Military Embedded Systems


Articles 1 - 5

AI/ML-based attack signal intelligence at the tactical edge - Story

September 07, 2023

Advances in generative artificial intelligence (AI) are enabling adversaries to build new attacks faster and evade signature-based threat detection with ease. The cutting edge of adversarial cybersecurity is becoming more sophisticated, using new technologies to rapidly develop new attacks. Defensive cybersecurity efforts must keep pace with bad actors by using new tools that combine attack signal intelligence with pattern-matching capabilities to identify polymorphic threats, or cyberthreats that employ evasive techniques to evade detection from traditional security solutions.


Bringing secure mesh wireless to mobile command posts - Story

May 15, 2023

Military wireless networks in the military can be secured through the proven use of NSA-approved Commercial Solutions for Classified (CSfC) encryption. CSfC is a set of approved architectures using two layers of commercial encryption (as opposed to Type 1 military-only encryption) for access to classified networks. The layers, software and/or hardware, must be developed independently and validated to international Common Criteria standards. Today, it’s possible to rapidly set up a mobile, extendable wireless network qualified to Technology Readiness Level (TRL) 9 [denoting that a technology has been “flight proven” during a successful mission]; using Wi-Fi 6, multi-­hundreds of megabits of throughput can be rapidly deployed in the field.


Reducing SWaP in the field with a USB-based hardware security module - Story

October 17, 2022

Digital keys are a core concept in establishing secure networks, one as relevant in a data center application as it is at the edge of the tactical battlefield. While cryptography (crypto) uses both symmetric and asymmetric keys for different functions, for this column we’ll focus on asymmetric cryptography in which different keys are used for locking and unlocking.


Unified network communications management: the next step to realizing MOSA - Story

July 26, 2022

The vision of hardware interoperability at the tactical edge, from air platforms to ground vehicles to base stations, is now being realized. Because MOSA [modular open systems approach] is an approach and not itself a standard, solutions that support this vision can be achieved through many different means as long as interfaces and communications protocols are based on open standards. There remains a key area to address, though, to achieve seamless interoperability between heterogeneous systems. Consider, for example, the Sensor Open Systems Architecture (SOSA) Technical Standard: While most aspects of sensor processing system architectures are well-defined within SOSA, one area that has not been rigidly defined is the network configuration and operational environment of individual cards and modules.


Creating the data fabric for tactical edge with software-defined wide area networking - Story

June 23, 2022

A software-defined WAN (SD-WAN) can establish a data fabric capable of dealing with any tactical edge scenario where reliable WAN is needed.

Articles 1 - 5