CWIX (Coalition Warrior Interoperability eXercise, eXamination, eXperimentation, eXploration) są to coroczne ćwiczenia wojskowe organizowane przez Sojusznicze Dowództwo ds. Transformacji (Allied Command Transformation - ACT).
Stanowią one najważniejsze wydarzenie NATO w zakresie interoperacyjności, zarówno technicznej jak i proceduralnej, stwarzają warunki do testowania rozwiązań na różnym poziomie dojrzałości. Umożliwiają prowadzenie badań, eksperymentowanie, weryfikację i potwierdzenie prawidłowości działania, współpracy rozwiązań teleinformatycznych w oparciu o uzgodnione i zatwierdzone przez członków sojuszu standardy i potrzeby operacyjne. Ma to zasadnicze znaczenie dla skuteczności i bezpieczeństwa prowadzonych operacji oraz zapewnienia gotowości sojuszu do podjęcia wspólnych działań od pierwszego dnia realizacji przyjętego zadania.
Tegoroczna edycja, zrealizowana została w rozproszonej i zdalnej formie. Zespół z Wydziału Cybernetyki, z powodzeniem przetestował wspólnie, z Laboratorium Badawczym Armii Stanów Zjednoczonych, holenderską firmą Wonderbit i NATO rozwiązanie zapewniające bezpieczną integrację Internetu Rzeczy z systemami wykorzystywanymi w trakcie operacji wojskowych. Rozwiązanie to zostało opracowane i zaimplementowane przez zespół pracujący nad projektem SEMACITI, finansowanym przez Ministerstwo Obrony Narodowej w ramach programu Kościuszko.
Security accreditation is a vital process used by governmental, military, and international organizations to verify a proper security posture of communication and information systems. Currently, it is a largely manual, time consuming, and highly repetitive process. Smart contracts could offer an opportunity to automate some parts of the security review, increasing speed, transparency, and predictability of the security accreditation, as well as software approval. We analyze the feasibility of supporting security accreditation with smart contracts and present our proof-of-concept implementation based on Hyperledger Fabric.
SŁOWA KLUCZOWE: Military communicationSmart contractsOrganizationsDistributed ledgerAccreditationSecurity
This article describes how to authenticate and authorize IoT devices in federated environments. In our solution, we propose the use a distributed ledgers as a replicated database, which enforces consensus among federations. We also presented our performance results.
SŁOWA KLUCZOWE: Internet of Things, Authentication, Authorization, Federation environments, Distributed ledger
Zastosowanie łańcuchów blokowych w operacjach Organizacjach Traktatu Północnoatlantyckiego
SŁOWA KLUCZOWE: Zastosowanie łańcuchów blokowych w operacjach Organizacjach Traktatu Północnoatlantyckiego
We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide verifiable proofs of key generation. The auditable key management has several possible use cases in both civilian and military world. In particular, the new regulations for protection of sensitive personal data, such as GDPR, introduce strict requirements for handling of personal data and apply a very restrictive definition of what can be considered a personal data. Cryptographic access control for personal data has a potential to become extremely important for preserving industrial ability to innovate, while protecting subject’s privacy, especially in the context of widely deployed modern monitoring, tracking and profiling capabilities, that are used by both governmental institutions and high-tech companies. However, in general, an encrypted data is still considered as personal under GDPR and therefore cannot be, e.g., stored or processed in a public cloud or distributed ledger. In our work we propose an identity-based cryptographic framework that ensures confidentiality, availability, integrity of data while potentially remaining compliant with the GDPR framework.
SŁOWA KLUCZOWE: Identity-based encryption, GDPR
The article describes the basic requirements of authentication systems used in Internet of Things networks, and problems and attacks that may hinder or even prevent the process of authentication. The current methods used in device authentication are also presented.
SŁOWA KLUCZOWE: Internet Rzeczy, IoT, uwierzytelnianie urządzeń, identyfikacja urządzeń
Blockchains offer an interesting solution to some of the security challenges encountered in military applications. They are particularly attractive in the scenarios, where it is difficult or even impossible to establish a common root of trust, e.g., in the context of civil-military collaboration, where military organizations need to build trusted information exchange infrastructure with various types of civilian governmental and non-governmental organizations, local communities, commercial companies and private persons. In our work, we discuss how blockchain can be used to store metadata describing information collected from the IoT devices owned by the federation members as well as crowdsourced from sensors belonging to private users. We present a high level architecture for a metadata binding solution using blockchains compliant with STANAG 4774 and 4778. We also describe a concrete technical solution based on Hyperledger Fabric and some of the open issues.
SŁOWA KLUCZOWE: Metadata, Blockchain, Internet of Things, Fabrics, Peer-to-peer computing, Sensors, Access control
Distributed ledgers and blockchains have been heralded as a new and universally applicable architecture for management of trust. In this article we investigate what are the possible advantages of using distributed ledger technology within the North Atlantic Treaty Organization (NATO) operations and what are possible use cases for such use. We also analyze different types of distributed ledgers proposed in the literature in respect to their applicability in context of federated military operations. Finally, we describe in more detail a specific use case, related to use of blockchain as new approach to implementing trusted binding mechanism for detached labels as stipulated in the NATO Standardization Agreement (STANAG) 4778, which is now undergoing a ratification process within NATO.
SŁOWA KLUCZOWE: Blockchain, Distributed ledger, Cryptography, Organizations, Distributed databases, Protocols, Resistance