Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield IoT

An upcoming frontier for distributed computing might literally save lives in future military operations. In civilian scenarios, significant efficiencies were gained from interconnecting devices into networked services and applications that automate much of everyday life from smart homes to intelligent transportation. The ecosystem of such applications and services is collectively called the Internet of Things (IoT). Can similar benefits be gained in a military context by developing an IoT for the battlefield? This paper describes unique challenges in such a context as well as potential risks, mitigation strategies, and benefits.

[1]  Charu C. Aggarwal,et al.  Using humans as sensors: An estimation-theoretic perspective , 2014, IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.

[2]  Dong Wang,et al.  Social Sensing: Building Reliable Systems on Unreliable Data , 2015 .

[3]  Barry O'Neill,et al.  The Group problem solving process : studies of a valence model , 1982 .

[4]  Xue Liu,et al.  Integrating Adaptive Components: An Emerging Challenge in Performance-Adaptive Systems and a Server Farm Case-Study , 2007, 28th IEEE International Real-Time Systems Symposium (RTSS 2007).

[5]  Suhas Diggavi,et al.  When Are Dynamic Relaying Strategies Necessary in Half-Duplex Wireless Networks? , 2015, IEEE Transactions on Information Theory.

[6]  Suhas N. Diggavi,et al.  On capacity of noncoherent MIMO with asymmetric link strengths , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[7]  Ramesh Govindan,et al.  Reliable and efficient programming abstractions for wireless sensor networks , 2007, PLDI '07.

[8]  Klara Nahrstedt,et al.  Self-Configuring Information Management for Large-Scale Service Overlays , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Shen Li,et al.  RDeepSense: Reliable Deep Mobile Computing Models with Uncertainty Estimations , 2017, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[10]  Ananthram Swami,et al.  The Internet of Battle Things , 2016, Computer.

[11]  Sanjit A. Seshia,et al.  Compositional Falsification of Cyber-Physical Systems with Machine Learning Components , 2017, NFM.

[12]  Suhas N. Diggavi,et al.  Gaussian Interference Channel With Intermittent Feedback , 2015, IEEE Transactions on Information Theory.

[13]  Mohit Tawarmalani,et al.  Robust Validation of Network Designs under Uncertain Demands and Failures , 2017, NSDI.

[14]  Sanjit A. Seshia,et al.  Towards Verified Artificial Intelligence , 2016, ArXiv.

[15]  Klara Nahrstedt,et al.  QoS-assured service composition in managed service overlay networks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[16]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[17]  Ashish Tiwari,et al.  Output Range Analysis for Deep Neural Networks , 2017, ArXiv.

[18]  Donald F. Towsley,et al.  Network tomography on general topologies , 2002, SIGMETRICS '02.

[19]  Mani B. Srivastava,et al.  Truth Discovery in Crowdsourced Detection of Spatial Events , 2016, IEEE Trans. Knowl. Data Eng..

[20]  Susan E. Jackson,et al.  Team composition in organizational settings: Issues in managing an increasingly diverse work force. , 1991 .

[21]  Richard Dempsey,et al.  Commander's Intent and Concept of Operations , 2013 .

[22]  Suhas N. Diggavi,et al.  Harnessing Bursty Interference in Multicarrier Systems With Output Feedback , 2017, IEEE Transactions on Information Theory.

[23]  Tarek F. Abdelzaher,et al.  ClariSense+: An enhanced traffic anomaly explanation service using social network feeds , 2016, Pervasive and Mobile Computing.

[24]  Kin K. Leung,et al.  Node Failure Localization via Network Tomography , 2014, Internet Measurement Conference.

[25]  Sylvain Frey,et al.  Self-adaptation in Collective Self-aware Computing Systems , 2017, Self-Aware Computing Systems.

[26]  Kin K. Leung,et al.  Monitor placement for maximal identifiability in network tomography , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[27]  Mani B. Srivastava,et al.  Parallel and Streaming Truth Discovery in Large-Scale Quantitative Crowdsourcing , 2016, IEEE Transactions on Parallel and Distributed Systems.

[28]  Cesare Stefanelli,et al.  Analyzing the applicability of Internet of Things to the battlefield environment , 2016, 2016 International Conference on Military Communications and Information Systems (ICMCIS).

[29]  Sanjit A. Seshia,et al.  Combining Induction, Deduction, and Structure for Verification and Synthesis , 2015, Proceedings of the IEEE.

[30]  Lorenzo Keller,et al.  Joint identity-message coding , 2010, IEEE Journal on Selected Areas in Communications.

[31]  Ramesh Govindan,et al.  Macro-programming Wireless Sensor Networks Using Kairos , 2005, DCOSS.

[32]  Kristen Grauman,et al.  Learning with Whom to Share in Multi-task Feature Learning , 2011, ICML.

[33]  Tarek F. Abdelzaher,et al.  EnviroSuite: An environmentally immersive programming framework for sensor networks , 2006, TECS.

[34]  C. Nemeth Differential contributions of majority and minority influence , 1986 .

[35]  L. R. Hoffman,et al.  Quality and acceptance of problem solutions by members of homogeneous and heterogeneous groups. , 1961, Journal of abnormal and social psychology.

[36]  Seif Haridi,et al.  Apache Flink™: Stream and Batch Processing in a Single Engine , 2015, IEEE Data Eng. Bull..

[37]  Ameet Talwalkar,et al.  MLlib: Machine Learning in Apache Spark , 2015, J. Mach. Learn. Res..

[38]  Klara Nahrstedt,et al.  iDSRT: Integrated Dynamic Soft Real-Time Architecture for Critical Infrastructure Data Delivery over WLAN , 2009, QSHINE.

[39]  Robert Dixon,et al.  Megacities and the United States Army: Preparing for a Complex and Uncertain Future , 2014 .

[40]  Tarek F. Abdelzaher,et al.  ApDeepSense: Deep Learning Uncertainty Estimation without the Pain for IoT Applications , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[41]  Minlan Yu,et al.  Condor: Better Topologies Through Declarative Design , 2015, Comput. Commun. Rev..

[42]  Kin K. Leung,et al.  Efficient Identification of Additive Link Metrics via Network Tomography , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.