Blockchain Will Be A Trusted Military Solution

The US army wants to ensure that the flow of data through terrestrial and satellite networks is trustworthy, and blockchain technology may be the key to an innovative solution. The use of blockchain technology is becoming more widespread in security and military applications. 

Blockchain is a database that is shared across a network of computers. The computers in the network, called 'nodes', check the details of the trade to make sure it is valid.

It is a digital ledger of transactions that can be programmed to record everything of value in order to help exchange various values in a transparent, conflict-free way and it does not use a middleman, and has no need for a central authority to approve transactions. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. 

Now some militaries worldwide want to leverage the super secure nature of blockchain technology in its communications. 
In 2016, NATO’s Communications and Information Agency (NCIA) hosted the 2016 Innovation Challenge requesting solutions such as military-grade blockchain applications. The organisation called for blockchain applications regarding military logistics, procurement, and finance as well as “other applications of interest to the military”.

The US Army’s Space and Terrestrial Communications Directorate (S&TCD) is looking to blockchain to check breaches and cybersecurity issues in communications data. The solution has to include a machine learning-based service that tracks and blocks malicious structured and unstructured messages. It would track messages through the network from producer to consumer and will be able to automatically detect message modification.

Machine learning and blockchain will be used in processes like user authentication and sharing trust information. The plan is to have blockchain consensus algorithms suited for disconnected, intermittent, and limited bandwidth environments, according to sociable.co. 

The authentication service will leverage machine learning, user/system data, and network threat history and status to develop trust measures for each user within a system or network.

As the request for information elaborates, “this authentication service should enable tracking of user trust values within the blockchain while allowing dynamic removal or addition of users to the blockchain during its lifecycle.”

The development will deliver real-time and quantitative analytics upon the receipt of messages or data, while leveraging ML-based techniques on historical data.

“In the coming years, the defense research community is expected to search for new applications for the military based on blockchain technology with predominant candidate areas such as cyber defense, secure messaging, resilient communications, logistics support and the networking of the defense Internet of Things,” evaluates eda.europa.eu.

I-HLS

You Might Also Read:

Communications Satellites Are Vulnerable:

Pentagon Cybersecurity is Falling Behind:

 

 

 

« China’s Dirty Secret - Intellectual Property Theft
Improving Electric Power-Grid Security »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

Datec PNG

Datec PNG

Datec is the the largest end-to-end information and communications technology solutions and services provider in Papua New Guinea.

ACPL Systems

ACPL Systems

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your data is protected and business risks are reduced.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.