prominent. 1. L. Atzori A. Iera, and G. Morabito, “The Internet of However, the concept of NGMN and earlier NGN Things: A survey,” , vol. 54, no. 15, pp. 2787–2805, 2010. (Next Generation Network) system are designed 2. ITU, “World telecommunications/ICT indicators for all-IP communication via single infrastructure. database,” Int. Telecommun. Union, Tech. Rep., This will result with the convergence between Dahlmanet al. Dec. 2014. IEEE Commun. Mag. different access and transmission technologies. 3. , “5G wireless access: Requirements Unlike the original D2D concept, dD2D will and realization,” , vol. 52, no. allow the planning and implementation of V2V 12, pp. 42–45, Dec. 2014.

196 Vol. 4 No. 1 2019 Joint Framework for Integrating Disparate Security Solutions Joint Framework for Integrating Disparate Security Solutions

Col Munish Tuli and Lt Col Aashish Joon

Abstract—

Presently all three services have deployed their own network security solutions on respective captive data networks. These security solutions are from different OEMs and therefore integrating them in a joint tri-services network environment is a challenging task. In this paper, we have analysed various challenges in integrating disparate security solutions include SIEM, IAM, PKI, DC, Patch Management and Anti-Malware and proposed a joint security framework for integrated tri- services network. 1. INTRODUCTION 2.2 Different Policies

1.1 2.2.1 All three services have different information security policies and to achieve security Today all three services have established their cohesiveness aligning them towards a common own SOCs with disparate network security solutions on their captive data networks. Each service has deployed diversified security objective needs to be carefully planned. solutions of SIEM, IAM, PKI, Domain Controllers, Therefore, standardization of security policies Patch Management and Anti-Malware to is essential while integrating security solutions. strengthen cyber security posture of its data 2.3 Different Use Case network. Since, these security solutions are from different OEMs, amalgamation of varied 2.3.1 security solutions forms a formidable task. All three services have different operating Therefore, there is a need to formulate a environments and accordingly security analysts joint cyber security framework to achieve an 2.integrated INTEGRATION tri-services OF network SECURITY environment. SOLUTIONS: CHALLENGES have defined specific use cases for each service 3.while JOINT implementing FRAMEWORK security solutions.FOR 2.1 Different OEMs INTEGRATING SECURITY 2.1.1 SOLUTIONS 3.1 each service to deploy security solutions of Different vendors have been contracted by

IAM, SIEM, PKI, Domain Controller, Patch In this section we will analyse security solutions Management and Anti-Malware. Therefore, deployed by the three services and propose provision of interoperability between solutions a joint security framework in an integrated of all three services was not initially conceived. tri-services network environment. 197 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3.2 Security Information and Event appropriate response steps and actions against Management (SIEM) 3.2.1 various cyber threats. This ensures all alerts are responded to while freeing up valuable various security and networking devices and analyst time. It is recommended that SOAR correlatesSIEM aggregates them to logs provide and events near datareal fromtime solution be layered on top of the SIEM solutions detection, reporting and monitoring of security of respective services. The SOAR platform at the tri-services level will manage incident response process to each alert generated by threats in a network. Since SIEM solutions of SIEMs of each service to create a more robust, the three services have been implemented efficient and responsive Unified SOC. 3.3 Public Key Cryptography (PKI) separately, it is proposed to establish a Unified SOC wherein outputs from SIEMs of 3.3.1 three services will be integrated to provide security monitoring at the tri-services level. To achieve Unified SOC would involve overcoming PKI is an Asymmetric Key Cryptography technical challenges in integrating SIEM framework that is responsible for issue, solutions of different OEMs. Though partial maintenance and revocation of public key integration may be feasible by integrating SIEM certificates over the network thereby providing to identities solutions of same OEMs to achieve a distributed confidentiality, authentication, integrity SIEM architecture, full integration may not be and non-repudiation services 3.2.2feasible Security at SIEM level. Orchestration of individuals, organizations and computer Automation and Response (SOAR) 3.3.2systems operating in a network. 3.2.2.1

trustIn a strict anchor CA forhierarchy all relying all trust parties emanates within from that SOAR platforms enhance response capabilities a common root CA. That is, the root CA is the of SIEM. SIEM identifies potential anomalous deployed, relying parties will not rely on any activities and generates corresponding alerts. domain. Although subordinate CAs may be But SIEM needs regular tuning to understand and differentiate between anomalous and certificates issued by a subordinate CA unless a normal activity thus considerable amount valid certificate path can be traced back to the root CA. A strict hierarchy is also characterized notof timeeffective is utilized and requires in making support the of tool another work intelligently. Therefore, SIEM solution alone is by the fact that a subordinate CA will have one, and only one, superior. Further, subordinate technology. In order to establish an efficient CAs are not permitted to have their own self- Unified SOC, it is proposed to integrate SOAR signed certificates and only the root CA has a self-signed certificate. PKI server logs are with SIEMall the solution. tools Inand SOAR technologies platform, securityneeded collected by SIEM to analyse usage of Digital arealerts seamlessly can be orchestrated automatically together responded to take to Signature Certificate (DSC) token, unresolved OCSP requests etc. 198 Vol. 4 No. 1 2019 Joint Framework for Integrating Disparate Security Solutions 3.3.3 with federated access management is a

standard architecture for IAM deployment. respectiveEach service networks has with already large implementedfootprints of Certification Authorities (CAs) in their IAM provides four functionalities of identity toverification, verify privilege authentication, level assigned authorisation to users, and entities using digital certificates. One service accountability. IAM logs are collected by SIEM can become sub-CA under root CA of other service or migrate to a CCA certified legal CA. identify and analyse auto – deactivation of If all three CAs are certified by the CCA, there user accounts and analyse Single Sign On (SSO) will be a strict hierarchy amongst all the 3.4.2events denied access. However,certificates checking generated for by the respective revocation CAs statusas the certificates can be traced back up to the CCA. Interoperability of IAM solutions from different of the certificate will still have to be diligently OEMs can be diligently orchestrated through planned. In the joint network environment, eachSAML time (Security a user Assertion accesses Mark-upan application, Language) the there will be traffic flow, for request and authenticationauthentication. process With is SAML relayed authentication, to the identity response messages of Online Status Check 3.3.4Protocol (OCSP) for checking certificate status. provider. The user enters his credentials which are then verified by the identity provider. The identity provider returns an access or reject Service specific applications will send OCSP authentication is success, the user is granted accessresponse to inthe the resource, form ofand SAML if not, assertion. access is If whichrequests responds to its respective to the application OCSP server(based with the on OCSP URL given in user digital certificate) send requests to the concerned user service denied. Service specific applications will relay certificate status. Tri-services applications will SAML authentication process to its respective identity server which returns SAML assertion OCSP server, which responds with certificate concernedto the application. users service Tri-services identity server, applications which status to the application. Therefore, a will relay SAML authentication process to the tri-services application will receive OCSP response from all three services OCSP servers returns SAML assertion to the application. depending upon the user whose certificate Therefore, a tri-services application will status needs to be verified before granting him receive SAML assertions from all three services 3.4access Identity to the application. and Access Management identity servers depending upon the user to be (IAM) authenticated before granting him access to the 4.application. DOMAIN CONTROLLER 3.4.1 4.1 various resources such as applications and IAM plays a vital role in deciding access to Each service has implemented Domain services by the users. Centralized identity Controllers (DCs) in their respective captive 199 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 architecture has inherent advantage of reduced data networks. Single Forest Single Domain response to patch management alerts at the tri- 6.services ANTI-MALWARE level. administrative complexity due to centralised control. In a forest there is an inherent transitive 6.1 trust relationship between all its domains and replication takes place within the domain. In Anti-malware solution protects against the proposed joint framework Primary Domain to include viruses, rootkits, ransomware, Controllers (PDCs) of each service will be infections caused by various types of malwares integrated to form Multiple Forest Multiple software uses different strategies to protect spyware, worms, trojans etc. Antimalware Domain architecture at the tri-services level system from malicious software, including by establishing an exclusive inter forest trust relationship while DCs of each service can continue to be in Single Forest Single Domain signature-based malware detection, behaviour 5.architecture. PATCH MANAGEMENT 6.2based malware detection and sandboxing.

5.1 It is proposed that the three services should solutions to protect endpoints on their captive continue with their existing anti-malware Patch management is the process of installing latest patches (code changes) which improves data networks. Anti-malware server logs are are cleaned properly, identify machines that the system or fixes security vulnerabilities collected by SIEM to track if detected viruses on various systems within a network thereby identify quarantine action failed events and enhancing cyber security posture of the entire are not updated to latest malware definitions, 5.2network. identify events where user choose to delete/ ignore an item. SIEM alerts generated from It is proposed that the three services should anti-malware server logs of each service are automated response to malware alerts at the continue with their existing patch management integrated with SOAR to provide integrated solutions on their captive data networks. Patch management server logs are collected 6.3tri-services level. by SIEM to identify endpoints which have not A diagrammatic representation of the proposed been patched with latest patches and identify alerts generated from patch management vulnerabilities in unpatched system. SIEM server logs of each service are integrated joint security framework in an integrated tri-services network environment is given at with SOAR to provide integrated automated Figure 1.

200 Vol. 4 No. 1 2019 Joint Framework for Integrating Disparate Security Solutions

Fig. 1: Joint Security Framework for Tri-Services Integration

7. CONCLUSION REFERENCES 7.1 1. Security Operations Centre – SIEM Use Cases and Cyber Threat Intelligence by Arun E Thomas. Integration of security solutions of all three 2. https://www.exabeam.com/siem-guide. 3. https://dnif.it/soar-security-orchestration- services is a challenging problem. In this paper, automation-response-guide.html. these challenges have been analysed and a 4. Mastering Active Directory by Dishan Francis.. joint security framework at a tri-services level 5. http://www.oasis-pki.org/pdfs/ca-ca_interop.pdf. has been proposed for integrating disparate security solutions implemented by all three services on their captive data networks.

201 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Joint Enterprise Cloud for Armed Forces

Lt Col Sumit Gupta, SM

“No force on earth can stop an idea whose time has come” —Victor Hugo

Abstract—Jointness for its actualisation on ground would require massive changes in existing organisational structures, processes and technologies. One area which would assume greater significance towards realisation of true jointness would be of ICTEC (Information, Communication Technology, Electronics & Cyber). The emerging platform of “Cloud Computing” lends itself naturally towards the vision of joint ICTEC infrastructure balancing the twin objectives of “Maximum Efficiency & Minimum Cost”. 1. INTRODUCTION rapidly provisioned and released with minimal management effort or service provider 1.1

characteristicsinteraction. This and three cloud service model models promotes and The National Institute of Standards and availability and is composed1 of five essential Technology (NIST) defines cloud computing as four deployment models” “ a model for enabling convenient, on-demand . Figure 1 shows network access to a shared pool of configurable computing resources (e.g., network, servers, the framework of the NIST definition of cloud storage, applications and services) that can be computing.

Fig. 1: NIST Cloud Definition Framework2

202 Vol. 4 No. 1 2019 Joint Enterprise Cloud for Armed Forces 2. CURRENT STATUS OF INFORMATIONISATION applications with dedicated computing IN ARMED FORCES &planned/implemented storage infrastructure its & without own set due of

2.1 separateconsiderations arm & tois very network much bandwidtha precious availability (which is in the domain of a Indian armed forces have ushered into Informationisation in a big way with parallel resource). These have led to duplicative, projects across various verticals currently being costly & complex infrastructures, mal- effects of which would be felt once these in different implementation phs. As an example, Anti-AI (Artificial Intelligence) applications are fully operationalized. echelonsArmy has ofundertaken command, projects primarily for provisioningto facilitate Approach. routineof IT infra administrative at all levels & fromtraining units requirements to highest (b) AI algorithms need as much to various services over Army Data Network approachdata as possibleof informationisation to work effectively; locks as also to provide authorized users access awaymore the the data data, in betterdifferent it is.application Current silos thus depriving the armed forces of (ADN). Operational Information System (OIS) & Logistics Management System (LMS) are Increasing Life Cycle Cost (LCC). major endeavors of Indian army to facilitate the true powers of AI. its transformation into a dynamic Network- (c) operation, maintainence & management Centric Force capable of achieving Information Besides the developmental costs, further Superiority through effective management andof IT. administrative The Air Force requirements & Navy too havepeculiar similar to costs of these resources would be projects catering to the operational, training largely inefficient, costing time, money & manpower that could be applied directly Concerns of Interoperability. 3.these DRAWBACKS services. OF towards achieving strategic initiatives. PRESENT APPROACH TO (d) To realize INFORMATIONISATION the full potential of Network Centricity OF ARMED FORCES in a joint operational environment as thatenvisaged each of in the an individual Integrated applications Theatre 3.1 Command (ITC), it is rather essential

conception,are able to design “seamlessly & development talk” to each of Present approach of developing various theseother. applications, However, given lacunas the are disjointed surfacing applications to enable the armed forces to poised to take on the challenges of futuristic in this aspect, forcing the developers to meet their objective of Net Enabled Force battlefield suffers from few handicaps that notincorporate an ideal “quick way to fix achieve solutions” the todesired make coveredlimits the in effectivesucceeding utilization paragraphs: of IT resources the applications interoperable, which is at our disposal. These shortcomings are briefly Duplicative, Cumbersome, and Costly Greater Exposure to Cyber Threats. Application Silos. end state. (a) (e) individual arms & services with dedicated In its exuberance The application silos being developed by to embrace IT, each arm & service has203 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

computing, storage & software resources present a large intrusion surface area for change. Each IT capability development initiative to be first scrutinized by DJEC for checks“Cyber are Warriors” in place to would exploit. require Further, a pool to standardization. The DJEC would work in ofoperate, trained manage personnel & ensure with cyberthese securityarms & close coordination with Directorate General services; which in the present scenario of Information Systems (DGIS) of Army and its counterparts in Navy & Air Force to ensure the aspects of interoperability are taken care of. Impediment to Jointmanship. 4.3 is practically non-existent. Step 2: Establish Core Data Centers (CDCs) (f) IT is & Optimize Consolidation of Existing IT the key enabler for jointmanship to Infrastructure actualize in a war scenario by facilitating howeverseamless given information the current exchange issues across of storage, computing. There & isapplications a pressing to need cloud of participating components (tri-services); migrating from the existing desktop based integration with Naval & Air force interoperability within the Army, the based access to these resources to enable efficiency, economy, ease of management & 4. STRATEGYapplications FOR seems ADOPTION a distant probability. OF reduced intrusion surface for cyber threats. This CLOUD COMPUTING IN ARMED would involve establishing CDCs at command FORCES level by each service. In case Integrated Theatre Commands (ITCs) come into being, a joint CDC 4.1 with each ITC is proposed to be established. Further, currently installed IT infrastructure needs to be consolidated at these Data Centers. phased transition to cloud computing model, Next step would be migration of existing ratherIt would than be a complete prudent tooverhaul have aof plannedthe system & applications & data to CDCs & Armed forces 4.4Joint Enterprise Cloud Environment. in a jiffy, as it would give armed forces enough Step 3: Establish the Armed Forces Joint leverage to build on the successes and lessons Enterprise Cloud Infrastructure. learned from Industry cloud initiatives as they implementationare implemented. of The the four Armed concurrent forces stepsJoint As CDCs are proposed that would enable a phased are established, a Joint Enterprise Cloud Infrastructure would be incorporated in these 4.2Enterprise Cloud Environment. and cloud functions such as Infrastructure as a Service (IaaS), Software as a Service (SaaS) & Step 1: Establish Directorate of Joint is fair to assume that apart from armed forces Platform as a Service (PaaS) will be added. It Enterprise Cloud (DJEC) under the Office of CDS other organizations such as Border Security from all three services and would have the Force (BSF), Central Reserve Police Force overarching. DJEC authority would be over staffed all three by personnel services (CRPF), Assam Rifles (AR), Defence Research & Development Organisation (DRDO), funding, procurement, management and use Intelligence agencies & agencies dealing with ofto establishcloud services, an Enterprise through First policy approach and process to the National Critical Information Infrastructure (NCII) would have deployed their own cloud 204 Vol. 4 No. 1 2019 Joint Enterprise Cloud for Armed Forces

Joint Enterprise Messaging infrastructure. In such a multi-provider cloud (d) . The DJEC environment there would be a requirement of will provide a set of Joint Enterprise Messaging capabilities that includes, deliverya cloud service of cloud broker services with bothamongst a technical various & an organizational component to manage the presentat a minimum,Army Wide Instant Area MessagingNetwork (IM), chat, email (as replacement to government agencies. It is recommended (AWAN) based message exchange), and that an organization working under Central web conferencing (as replacement to Government be the nodal agency to perform currently deployed non-standardized this role and in pursuance of same suitable video streaming/ video conferencing Identity and Access Management organizational structure & processes need to solutions). be established. (IdAM) Services. 4.5 (e) Step 4: Deliver Cloud Service. services that are focused The on DJEC managing will digitalimplement identity, enterprise authenticating‐wide users, IdAM Following cloud servicesJoint will beEnterprise delivered: File Storage. using data tagging to support and enforce (a) The accessauthorizing control access policies to throughout resources, andthe DJEC will implement joint enterprise file user,storage from as a anywhere capability toand enable from global any access to data and files by an authorized 4.6 enterprise.

Joint Enterprise Directory Services. device. services, provide additional cloud services, (b) The DJEC will continue to improve these The DJEC will implement joint enterprise individual Armed forces components as they directory services to make data visible, and incorporate cloud services provided by discoverable,Unified Capabilities. and accessible. take necessary steps to migrate legacy emerge. (c) The DJEC will 5. RECOMMENDED DEPLOYMENT MODEL FOR ARMED FORCES voice, video and data collaboration 5.1 services to Everything over IP (EoIP); standardize and consolidate each arm/ Establishment of Core Data Centres costservice and application streamline silos’ management; convergence (CDCs) efforts across Armed Forces to reduce . As recommended in Para 15 above enhance wireless and mobility support it is proposed to establish CDCs at command keeping in view projects like Mobile level by each service in the transition phase Cellular Communication System (MCCS) towards jointness. As part of Project Network & Tactical Communication System (TCS), For Spectrum (NFS), CDCs are already being Air Force Cellular Network (AFCEL); getestablished operationalised at Comd in leveltimes by to each come, service. it is and provide real‐time collaboration Once the Integrated Theatre commands (ITCs) (assured, integrated voice, video, and data services). 205recommended that resources available with : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

5.3 service specific CDCs be amalgamated to form Establishment of Cloudlets at all Levels. a joint CDC at theatre level. 5.2 It or cloudlets at all levels form unit upward to Centralization vs Decentralization. is recommended to establish mini data centres

cater for the decentralization requirements Cloud computing is essentially a concept of of Armed Forces. Each organizational Centralization – moving everything from the hierarchy (battalion, brigade, division, corps, desktop (user) to the cloud (service provider). Command in army and similarly in navy & Internet connectivity is assumed to be available air force) need to consolidate the current IT to the user at all the times. However, in armed would provision adequate cloud services for during times of crisis as network resources infrastructure at these cloudlets. The cloudlets forces network availability cannot be assured optimal functioning & storage at each level would be subjected to degradation by the attacks against network nodes as also the with capacities commensurate to the size of adversary by carrying out cyber or electronic formation & “Blackout” period expected. All the cloudlets across the three services will be physical destruction of critical nodes by long natural extension of CDCs and would operate range vectors. Thus armed forces need to according to same operational, business, ensure that they function as a single, logically strike a right balance between centralization of and IT Service Management processes to seamless computing environment meeting resources to improve efficiency and realize all the to optimally function during periods of all requirements for graceful fail over, benefits of cloud computing & decentralization disaster recovery, continuity of operations, “Blackout” (No Network Connectivity). In addition to network availability, bandwidth security, resiliency, and load balancing. Once operationalised in times to come, resources availability in mobile operations would also be the Integrated Battle Groups (IBGs) get limited owing to reliance on Radio Frequency of sensors and networking of these with (RF) spectrum. Exponential rise in the number information processing nodes and shooters from the cloudlets be redistributed to align to 5.4the new organisational structures. in a joint operational scenario would further Network Resources. requirement of seamlessly integrating the demand extremely judicious usage of available There would be a RF spectrum. Thus greater reliance need to be placed on having Edge Computing capabilities network resources utilizing the present media to support the warfighter at the tactical edge. as well as futuristic projects as Army Static Edge computing would also reduce the amount Switched Communication Network (ASCON) of info flow between various nodes thus putting Phase IV, Network For Spectrum (NFS), Mobile lesser strain on limited bandwidth availability Cellular Communication System (MCCS), in the battlefield. Tactical Communication System (TCS), Airforce

206 Vol. 4 No. 1 2019 Joint Enterprise Cloud for Armed Forces

recommended with army, navy & airforce as

Network (AFNET), Navy Enterprise Wide navyNetwork. & air force Defence clouds Communication to form an armed Network forces 6.the stakeholders.CONCLUSION (DCN) to provide connectivity between army, 6.1 5.5community cloud. is moving to & many large corporations are Deployment Model. The cloud computing is where the internet currently in vogue inGiven the thecloud public, computing private, investing heavily in this field to maintain their hybrid & community deployment models duecompetitiveness. caution & security Armed procedures forces too in need place to migrate to the cloud environment; albeit with era,world a & army’scommunity sensitivity deployment to its information model is& also the need for moving into a jointmanship to reap the enormous benefits this evolving paradigm of computing offers.

207 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Unified Cyber Security Risk Management Framework for Enhancing Jointness of Operations

Lt Col Sudipto Roy

Abstract—

With the implementation of jointness across all war fighting platform, there will be an increasing concern that all systems containing information technology will be vulnerable to intelligence exploitation and offensive attack through cyberspace. There is a requirement to analyse the life-cycle management to improve cyber security in all joint military systems. We also need to focus in identifying some fundamental principles of sound cyber security management and ensure their compliance with the current state of cyber security laws and policies. This paper has been divided into four different sections, namely, Cyber Security Management, Challenges for Managing Cyber security, Implementation Challenges and finally the recommendations. This paper takes a holistic look on the cyber security management of all military systems under joint operations in the entire lifecycle, i.e., right from the research and development stage to the disposal stage. Finally the paper is concluded with twelve different suggestions that can be implemented to enhance cyber security in the joint operations. 1. INTRODUCTION 1.2 1.1 Importance of Cyber Security Risk Management in Joint Operations Understanding Jointness of Operations very effectiveness of any military operations . With the . The implementation of jointness across all war day warfare has employed military force during concern that all systems containing information rests on a fulcrum called jointness. All modern fighting platform, there will be an increasing

technology will be vulnerable to intelligence generalsconflict purelyhave always in the possessed form of individual a vision that and independent military service components. Great exploitation and offensive attack through with authority over all assigned forces and across cyberspace. In this paper, we will analyse only through a single, unified commander vested how the life-cycle management can improve cyber security in all joint military systems. all war-fighting domains, could hope to realize The focus primarily will be on the subset of all greatest military efficacy and success. Recent haveprocured some systems control for inwhich the theform joint of command designs, military failures can be attributable in part to controlling the jointness of operations, will the inability of the different military services architectures, protocols, and interfaces securityto work togetherenvironment cooperatively have andtransformed coherently. The nature and complexity of the contemporary (e.g., weapon systems, platform information considerably, making jointness, as manifested technology), [1] as opposed to commercial, off- by strategically minded, critically thinking, joint the-shelf information technology and business war fighters, all the more important. systems. 208 Vol. 4 No. 1 2019 Unified Cyber Security Risk Management Framework for Enhancing Jointness of Operations 1.3 2. CYBER SECURITY MANAGEMENT Fundamental Principles of Sound Cyber 2.1 Security Management in identifying some fundamental principles Cyberspace the Most Challenging Domain . This paper focuses . comparing them with the current state of of sound cyber security management and The most challenging domain for military systems in joint operations challenging is going to be cyberspace. Most modern military systems iscyber aimed security at limiting laws the and adversary policies. Theintelligence desired that they depend on it for their fundamental outcomes of any cyber security management are so intimately intertwined with cyberspace directly or indirectly, to other military systems, exploitation through cyberspace to an operations. Many are further connected, either acceptable level and to maintain an acceptable operational functionality/ survivability even forming a complex system of systems whose when attacked offensively through cyberspace. ofcapabilities military aresystems interdependent. creates many The enhancedextensive dependence on cyberspace and the networking theThe life outcome cycle of of a all military Cyber securitysystem, frommanagement, research needs to be achieved continuously throughout systemsand synergistic and capabilities,operations butfrom also adversary leads to and development through disposal. All phases numerous potential vulnerabilities to military are important, but the development and intelligence exploitation and attacks through cansustainment limit options stages in are the particularly future, and critical. the latter The former because design decisions are made that cyberspace. Adversaries can potentially use the domain of cyberspace in various ways to because most systems reside in sustainment onchallenge these thesystems military to systems steal deployedtechnology in jointand 1.4for most of their life cycle [2]. operations [4]. They can collect intelligence Operational Risk Reduction accelerate their own capabilities. They can use operational risk reduction will come from a . The overall this intelligence to develop countermeasures. And they can use cyberspace as a means to assessment of how mission assurance is affected combination of system security engineering, directly attack our military systems. Together, these pose significant risks to operational mission accomplishment. Aand multiple embracing layers adaptive security solutions management since will the 2.2 cyber security environment is rapidly changing. Defining the Scope of Cyberspace that military systems and their underlying contribute to mitigating vulnerabilities. [3] . Ensuring The adopted defensive measures should deny low risk and adequately support operational information systems operate with acceptably attacked,access to the the system systems degrades and should gracefully be backed and by a robust and resilient design so that when missions in the face of existing and potential recovers rapidly to an acceptable level of future advanced cyber threats, lies in the realm of functional performance. cyber security. Cyberspace is a very vast domain.

209 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

However, in the scope of the paper we will 2.4 Achieving Counter Cyber Exploitation in Acquisition Stage adopt a simpler and a goal-oriented definition. 2.4.1 This will allow us to apply it clearly and usefully Cyber Exploitation of Military System to military systems and information systems. [5] For the purposes of this paper, we use the . term cyber security to mean limiting adversary Cyber exploitation of a military system is the intelligence exploitation to an acceptable level extraction of information from or about that and ensuring an acceptable level of operational system by an adversary. Exploitation can be functionality/ survivability even when attacked done by penetrating and extracting information offensively through cyberspace. Acceptable from joint command databases, and can be done adversary can use this information for a range level of system risk is determined by mission by accessing the military system itself [7]. An of purposes, including stealing technology, assurance management decisions. In short, this objective-oriented definition of cyber security means having effective counter cyber assessing joint capabilities, developing preparing intelligence for an offensive attack exploitation methods and survivability from countermeasures to joint military systems, and 2.3attacks through cyberspace. against the military system. Defining Military Systems 2.4.2 Achieving Success in Cyber Exploitation . In this paper, we will focus on military systems which are procured by . that since the government is involved in the adversary needs to gain access to useful the government. In addition, we will also assume For cyber exploitation to be successful, an procurement, it has some control over design,

information and exfiltrate that information architectures, protocols, and interfaces. The before being detected and blocked. Access can acquisition/life-cycle management community be gained through software infiltration or by plays a significant role in cyber security for implants in firmware or hardware introduced military systems. This paper will examine how through the supply chain. These access points throughout their life cycles, including the phases to improve cyber security for military systems can, in principle, be indirect via a less critical of research and development, procurement, test, with the system containing the more critical system that has some information exchange and sustainment. This paper avoids addressing information [8]. Hence, to have effective needs to identify the most critical information, specific technical solutions or proposals for counter cyber exploitation, the system owner security controls. [6] Rather, it will address that information; if the adversary gains access how policy changes, organizational roles and and the adversary needs to be denied access to responsibilities, and monitoring and feedback can be adjusted to provide more coherent and to critical information, he must be detected and integrated cyber security management in joint blocked from successfully exfiltrating it. operations.

210 Vol. 4 No. 1 2019 Unified Cyber Security Risk Management Framework for Enhancing Jointness of Operations 2.5 Instituting Counter Offensive Cyber Operations and limiting the ability of an adversary to 2.5.1 learn about our own systems and missions. Goals and methods of this facet overlap Defining Offensive Cyber Operations considerably with the goals and methods of . attackcounter occurs cyber requires exploitation. a military Second, system operating design Offensive cyber operations aim to do harm to at an acceptable level of functionality after an attacka military against system a military (or via system a military can, in system) theory, by attacking through cyberspace. An offensive that can absorb and recover from an attack. The ability of a system to absorb an attack but still function at some acceptable level is often called thedo any form harm of thethat owner can be inflictedpartially by or the fully software losing controls of the system. Damage can come in robustness. The subsequent ability to recover from an attack by restoring either partial or full control of the military system, or the adversary mission functionality is often called resiliency. takingthe ability full tocontrol use the of system,the system the lossand ofusing active it 2.5.4 Layered Approach to Cyber Security according to his own ends [9]. The latter could . Cyber result in using control to cause self-destruction security against offensive cyber-attacks, has 2.5.2or attack personnel or another system. to be provided in a layered manner. The first layer is defense. If the defense is breached and Exploiting a Military System military system, and whatever degradation in functionan attack that occurs, military the systemattack is suffers, met by it recoversa robust . To successfully attack software, firmware or hardware through cyberspace, an adversary needs access to it diversity,quickly by dynamic being resilient adaptation [11]. and These replacement ends can toand do thereafter so generally a flaw entails to exploit, deep that knowledge affects the of ofbe components achieved by when combinations they fail, surgical of redundancy, deletion ability to carry out the mission. The capability of infected components to stop contagion, the military system being attacked and how it and resiliency, sharing of resources with the thefunctions. more Itknowledge is probably the a fair adversary estimate tends that the to architectural considerations for robustness more consequential the offensive cyber-attack, need to come from effective intelligence adversary to deter attack, and protection/ need. Some of that knowledge will generally defensive measures. At the military-system securitylevel, like engineering the case of counter of these cyber techniques exploitation, in the collection, including cyber exploitation, thus the defensive layer is achieved by integrated linking counter cyber exploitation and counter 2.5.3offensive cyber operations. 2.5.5design phase. Facets of Countering Offensive Importance Strong Systems Engineering

. Countering from strong systems engineering with an. offensive attacks through cyberspace has understandingRobust and resilient of how militaryhumans systemsinteract arisewith two facets [10]. First, preventing attack requires limiting access, limiting flaws whose exploitation could significantly affect an those systems and further guided by functional operational mission (e.g., software assurance),211 performance requirements. Functional : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

in the form of denying access and having resilient systems differ from those aimed at defense,performance such as requirements security controls for placed robust on andthe robust and resilient designs, is the primary missionresponsibility impact of theand life-cycleensuring management.operational perimeter of a system to deny access. Those for The goal of minimizing adverse operational defense contribute only to defense and depend on the threat environment. Requirements for mission accomplishment, is the responsibility outward looking, they do not emerge from of the mission owner [13]. These two goals robustness and resiliency are not reactive or occasionally come into conflict and create are proactive and emerge from the need for tension in cyber security management. the threats that adversaries pose [12]. They 2.6.3 Policies and Organizational Constructs continuing functionality of the system. Cyber . robustness and cyber resiliency are in this Policies and organizational constructs need to operationalsense no different requirements from and other not on survivability regulatory recognize and resolve this tension. This tension requirements and are the outcomes based on arises from two sources. Firstly, there are thenumerous system instances or changing in which how cyber the security system can is 2.6standards. Managing Cyber Security Risk in be achieved to some degree by either changing Joint Operations used. Overcoming poor operational practices 2.6.1 can require quite elaborate and expensive Components of Cyber Security Risk design solutions. Which solution to pursue, or security risk to an operational mission is what combination of solutions, is a decision . Cyber that spans the stakeholders of the life-cycle components, namely: 2.6.4management community and mission owners. defined as the product of three different System Supporting Operational Mission

(a) Vulnerabilities of systems. . Secondly, how critical a system vulnerability (b) Threats to those systems. might be depends on how that system is used (c) The impact to operational missions to support operational mission. Missions are if those threats exploit system accomplished by a combination of doctrine, vulnerabilities. 2.6.2 Missionorganization, assurance training, is not materiel, the same leadership as each Striking a Balance amongst all Three and education, personnel, and facilities. Components system maximizing its cyber security. For some . Cyber security management of systems, more risk will be accepted, either the risks of cyber exploitation and cyber-attack because that system is less critical than others ofrequires each of a balancethese three and components integration amongof risk allis to operational missions or because its potential three components of risk. The management vulnerabilities are less than another system’s. Information for making decisions regarding somewhat different. The goal of minimizing accepting mission risk extends beyond the vulnerabilities to systems by identifying purview of a standalone military system. potential vulnerabilities and their mitigations Effective cyber security management will 212 Vol. 4 No. 1 2019 Unified Cyber Security Risk Management Framework for Enhancing Jointness of Operations require careful coordination and integration of

technical knowledge is confined to a very 2.6.5efforts among multiple stakeholders [14]. 3.3limited number of experts. Assessment of System Vulnerabilities Intertwining between Functionality and Cyber security . Finally, the assessment of system vulnerabilities . Secondly, functionality and mission impact must be done in light of the and cyber security are intertwined. Quite supportthreat environment. decisions throughout The threat the informationlife cycle of a number of cyber vulnerabilities are the needs to flow continuously to stakeholders to result of features deliberately designed into systems. That is not to say that engineers aim the military system. Some of that information andto make security vulnerable and are systems, willing but to acceptduring design,certain early in the development phase will be more engineers make trades between functionality general and less certain. As the system design matures, information needs to be more specific levels of vulnerabilities in order to achieve and timely so that countermeasures can be 3.4some functionality [15]. effectively employed. 3. CHALLENGES FOR MANAGING Rapidly Evolving Threat Vector CYBERSECURITY . Thirdly, 3.1 the threats of exploitation and attack through adversariescyberspace areare rapidlygrowing, evolving and the and changing adapting to countermeasures. Capabilities of potential In this section, we first discuss challenges posed by inherent attributes of cyber security technologies introduce new vulnerabilities before moving on to general management over time. This evolution means that static challenges faced by any endeavour. Further, solutions for cyber security management are we will be outlining a proposed framework inunlikely the form to be of effective; security cyber overlays security that solutions respond of general principles for sound cyber security need to be adaptive. Creating defensive barriers management, which will serve as a baseline for 3.2comparison with the current scenario. to discovered vulnerabilities is by nature insufficient to protect against future, unknown Systems Integral to Design 3.5threat vectors. . Firstly, the Inherent Advantage of Attacker challenges in implementing effective cyber security are technical and involve attributes . Fourthly, onlyof systems specialists that can are understand integral to theirthe detailed design. in cyber space the attacker has inherent operationsModern military of the systems protocols, are soidentify complex critical that advantage over the defender. The adversary needs to find only one weakness, such as a single access point. The defender needs to vulnerabilities, and understand how to address mitigate against all plausible threats for all tothese each vulnerabilities military system, without and compromisingtherefore the potential vulnerabilities. Because the aggressor functionality. Many of these details are specific needs to find just one path for access and the defender needs to block all possible paths, 213defensive measures also tend to be more : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

threat environment and the changing putting the defensive side on the wrong side of technologies stress the need for adaptive expensive than the tools they attempt to stop,

3.6cost considerations [16]. solutions and an organization that supports and facilitates innovation. These challenges Imbalance between Offense and Defense contraindicate that effective cyber security . solutions will emerge solely from prescribed Fifthly, this imbalance between the offense and meantrules and to deny policies, access specifically have struggled in the formto keep of defense in the cyber domain implies that it is security controls. Reactive, defensive barriers unwise to assume that complete cyber security up with the evolving threat. Although the can be achieved. Some potential vulnerabilities most common means to try to reduce cyber that can be exploited or attacked will always exploitation is defensive barriers to deny persist. The goals of counter cyber exploitation they are part of the integrated design of the access, these barriers are most effective when are, for example, controlling critical information system than when they are appended after by identifying it, restricting access to it, and poorly designed from a security standpoint are preventing its theft. It is not possible to reduce design. Security controls enveloping a system the amount of critical information to zero. Nor with a secure architectural design have great does it appear safe to assume that access can be unlikely to be successful; controls integrated unequivocally denied [17]. The question is how much security is enough given finite resources promise. Effective cyber security management 3.7and mission needs. is most likely to be achieved through risk Risk Mitigation Decision Making mitigation guided by mission assurance goals and achieved by adaptive solutions integrated . Sixthly into the design phase, rather than by prescribed and finally, risk mitigation decisions for cyber 3.9rules. security are not easily partitioned. Systems Effective Organisational Design are sufficiently interconnected that accepting tendency toward a dynamic environment acceptinga vulnerability risk inof onean systemadversary can accessing introduce a . The maintenancevulnerability intodevice another through system. an Forintermittent example, suggests that cyber security is most effectively managed by an organizational design that maintenanceInternet connection device ispotentially connected introduces to the military this emphasizes identifying cyber security solutions vulnerability to a military system when that via coordination and collaboration of workers introduced in small programs or in noncritical rather than prescribing standardized solutions. componentssystem. Hence, and critical in vulnerabilitiesa diverse range can beof willThe identify strong successful tendency solutions toward from complexity the top suggests that it is unlikely that the organization reduction in only large or critical systems is targets. Concentrating effort on vulnerability down. Highly formalized rules for achieving cyber security imposed on the engineering level 3.8insufficient [18]. decisionfrom above making will impedefor implementation innovative, adaptive to the Organization Level Support for Innovation outcomes for cyber security. Decentralized

. levels in the organization possessing the The cyber security challenges of the evolving214 appropriate expertise is indicated. Higher Vol. 4 No. 1 2019 Unified Cyber Security Risk Management Framework for Enhancing Jointness of Operations levels in the hierarchy should set clear goals at lower levels like system engineers, need more decisions of how to accomplish those goals to of systems and current threats, and need of what should be accomplished, but devolve technical feedback regarding the performance well-trained system security engineers. And securitymore rapid and responsesmission assurance than the are higher-level important finally, the weaker tendency toward diversity leaders do. The goals and priorities for cyber suggests that cyber security might very well require more than one organizational unit to for shaping the right feedback for highest-level be effectively managed, perhaps managing and information technology systems separately leaders [20]. weapon systems/platform information systems 4. IMPLEMENTATION CHALLENGES 4.1 3.10[19]. Keeping in view the current laws and policies Feedback and Control monitoring of how well desired outcomes are and comparing all the discussed management . Continuous being achieved is essential for sound decision principles, reveals a number of implementation challenges and conflicts that impede the structuresmaking. What and is therefore monitored can and implicitly evaluated set in the an arrive at four challenges, each of which has organization sets incentives and accountability current efforts. Through this assessment, we outcomes,organization’s it is goals.unlikely If those outcomes implicit goals will 4.2further consequences for security. do not align with the organization’s desired Changing Dynamics of Cyber Security Environment be attained. Cyber security management can be understood as a process-control loop. . Our first challenge is that the forA process-controlmonitoring it, to loop decision runs frommakers, the to state the cyber security environment will be complex, of cyber security, to feedback mechanisms rapidly changing, and difficult to predict, but the policies governing cyber security has to be actions (designs, policies, and practices) under better suited to simple, stable, and predictable their control, which in turn adjust the state depicts standard management practices of a haveenvironments, four consequences which will of concern lead to which significant have continuousof cyber security. process Thisof monitoring process controlhow well loop the gaps in cyber security management. This will enterprise is operating, making decisions to been summarised below: (a) The prescribed solutions for military adjust those operations, taking actions to adjust controls which are not as comprehensive system cyber security in the form of the enterprise, then examining the outcomes of for providing security as sound system those decisions. There is also a feedback loop security engineering demands them to Decisionthat monitors makers whether at high the levelsactions in directed the Joint by management are being properly implemented. be. measuresOperations in HQ meeting need feedback mission on assurance cyber security goals (b) informationThe processes technology and security systems controls in andthat need captures to look the out success at a longer of cyber timeframe, security mind,will benot developedmilitary systems, principally and hence with monitoring trends over time. Decision makers215 solutions will not be well tailored. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

4.4 will diminish in favour of tactical (c) The strategic goal of mission assurance Accountability for Military System . The third security controls. challenge in cyber security management in (d) In relying on standardized and joint operations deals with the control of and accomplished,formalized security the policy controls telegraphs as the accountability for military system cyber security tomeans the enterpriseby which cyber that thesecurity implicit is to goal be which are spread over numerous organizations. diminishedThis will unity give of rise command to poor and integration,control for resulting in diminished accountability and of cyber security is compliance with 4.3 security controls. cyber security. These overlapping roles, and presence of a cyber security-focused apex Vigilance in Life Cycle of Military System authorizing official at the national level, will . create ambiguities in decision authority and The second possible challenge is that the accountability. It will be, for example, unclear implementation of cyber security is not going who can make the final decision regarding to be continuously vigilant throughout the risk to a mission: the commander of joint life cycle of a military system, but instead will operations or the authorizing official at the during procurement, resulting in incomplete Government level. Similarly, who will be held be triggered by acquisition events, mostly accountable if a cyber security incident occur, consequences of concern that this challenge the program manager, the authorizing official, coverage of cyber security issues by policy. This 4.5or the operational commander? will pose have been summarised below: Monitoring and Feedback for Cyber security late in the design process, and therefore (a) These programmatic events will come . some critical design decisions that will The fourth challenge will be in monitoring will have little leverage to influence and feedback for cyber security to ensure its completeness, coordination, and sufficiency affect cyber security. concern:for effective decision-making or accountability. (b) disposed,Systems will in get programsdiminished attention beyond This challenge will have three consequences of procurement, being sustained or (a) This may lead to critical gaps in the relative to those in procurement. feedback mechanism since it will not (c) This policy structure will lead to capture all systems, and will be unable imbalanced risk assessment by favouring to probe the consequences of cyber system vulnerability assessments over security shortfalls, and thus will not be mission impact and threat. produced in a form for effective decision- (d) Management, oversight, and budgeting making. within the joint operations HQs will (b) If there is a lack of comprehensive have to be strongly structured around securityprogram oron aoperational system oriented missions feedback will programs. Cyber security vulnerabilities on cyber security, the impact of cyber will cross program boundaries, creating a misalignment between the challenge stand in stark contrast to the abundance and its management. 216 of feedback on cost and schedule Vol. 4 No. 1 2019 Unified Cyber Security Risk Management Framework for Enhancing Jointness of Operations

Redefining Policies an incentive structure for program performance. This imbalance will create (d) . Adopt, within supplementthe joint operationalthe required HQ, security policies costmanagers and schedule and program over performance, executive controlsthat encourages with more program comprehensive offices to officers which will favours emphasis on

specifically cyber security. cyberInnovation security and measures,Adaptation including sound system security engineering. (c) These deficiencies in feedback on (e) . Foster cyber security will inhibit individual innovation and adaptation in cyber accountability. 5. RECOMENDATIONS implementationsecurity by decentralizing within in anyindividual policy about system security engineering 5.1 Simplifying the Complexity programs. (f) . Efforts Two underlying themes emerges through in reducing the overall complexity of securitythese challenges risk management posed bywill cybernot adequately security the cyber security problem by explicitly capturemanagement the impact in joint to operationaloperations. missionsFirstly, cyber and interconnectionsassessing the cyberof military security systems risk/ in functional benefit trade-off for all Expert Group cyberspace forsecondly, these cyberchallenges security of concernis mainly following added onto 12 systems, not designed in. As partial redress (g) needed within. theCreate lifecycle a group community, of experts in cyber security that can be matrixes as Defining Cyber Security Goals recommendations are being suggested. makingAddressing resources Legacy availableSystems to small (a) outcomes for military systems within the. programs and those in sustainment. Define cyber security goals and desired (h) . Establish shall remain consistent with national an enterprise-directed prioritization for joint operational environment, which assessingContinuous and addressingAssessment cyber security Realign Roles and Responsibilities issues in legacy systems. defence issuances. (i) . Close (b) . feedback gaps and increase the visibility Realign functional roles and of cyber security by producing a regular, responsibilities for cyber security risk programcontinuous and holding assessment program summarizing managers missionassessment impact around and a balance empower of system the the state of cyber security for every vulnerability, threat, and operational Dedicated Team for Cyber security Productaccountable Acquisitions for a response to issues. joint operational HQ to integrate and (j) Increase Accountability adjudicate among stakeholders. . Create cyber security teams within the joint (c) systems and ensure that all. systems Assign operationsIndividual HQsAccountability that are dedicated to comprehensivelyauthorizing officials fall a under portfolio some of acquisition/lifecycle management. (k) . Hold individuals accountable for infractions authorizing official throughout their life of cyber security policies. cycles. 217 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Independent Body for Auditing Develop mission thread data to support (l) . 7. R. A. Clarke, R. K. Knake, Cyber war: the next Athreat Breakdown to national and security Analysis and of what the toSony do aboutHack, it, New York:Ecco, 2010. program managers and authorizing 8. officials in assessing acceptable risks 2014, [online] Available: https://www. to missions caused by cyber security riskbasedsecurity.com/2014/12/a-breakdown- and-analysis-of-the december-2014-sony-hackINSS. 6. CONCLUSIONdeficiencies in systems and programs. 9. G.Insight Siboni, D. Siman-Tov, “Cyberspace Extortion: North Korea versus the United States”, 6.1 delegation, no. model”, 646, 2014. Computer Security Applications 10. A.Conference Schaad, 2001. “Detecting ACSAC conflicts 2001. Proceedings in a role-based 17th Annual recommendations, even if fully implemented, wouldIt may not completely be appreciated solve the that challenges these metering, pp. model”,117-126, Global 2001. Telecommunications 11. M.Conference Pias, S. Wilbur, 2001. “EdgeMeter: GLOBECOM distributed‘01. IEEE network

, vol. 4, pp. necessarilyof cyber securityrequire duringadditional joint resources operations. and 2517-2521 vol.4, 2001. Further, some of these policies would 12. Xuhuicommunal Ao, N.H.access Minsky, control”, V. Security Ungureanu, and “FormalPrivacy treatment2001. S&P of2001. certificate Proceedings. revocation 2001 underIEEE Symposium on a suitably skilled workforce to carry out the responsibilities, commitments that are difficult , pp.Computer 116-127, Security2001. Applications to make in a constrained fiscal environment. 13. P.2000. Gutmann, ACSAC ‘00.“A reliable 16th Annual scalable Conference general-purpose The fact is that there are no quick or easy certificate store”, , pp. 278- fixes for achieving world-class cyber security. to287, intrusion2000. detection”, Computer Security However, by adopting these recommendations, 14. M.Applications Petkac, L. Badger,2000. “SecurityACSAC ‘00. agility 16th in response Annual the joint operational HQ would take a large Conference step toward more effective cyber security of its operating system”,, pp. 11-20, 2000. military systems throughout their life cycles. Distributed Computing Systems REFERENCES 15. O.C.1990. Kowalski, Proceedings. H. Hartig, 10th International“Protection in Conference the BirliX Strategic concept for the defence and security of the on members of North Atlantic Treaty Organization, 1. , pp. 160-166, 1990. Web Information 16. HaoSystems He, EngineeringR.K. Wong, “A2000. role-based Proceedings access of the control First 2010, [online] Available: http://www.nato. modelInternational for XML Conference repositories”, on int/nato214_strategic-concept-2010-eng. pdf214strategic-concept-2010-eng.pdfstrategic- , vol. 1, pp. 138-145 concept-2010 eng pdfstrategic-concept-2010- vol.1, 2000. Security and eng.pdfstrategic-concept-2010-eng.pdf. 17. T.Privacy Fraser, 2000. “LOMAC: S&P 2000. Low Proceedings. Water-Mark 2000 integrity IEEE protectionSymposium for on COTS environments”, 2. N. Choucri, D. Goldsmith,Bulletin “Lost of in cyberspace:the Atomic Scientistsharnessing the Internet international relations , pp. 230-245, 2000. and global security”, 18. M.DARPA Petkac, Information L. Badger, Survivability W. Morrison, Conference “Security and , vol. 68, no. 2, pp. 70-77.Bulletin of the agilityExposition for 2000. dynamic DISCEX execution ‘00. Proceedings environments”, 3. AtomicH. Lin, Scientists “A virtual necessity: some modest steps toward greater cybersecurity”, , vol. 1, , vol. 68, no. 5, pp. 75-87, 2012. pp. 377-390 vol.1, 2000. Software 4. L. J. Janczewski, A. M. Colarik, Cyber warfare and 19. EngineeringE.C. Lupu, M. IEEE Sloman, Transactions “Conflicts on in policy-based distributed systems management”, cyber terrorism,Cyber war Hershey: and peace Information Science Reference, 2008. , vol. 25, no. 6, pp. 852-869, 1999. 5. J. S. Nye, , 2012, [online] Applied Computing 1990. Available: http://www.project-syndicate.org/ 20. S. Ramanna, J.F. Peters, E.A. Unger, “Temporal specificationProceedings of of the an 1990 integrity Symposium kernel on for multimedia commentary/cyber-war-and-. office systems”, 6. J. Carr, Inside cyber warfare, Sebastopol, , pp. 192-199, CA:O’Reilly Media, 2010. 1990. 218 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Artificial Intelligence and Block Chain Technologies

Lt Col Apurva Bhatnagar

Abstract

—Security challenges to joint defence networks have been a matter of concern to the National Security within the last two decades. Defence telecommunication infrastructure that provides the necessary backbone for information exchange such as voice, video, data, and Intranet connectivity have been found to be particularly vulnerable to various forms of attacks. Some of these attacks could lead to Denial of Service, loss of importantintegrity and security confidentiality challenges of networkto current services. telecommunication Protecting these networks networks and from recommends attacks is thus leveraging an important these aspect that cannot be ignored. This paper suggests utilization of latest technologies to address some of the

technologies that can be implemented to mitigate not only infrastructural insecurity but the overall Cyber 1.Security INTRODUCTION posture.

1.1 Wit

h automation to ITisation of various the systems used to process or store it. As the increaseorganizations in likethe government,Data storage, military, handling, other taskedquantum, with complexity safeguarding and types information of cyber relating attacks assimilation,private industries, collation there andhas beenadopted an enormous security grow, organizations especially those that are need to take steps to protect their sensitive to national security, health, or financial records, measures. Related to the criticality of these measures and the vital data, Cyber Security data and personnel information. As early Posture of an organization becomes paramount spyingas March are 2013,the top the threat nation’s to national top intelligence security, important. A significant portion of that data officials cautioned that cyber attacks and digital details,can be personal sensitive information, information, or whether other types that be operational plans, deployment, financial 1.2surpassing even terrorism. of data for which unauthorized access or dataexposure across could networks have severeand to other consequences devices in if predominantImproving Cyber reasons security as under: posture is emerging thecompromised. course of routine Organizations or sharing transmit important sensitive data as the top priority because of several dedicated to protecting that information and (a) The large volumes of data requiring Data and Cyber Security describes the discipline Analytics, and increased complexity of 219 the cyber-attacks/breaches. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

interconnections increasing the supervision of various processes is neither (b) Increased data migration to network integrity assume critical dimensions. Manual

vulnerability of data. feasible nor effective. Even patching security of enterprise applications via personal (c) BYOD and cloud services enable access throughflaws from different time to timetools is andnot practical.techniques Data and by hereitself needsis how to thisbe both paper abstracted suggests and leveraging secured devices increasing susceptibility of systems. Unauthorized users can easily the latest technologies like Blockchain, AI and strivinghack organization hard to ensure networks personal once devices they crack devices. Tri services has been Big Data Analytics. Cyber security is the core challenge when it comes to risk management- are not connected over organization People, Process and Technology. The later, network or other networks are brought Technology offers very stimulating and useful into Organization premises. Despite sometools toemerging survive technologies in the cyber that ecosystem.can help measures like Air gap, cyber violations Nothing is entirely unhackable, but there are are predominant. organizations address this challenge. Some (d) Tightly integrated supply chains like of these Force Multiplier technologies are Defence Accounts, vendors or other civil- Blockchain, Artificial Intelligence (AI) and Big Blockchain. military type organizations increase risk Data. from the weakest link. the internet have disrupted the old way (a) Computer technology and (e) Cybercrime has become a service and continue to come up and working models hence it is difficult to trace malware. changes in processes and policies, of office functioning. New procedures (f) Lack of preparedness to make quick essential skill particularly in case of a of yesteryears Standard Operating highlyin case sophisticated of a cyber attack.attack, Thiswhich is has an withoutProcedures a price; are technology all but introduces forgotten. But these efficient changes are not system with a connection to the internet the ability to bypass detection until vulnerabilities in organizations. Every after cyber attackers have breached the 1.3 defenses. last,or external have an answer network to the is menace exploited posed by hackers. However, technology may, at

Cyber security should no longer be viewed by cyber criminals. As the strategies anas integral a function part of of Informationculture and Technologystrategy of the or used by cybercriminals continue to Information security alone. It needs to form evolve, security experts have turned to Blockchain for a solution. organization. It should be reflected in each As defined in Wikipedia, Blockchain and every facet of the organization, right from ledgertechnology which is labeled records as a peerall to peerdata the strategy to the behavior of an individual network with a shared, distributed in the Area of Responsibility. With so much dependence on data flow and communication istransactions that users acrosscan make multiple secure networks. network between processes, components and The core benefit of using Blockchain sub-systems, data integrity and systems 220 Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Vol. 4 No. 1 2019 Artificial Intelligence and Block Chain Technologies

device usage, network activities, communication onto a Blockchain information to analyze user behavior, irrespective of the organization. such information, the system will change identityBlockchain thefts technology and any malicious can prevent intent a location and application data. Using variety of data breaches, cyber attacks, to ensure the data is secure on remote the data remains private and secure any user’s access rights automatically in network. Blockchain ensures that networks. in all the blocks it creates to maintain Artificial Intelligence and Machine Artificial Intelligence previously transparency. Learning occupied the realm of science fiction, but (b) is now a mainstay in helping organization machine . Inintelligence, computer science,is intelligence Artificial better secure themselves. As computing Intelligence (AI), sometimes called powerfulpower increases analytics and Machinetools can Learning help becomes more advanced, ever more demonstrated by machines, in contrast to the natural intelligence displayed by anforecast attack where might hackers focus mightin the strike future, next. it humans. Colloquially, the term ‘Artificial If an organization can predict where Intelligence’ is often used to describe associatemachines with (or the computers) human mind, that such mimic as incan concert better withprepare advanced for a possibleauthentication cyber ‘cognitive’ functions that humans andattack encryption and ideally techniques, deflect it. analytics When used can

‘learning’ and ‘problem solving’. Artificial Intelligence has become the provide organization with formidable foremost focus of Cyber security as a tools to help keep their data safe. solution. One of the most important Artificialas promising Intelligence solution (AI)providers, and Machine which reasons to use AI for Cyber security is the haveLearning the (ML)potential techniques to improve are emerging network potential of Natural Language Processing (NLP). Systems that are powered by AI can automatically collect data by service and in-house processing scanning the data over the network. in financial institutions, banks and theThese scanned kinds ofdata AI that systems provide use NLPinsights for especially Defence sector. In the view of selecting valuable information from andgrowing technologies success-rate in various of Research application and Development of AI and ML based tools indicating cyber-attacks, mitigation and are now turning to develop automated anomalies based on which they create domains, many Defence organizations prevention strategies on processing. self-learning algorithms for improved Alternatively,authenticated AIframework will help organizationand system Big Data create a real-time, dynamic and global and efficient security solutions. (c) applications, . Big ease Data of isaccess a technology and accuracy that that adjusts the access rights based havehas come made into it existence very popular in recent in past.diverse Its on location or network. This will also intelligenthave a Multi-factor systems will authentication monitor user to Data represents the information assets prevent cyber threats. Not only this, the fields. A 2016 definition states that “Big 221 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

characteristics: Decentralization technologycharacterized and by analytical such a highmethods volume, for velocity and variety to require specific (i) . It is not owned Transparency by any one party. its transformation into value”. Similarly, Kaplan and Haenlein define Big Data (ii) . Hence data cannot be tracked, maintaining the privacy as “data sets characterized by huge Immutability amounts (volume) of frequently updated of transacting parties. data (velocity) in various formats, (iii) . Data inside a such as numeric, textual, or images/ 2.2 Blockchain cannot be tampered with. videos (variety).” Additionally, a new V, veracity, is added by some organizations to describe it, a revision challenged by Blockchain utilizes encryption and hashing some industry authorities. The three Vs to store immutable records and many of the (volume, variety and velocity) have been existing Cyber security solutions utilize very further expanded to other complementary Machine Learning similar technology as well. The majority of characteristics of Big Data: trusted authority to verify information or existing security measures rely on a single (i) . Big Data often doesn’t ask why and simply detects Digital footprint couldstore encryptedfocus their data. efforts This on leaves a single the systemtarget patterns. vulnerable to attack, and many bad actors (ii) . Big Data is often a cost-free byproduct of digital to commit Denial of Service attacks, inject interaction. handmalicious over information current security and extort measures data throughin that (d) The main components and ecosystem of theft or blackmail. Blockchains have the upper Big Data are as under: require the authority or trust of an individual (i) Techniques for analyzing data, such true Blockchains are decentralized and do not as A/B testing, machine learning and Natural Language Processing (NLP). member of the network. The system does not intelligence, cloud computing and a complete copy of all the historic information (ii) Big Data technologies, like business require trust because each node, or member, has

databases. available and just through achieving consensus of the majority will more data be added to the (iii) Visualization, such as charts, graphs other sections of this paper, this is achieved chain of previous information. As outlined in 2. LEVERAGINGand other OF displays EMERGING of the data. TECHNOLOGIES TO ENHANCE CYBER SECURITY POSTURE in many different ways, but the bottom line is, many members of a network who have access to 2.1 the same information will be able to secure that group far better than a group made up of one Blockchain and Cyber Security leader for their information, particularly when leader and a host of members who rely on the (a) . Blockchain refers to a list of records, bad actors could come in the form of group known as blocks that are linked by members or even as the leaders themselves. cryptography. Blockchain has three main222 Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Vol. 4 No. 1 2019 Artificial Intelligence and Block Chain Technologies

2.3 given storage ecosystem, protecting

its data from tampering. That is, A recent example of use of Blockchain data stored in the cloud remains Blockchain helps to ensure that technology is NASA that decided to implement hash lists allow for searching of data Blockchain to improve their Cyber security, resistant to unauthorized changes, avoid Denial of Service and other attacks on air 2.4traffic services. that can be maintained and stored securely, and data exchanged can be verified as being the same from The cryptographic hash, which links the dispatch to receipt. In a nutshell, blocks, is highly resistant to attack and cannot Blockchain improves data storage storesbe inverted and shares or modified.sensitive data, This transact has special and and sharing security by creating relevance to organization like Defence that a decentralized network that uses client-side encryption in which maintain privacy. Though Blockchain was first data owners will have full traceable Network security invented for Bitcoin, its features make it an apt control of their data. of works in this category use foundation for Cyber security technologies. In (ii) . The majority fact, large organizations are slowly warming up to the idea of adopting Blockchain security. For useBlockchains containers to for improve authenticating Software example, in 2017, Lockheed Martin decided to Defined Networks (SDNs) and adopt Blockchain as part of its Cyber security strategy. The company contracted Guardtime critical data to be stored in a Federal, the world’s largest Blockchain Cyber decentralized and robust manner. security firm, to provide the service. Ron In such works, Blockchain-enabled Bessire, VP Engineering and Technology at architecture of SDN controllers Lockheed Martin saw this move as a chance using a cluster structure is used. to ‘enhance data integrity, speed problem The architecture uses public discovery and mitigation’ and ultimately, speed and private Blockchains for P2P up software development and delivery of final communication between nodes in products. 2.5 forthe networkaddressing and SDNnetwork controllers security to make the Blockchain appropriate Private user data (a) Based on the most security-focused issues. with other categories, the Blockchain applications identified in (iii) . Comparing sharing,RQ1, Blockchain network was security, applied private to improve user data,Cyber navigation Security inand data utility storage of World and application of Blockchain for improving data privacy has been Data storage and sharing less discussed. The reason could be Wide Web with details as under: due to the irreversibility nature of (i) ledgers are used to eliminate. Both a Blockchain (everybody has a copy singlepublic source and privateof failure distributed within a of the ledger), which makes it hard to be used for privacy purposes, particularly in data protection. In 223 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

current approaches, typical user device preferences are encrypted process the captured data to achieve effectiveas powerful reasoning tools toin analyze addressing and

and stored on the Blockchain to be retrieved only by that user. Also, security issues. Although AI is they explore differences between powerful and can be engaged mechanisms,Blockchain Proofwhere of nodes Work andare generatedwith distributed when corrupted computing, or givenProof a ofscore Credibility to determine consensus their dishonestdeceptive data analysis is intentionally would beor

credibility dependent on the unintentionally integrated by a number of connections to other malicious third-party based on Navigation and utility of the a popular ledger technology has trusted nodes. adversarial inputs. Blockchain as World Wide Web (iv) the www . In present day, the potential to be leveraged in is inevitable. Substantial transactiondifferent areas risks of and the unintentional cyber space. tasks in defence offices these leakageBlock chain of information, attempts to reduceowing days are Internet dependent like to its characteristics such as e-procurement (GeM), e-ticketing or NIC e-mail. Blockchain can be used to improve the validity decentralization, verifiability and immutability for ensuring monitoringof the wireless the access Internet control access data points connected by storing and the authenticity, reliability and integrity of data. When the is used to help navigating to the on a local ledger. Also, Blockchain credibility and reliability of data can be ensured, more secure and trustworthy outcomes can be applicationscorrect web pageand throughcommunicating accurate produced by AI. A future research withDNS records,others safelythrough utilizing secure, web direction could be the exploration of Blockchain for the security of AI these solutions, the idea of encrypted methods. To implement 2.6 data in Defence network. used, in which the consensus Artificial Intelligence and Cyber consortium Blockchain has been Security preselected set of nodes in the (a) another technology that has started process is controlled by a impacting. government Artificial Intelligence departments (AI) and is Blockchain for AI data security network. Defence organizations in a major way. (v) data is captured from various. sourcesIn modern and computing transmitted ecosystem, among It is an area of computer science that helps building solutions with human like intelligence and can carry out complex devices through the networks. learning,tasks independently. deep learning AI and applications Natural Artificial Intelligence (AI) and are based on neural networks, Machine its derivatives have been used 224 Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Vol. 4 No. 1 2019 Artificial Intelligence and Block Chain Technologies

Machines act like humans only after they Language Processing (NLP) algorithms. security areas which are amenable to AI are 2.9described in succeeding paras: are trained well to accomplish specific Threat monitoring, detection and activities by processing huge amounts of growing interest and value proposition response ofdata the and technology identifying is resulting patterns in in Defence it. The (a) wider range. AI of andevolving Machine threat Learning vectors rather(ML) allows than monitoring the systems threats to monitor against a procurements trying to explore AI in most of their service propositions. 2.7 Machine learning can track anomalous previously identified signatures.

Major initiatives in the field of AI have been behavior easily and help in predictive taken by Google, Apple, Amazon and others. analysis of threats and attacks. Government of India has appreciated the Complex analytics using historical data governanceimmense potential and service of delivery AI and as hasillustrated made withoutcombined human with intervention clustering, and clipping, allow significant investments to use it for better securitydata visualization administrators etc can tobe respondcarried out in near real time to security events and below: (a) PM Narendra Modi Government has incidents. This will take threat detection set up an AI task force, appointed by and alertAudit generation to the next level. Ministry of Communication and IT in order to prepare India for the upcoming (i) . ML can increase efficiency Industrial Revolution 4.0 through a of configuration management, Public-Private Partnership. configuration audit and Cyber (b) The AI Task Force of the Ministry canSecurity enhance Audits the by performance removing human and militaryof Defence superiority has shared and the their strategic final reduceerrors andthe biases.risk in Theseinternal solutions audits report on how AI can aid in gaining

implications of AI from a National by reviewing a larger data set (for Security Perspective. evaluatingexample evaluating a representative all casualties sample (c) followingNiti Ayog sectors has come on focus: up withhealth India’s care, aspublished done inin aconventional year) as compared internal to agriculture,strategy on AI education, for the development smart cities of and the audits against known internal

audit completeness and quality infrastructure, and smart mobility and control red flags, thereby ensuring 2.8 transformation. reports. A CSAT (Cyber Security Audit tool) has been put in place at AI has the potential to make Cyber security more HQ DG Assam Rifles justifying the Secure code review efficient and responsive against ever increasing above. threats and improve the Cyber security posture of any defence organization. Some of the Cyber (ii) . NLP 225 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

t are

inechniques automated (Natural code review Language for which ableotherwise to crawlrequire dynamichuman Processing algorithms) are utilized pages, detect vulnerabilities

better detection and reporting of intelligence, thereby reducing cost and increasing efficiency and reviewsbad coding can practiceshelp reduce or security costs, Automated network analysis ensurevulnerabilities. code health Automating and increase code reducing false positives. (vi) system due to the sheer volume. AIof is a perfect fit for Machine Learning productivity by focusing on the Access management and most harmful vulnerabilities. available data that requires analysis. network monitoring Access good way to detect m So monitoring communication is a (iii) management is another area where . 2.10 alware.

ofAI systems, and ML canapplications increase efficiencyand data and effectiveness. Cyber security constraints,AI-based applicationsfree network Admin could from potentially mundane continuous learning and updation reduce backlogs, cut costs, overcome resource bases can be improved through systemstasks, improve and handle the many accuracy other of tasks projections, humans of rules. They can also aid in inject intelligence into scores of processes and monitoring network traffic and fraudulent access, identifying malicious intent identifying any abnormal activity andcan’t sifting easily dothrough on our millions own, such of documents as predicting in whichand raising can harm alarms the or networks taking pre- or emptive actions to block any traffic 2.11real time for the most relevant content. applications, thereby integrating Big Data and Cyber Security the functionalities provided by Data discovery, classification can store large amounts of data and help multiple security tools. (a) . Big Data and loss detection/prevention (iv) . analysts examine, observe, and detect ML techniques can be used to irregularities within a network. That enhance offerings by typical Data makes Big Data analytics an appealing idea to help escape cybercrimes. The monitoringLoss Prevention and (DLP)prevention solutions of by automating classification, tosecurity-related detect and resolve information an issue, availableallowing from Big Data reduces the time required models to identify sensitive personal orsensitive strategic data information loss by using and predictive tracking cyber analysts to predict and avoid the access patterns to these data sets possibilities of intrusion and invasion. Insights from Big Data analytics tools from new/unusual activity from attacks,can be compromised used to detect and Cyber weak securitydevices, Vulnerability assessment and existing sources. threats, including malware/ransomware penetration testing (v) and malicious insider programs. This . AI based is where Big Data analytics looks most vulnerability scanning applications 226 promising in improving Cyber security. Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Vol. 4 No. 1 2019 Artificial Intelligence and Block Chain Technologies

Intelligent risk management 2.13

(b) . To improve the Cyber security efforts, Big Data analytics solutions, backed by Machine the tools must be backed by intelligent Learning and Artificial Intelligence, give hope purposerisk-management of using these insights automation that Big toolsData that information and processes can be kept experts can easily interpret. The key secure in the face of a Cyber security breach and hacking. Employing the power of Big Data, we should be to make the data available can improve our data-management techniques to analysts more easily and quickly. and cyberthreat-detection mechanisms. This approach will allow our experts to 2.14 source, categorize, and handle security Threat visualization threats without delay. analytics programs can help us foresee AnalyticaPolitics as wasan example increasingly is emerging engaged as inone helping of the (c) . Big Data key markets of Data Analytics firms. Cambridge

the class and intensity of Cyber security politicians to understand voter behavior threats. One can weigh the complexity through data (later found to be stolen), Donald of a possible attack by evaluating data allow one to use current and historical politicalTrump was parties allegedly have one opted of itsfor clients. the services Indian datasources to get and statistical patterns. understandings These tools also of politicians have also been catching up. Several

of Data Analytics firms to understand voter which trends are acceptable and which Predictive models behavior for the 2019 Lok Sabha elections. are not. presentIn the Indiangovernment context, and informationthe opposition privacy over (d) a predictive model that. Intelligent can issue Bigan has been a bone of contention between the alertData as analysis soon as enables it sees experts an entry to point build the Aadhaar Bill. Aadhaar database has been repeatedly proven to be prone and vulnerable for a Cyber security attack. Machine to attacks. A single breach in its security could learning and Artificial Intelligence can 2.15exposes vital information of Indian citizens. play a major role in developing such a Threats envisaged while implementing mechanism. Analytics-based solution Blockchain, AI and Big Data technologies enables to predict and gear up for for effective Cyber security posture 2.12 possible events in the process. . With inherent minor drawbacks that have been Infrastructure penetration testing will give identified till date, these technologies have Security risks in Blockchain isinsight a simulated for complete malware database attack against and process computer and following risks/ challenges: help keep intruders at bay. Penetration testing (a) . Although Blockchain holds immense promise and systems and network to check for exploitable withpotential, suggestive it remains approach: vulnerable to cyber vulnerabilities. It is like a mock-drill exercise threats and risks as mentioned below to check the capabilities of our processes and Key Management existing analytics solutions. Penetration testing are used to sign transactions, and has become an essential step to protect IT (i) . Private keys infrastructure and critical data. 227 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

hence anyone with the private key corresponding to an address, can sign a transaction and transfer attacksattention that is theleverage possibility enhanced of value to another address or value computationalquantum computing power to weaken based or

it off-chain. Having misplaced keys, compromise existing cryptographicWith Thelost assetsway cannotAWAN/ be recoveredAFNET are as evolvingalgorithms times, used the in cryptographic existing IT managed,private keys a nodal cannot agency be recovered. can take algorithmsystems and can inbe Blockupdated chains. to address care of this issue. this issue Software coding error/ protocol Security and privacy risks in AI. . vulnerabilities Data manipulation (ii) (b) Machine learning systems make neither possess. a Most security Blockchains or audit (i) . AI and are developed by enthusiasts that learningbetter predictionsdata sets or by algorithms analysing certificate, nor follow secure coding huge amounts of data. But if the practices. Often, an exchange may The recommendation potentialy disastrous results for inexpose such theira case hardware would andbe ofsoftware a SAG can be manipulated, it can lead to to threats. approved Secure Code/ Secrecy Big Data/ Block Chain can assist in Identity based attack avoidingsectors data specifically manipulation. in Defence. . (iii) . Blockchains Protection of training data are not immune from identity- (ii) . based attacks. Such attacks could a system can consist of sensitive of the nodes in a network and Majority of the training data fed into underminebe employed the to consensus take over avalidation majority Hackers can gain access to such military information for functioning. The basic Cyberand Security distributed measures architecturein place can Block Chain can ensure confidential data by utilizing reverse avoidprotections such attack. of a network. protection of such data engineering. Unauthorized access Sophisticated consensus based . attacks strong access control, credential (iv) (iii) management and privilege. Lackaccount of hash power. If, and when,in the a hackerecosystem, gains control of at least 51% of the mining of system functionalities and administration can lead to abuse hackerthe property power to ofalter immutabilityand reverse the Machine learning algorithm is compromised.Though This rare, gives this the system availability by accessing possibility can be taken care of by Defence organizations have a strong continuousinformation. monitoring the networks. accessdata source control andalready training in place. method. Evolving attack vectors. Unmasked PII

(v) One (iv) . Personally longer-term risk that is gaining Identifiable Information in 228 unmasked form being used in an AI Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Vol. 4 No. 1 2019 Artificial Intelligence and Block Chain Technologies

platform can lead to compromise of

to ensure masking/ encryption of theOne data of theis split methods into usednumerous here the PIIdata. Hence organizations need is Map Reduce paradigm. When Regulatory and compliance and allocates to particular storage . bulks, a mapper processes them issues (v) amounts of data leads to more options. If an outsider has access to accuracy. Although in providing analysis core services, of huge mappers’ code, they can change the settings of the existing mappers or data collection, processing and add ‘alien’ ones. This way, the data storagebut getting in adequateorder to consentcomply forto and intruders can make mappers processing can be effectively ruined A well defined Nodal Agency will address all produce inadequate lists of key/ suchregulations issues. pose a challenge. value pairs. Which is why the results Security and privacy risks in Big Data brought up by the Reduce process Analysis will be faulty. Besides, intruders can (c) get access to sensitive information. . Big Data security comes with its concerns and challenges, and to be The problem here is that getting such able to mitigate, its pertinent to get provideaccess may an notadditional be too security difficult sincelayer acquaintedVulnerability with them. to fake data generally Big Data technologies dont generation rely on perimeter security systems (i) the operational security challenges whichto protect are well data. strengthened They usually in Defence tend to . Before proceeding to all organizations over a period of time Troubles of cryptographic of Big Data, there is a concern of . protection fake data generation. To deliberately (iii) undermine the quality of Big Data sensitive information,. Although it encryptionis further analysis, intruders can fabricate data is a well-known way of protecting sensorand ‘pour’ data it to into detect our malfunctioning data lake. For productioninstance, if anprocesses, Ordnance intruders Factory uses can on the list of Big Data security issues. Despite the possibility penetrate the system and make the essentiality of doing so, this security to encrypt Big Data and the sensors show fake results, say, wrong data is generally stored in the cloud measure is often ignored. Sensitive to notice alarming trends and miss temperatures. This way, one can fail And the reason for acting so recklesslywithout any is encryptedconstant encryptions protection. the opportunity to solve problems and decryptions of huge data slows Such challenges can be solved through things down, which entails the loss applyingbefore serious fraud detection damage approach. is caused. Potential presence of untrusted With the planning of Data mappers Centresof Big Data’sby defence initial organizations advantage this i.e. (ii) issueSpeed. will be adequately addressed. . Once Big Data is collected, it undergoes parallel processing.229 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Possibility of sensitive can give awareness of security information mining (iv) . Perimeter- recommendationgaps. And although is itrarely is advised met toin based security is typically used for perform on a regular basis, this Big Data protection. It means that all ‘points of entry and exit’ are secured. datareality has like enough the present challenges day Cyber and Data can be better protected by concernssecurity Audits.as it is, and Working an audit with would Big adding extra perimeters. Also, system’s security could benefit from anonymization. If a compromised only add to the list. Besides, the network for example gets personal addresses and telephones, they can sidelack security of time, requirements resources, qualified makes data of a users with absent names, personnel or clarity in Admin- Data provenance difficulties A religious approach on these will do practically no harm. Data provenance, or historical ensuresuch audits no lapse. even more unrealistic. (v) . 3. CONCLUSION isrecords to document about the data source complicates of data andmatters all evenmanipulations more. Since performed its job 3.1 with it, user can only image what a gigantic collection of metadata This paper has identified the scope rendered by the latest technology solutions that can that can be. Big Data is not small contains has detailed information keywordcontribute searches to enhance for this the Cyberanalysis Security paper in volume itself. Every data item it posture of our organizations. The initial

about its origin and the ways it was highlight Blockchain or Big data as a standalone influenced (which is difficult to get technology that bring with it an exorbitant in the first place). array of possible solutions for finance, logistics, For now, data provenance is a broad healthcare and Cyber Security. This paper has Big Data concern. From security focused solely on leveraging Block Chain, Big canperspective, lead to the it is wrong crucial data because sets, Data and AI for Cyber Security. Undoubtedly, unauthorized changes in metadata there are worthy applications for Blockchian, Big Data and AI, however, a decentralized, which will make it difficult to trustless system cannot by itself solve all find needed information and untraceable data sources can be problems one may uncover in the field of Cyber a huge impediment to finding the Security and hence an amalgamated solution roots of security breaches and fake utilizing Blockchain applications, Big Data Absent security audits data generation cases. diagrammaticallyAnalytics and AI represented Machine Learning as under: or NLP for Cyber Security has been suggested and (vi) . Big data security audits in the organization

230 Enhancing Cyber Security Posture by Leveraging Technologies Like Big Data, Vol. 4 No. 1 2019 Artificial Intelligence and Block Chain Technologies

Fig. 1

REFERENCES 3. Recent advances in Blockchain Technology by Dr. NV Narendra Kumar. 1. Wikipedia. 4. Cyber Security for Industry 4.0 by ASSOCHAM. 2. A Systematic literature review of Blockchain 5. AI in Cyber Security by Forbes. Cyber Security by Taylor, Dargahi. 6. Big Data Analytic by Crimson.

231 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA

Anindita Banerjee1 and M T Karunakaran2 1,2QuNu Labs Pvt Ltd., MG Road, Bangalore, India E-mail: [email protected], [email protected]

Abstract—

Data security in a network is a major concern in quantum era. One of the major challenges faced by quantum technology is to integrate itself seamlessly into present cryptographic infrastructure. The encryption algorithms prevalent today should be revisited from the perspective of threat from a quantum computer. In this paper, we demonstrate a practical demonstration and integration of a Differential Phase Shift Quantum Key Distribution (DPS QKD) protocol with commercial router cum encryptor. This QKD protocol is based on a family of Distributed Phase Reference protocol which is best suited for fiber transmission. We have achieved with 1 GHz pulse repetition rate in conjunction with gated single photon detectors, a sifted key rate of 600 Kb/s and secure key rate of 271 Kb/s at 40 km. The quantum bit error rate in our QKD system is less than 4% routerfor the cumpresent encryptor implementation. and we have We havesuccessfully validated performed the randomness data transmission of the final secure from akeys source generated router fromto a QKD in NIST test suite and it has passed all the 15 tests. The QKD system was integrated with a commercial

destination router. 1. INTRODUCTION

1.1 of digital signatures, key transport etc. All the cryptographic algorithms that utilizes these algorithmskeys for encryption-decryption ensuring computational or security any other to Cryptography is an art of secret writing. The cryptographic tasks are based on mathematical primary objective of cryptography is to protect the authenticity, integrity, and confidentiality quantumour data. information This computation theory, security the information is based algorithmof the information using an encryption being sent. key Theand delivered message on the capability of classical computers. In to(plaintext) the recipient is through encrypted a conventional by an encryption channel which provides huge computational power andis processed there areby the quantum laws of quantumalgorithms mechanics which algorithm is again applied in an inverse manner in the form of a cryptogram. The encryption can break prevalent classical cryptographic anyto retrieve cryptographic the message process, from it needs the cryptogram. to remain algorithms like Diffie–Hellman (DH), Rivest The cryptographic key is the most vital part of Shamir Adleman (RSA) and Elliptic-curve cryptography (ECC) on a large-scale quantum private to ensure any secure communication. All computer. The threat lies if the encrypted data- the public key infrastructures use asymmetric in-transit is copied today then, it can be later keys comprising of public key and private key. decrypted by anyone who will have an access to The certification authority gives the private key the quantum computer. Therefore, the efforts usedto the for key-requester various cryptographic while the publicpurposes key like can by global standardization bodies are towards be shared over public channel. These keys are making present cryptographic backbone quantum-safe. A prospective candidate for encryption-decryption, creation-verification232 quantum-safe encryption is Quantum Key Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA

hash family with prior shared keys required for Distribution(QKD) which is one the most QKD nodes (Alice and Bob) from 2-universal mature fields of Quantum Information Theory. The theoretical security of the QKD protocols the same. We have implemented a QKD protocol are based on the fundamental principles of in fiber medium and performed sifting, error quantum physics. The composability [1] of correction using cascade, privacy amplification QKD allows the keys to be used for other [4] and finally key reconciliation. In section 2, cryptographic primitives for enabling forward thewe haveeavesdropping mathematically techniques explained on quantum the QKD security. Differential Phase Shift(DPS) QKD protocol, in section 3 we have briefly discussed is one of the most prominent QKD protocols in Differential Phase Reference (DPR) QKD channel, in section 4 we have explained our protocol family. It can be implemented using integrationexperimental in setup,the commercial in section router 5 we system have standard telecommunication fiber and off- discussed the quantum-safe network and the-shelf components. With respect to QKD performance, DPS has a major advantage over and in section 6 we have concluded our work. other QKD protocols [2,3]using weak coherent Fig. 1. Schematic of DPS QKD. The intensity state. The reason being, it is insensitive to modulator (IM) generates the pulses, phase multi-photon states. Considering the photon- modulator (PM) modulates the optical signal, performednumber-splitting(PNS) with an ideal source, attack, in theother securewords thereafter it is attenuated by an attenuator key rate of DPS QKD is close to BB84 when (ATT) and passed through a quantum channel (QC). Bob has DLI is Delay line interferometer it outperforms BB84protocol with coherent (DLI) and he detects the photons using InGaAs source. In this work, we have authenticated the based Single Photon Detector (DPD).

233 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2. QKD PROTOCOL

2.1 (1) 2.2 In QKD, the carriers of binary information are a quanta of light. Ideally, it is a single photon where, is the reference phase, is the Fock state. Single photon sources are difficult phase induced on the weak coherent state to realize experimentally, this is the reason that is the QKD is mostly implemented by faint laser pulse/ weak coherent source. This kind of source obeys by the phase modulator and Poisson statistics. We have demonstrated the number of pulses in the coherence time. Boband DPS QKD protocol using weak coherent source can detect an event at different time-slots say between sender Node 1 (Alice) and receiver time-slot due to superposition of Node 2 (Bob). The schematic is presented in detection occurs at coherent pulses. Valid time-slot is when Fig. 1. Each pulse is randomly phase modulated valid detection occurs then Alice calculates by phase 0 or by a phase modulator the sifted key as .When according to the random numbers which are key is generated from the detector which has generated by a randomphase when number the raw generator. key is 1 and Bob’s sifted These random numbers form Alice’s raw key. She applies a clicked, if detector which clicks on Logic 0 and 0 phase when raw key is 0. She attenuates (1) has detected an event then sifted key is 0 the Weak Coherent Pulses (WCP) to a mean (1). Thereafter, Alice and Bob perform error photon number of . Alice sends correction and privacy amplification to arrive them to Bob through a quantum channel (QC). operator as where, is the Bob receives the travel photons, demodulates at final secure key. We can define a bosonic them through Delay Line Interferometer (DLI) and detects them randomly. Precisely, the WCPs andcreation hence operator these operators for a photon can incommute time-slot with that reaches the Bob’s side enters the one-bit . We assume that the time-slots do not overlap DLI which comprises of two beam splitters written as , therefore, we can and an optical delay of 1-bit in one of it’s paths. each other. A weak coherent state can be After interference at the second beam splitter the photon is detected by either (ideally) of the write the state in equation (1) as two single photon detectors obeying the laws of interference. Bob announces the time-slot where randomlyhe has received select a the small detection. fraction Alice of keys computes to give her sifted key from Bob’s announcement. Bob an estimate of the error rate. If the error rate 2.3 does not exceed the threshold error rate then where, Bob initiates the post processing algorithms like error correction, privacy amplification and key is the Poisson distribution with Mathematically,reconciliation to this finally train generate of weak secure coherent keys an average photon number . If we which can be used for cryptographic purposes. can represent the state as consider coherence time to be infinite then we states is represented by

234 Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA

it induces where can learn of errorthe fraction at Bob’s and detection will not setup. have coherence time of the laser, is the phase anyIf Eve information attacks only from aof fraction the photons, then Eve is the number of pulses in the 3.3 . of the time-slot and is the time-slot. Let Beam Splitter Attack: us consider that there are just 3 pulses in the coherence time, thus equation becomes In beam splitter attack the phase reference thus, the state appears to(BS) apply [5], aEve strategy will place which a beamcan have splitter a lossless in the Basic assumption is that Eve does not possess quantum channel (as the name goes). Eve has as that to be averaged out over the different channel or substitute the quantum channel values of phase resulting in a mixed state from beam splitter to Bob by a lossless 3. EAVESDROPPING .ON DPS channel. She will obtain the fraction of photons equal to channel loss without disturbing the 3.1 communication rate. The probability that Eve will know the valuewithout of bitquantum at a particular memory timeand given Bob detected with a quantum photon memory, at that time where is The average number of photons per pulse is . Thus, the numberWe can safely of photons interpret is much that smaller than the number of phase difference 3.4 is the transmission efficiency of channel. withi.e. Photon-number-splitting Attack: the total wave-function cannot be recreated measurements. Thus, security of DPS In is based on the non-orthogonality of a wave- Photon-number-splitting (PNS) attack [6],in reviewfunction the spanned security by of manythe protocol time-slots. from Thisthe herEve quantum measures memory the photon and numbersend using state perspectiveforms the basis of realistic of security attacks of DPS on QKD.the protocol We will preserving operation. She can store

to Bob. She will measure it after Bob reveals and security loopholes due to non-ideal the time of photons detections. then How she hasmuch copiesinformation of the 3.2implementation. stateis gone to Eve from each photon she stores? If Eve has Intercept and resend attack: which she can measure later. Eve resend (IR) Intercept and entangles her probe with the sent photons and attack is a type of Individual attack. measures this probe after Bob’s announcement. This is a general positive-operator valued detectsEve will any have photon a setup in similar a particular to that time of Bob. say atShe will intersect and measure all pulses. If she measurement (POVM) attack on single photons. Since, Eve does not know the phase reference superposition of two pulses with similar phase then, she will resend a pair of WCPor a photon in hence it will be sent as at that particular time then, he cannot detect difference between them. If Bob measures themthen

Eve but if he detects them at times 235 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 2: Key Rates with Distance for BB84 and DPS QKD 3.5

Comparison with BB84 for BB84 and compared it with DPS QKD (considering restricted attack) using 3.6 standard experimental parameters. (a) In DPS QKD Eve’s information from PNS attack is independent on channel Sequential Attack: loss. It is a function of . Final key rate Sequential attack (SA)[7] is a decreases linearly with channel loss. consecutive type of IR attack. Eve places measurement device Hence its robustness against PNS attack clicks and then constructs very close to Alice. She waits for is evident. time-slot (b) In BB84, Eve’s information from PNS state. The error induced by it is hence error attack is dependent of channel loss. is. This happens because of probability consecutive of Thus, if losses are higher then Eve can clicksmeasuring is side time bins is send multi-photon fractions and stop . Theconsecutive probability clicks of decreases with single photon states. In other words as . Therefore, probability of loss increases Eve can have information key rate is a quadratic function of overallobserving detection rate thus, over large fraction of key. Hence, final consecutive clicks. Eve needs to conserve the key rates with distance for an ideal it clicks for . This gives channel loss. In Fig. 2 we have shown source, weak coherent source and decoy an upper bound and for Eve will knows give anything random if with probability 236 . (since Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA 3.8 result). The average collision probability is Quantum Hacking: Compression factor is There are certain demonstrations of quantum hacking on DPS QKD based on inefficient detectors. These According to a study [3,7] it is advantageous mismatch,hacking [11,12] functioning can fallof intodetector, IR attack.thermal It to do individual attack (IA) than SA and that exploits the drawback like detector efficiency security against IA implies security against SA. Eve can employ different strategies to monitoringeffects etc. These of the are basicallytransmission the side and channel error amplitudesreduce the of error the end rate. pulses She are can smaller modulate than attacks. These can be prevented by effective the envelope of the pulse block so that the detection setup, adding optical components at detection. Security patches i.e. by strategic that of the central pulses. A lot of research has been done on sequential attacks on DPS Bob’s side, monitoring the power, are effective QKD. Several studies have been reported on in preventing such hacking. Eve also needs to sequential attacks. However, the strategy [8] Weplan can execution conclude of that such these attacks side channel for which attacks she pulsethat utilizes envelope, Unambiguous is considered State threatening Discrimination for makes some assumptions of the QKD system. (USD) for phase differences and optimized this attack, solutions like decoy strategy and can be detected by proper countermeasures strategiclong-distance phase DPS modulation QKD. However, at Alice toNode combat can 4.and EXPERIMENTALeffective monitoring. SETUP

4.1 be exploited to combat the sequential attacks 3.7based on intensity modulation. Unconditional Security: In Fig. 3, we have shown the experimental setup, we have used a 1550 nm continuous wave laser. Coherent attacks are It is passed through Lithium Niobate the most challenging attack on any QKD systems Intensity Modulator to generate 1 GHz and the security against it is difficult to prove. train of pulses with 400pswidth. Chromatic Several studies have been reported on different dispersion of DLI is 1ps/nm and SMF fiber is strategies of coherent attack on DPS QKD where 18 ps/(nm.km). We find that the chromatic they attack: pairs of adjacent pulses, noiseless phasedispersion modulator has negligible at random effect. and The thereafter, train of DPS QKD and block randomization. In[3] it is pulses are phase modulated by based analyzed that COW and DPS are similar in QKD isstrongly then passedthrough attenuated using the quantum variable channel optical protocolperformance is dependent however, upon DPS isconstruction somewhat betterof the attenuators (VOA). The weak coherent source than COW [9]. The scientific proof of any QKD modulationwhich is a standardare generated telecommunication from a random fiber QKD scheme and in it’s realistic implementation. to reach Bob. The random numbers for phase seeIn everythat these security assumptions proof some do not assumptions open any will be considered and it is very important to number generator (PRNG). The train of WCP travel to Bob system via QC. At Bob’s side we security loophole from product perspective. It have a Mach-Zehnder interferometer with 1 is to be noted that unconditional security by ns delay which is fine tuned to match the path coherent state based DPS QKD is proven in [10] difference between consecutive WCPs to cause using complementarity approach. 237interference. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 3: Experimental Setup

clicksThe WCP is are randomly detected by single photon detectors. Probability of detector getting is However, the probability of simultaneous click due to signal and dark count i.e. . Secure key rate for sequential attack is given by is , where very small. Therefore, We have calculated the sifted and secure key .The probability of, signal the is the channel distance transmission and is isthe giventotal loss by is the fiber attenuation, rates based on the experimental parameters shown in Table 1a. In Fig. 4,we have presented protocolfrom Bob’s and optics. it depends The Quantum on the Bit electronics, Error Rate a test case where we have shown the SPD (QBER) is an important parameter in QKD 1counts is always when giving Alice sentconstructive Logic 0 continuouslyinterference considered following errors while(00000 port i.e. a 2fixed is pattern).always giving We find destructive that port optical error and detector parameters. We have

alwaysinterference. shows Whendestructive we changeinterference to 01010 and portpattern 2 shows from constructive Alice side, weinterference, find that this port1 is The total is estimated where to be 3.9%.sifted The secure key rates for DPS QKD is given by we have ensured the randomness of the key shown in Fig. 5. After generating secure keys, key is obtained by .Secure key rate considering realistic attack (IR attack and through NIST test suite [13] because the keys BS attack with quantum memory) is given by will be used for cryptographic purposes. In Fig.6, we have shown the NIST test results on . Secure key rate considering general the keys after key reconciliation process. The individual attack (PNS attack) is given by computing elements CE1 (Alice side) and CE2 238 Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA

...Table 1 (Contd.) Dark count (Bob side), address the sifting, authenticity, error correction, privacy amplification and 10000 Hz reconciliation activities. This subsystem Pulse repetition rate 1GHz also implements quantum enabled Internet DetectorDead time efficiency 101 % Protocol Security (IPsec) and VPN protocols havefor communicating shown the sifted between and secure Alice key andrates Bob for After pulse probability 0.1 % over a standard internet network. In Fig 7, we Fiber attenuation 0.2dB/km (a) Secure key rate Distance Sifted key different distances. We have also specified the (km) (kbit/s) Restricted Individual keyTable rates 1: (a) in Parameters Table 1b. of Critical Components in the (kbit/s) (kbit/s) QKD Experiment and(b) Summary of QKD Experiment 694 Parameters values 20 1585 271 326122 40 631 41 Mean photon number 0.1 60 251 104 9 Pulse width of WCS 400ps 80 100 3711 Table 1 (Contd.)... Optical loss at Bob 4 dB 100 40 - (b)

Fig. 4: Counts at (a) Port1 and (b) Port2 of the DLI when Alice Raw Keys has Generated only logic 00000. (a) (fixed pattern is given). (b)

Fig. 5: Counts at (a) Port1 and (b) Port2 of the DLI when Alice raw keys has generated only logic 010101 (a) (fixed pattern is given) (b)

239 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 6: Results of the NIST Tests Applied to the Final Secure Keys

Fig. 7: Key Rate vs Distance for DPS QKD

240 Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA 5. QUANTUM SAFE NETWORK 5.1 with the adjacent nodes and learns about the routes required for reaching other nodes. The information transfer needs to happen between Transforming present network security into entities R1 and R3, which has to be encrypted. quantum-safe is one of the biggest challenges R1 requests key from QN1 for encrypting the successfullyfaced by International demonstrated, standardization deployed, bodies and data. QN1 passes key K1 to R1.R3 will request applicationslike ETSI, NIST, in industry CSA etc. and The government QKD has been are QN4 for corresponding key.QN1 finds the route to QN4 through the network(QN1-QN2-QN3- QN4).Using quantum hopping technique, key growing. We present below application and presented the integration of our product with gets transferred to QN4. QN4 further transfers scenarios from technical perspective. We have key K1 to R3.R3 after receiving the key K1 from QN4, decrypts the information. commercial router thereby demonstrating 5.2.2 5.2point Application1: to point QKD within Key 40 Generation km. in a QKD Network implementation of the trusted node concept We have configured our system for 5.2.1 [14] as presented in Fig. 8 to increase the distance. The scalability of the computing element and flexible architecture in our product ourQKD presentnetwork system comprises we ofcan multiple generate nodes secure that allowed us to evaluate point-to-multipoint are connected to form a quantum network. With integration of classic cryptography with QKD networking and multi-hopping scheme keys at a modest rate till 80 km. The nodes may key management across all different layers of contain multiple ‘Alice’ and ‘Bob’ combinations quantum cryptography to ensure quantum-safe depending on the network topology. These nodes contain QKD stack that communicates information and communication technology.

Fig. 8: QKD Network with Trusted Nodes

241 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 9: Quantum Key Transportation between end Applications

5.3 Application 2: Quantum Key Transportation between end Applications QN2 and QN3 creates VPN using Qkeys with strengthened hash function. After which using 5.3.1 OTP1 send key ‘K1’ to QN3. QN3 transfers QKey 5.4to R3. Application 3 quantum node to the other, where two end applicationsTo understand are asking the key for transfer the quantum from keys one 5.4.1 between them, consider the scenario depicted We have implemented a few solutions based on in figure. In this scenario, user ‘A’ wants to 5.4.2ETSI recommendations Layer 2 [15]. communicate with a user ‘B’ securely. The Quantum key (QKey) from quantum node (QN1) is produced and transported to the end (a) As a key exchange protocol for PPP. quantum node (QN3). Application ‘A’ ask for (b) In IEEE 802.1MACsec a QKey to QN1 via KMIP interface. The QN1 (c) QKD link-encryptor for encrypting traffic finds the route to reach ‘B’ and selects best on an Ethernet of fiber channel link route via QNs QN1→QN2→QN3. QN1 generates (d) QKD link-encryptor as VPN tunnel QKey ‘K1’ with QN2. QKey ‘K1’ is passed to R1.

242 Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA 5.4.3 Layer 3

unreliable. Also, the current standard method IPsec defines the architecture for security of hashing (SHA2) is an extended version services for IP network traffic. It includes 3 (increased length from 160 to 256) of the main protocols: Internet Key Exchange protocol already failed SHA1 algorithm which had a weak collision avoidance probability. This should be (IKE), Authentication Header protocol (AH) universal hashing algorithm which provides and Encapsulating Security Payload protocol replaced by an Information theoretically secure keys and also initiate the security associations (ESP). IKE is used to manage the cryptographic for the mapping of every key bit used for the required for the secure data transfer. AH and authentication with every bit of the message thus providing maximum randomness for ESP will provide the necessary integrity and shared session keys for security association in confidentiality required for the data being the input key length. Modified IKE to provide transferred. QKD solves the key distribution problem by allowing the exchange of a 5.5IPsec Application protocol. 5: Practical cryptographic key between two remote parties Demonstration for Point to Point with absolute security, guaranteed by the QKD laws of quantum physics. So, to combine the 5.5.1 Layer 4 advantages of QKD with the structure of the IPsec, the key exchange in IKE (Phase 1 and 2) should be replaced by the QKD system to (session keys): We have successfully integrated provide the secure key on both end points. our QKD with a commercially available router These keys can be used to create a session and this is shown in Fig. 9. The keys are (Handshake) between the two nodes with the requested by the source router as and when Security associations discussed and also the provides the key to the source router along with needed. The quantum node at the source end authentication and encryption supported by these keys. The DH, RSA are the currently used the key ID. The source router communicates the public key exchange algorithms that depend on of the multiplication of two huge prime key ID to the destination router. The destination the computational complexity of factorization router conveys the key ID to the QKD unit at the destination site. The destination QKD passes numbers, which increases exponentially with the source router and destination router will the corresponding key. In this technique, both the size of the prime number. This complexity refer to the same key in a secure way while can be brought down exponentially using Shor’s algorithm after the onset of quantum computers, thus making the key exchange encrypting data-in-transit.

243 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fig. 10: Integration of QNu QKD with Commercial Routers cum Encryptor

244 Vol. 4 No. 1 2019 Practical Solution for Secure Network in a Quantum Computing ERA

Fig. 11: QKD Point to Point Communication between two Office 5.6 Application 4: Highly Secure

5.6.1 keys which can be used for any cryptographic purposes. We have also discussed the present security status of DPS QKD including In Fig. 11, we have presented an application theoretical and implementation security. This for secure defense communication. The entire protocol is recognized by ETSI and is in the network can be quantum secured in the theprocess requirement of becoming for astransition one of thefrom standards current channelprescribed and manner classical which channel is connected are depicted from cryptosystemfor QKD protocol. into Wequantum have alsosafe broughtencryption forth as Army Office 1 to Army Office 2. The quantum differently as they serve different purposes. per the ETSI recommendations. We particularly The keys generated by QKD are symmetric and andemphasize moving onforward transition in that of direction classical networkwe have information theoretic secure with composable reportedsecurity tothe quantum-safeintegration of networkour system security with security framework. This will be shared commercial router and successfully performed securely to encryptor/decryptor, which can data transmission from a source router to a then be shared with different applications that 6.will CONCLUSIONSwant to access the keys. REFERENCESdestination router. 6.1

1. Renner R., König R.: Universally composable privacy amplification against quantum haveWe have successfully performed generated a 1 GHz random pulse ratequantum DPS- adversaries. Proceedings of the Second QKD experiment utilizing InGaAs detectors. We international conference on Theory of Cryptography TCC’05, 407--425 (2005) 245 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2. Bennett C. H., Brassard G.: Quantum 9. Stucki D., Brunner N., Gisin N., 87Scarani V., Zbinden cryptography: public key distribution and coin H.: Fast and simple one-way quantum key tossing. Proceeding of the IEEE International distribution. Appl. Phys. Lett. (19), 194108-1- Conference on Computers, Systems and Signal -194108-4 (2005) Processing, 175-179 (1984) 10. Mizutani A., Sasaki T., Kato G., Takeuchi Y., Tamaki 3. Inouye K.: Differential Phase-Shift Quantum Key Distribution Systems. IEEE Journal of Selected K.: Information-theoretic security proof of Topics in Quantum Electronics (2015) differential-phase-shift quantum3 key distribution protocol based on complementarity. Quantum 4. Bennett C. H.,41 Brassard G., Crepeau C., Maurer U. M., Generalized privacy amplification. IEEE Trans. Science and Technology (1), 2017 Inf. Theory (6), 1915--1923 (1995) 11. Lyderson L., Skaar J., Makarov58 V.: Tailored 5. Inoue K., Waks E., Yamamoto Y.: Security73 of bright illumination attack on distributed-phase- differential-phase shift quantum key distribution reference protocol. J. Mod. Opt. (8), 680—685 against individual attacks. Phys. Rev. A (7), (2011) 012344-1--012344-9 (2006) 12. Curty M., Tamaki K., T.: Effect of detector dead 6. Inoue K., Honjo T.: Robustness of differential- times on the security evaluation of differential- phase-shift quantum key distribution against 71 71 phase-shift quantum key distribution against photon-number-splitting attack. Phys. Rev. A (4), 042305-1--042305-4 (2005) sequential attacks. Phys. Rev. A (77), 052321- 1--052321-20 (2008) 7. Curty M., Zhang L. L., Lo H. -H., L¨utkenhaus N.: Sequential attacks against differential-phase-7 13. Juan S.: Statistical Testing of Random Number Generators. NIST company (2012) shift quantum key distribution with weak 4 coherent states. Quant. Inf. Comput. (7), 665— 14. Elliott C.: Building the quantum network. New J. 688 (2007) Phys. , 46.1--46.12 (2002) 8. Gomez-Sousa H., Curty M.: Upper bounds9 on the 15. Quantum Safe Cryptography; Case Studies and performance of differential-phase-shift quantum key distribution. Quantum Inf. Comput. (1/2), Deployment Scenarios, ETSI GR QSC 003 V1.1.1 62--80 (2009) (2017-02)

246 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Future of Cryptography: Quantum Key Distribution through Micro-Satellites

Col Kapil Jaiswal

Abstract—

Information security is becoming a critical issue in satellite constellations, because the amount of critical and valuable data to be communicated is increasing. Satellites based Quantum Communication (Q.Comn) is the most efficient way to achieve intrinsically hack-proof secure Quantum Key Distribution (QKD) because unavoidable losses restrict scaling up fiber based Q.Comn. The recent advancement in satellite technology are indicative of real potential to allow a global scale QKD. Recently a 600-kg Q.Comn satellite has been launched into orbit successfully demonstrating quantum teleportation experiments. However, it remains a greater challenge to demonstrate Q.Comn with a small-size and low-cost satellite. If Q.Comn could be achieved using a micro-satellite, the paradigm of satellite communications would change. This paper assesses the latest advancement in satellite technology in conjunction with an iterative Size, Weight and Power (SWaP) optimization process to do feasibility analysis for designing simplest, smallest, lightest and least power- consuming satellite system capable of Q.Comn with an operationally viable key rate. 1. INTRODUCTION and the downlink scenario, it is assessed that 1.1 evaluating their performance in both the uplink during downlink are completely outweighed benefits due to the fractionally larger key rate The security of quantum communication (Q.Comn) is based on fundamental and Additionally,by the lower an cost, uplink ease allows of operation for a larger and immutable laws of physics and not on the simplicity offered by an uplink to the satellite. andhope unconditionally that a problem secure is too difficultcommunication for an adversary to solve. Naturally, this future-proof variety of implementable Q.Comn protocols (i.e., future-proof nature). This is because technology has a large impact on global many different Q.Comn Protocols (e.g.,E91 [4], communications. Attempts to overcome the BB84 [5], decoy state protocol (DSP) [6], BBM limits imposed by losses and create a global [7], B92 [8]) rely on nearly identical detection satellite based network are underway. However schemes for the receiver and can thus all be these efforts are gigantic and invlove incredibly 1.2implemented on mini satellites. complex ultra-modern satellites which are extremely expensive. Whereas smaller mini / micro satellites based on CubeSats architecture inThe classical timing resolutioncommunication of the from single ground photon to previouscan be constructed long distance and launched implementations for a fraction via detectors enables pulse-position-modulation of the bigger satellite cost. The study of space, with exceptionally fast data rates. The optical fiber [1], free space terrestrial links present generation extremely sensitive single [2] and the successful 600 kg class [3] large photon detectors with exceptional cadence and satellites is undertaken. By analyzing the narrow FOV are proposed for Q.Comn and drive results of these proof-of-concept missions and247 the design for the satellite infrastructure. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

2. QUANTUM COMMUNICATION PROTOCOLS the polarization of an emitted weak coherent 2.1 pulse. Alice must also randomly choose the average intensity of each pulse (to designate protocolit as a signal needs or a decoy different pulse) source in order on ground to avoid as Two most common Q.Comn protocols E91 [4] a photon number splitting attack. Thus each and the Decoy State Protocol (DSP) [6] are considered in this study. In both, information 3.seen EXPERIMENTAL in Fig. 1. INFRASTRUCTURE is encoded in the polarization state of single AND MINI SATELLITE photons at the ground station (Alice) who then sends these states to the satellite (Bob). 3.1 Bob measures the polarization of the received photons in a set of randomly chosen bases. The protocol is divided into several individual isThe connected proposed eitherexperimental to one setuparm ofwill a consistsource “trials”. In each trial, one state is sent and of a Optical Ground Station (OGS), which received. The techniques used to identify each trial depend on experimental implementation of polarization entangled photon pairs (for and protocol. To ensure that the key is secure, Q.Comn protocol E91) or to a pulsed laser with randomly chosen polarization and mean photon EAlice and Bob perform statistical tests (i.e., compute the Quantum Bit Error Rate (QBER number for each pulse (for Q.Comn protocol ) and/or perform a Bell test) on the data they DSP). The signal photons are transmitted to measured from several trials. Thus, they also the CubeSat in a 500 km low-earth orbit (LEO) need a form of (insecure but authenticated) via a free-space link. OGS and CubeSat point classical communication. To obtain the key, beacon lasers at each other for precise attitude Alice and Bob need various post-processing control. The quantum signal is analyzed on (PP) steps that vary between protocols. board the CubeSat using a randomly switched Importantly, the larger the measured QBER, half-wave plate (HWP) and a polarizing beam the more information an eaves dropper (Eve) splitter (PBS). Measurement outcome, basis could, in principle, obtain about the key. Thus choice and time tag of each event are recorded. the number of secure bits of key that can be Information about the latter two is transmitted exchanged per second depends on the QBER. to the OGS using a classical radio frequency The key difference between the protocols is that (RF) link. The OGS identifies the matching bits E91 exploits quantum entanglement of photons using a cross-correlation analysis and tells the to obtain mutually shared randomness (the key) CubeSat which ones to use. Both disregard the between the two parties. In DSP however, Alice other bits, perform post-processing and then encodes information by randomly choosing share a sifted key.

248 Vol. 4 No. 1 2019 Future of Cryptography: Quantum Key Distribution through Micro-Satellites

Fig. 1: Experiment Overview Consisting of Space and Ground Segment 4. LINK BUDGET & ERROR CALCULATION (1)

S 4.1 R E91 is The secure key rate (i.e., bits per second) for E91 protocol The security proofs for both E91 and DSP show E (2) that a secure key can be exchanged only if the QBER is below a certain value. For E91, The secure key rate for DSP protocol is fthe overall limit is 11.0% assuming optimal classical PP with error correctionf efficiency ( 3 ) with= 1. the Realistic same PPf and techniques assuming limit the tostandard 10.2%, 4.2 assuming a PP efficiency of =1.1. For DSP where the factor ¼ is due to the fact that only half of the photons are measured in the right values, the limit of is 6.2%, requirements can be reformulated in terms of the more familiar Signal to Noise Ratio (SNR) as basis and another half are non-usable decoy 249 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

states. Rrep is the repetition rate of the DSP total E91 singles rate of RA ≈ 60 Mcps. Similarly, source. Analogous to Eq.2. The total link loss to the DSP requires a source capable of producing the satellite, ΛB, for E91 (DSP) must be better a controllable mean photon number per pulse than -62.7 dB (-61.2 dB) in order to obtain µDSP ≈ 0.64 (0.1) for the signal (decoy) pulse a secure key, i.e. achieve a SNR of more than where 50% of all pulses carry a signal with a 8.8. Accounting for losses in the apparatus of 5.3repetition The rateCubeSat of >1 GHz. Alice and Bob, the maximum tolerable link loss ΛLfrom sending lens to receiving lens alone, is 5.3.1 5.-43.6 PRELIMINARY dB (-42.2 dB) for DESIGN E91 (DSP).

5.1 The basic block diagram of the mini satellite forbased quantum on CubeSat communication architecture while is shownthose in greenFigure relate2. Components to the pointing, in brown acquisition are those usedand The advantage of the uplink scenario is that most of the mission’s complexity is ground based tracking system. Other essential subsystems and multiple protocols/experiments can be are blue. (TTM: Time Tagging Module, RNG: implemented. Consequently, to better assess the Random Number Generator).The subsystems Q.COmn over CubeSat design problem, first the can also be classified based on the type of design of the optical ground station (OGS, Sec. components used as indicated by the grey 5.1) is analysed and then that of the CubeSat (Sec. dashed lines. All components are fixed to the 5.2). Fig. 1 shows an overview of the experiment CubeSat frame, communicate with the main consisting of space and ground segments. Fig. 2 CPU and supply/draw power to/from the shows a block diagram of all payload components CubeSat bus (all of which are not shown). The 5.2necessary The forGround the Q.Comn Segment mission. CubeSat requires several subsystems as listed 5.3.2in Table 2. eachThe design of which constraint require of different support sources of at least within two Q.Comn protocols by proposed CubeSat mission, For a 3U CubeSat, these components must fit within 0.0032 m3, weigh less than 4 kg photonthe OGS issource enforced with from a pairinitial production modeling stage. rate and consume less than 21Wh per orbit (with E.g. the E91 protocol requires an entangled designexpandable and analysis ≈ 30×30 the cm2 requirements off-the-shelf of solar the panels). Through an iterative process of SWaP RPE91= 100 Mcps and an intrinsic heralding efficiency ΛH of 85% (-0.7 dB). For Alice to detect theCubeSat tradeoffs, have design been choices optimized and basedcompromises on the these extreme count rates on ground, using available technology. This section discusses multiplexed arrays of superconducting nano quantum payload which consists of receiving wire single photon detectors (SNSPDs) with a are discussed in Sec. 5.3. Here focus is on the detection efficiency ηA of 70% (85% for one single SNSPD without multiplexing) and a total telescope, basis choice, polarization analysis timing jitter (including electronics) tA of 16ps and detection subsystems (see Fig. 3). All (15 ps for the SNSPD alone) is proposed. This optical losses are estimated within the CubeSat results in a total ΛA= ηA · ΛH= 60% (-2.3 dB) and (between telescope and detectors) to be ΛOB=- a ground based detector noise rate of less than 1.0 dB, using only standard commercially 100 cps which is ignored in comparison to the250 available devices. Vol. 4 No. 1 2019 Future of Cryptography: Quantum Key Distribution through Micro-Satellites

Fig. 2: Proposed Mini-satellite Architecture based on CubeSat 5.3.3

orswitch (LC-HWP). It randomly shifts the The signal and beacon beams from ground are polarization of incoming photons by either 0 collected by a Cass grain-type mirror telescope. . This effectively acts as a measurement The back side of the secondary mirror carries basis switch in combination with the polarizing the earth-facing beacon laser necessary for beam splitter (PBS) separating horizontally tracking of the CubeSat. The input Signal and (vertically) polarized photons by transmitting detectorbeacon arefor precise separated attitude by a sensing dichroic and mirror clock (reflecting) them. The second PBS is used for (DM). The latter is tracked with a fast quadrant enhanced extinction ratios. Long pass (LP) and interference filters (IF) are used to block synchronization while the former passes a out stray light and the photons are detected by binary liquid-crystal-based half-wave plate silicon-based avalanche photo diodes (APD).

Fig. 3: Schematic of the Optics Payload on Board Cubesat

251 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

5.3.4 R are the erroneous measurement BG consumption pose significant challenges to the

satellite design. Using commercially available originating from the ground area which are clicks due to near-infrared noise photons products, optimization of the secure key rate produced by the CubeSat while adhering to the RBG not blocked by the spectral filters. If the orbit standard restrictions has been done. Results are dB/ height is fixed (chosen 500 km), can only be shown in Table 2. Further customizing of certain fB where fB reduced by reducing the field of view (FOV= parts would significantly lower the total SWaP is the CubeSat tele scope’s effective consumption. The only component that would A long fB focal length). This has two additional benefits: have to be modified is the time tagger, which improves the polarizing beam is however within reach of current technology. A standard 3U CubeSat is 10x10x34.1 cm splitter’s (PBS) extinction ratio sinced it stronglyreduces B excluding the solar panels (with a maximum reducesthe divergence the radiation of the damage impinging to beamthe detector within the PBS. More importantly, a small protrusion limit of 6.5 mm). Another way to gain more space would be to use the less common 4U due to its small cross sectional area. However, 5.4.2standard (10x10x45.4 cm). the FOV must be large enough to maintain the OGS in view despite the pointing errors of the 5.3.5CubeSat. panelsExploded as well view as ofany preliminaryelectric connections 3U CubeSat have design is shown in left part of Figure 4. The solar fB been omitted for clarity. The optical elements telescopeTo achieve despite an optimal the increased, a Cassegrain-type telescope reflector is a good choice for the receiving shown in the red box are out of scale. The right TB part of Figure 4 depicts Artistic depiction of - loss Λ due to the secondary mirror (which the 3U CubeSat with expandable solar panels is estimated to be 1.5 dB in total). This is in bird-wing configuration. They are mounted the required fB because the overall design is lightweight and to the sun-facing side of the CubeSat, the other of 40 cm can be realized with three long sides of the surface can be covered 5.4.3with radiators for detector cooling. ×a 10 cm long telescope. The telescope covers the CubeSat’s quadratic Z+ surface of about 9 circular telescope with DB 9 cm. For simplicity, calculations assume a 5.4 Preliminary SWaP=10 Analysis cm. The CubeSat standard weight limit is 4 kg for whicha 3U, however is useful this ifrequirement an operational can be lifetimerelaxed 5.4.1 to 5 kg depending on the launch provider,

of more than 6 months is desired. The The results of Size, Weight and Power operational lifetime is mainly limited by (SWaP) analysis along with a complete list radiation damage to the CubeSat, especially of subsystems and their control circuits is operationalthe APDs. life Thus, times heavier at the cost shielding of a tighter (not included in the current SWaP) would improve performinggiven below a in quantum Table 2. “Energymeasurement per orbit”and takesrefers intoto consumption account different per one operation full orbit timeswhile weight budget. The type of solar panels and the orbit of the CubeSat limit the total power production per orbit to 21Wh. Only87% of this for each device. The strict limitations of SWaP252 Vol. 4 No. 1 2019 Future of Cryptography: Quantum Key Distribution through Micro-Satellites

value is consumed. The◦ satellite is within line CubeSat is capable of a Q.Comn link roughly of sight of the OGS for a maximum of 11 min once every 1.5Table orbits. 2: SWaP Analysis (if it passes with 0 inclination), of which at most 220 s can be used for key generation. Thus most subsystems only operate for a fraction of each orbit. Together these consume 17.5 Wh while the always-on systems (attitude control, UHF-band communications, GPS and main computer) consume a further 13.5 Wh per orbit. The CubeSat must operate only at night to avoid excessive background counts. Thus a large set of batteries are necessary. To preserve battery life and provide a safety margin it is assumed that the batteries are never drained by more than 30%. Thus a total battery capacity of at least 58 Wh is needed. The proposed design provides for 60 Wh. The CubeSat consumes a total of 31.9 Wh per orbit but its solar panels can only produce 21 Wh. This means that the

Fig. 4: Design of LEO 3U CubeSat for Optical Link

253 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

6. PERFORMANCE ANALYSIS

6.1 by a commercially available space certified on-board computer (OBC) with an ARM9 processor running at 400MHz with enough spare processing power for other satellite tasks. amountHaving specifiedof secret key the the key satellite parameters could acquire for the 6.3 Expected Secure Key Rates design of proposed CubeSat, the estimate on the 6.3.1 with two sufficiently separated OGS (Section 6.2) is calculated , for that estimate of the data storage and transmission needs (Section 6.1), The study shows that shown that Q.Comnr was also calculated. with a 3U CubeSat is feasible in principle. 6.2 On Board Computing 0 Requirements Observations in existing OGS show that an of larger than 5 cm can be achieved or more 6.2.1 than◦ 227 nights per year or 62% of the time. Therefore, assuming a circular orbit with 30 orbital inclination ,it can be calculated that a secure key is not trivial and dictates the choice The classical post processing required to obtain for a total of 44,300 s or 12:20 h, each year the link quality is sufficient◦. to perform Q.Comn. of the on board processing capabilities of the The average inclination in zenithr measurements as seen from ofthe into OGS, account,, is 28.3 the totalComputing key acquired for such in one an CubeSat. The first step is to identify coincidence 0 events. This is commonly done by computing average orbit and taking the a timing cross-correlation histogram which year would therefore amount to 4.0 Mbit (13.0 timingcan be of a computationallyall its detection intensiveevents with task. the It is recommended that the CubeSat share the 7.Mbit) CONCLUSION for E91 (DSP). amountOGS. The of OGS data can transferred identify coincidence and the amount events 7.1 and notify the CubeSat. This minimizes the

ntag time of calculations the CubeSat needs to perform. Q.Comn offers the highest security possible. ntag operations in the The on board processing of all the However, it is expensive and communication tags should be less than 18 distances are limited. This complete feasibility mkey is estimated to require roughly mkey worst case. Calculating a sifted a key of length astudy relatively has shown cheap that and it is easypossible to toconstruct achieve mkey bits of Q.Comn over thousands of kilometers using 6.2.2memory and 15 operations to complete. mini satellite using CubeSat architecture. By miniaturizing the design, optimizing power Error correction requires additional memory consumption and minimizing the weight, and computational power. About 10 to 20 MB full-fledged commercial global Q.Comn can of memory is sufficient for this when using be achieved with a simple 3U CubeSat. This algorithms based on low density≈ parity check includestheoretical selection assessment guides study for the can components, be used as operationscodes. In the per worst second case to calculate it is estimated the secure that guidelines for building a Q.Comn mission which all these PP steps will require 258 million trade-offs and optimizations for the secure key in real time. This can easily be handled254 key rate, choice of orbits etc. Analysis of laser Vol. 4 No. 1 2019 Future of Cryptography: Quantum Key Distribution through Micro-Satellites REFERENCES based alignment advancement suggest that the fine pointing capabilities of CubeSats no longer 1. Yin, H.-L., 117 Measurement-device-independent limit their applicability for Q.Comn and optical quantum key distribution over a 404 km optical fiber (19), 190501. doi: 10.1103/ 7.2links. PhysRevLett.117.190501. 2. Ursin, R., Tiefenbacher et al.: Free-space distribution of entanglement and single photons 6 * over 144 km. 356 Using proposed CubeSat design, a pair of 3. Yin, J., Cao, Satellite-based entanglement ground stations can exchange 13 10 absolutely distribution over 1200 kilometers (6343), secure bits/year. Key expansion protocols can 1140{1144. 67 be used to grow the key with only marginal 4. Ekert, A.K.: Quantum cryptography based on Bell’s theorem (6), 661. security implications. A commercially viable computation power, data storage and classical 5. Bennett Ch, H., Brassard, public key distribution Q.Comn satellite needs significant classical and coin tossing int. In: Conf. on Computers, evaluated all these requirements and outlined Systems and Signal Processing (Bangalore, India, Dec. 1984), pp. 175-9. strategiescommunication to achieve bandwidth. all this This with study minimal has 94 6. Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution , 230504. a trusted node and has the potential for usage doi:10.1103/PhysRevLett.94.230504.68 resources. In the current design, the CubeSat is 7. Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s68 theorem (5), 557. scenarios like QKD between multiple entities of 8. Bennett, C.H.: Quantum cryptography using any critical organizations. two non-orthogonal states (21), 3121.

255 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 High Performance Network Forensics and Anomaly Detection on Commodity Hardware

Kunal Sadalkar1, M Hemavathy2 and M Akila3 E-mail: [email protected], [email protected], [email protected]

Abstract—

Network forensic tools based on deep Packet Inspection (DPI) technology are crucial network level operational security controls for protecting networks from emerging and sophisticated attacks. However, it is becoming increasingly difficult to implement DPI based network forensic systems effectively due to the rising need for more complex analysis, along with the unstoppable growth in the volume of network traffic that these systems must inspect. To address these challenges, future cost effective anomaly detection technologies must exploit the power of emerging highly concurrent multi-core platforms. Unfortunately, current systems severely limit their use of parallelism by either resorting to coarse-grained load-balancing or incapability of Linux kernel network stack to make use of multi core efficiently. In this paper we proposed a comprehensive approach that introduces parallelism across all multi-core commodity CPUs like Intel X86 or ARM. We investigate kernel independent network application strategies that take existing DPI analyses and anomaly detection systems, automatically parallelize their processing over multi-core hardware. 1. INTRODUCTION

1.1 asset,amount point of networkof intrusion, data, time analyzes of intrusion this dataand to find compromised assets, owners of the investigators requires sophisticated forensic Cyber security is both national and economic quantifies data loss. In this complete process, everysecurity day issue. to protect Governments critical &infrastructure institutions are waging worldwide battle in cyber space tools and software. One of such tool is deep packet inspection based network forensic tool and intellectual properties. Today’s wars which provides ability to examine protocol headers and payload of packets. It enables systemshave become are connectedborderless todue the to outside uncontrolled wide with the guaranteeing the transmission quality distribution of internet networks. Once specific action such as anomaly detection along area networks (WAN), the threat scenarios 2.can beTECHNICAL perform on them.CHALLENGES FOR also multifold. Every IT enabled mature HIGH PERFORMANCE NETWORK toorganizations counter threats, are prone every to suchsecurity attacks focused if no FORENSICS ON COMMODITY proper security controls are in place. In order HARDWARE consistsorganization of single must individual equipped or withsmall computer group of incident response teams. This entity may Today there are various challenges to carry network forensics because of the explosive people highly expert in computer and network speedgrowth results of Internet in rapidly and increasing high bandwidth network applications, in terms of both host and network Duringsecurity. theirWhenever investigation any security they breach collect noticed rich these teams conducts thorough investigations. 256load. Additionally, network speed tends to Vol. 4 No. 1 2019 High Performance Network Forensics and Anomaly Detection on Commodity Hardware

increase faster speed than CPU and memory incredibly difficult with current tooling. Most of speed causing gap between network and end forensics tools have difficulty with this size of system speed. For example today 10Gbps data. However it’s not only just size and scale softwareEthernet runninginterface on is them widely through used conventionalin industries viewbut also of todaynetwork there data are noin goodterms technological of threats, but general purpose processors along with solution available to provide comprehensive approach are incapable of process such 2.2sessions, Visualizing protocols and files. Querying Data for speed data. Hence there is need to exploit full Intelligence Gathering potential of existing cost effective multi-core functionality of general purpose processors. In one of the research observation it is found The flow of data traffic among systems on the that, performance of Linux kernel’s networking network, the exchange of information and stack doesn’t scale with respect to increase in services between countries, are examples number of cores because of following reasons: of causally connected measurable events in network packets with interrupt driven a network [2]. Understanding the behavior (a) methodologyLinux kernel which handles adds unnecessary incoming to discover temporal connections among of such networks often requires the ability is that relevant events are hard to identify packet processing overheads. automatically,the events in a so large the data investigator set. The problem must (b) Prior versions of Linux kernel networks stacks are not multi queue aware. organize events into a narrative sequence by (c) Inefficient usages of memory for packet hand. The investigation process often requires intensive processing applications. backtracking and multiple comparisons, which (d) Per packet processing performance is not well supported by current forensics tools. degradation on smaller packet size presentingThere is need network of new eventinteractive data visualizationat multiple networking data. levelstechniques of detail for for analyzing, the purpose organizing, of forensic and Linux network stack is good for general purpose suchnetworking as packet solution, analysis but and not anomaly for applications detection that require high-speed packet processing analysis - tracking down causal sequences of 2.3importance. Behavior and Pattern Anomaly 2.1systems Data on Storagehigh speed Challenges network interfaces. Detection Bottlenecks over a last decade there is always challenge for unless it has used for generating security Although storing data has become cheaper inferenceThe collection and detecting of raw packet unwanted data ismalicious useless indexing such huge data and efficiently access it in a real time. A normal 100 Mbps line for a traffic behavior. Performance of the tools used for analyzing anomalous behavior and Makingmonth can sense generate of this a volumepacket logof informationof 3TB. It may is contain approximately 500,000 attacks[1]. matching on such real time huge traffic also limited with their single core oriented design. 257 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3. DESIGN OBJECTIVES performance anomaly detection and deep

3.1 connected to network tap which captures every packet inspection. One of its interface is in previous section in mind, following design By keeping technological challenges discussed in and out high capacity packet traffic. Figure 2 describes architecture of performance anomaly network forensics and intrusion detection objectives can be decided for high performance detection and deep packet inspection server. 4.1This hasHigh following Performance sub-components. IDS and DPI systems. Engine of commodity hardware for high speed (a) To fully exploit multi core functionality

packet processing. This block performs highly scalable multi core packet capture and deep packet architecture for packet processing. Each core (b) inspectionTo design andengine develop on costcommodity effective Packet capture: performs following sub-functionalities. (a) This is user space hardware. traditionalpacket capture slow module path packet using Intel’s processing, DPDK (c) To design and implement methodology library[4]. To overcome limitations of and APIs for huge data storing, querying and real time processing. Intel developed open source framework named Data Plane Development Kit (d) To design and implement intuitive environment(DPDK). This frameworkthrough the creates creation set of network data visualization technique for libraries for specific hardware/software huge data. Packet Analysis: (e) To flag or alert anomalous traffic environment abstraction layer (EAL). behavior based on data mining and (b) This block performs ‘never seen before’ traffic. packet decode, protocol identification architecture for network security Logging: (f) To design and develop service oriented and anomaly detection. network payload data, session metadata (c) This performs full indexed solution. (g) To identify application protocols, traffic and alert logging. 4. ARCHITECTUREpattern and metadata. & METHODOLOGY FOR HIGH PERFORMANCE NETWORK FORENSICS USING DEEP PACKET INSPECTION deployment diagram of solution for high Figure 1 shows network level operational

258 Vol. 4 No. 1 2019 High Performance Network Forensics and Anomaly Detection on Commodity Hardware

Fig. 1: Typical Network Deployment of High Performance Deep Packet Inspection and Anomaly Detection

4.2 Data Processing APIs and 4.3 Packet Logging in Big Data Rendering Engine Storage

storage and data locality putting spindles In order to scale and reuse its core functionality Apache Hadoop[3] is optimized around cheap data processing APIs facilitate service oriented architecture which can be used by other next to processor cores. To analyze full packet security control systems. This is based on open captures, Apache Pig – a dataflow scripting source Packetpig APIs which does deep packet operating system detection, and other deep interface on top of Hadoop can be added. The inspection, file extraction, feature extraction, length of retention of data can be based on the packet captures focuses on providing as much each day and the window of time one want to network analysis. Packetpig’s analysis of full amount of data flowing through the network context as possible to the analyst. be able to peer into the past.

259 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Ethernet Card (Flow load balancing)

Data Rx1 Rx2 RxN proces sing Capture Capture Capture APIs

and Detection Detection Detection Render & Analysis & Analysis & Analysis ing Log Log Log Big Data engine Big Data Big Data

Core0 Core1 Core2 CoreN

Fig. 2: Architectural Diagram of High Performance Anomaly Detection and Deep Packet Inspection Server

5. CONCLUSION technology to counter advanced network threats, enlisted technological challenges to 5.1 implement high performance packet processing network forensic tools on commodity

Traditional network defenses such as UTM/ ofSIEM security have administrator limited visibility to identify over successful ongoing architecturehardware and for successively network forensics proposed to overcome a multi- attacknetwork and activity. successively In order speeding to improve up of efficiency response core, scalable high performance software time depends on the use of forensics tools REFERENCESthose technological challenges. tools on commodity hardware have limitation toeffectively. scale for Currenthigher throughput network packetdue to inherent forensic Ph.D. 1. DissertationSupporting the Visualization and Forensic Analysis of Network Events, Doantam Phan, architecture of traditional Linux network stack. , Stanford University, December 2007 Utilization of multi-core features provided in 2. https://hortonworks.com/blog/big-data- security-part-one-introducing-packetpig/ themodern importance CPUs is must of deepfor processing packet inspectionpackets at higher throughput. In this paper, we studied 3. hadoop.apache.org/ 4. https://dpdk.org/

260 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 HR Strategies in Support of Joint ICT Structures

Brig Ramesh Balan

“Military institutions do not transform, people do; and in so doing, they transform the institution”

—Stephen Peter Rosen (Winning the Next War: Innovation and the Modern Military)

Abstract—

Joint officer management and training will evolve in accordance with the kind of jointness that we choose to adopt. Whichever way we go, this would undoubtedly be a key result area to prepare for future wars. Early adoption of relevant measures will only enhance joint warfighting capabilities, and grow an increasing number of officers well rounded in joint matters. HR strategies for Joint ICT Structures will constitute a critical area worthy of our collective attention. 1. INTRODUCTION

1.1 willeducated, need consciously empowered decide and how harvested. they wish Byto corollary, this implies that the three Services

transform. takeThe characterus there1 of war and warfare is continually 1.3 changing. Paradoxically, “what got us here, won’t ”. So serious introspection is due. For some time now, we have all accepted that But this will require us to rise above jointness is the inclusive mantra for emerging withconventional a spirit ofmindsets honest andinquiry our andservice-specific the resolve conventional kinetic battlefield scenarios of scripting, to re-frame the questions we ask, thisthe future.analysis Perhaps the term even is inused the to non-contact mean the warfare domain. But what is “jointness”? In to implement. We will need to confront change 2 2.and DEALINGembrace it. WITH HR effective integration of the combat capabilities of the Services . To that effect, most advanced 2.1 militaries have become more joint over the last Dealing with HR big task 1.2few decades. has always been a . Typically, the scope of HR in the Armed Forces needTherefore, to rapidly the entiregear up, war-fighting to operate machinery, in mutual scopeextends of tothe military current personnel discussion, of this all ranksAnalysis as cutting across Service and cultural barriers, will willalso restrict defence itself civilians. only to However, officers, that to limit too in the a joint ICT context synchronisation. While man and machine both will be important, the man behind the machine . That said, preparing officers will clearly be vital. Irrefutably, human capital for joint service – in the right numbers and with will need to be invested into, managed, trained, the right kind of expertise and experience – will

261 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

approachrequire us wouldto define identify and implement needs for aeducation strategic creation of Integrated Theatre Commands? approach for joint officer management. Such an In the case of the U.S., such drastic reforms personnel policies and practices to ensure that were encompassed in the Goldwater-Nichols and experience in joint matters and establish Department of Defense Reorganization Act of 1986. But are we actually ready that? And is it officers with the required knowledge, skills, and3 2.5the only viable way? experience are available to meet those needs . It would, in other words, focus on aligning the 2.2need with the supply. Every country has to pick its own pace and approach. In matters of jointness, respecting of higher defence structures have manifested and accommodating cultural sensibilities is Hesitant steps towards jointness and reform perhaps just as important as knowing and stimuli, rather than panning out as a well pursuing what is right. Presumably, our senior merely as sporadic responses to external willhierarchy require is the already patronage seized of ofwise this. leadership, But the ad hoc and archaic inevitable reform that will need to follow, thought through plan. Our inheritance in jointness is a legacy of resolute will and collective involvement. It will whichstructures are hastily such as put the together JOC, JAAOC in the andface suchof a have to cut across the three Services and touch like; essentially joint bodies and structures Doctrine, Organisation, Training, Equipment 3.and JOINTPersonnel OFFICER aspects. MANAGEMENT crisis / emergency and dissipate thereafter. No institutional memory. No persistence. In fact 3.1 as on date, other than HQ IDS, HQ ANC, certain training establishments, DSCC, DCN and SI 2.3units, barely any joint structures exist. Bluntly put, the crux of the problem wrt joint officer management in India is that we have grown with single service scripting. To Since structures have not emerged, staffing of4 therethe bulk is ofa usslow jointness process is of a superimposedacculturation joint establishments has not evolved beyond whichconstruct, is unconsciously not an ingrained in belief.progress, No doubtwhen “a collection of borrowed military manpower” posted to apportioned billets determined by bureaucratic selection and assignment an officer serves in a joint establishment. As procedures. These officers serve their tenures far as the Services are concerned there is an worth roughly 2.5 to 3 -years as ‘purple-men’, increasing acceptance of joint establishments before they revert for advancement within – particularly in matters related to budget and their own Services. Is that good enough to win procurement, and Doctrine, Organisation and 2.4us the next war? Training. Joint Intelligence is faring reasonably well for two reasons, viz one - it draws upon a potent and performing SI (with an established A difficult choice therefore stares us in the organizational culture) or certain others face. Should we take the bull by the horns (constituted of the very best in terms of talent and adopt a top-down, integrated approach and exposure); and two - it received a boost to ushering in jointness, culminating in the262 after Operation Vijay and enjoys a position Vol. 4 No. 1 2019 HR Strategies in Support of Joint ICT Structures

of pre-eminence. Joint Operations and Force star rank. Now this will call for the entire Development however remain the Holy Grail. career progression path of a promotable one Well that may not be bad, in the life of a 72 year star officer, to be so structured that that a joint young nation; clearly a lot more needs to be exposure can be earned at the right stages. 3.2accomplished. But, a numbers check will show that we just do not have the required number of joint billets to achieve that. So the emergent alternatives From the perspective of the MS / Personnel would be to either make such an eligibility Branches of respective Service, joint billets orcriterion accord desirable discretionary rather waivers than essential, where due or soto are filled against QR, which indicate minimum accept some notional joint-billet equivalence, acceptable eligibility criteria. Nonetheless, a alternative measure would dilute the primary considered opinion would be that joint billets that individual officers do not suffer. Each such are still not at the totem position. Part of the reason for that is that we do not have HR purpose of laying down such an eligibility policies that are truly joint / integrated, rather criterion to begin with. It could also happen they are an amalgamation of extant single that it just is not in scheme of things for an service policies as applicable to respective IAF flyer to serve in avis joint a visbillet wet to listingbe eligible and personnel contributed by that Service. But can to become a two star; or for a naval officer to HR policies really be joint / integrated, when choose a joint billet each Service recruits, commissions and trains sea-time. Why should he? And why should the HR/ talent principally to meet its own known IN or IAF espouse such a career progression path at the cost of its own Service priorities? economiccommitments? reasons, In fact we givenare merely the numbers apportioning being commissioned annually for a variety of socio- While it may be possible for the IA to provide joint service exposure to say a deserving what is available rather than exceeding ASC officer in a joint billet – stemming from commissioning targets. Overall, this probably is reasons of say cadre management in Colonels a natural outcome of the way we are organized rank, cultural sensibilities and prior exposure / structured, and in effect the way we think and may make him completely unsuitable to run operate. Unless this root issue is addressed, writ over General Cadre officers serving in IA- specific billets. In a nutshell, we have a bundle 3.3tangible dividends may not yield. of contradictions staring us! Notwithstanding, it may well be worth our while to frame Joint Officer Management provisions. But it is difficult to change that unless a 3.4 comprehensive analysis of the joint HR context is undertaken; where numbers are matched - criteria to billet – against a typical The intent of the joint officer management single service career progression path. A mere assignments,provisions would which be in to turn enhance would the improve quality, qualitative examination and the resultant stability, and experience of officers in joint recommendation will just not suffice. As an operations illustration, let’s consider that a policy decision the performance5 and effectiveness of joint is taken making a ‘minimum one tenure joint . Some issues relevant in our context exposure’ mandatory for promotions to two can be flagged as follows:-

263 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

Fluctuating Pattern of Wastage:

(a) some areas of specialization already Intake pattern and speed of promotions cut across Service boundaries (e.g. SI isin a respective tall order, singlefor reasons Service of individual will need and Medical services), certain others to be mutually harmonized. Now this potentially can cut across Service lines with minimal tinkering e.g. IT & vagaries when taken batch-wise and Communication, Cyber, Space, Aviation, willService-wise. clearly not Even have if athe common same date datum of UAVs, Imagery, Strategic Missiles and line is assumed to begin with, all cadets so on. Concurrently, whereas certain date of retirement for a given period of common comparable domains can be birth and consequentially the same adapted with effort e.g. Administration, how many will get commissioned each Logistics, AD and Gunnery, some core year,service. and No how Service many can will forecast get wasted precisely out areas across the Services, cannot easily on account of premature retirements meld e.g. infantry or armoured, fighter / transport aircraft flying, and sailing ships and submarines, being distinct in Criteria Appointments: While all or for being below acceptable medical their characteristics. category and so on. So it will be clearly be and promotion pattern in the face of (c) model of unit interspersed with staff difficult to preserve a harmonized intake duty,the three the quantum Services of largely time spent conform in each to a fluctuating wastages. As a consequence, officers across the Services, may not Joint Service Specialisation kind of billet and the service bracket come up for promotion at the same time. in which these billets are tenable may (b) ? differ. The model of Adequate Exercise Tenure-lengths, rotation philosophy, / Criteria Appointment (deemed as a normalizedvis a vis career progression path critical to be considered by the Selection and relative importance of joint service Boards) adopted by each Service may billets individual service billets differ. In the IA and IN, command of a will also need to be addressed and sine qua non tobody individual of troops demonstrated or a ship / unit competence is deemed standardized. Apart from the mechanics , it may pale in significance of fulfilling such a challenging ask, it poses a fundamental question – will in flying, for say the IAF. Perhaps, the we be commissioned as joint Service accept different modes of evaluation for Services will need to understand and officers, who will specialize in one of the three single Services or rather will equivalent ranks, based on job-specific we continue to be commissioned as Miscellaneous Issues requirements. single Service Officers (from one of IA, miscellaneous aspects which will need IN and IAF), some of who will do a joint (d) : Certain Service specialization? Another relevant question in this context is whether we harmonization include skill and talent wouldvis a vis have our respective arm/ service/ employment,retention measures, promotion identification and other of branch as areas of parallel specialisation AE criteria, premature release, re- ( joint) or whether these would be nested as a super-specialisation selection boards, and handling of under and beyond jointness? While264 non-empanelled officers, deputations, Vol. 4 No. 1 2019 HR Strategies in Support of Joint ICT Structures

designation of assignments as

subsuming within itself personnel from the Extended/ High Tech, High Tech Corps of Signals, Naval Signallers and some complaints(Specialised) and or Sensitiverepresentations, as per numbers of Electrical Officers and a subset of commonly evolved yardsticks, ACRs, the AE (L) from the IAF. Just for the record it is important to observe that the IAF has two (including an acceptable vis internal a vis types of Aeronautical Engineers, some of who oversight mechanism), legal aspects, are commissioned into the cadre of Electrical applicability of a Jt Service Act andEngineers. electronics This cadreas also handles oversees IAF repairs Signals in (less the say the Army Act, Inter-Arm-Branch- radio) apart from Radars, Airframe electrical and-Service-Transfers, uniform norms for commissioning (across different affected area. Presumably they also handle IT entry types and genders), postings support. Handling the radio set is tackled by (regular, compassionate ground, last pilots and ATC officers, whereas the AE (L) leg and spouse coordinated), inter- look into its repairs. So who is the specialist service-cross-attachments (in staff and Signaller from the IAF with whom the IA can regimental billets), and employment readily relate and find equivalence? The Naval punishments,(staff, regimental, discipline, extra-regimental, vigilance, Signaller is from the Executive Cadre akin honours,instructional awards and foreignand welfare assignments), matters, to IA’s General Cadre. He does not handle IT cadre management issues for principal support which falls into the lap of the Electrical Engineer, along with repairs to all electrical and electronics on board a ship. The IA’s Signaller is and support cadre etc. While a mere a distinct breed in this context. Someone from mention has been made of these issues, a supporting, rather an enabling arm, a hybrid there is no gainsaying that these HR who has chosen to evolve himself with combat matters will require considerable proficiency - operationally, procedurally and deliberation and discussion for viable technologically; someone who embraces 3.5 common tri-Service norms to emerge. telecom and IT with equal elan. In sum, each of the three Services throws up its own flavor Signallers across the Three Services of ICT-specialized HR … for reasons unique to go further and assume for the moment that the : Let’s each of the Services. While, it would not be a cake-walk to cull out viable QRs for joint ICT Gordian knot has been cut, that Joint Officer billets, however, jointness in this cadre will still be achievable by careful selection and training Provisions have successfullyper se been framed. Two thoughts are relevant in this context. The Joint / professional military education and suitable Officer Provisions could be based on a lead 3.6acculturation. Service model, e.g. that of the IA and modified The Joint Signaller thereafter based on context-specificde novo best practices followed by the other two Services. : One may say OK, but why Alternatively, they could be framed – put in such effort? The rationale is simple. a herculean effort by any account. The second Communications and IT constitute the nervous concern relates to identification of job-specific system of an organisation. Can one imagine QR based on the felt need in the emerging joint singlea Joint service establishment components, without or upwards the ability to its to environment. Let us carry forward the latter transmit orders / receive feedback to/from its issue. Assume that a Joint ICT Cadre is raised,265 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

superiors or laterally to its peers? The essence himWhile to Trainingthink through drills issues a candidate that may in not tackling lend of C4I2SR and NCW lies in this communication specified, repetitive tasks, Education prepares informational,and IT. Of course cognitive it will and need social to go domains beyond the physical domain and extend into the 4.2themselves to typical solutions. as well. With the appointment of CDS having finally been announced, it is only logical for this While individual Services run a number of dimension to be explored and given a concrete training courses for their own officers, iconic anshape. ad hoc Should we then have Joint Service Signal Units and HQ? Can we continue to function in institutions like the NDA, DSSC, IAT, CDM manner based on loose collaboration? and NDC run certain well established joint Where is the organizational flexibility and courses – which make a huge value-addition resilience with the IA, IN and IAF to tackle these in a number of ways, not the least of which is kind of requirements. Can we look at a lead joint acculturation. Premier institutions such as service model? As the largest Service IA may be the three War Colleges organize cross-Service expected to play a lead role in this regard. That visits and run the renowned Joint Capsule and may be good to start with but sustainability and 4.3Core programmes. growth will require something beyond that. It also does not require Einstein-ian brilliance to figure out that joint training and acculturation In the joint ICT context, courses on Joint will be critical to make such an overall Electronic Warfare (JEW) and Frequency arrangement work effectively, be reliable and Spectrum Management (FSM) have responsive to meet war-like scenarios. 4. JOINT PROFESSIONAL MILITARY traditionally been run, by rotation by each of EDUCATION (PME) AND TRAINING the three Services. There are a number of ways, andhowever, understanding in which we how could each do better. of the The three JEW 4.1 course for instance needs to go beyond sharing like all other professional men, Services wages EW (communication and non- Skilled officers, communication) in their own Service-specific are products of continuous and laborious study, contexts. The key issue is to ideate how we may training, and experience. There is no shortcut to fight joint in the EW domain, by working towards mostthe peculiar vitally typeessential of knowledge element inand modern ability theywar, a common objective. Switching tracks, the FSM course spends considerable time on nuances andmust the possess. only one Trained that under officers no constitutecircumstance the related to peace-time spectrum management. Wouldn’t it be better to address the spectrum can be improvised or extemporized6. In requirement of a typical joint operation for the Service community, we identify two key communication and non-communication needs so that at least that one aspect is stitched up? components of PME: train for certainty and This will include progressive improvement educate for uncertainty7. Both are required, nomination of a single venue, so that ownership intervals, spread across the career span of an of syllabi to address practical concerns, albeit in the right proportions at calibrated institutional memory is accreted, streamlining is taken by at least one institution; and officer, as they fulfil complementary roles. 266 Vol. 4 No. 1 2019 HR Strategies in Support of Joint ICT Structures 6. CONCLUSION implementationthe nomination of of Directing distance Stafflearning from packages, all three 6.1 Services, compilation of training material, All indications are that future wars, whether instituting measures for on-line access to pre-course and course material which would in the conventional kinetic or the non-contact domains will be fought joint. With the HR be equally accessible to officers from across aspects remaining just as important as ever, the three Services, development of joint ICT considerable attention will need to be paid to training infrastructure, enhanced availability management of personnel in the joint context. of ‘in-service’ ICT equipment, adherence to In order to fight together there is a need to 5.common RECOMMENDATIONS joint procedures, and so on. train jointly, the objective being to prepare8 officers/men for present and future conflicts . 5.1 This would lead to a common understanding of doctrines, concepts, each other’s Service recomme competencies, capabilities, strengths and Apropos above, the following steps are REFERENCESlimitations and evolution of new joint ones. Arrivended:- at an early decision wrt the shape

(a) 1. Marshall Goldsmith, What Got You Here, Won’t of future joint structures, viz, status quo, Get You There, 2007, published by Hyperion, New York, U.S.A. lead Service / Command or integrated 2. Dr. Don M Snider, Jointness, Defense theatre Commands. Transformation, and the Need for a New Joint develop and adopt a strategic approach Warfare Profession, 2003, Parameters, US Army (b) Contingent on the preceding decision, War College, Quarterly,et al published by the Strategic Studies Institute. 3. Thie, Harry J. , Framing a Strategic Approach to HR aspects in support of Joint (ICT) 4. ibfor id Joint Officer Management, 2005, published by the Rand Corporation.et al Structures. . (c) Evolve joint officer management 5. Harrell, Margaret C. , How Many Can Be Joint? Supporting Joint Duty Assignments, 1996, provisions. Test-bed them in the context published by the Rand Corporation. of the HR work-force for Joint ICT 6. Douglas MacArthur, May 1932. 7. Maj Gen PK Mallick, VSM (Retd.), Occasional Paper structures. on Professional Military Education - An Indian Experience, 2017, published by Vivekananda (d) Give a fillip to professional military International Foundation. education and training in Joint ICT 8. Joint Training Doctrine, 2017, published by context. Directorate of Doctrine, HQ IDS.

267 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019 Utilizing Decentralized Technology for HRM Advancement

Avnish Singh Jat1, Rajkumar Pandey2 and Akshay Singh3 1IT Consultant, Kriptech Systems Engineering Pvt. Ltd. 2Managing Director, Kriptech Systems Engineering Pvt. Ltd. 3Project Manager. Kriptech Systems Engineering Pvt. Ltd. E-mail: [email protected], [email protected] [email protected]

Abstract

—This paper aims to uncover the conceivable outcomes of utilizing the blockchain innovation in the field of HRM, featuring its advantages and potential issues for the HRM business procedures. A literature review has been led to distinguish the present status of utilization of Information Technology in the area of Human Resource Management and how Blockchain can help accomplish a shrewd, savvy, effective, straightforward and secure industrial facility administration framework. The fundamental ideas and components of the blockchain innovation -, for example, hashing, DLT, and smart contracts, are talked about. Revealing a few issues in the HRM business forms, the paper looks at blockchain-based arrangements. Future research headings have additionally been recognized and upheld. 1. INTRODUCTION in different parts, including monetary 1.1 administrations,it is would have human liked services, to improve coordination exercises

Business improvement procedures and plans and government sectors. Perceiving the must be firmly connected and start with HR. advantages of blockchain, the EU is attempting The changed spotlight puts new requests to build up the innovation: in February 2018, on both HR experts and the product they the purported. Blockchain Observatory and use. New innovative arrangements are being Forum, with Maria Gabriel, Commissioner looked for the more productive execution of thatfor thecan Digital change Economy numerous and parts Digital and Society, carry business forms in the field of HR the executives. characterizing it as a key distinct advantage The progress to the utilization of business process the executive’s frameworks, cloud numerous advantages to Union residents advancements and portable applications, BI additionally(Europa.eu ,gave 2018). uncommon In his discourseconsideration to the to 1.2advances and artificial intelligence is common. scholastic network, Chinese President Xi Jinping

blockchain, saying that innovation is critical to Simultaneously, as of late there has been a the intensity of the Chinese economy (Coindesk. withdeveloping cryptographic spotlight forms on blockchain of money, innovation. and today com, 2018). A basic overview of interaction Up to this point, it has been basically connected with blockchain decentralized application can 268be seen in Fig. 1. Vol. 4 No. 1 2019 Utilizing Decentralized Technology for HRM Advancement

Fig. 1: Blockchain Interaction Model 1.3 2. EXTENSION AND TASKS OF HUMAN RESOURCE MANAGEMENT

Blockchain is in the insight of US tech giants, 2.1 including IBM and Microsoft, which effectively offer explicit arrangements and apparatuses individuals who work or will work in the Human Resource centres around the articlefor structure is likewise blockchain-based set out: to applications.investigate the In this specific circumstance, the reason for this in its advancement incorporates parts of human capitalassociation administration, as its most significant which spotlights resource andon conceivable outcomes of utilizing blockchain methodologies for dealing with the workforce, innovation in business forms in the field of HR the executives, recognizing a few focal points causesupgrading to noticeit and pullingthe business in, creating, advantages spurring of it and potential issues in its usage. To achieve and(Bershin, holding 2015), appropriate and ability therepresentatives board, which this, it is first important to break down the business forms in the field of HR the board and blockchain instruments. (Medved, 2015). There are various perspectives

269 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

An essential prerequisite for cryptographic with respect to the number, name and substance of business forms in the field of HR hash capacities is that the first information the board. As indicated by the creator, as a can’t be recouped from the hash - for example beginning stage for their distinguishing proof that it can’t be unscrambled. It is likewise can be utilized the general plan for grouping not allowable to have distinctive information of business forms, based on which they can hash esteems. Cryptographic hash capacities be partitioned into administrative, primary can utilize various calculations. For instance, mayand supportingincorporate (Filippova those for and making Filipov, systems 2009) Bitcoin utilizes SHA-256 and Ethereum utilizes (Fig. 1). Specifically, the board procedures KACCAK-256 (SHA3-256). The two calculations thespeak hash to esteems the produced of a few hashesunique spellings as 64-digit for reports,and plans planning for human authoritative asset the executives,structures hexadecimal numbers. In FIG. 1 demonstrates controlling exercises and creating different “HR” as indicated by SHA-256 and SHA3-256, advancementand positions. of The the principleadministration procedures idea and are separately. As the model shows, the produced the “centre” of human asset the board. The qualities are a similar length - 64 characters, straightforwardly the improvement of the and each adjustment in info brings about an the innovations for HR the board ponder alternate Hashhash values esteem. according to SHA256 primary procedures in this field and bring aimed at the workers of the association and Human 378351dd7b11d622ed374e5004f27f5fc furnishforth new them ones. with The some primary particular procedures outcome are Resources 9554a34b9c68eef832364f8bba81fa6

Human 3e6ae9e2f46ed964779d0380a19faa49 resources dfa76471c0fd2c046f0c1d6c46e07af2 aor representative administration. and placing Instances him ofin the significant activity; business forms in HRM are: enlistment; naming ebda4567c1843b572bf935305fa6a1264 Cryptographic Hash values97c491bf452ae73c80835b855198719 according to SHA3-256 in-organization preparing; ability improvement and the executives; advancement of pioneers; done; worker accreditation; overseeing leave Human 61c15db785d16351d7be4a9692f0bd3d execution the executives; estimating the work Resources 534ecfae45a76849cee8d85b9c7a504d

Human 70efa470cc543cff0198043647e948c1 demands; retirement and that’s only the tip of resources eefa8bfef74af0df7de473067dfb3339

3.the iceberg.UTILIZATION OF BLOCKCHAIN FOR 9436678c1e8dc7abfdbe10e6516de5400 HUMAN RESOURCE MANAGEMENT Cryptographic f64b6490dd324c10da0c7c113f4e760 Fig. 2: (generated by emn178.github) 3.1 3.2

Blockchain is a data structure: it comprises of chaininformation depends hinders on hashing, that structure which ais backlink. one of One of the significant difficulties for HR The structure and support of the blockchain experts is finding the correct experts who, with their insight, capabilities and abilities, its key components. In cryptographic hash can fit well into the organization and add to capacities, contributions of any length are its prosperity. As indicated by an investigation changed over to yield strings of a similar length. via CareerBuilder (2016), a HR counselling Yield strings are called hash esteems ​​or hashes.270 firm directed in Chicago and Atlanta in 2016, Vol. 4 No. 1 2019 Utilizing Decentralized Technology for HRM Advancement wrong representatives in the most recent correspondence in the working environment, 75% of businesses concede they have enlisted demotivatesand enlistment representatives of reasonable workers)and makes ruins year, i.e. they had an “awful contract”. Also, the normal expense of enlisting an ineligible them increasingly capable. For instance, worker is $17,000, going between $ 11,000 endorsements, certificates and suggestions for independent companies and $ 24,000 for given by candidates assume a significant job in enormous organizations. The impact of poor the determination of representatives. Checking procuring is communicated in: lower efficiency them takes quite a while. It is no special case when and lower nature of work performed by the occupation candidates give off base data about timeworker for concerned; different exerciseworkers, in client futility protests; looking their capabilities and pragmatic experience. As fallingand preparing apart work another environment representative; atmosphere extra per an examination via CareerBuilder (2014), directed in the US (Chicago), about 60% of andmanagers results lie accomplished, in candidates’ scholarly CVs - as degree, far as and the sky is the limit from there. Comparative positions held, exercises performed, duties information for 2017 (again for the USA) is being sent out by another counselling firm - college participation, praises got and so on. itRobert takes Half.a normal As indicated of 17 weeks by their to address study, 81%such suchCounterfeit misrepresentation confirmations is andespecially endorsements normal of businesses confess to enlisting blunders, and are frequently displayed. As per the overview, that the length of enrolment and enlistment a mix-up (Half, 2017). Another major issue is procuringin areas, for untalented example, staff social can insurance have genuine (63%) and budgetary administrations (73%), where procedures has expanded altogether as of late. While by 2010 its normal term is 13 days 3.5outcomes. (www.fastcompany.com, 2015), by 2017 it is 3.323.7 days (Chamberlain, 2017). The approval of the information given by keeps up particular quest for new employment occupation candidates is confused by the locales,As indicated it setsby a reviewaside theby DHImost Group, effort which to expanded versatility and globalization of the workforce, just as by the expanding decent variety of preparing and capability structures. contract profoundly qualified authorities, for U.S. Research The Bureau of Labor Statistics example, building staff (62 days), business (2016) points out that recent college grads and frameworks experts (57 days), IT masters multiplematured 25-34times yearsnot remainas much in oneas individualsoccupation (56 days), IT pros promoting and publicizing at a normal of 2.8 years, which is almost 3.4(54 days) (Bika, nd). matured 55-64. Comparative wonders are seen 3.6in our nation. Various experts (Crichton, 2018; Thygesen, candidates2017) refer and to therepresentatives, absence of truston the between other, whichbosses, prompts from one wrong perspective, administration and occupation choices toThis talk, reasonable at the spot propensity and nation to of changeliving employments all the more frequently (thus and defilement (incorporating into the choice arrangement) requires rehashed keeps an 271 : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

the maintenance of various duplicates eye on the application reports, for example, the dangers of distortion and extortion are and the requirement for agreement. one needs to think unusually, including to of information hashing and connects searchlikewise for expanding. arrangements To in beat some such rising issues, data (c) Higher security coming about because from the requirement for agreement inbetween including squares information in the chain,and evolving just as advancements, for example, blockchain and DLT. They achieve various advantages to business procedures and information (Hooper, applications (counting shrewd 2018; Voshmgir and Kalinov, 2017; Filipova, agreements). 2018), which are communicated in: (d) Reliability that is expected to DLT and (a) Trust that is kept up by all partners, ie. keeping up indistinguishable duplicates it is decentralized. It’s about the alleged. of the chain over all hubs. “Trustless trust”: without confiding in any of the members in the blockchain, (e) Higher effectiveness and lower cost. the client can believe the aftereffect of The requirement for middle people the information preparing. (because of which business procedures are quickened) is decreased, just as the (b) Transparency and follow-up coming work expenses of filing and securing about because of the constancy of data, data.

Fig. 3: Blockchain Network Architecture

272 Vol. 4 No. 1 2019 Utilizing Decentralized Technology for HRM Advancement 3.7

blockchain-based quest for new employment the previously mentioned issues in the centre stage and the utilization of shrewd agreements These focal points make it conceivable to defeat up a worldwide stage for assessing work (Cherkasov, 2018). Its makers intend to build address them, various new companies are business procedures of HR the executives. To comer, a “notoriety” is framed, which develops assearchers’ they check expert and abilities.add new Foraptitudes every up-and-to their frameworks to check data for occupation endeavouring to actualize blockchain-based profile. The framework positions applicants candidates - incl. recognitions, authentications, by their notoriety, and the individuals who proficient experience and different subtleties. are among the best in the field get additional For instance, the APPII stage (www.appii.io, focuses. Organizations, thus, approach solid n.d.) empowers work searchers to assemble data about occupation candidates. What’s a supposed. A “shrewd profile” that portrays more, some routine enlisting exercises are subtleties of their preparation and expert administrations are paid with work tokens: themechanized more clients through the framework savvy contracts. has, the higher Stage enrolledaccomplishments. as accomplices After in check the framework, by past bosses the and preparing establishments that are 3.10their worth. proofinformation is accommodated is recorded in blockchain, more noteworthy making it difficult to misrepresent it. Buyer recognizable A comparative undertaking is likewise application, and this picture is contrasted security: they are caught utilizing a versatile being worked on in Bulgaria: the makers with a photograph from an official archive, of the Ethereum blockchain-based Open Source stage have the aspiration to create of(for the example, stage, clients an ID cardget tokens or international that they ID).can scholarly community, understudies and For their commitment to the improvement “straightforward” connects between the use for courses and preparing, for instance. organizations oversaw through shrewd Simultaneously, a few colleges, for example, the agreements (www.os.university, 2018). It is Massachusetts Institute of Technology - MIT, recognitions,visualized to authentications, utilize advanced and portfolios so on that in are creating ventures to hold understudies’ which clients can store archives, for example, confirmations in blockchain. 3.8 have been confirmed and approved through the instruments of blockchain innovation. Through application, understudies get a checked and coordinating calculations, jobseekers can Through the Blockcerts Wallet versatile rapidly locate a reasonable situation for their capabilities and bosses can discover appropriate fake duplicate of their certificate that they can lines,competitors. such choices, The stagein view administrations of open or private are impart to businesses and different partners utilized against EDU tokens. Along these (Durant and Trachy, 2017). 3.9 enrolment procedure, while additionally taking careblockchain, of the canissues essentially of trust and abbreviate discovering the

There are as of now various ventures for blockchain-based quest for new employment reasonable applicants. It is simpler to check the frameworks. A case of a fascinating plan of character of the candidates, their capabilities action is the Aworker venture - an Ethereum273 and expert experience. : A Journal on Defence Information and Communication Technology Vol. 4 No. 1 2019

3.11

representative data and important business procedures requires the connection between toIndeed, the most even recent the broadly patterns utilized in a proposalsterritory, foror the consistent update of the CV with respect various jobs and offices - HR expert, worker, bookkeeper, administrator, social insurance example, data innovation, are never again 3.13expert, and the sky is the limit from there. required. The candidate’s confirmed blockchain capabilities, aptitudes, experience and accomplishments are more important to bosses Coordination between them is bolstered by than both the best CV and the best proposals. blockchain, accord systems and disseminated Simultaneously, the odds of applicants with ensured,applications. and Oncethe requirement put away and for confirmed,rehashed high expert aptitudes and a decent notoriety keepsthe realness an eye ofon thetheir significant legitimacy information is dispensed is to get a new line of work reasonable for them are expanding. An assortment of data about of the constancy of the data, the danger of forging workers can be put away in the blockchain even with and reference data is encouraged. Because authenticationsafter they have beenand employedoccupation - incl.change, archives, sets for example, business contracts, endorsements, and messingcontrol withaccess the to information data, it is isincreasingly decreased. For such purposes, because of the need to limit of expectations, and so on. At times, savvy agreements can be utilized to oversee such suitable to utilize a private blockchain. records - for instance, after specific conditions 3.14 representativehave been met, is (forconsequently example, elevated a fixed from term of work and fruitful accreditation), the As per various HR experts (Brown and Smit, junior to senior expert, changing his activity 2017; Zielinski, 2017; The HR Observer, 2018), blockchain is additionally a suitable 3.12title and individually his compensation. atinnovation work eth when with paying specialists representatives’ and universal pay rates - particularly in worldwide organizations,

Along these lines, the level of mechanization andinstalments. are dependent Normally, upon worldwide various instalmentsguidelines of business procedures can be expanded in are slower, exchanges are progressively costly blockchain-based frameworks. Blockchain can avoidance and the prerequisite to know the likewise store some exchange information, - for instance, in connection to illegal tax for example, medicinal declarations and assessments, expenses paid, charges and beneficiary (KYC). Blockchain encourages the commitments paid, excursions for work and exchange of assets, as a rule by picking one of occasions, and so forth. Checked data about the well-known cryptographic forms of money the work performed can likewise be held - for - Bitcoin, Ethereum. In doing as such, steady whichinstance, takes finished into consideration exchanges, phone a progressively assembles exchange data is held, which may encourage and conferences with customers, and so on., ensuing checks by administrative specialists. In addition to the fact that transactions are exact bookkeeping of the individual commitment quicker, progressively solid and less expensive. of representatives. This plan is particularly One model is the Bitwage instalment framework appropriate for organizations offering adaptable (www.pymnts.com, 2016), which joins work plans -, for example, teleworking, low blockchain, portable and cloud innovations. maintenance and venture work, or utilizing Instalments are made in Bitcoin and the stage different outside partners. Keeping up274 bolsters nearby cash change. The Australian Vol. 4 No. 1 2019 Utilizing Decentralized Technology for HRM Advancement

takingorganization a shot Chrono at transient Bank additionallyagreements utilizesor low organisation require sufficient digitalisation. blockchain innovation to pay representatives It is no happenstance that as of late various unknown,driving IT this sellers is one of have the most concentrated open regions on maintenance (Chronobank.io, 2018), which structure answers for atomate HR. For reasons is normal for the supposed. gig economy - a model that is winding up more broadly utilized for IT concentrated of late. The enthusiasm of 3.15and favored by youngsters. HR experts and innovation organizations in the utilization of blockchain innovation in HR procedures is as of now a reality. It would like to In spite of the fact that blockchain innovation quicken business forms and lessen their worth, offers different open doors for improving HR while expecting a superior business result that business forms, it ought to be borne as a top overseeingcan have an data assortment and associations of appearances: with them incl. priority that its usage isn’t a simple assignment. finding and employing the “right” experts and In spite of its points of interest, it is another innovation and needs adequate experience and viably. Regardless of whether these desires well-prepared masters to assemble and keep up are reasonable and whether blockchain will such frameworks. There may even be obscure in a general sense change HR action will dangers of utilizing it. Fruitful undertakings demonstrate what’s to come. Notwithstanding, here require cautious examination and timesit ought ofto betheir borne advancement, as a primary concernand their that reengineering of HR business forms, furtherventures achievement around there depends, are in in the any beginning case, on such,considering it is important existing business to watch and the specialized current whether and to what degree work candidates, dangers (Filipova, 2018, p.89). In doing as prerequisiteslegitimate standards of information - incl. thesecurity acceptability orders, REFERENCESrepresentatives and businesses trust them. of cryptographic money exchanges, the

1. Iansiti, M. and Lakhani, K.R., 2017. The truth isfor likewise example, essential the Europeanto appropriately General decipher Data about blockchain. Harvard Business Review, theProtection ideas of Regulation “keen agreement” (GDPR), and so“full forth. trust” It 95(1), pp.118-127. 2. Crosby, M., Pattanayak, P., Verma, S. and Kalyanaraman, V., 2016. Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6-10), p.71. programming,that frequently andgo with it does blockchain. what the As software noticed, 3. Zyskind, G. and Nathan, O., 2015, May. the keen agreement has no lawful power - it is Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE. engineer put in it. Blockchain trust depends 4. Zheng, Z., Xie, S., Dai, H.N., Chen, X. and Wang, H., on the best possible working of cryptographic 2018. Blockchain challenges and opportunities: calculations and circulated applications. As A survey. International Journal of Web and Grid such, blockchain lessens the impact of the recruitmentServices, 14(4), and pp.352-375. human resource management 5. Onik, M.H., Miraz, M.H. and Kim, C.S., 2018. A human factor, yet for good or not, it can’t be 4.totally CONCLUSION kept away from. technique using Blockchain technology for Industry 4.0. 6. Filipova, N., 2018. Blockchain innovations in HR 4.1 management. Izvestia Journal of the Union of Scientists-Varna. Economic Sciences Series, 7(1), pp.262-273. 7. Bothma, R., 2018. Understand the impact of The expanding obligations of HR experts and blockchain in HR. HR Future, 2018(Sep 2018), the significance of business forms for HR the275 pp.40-41.