Thursday, March 19, 2026
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result
Home Defence & Military News Technology News

Hiding the Military IoT Devices in Plain Sight

by Editor
January 30, 2020
in Technology News
2 min read
0
Hiding the Military IoT Devices in Plain Sight
14
VIEWS

Camouflaging IoT device signals remains a problem, and not just for the military. New research shows that network-connected device can be authenticated without revealing their individual identities.

The internet of things is causing a headache for the military. Millions of devices unwittingly reveal their identities with every message they send or receive. The concern is that adversaries could be listening.

Commonly used safeguards to fend off identity data leakage include blind signatures, identity certificates and newer kinds of device authentication, such as verifiably common secret encoding. But adversaries have caught on and are finding ways to monitor, track and record use of many devices.

The fact is, camouflaging IoT device signals remains a problem, and not just for the military.

Lake Bu at Draper recently unveiled another approach. Bu found a way to hide the identity of a device inside a group identity. That way a device doesn’t reveal its individual identity, and the user can authenticate their access and still do their job. “Whether the device is a drone, robot, GPS app or soldier system, its identity is masked because it’s wrapped inside a secure Group Anonymous Authentication Protocol (GAAP),” Bu said.

Bu describes GAAP in a paper he co-authored with a team from Boston University’s Adaptive and Secure Computing Systems (ASCS) Laboratory. “GAAP enables a device to be authenticated without revealing its individual identity,” said Dr. Michel A. Kinsy, who directs the ASCS Laboratory.

GAAP works as a network-installed software application that goes out and gathers information about every device that’s been granted access to the network, including the groups, their members and their members’ privileges. GAAP uses the information to generate design parameters and construct and install a set of hardware modules on each device. The physical system is initialized when each device fetches its group identity certificates from the verifier on the network. If any malicious behavior is detected, the system diagnoses the issue and updates the network information.

The authors give examples of GAAP at work and point out how it could be used, for instance, in an army unit, a home with IoT devices or a department or team at a company with multiple employees. GAAP enables users to control access to services and resources granted to the individual devices or components based on their group information or privileges, and establish and enforce data-sharing policies that preserve the privacy of the critical information on end-users. GAAP makes devices resistant to ploys such as man-in-the-middle attacks, imposters, hijacking, counterfeiting and eavesdropping.

Authors include Bu and a team from Boston University’s Adaptive and Secure Computing Systems Laboratory, including Rashmi Agrawal, Eliakin Del Rosario and Kinsy.

Draper’s capabilities used in the development of the secure Group Anonymous Authentication Protocol and architecture include image and data analytics and secure and assured systems.

Tags: internet of thingsiot devicesiot securitysecurityWorld Military
Previous Post

DARPA Selects BAE to Build Powerful Next-Generation Advanced Electronics

Next Post

Smaller detection device effective for nuclear treaty verification, archaeology digs

Related Posts

US needs top cyber coordinator, better hacker ‘deterrence’

‘Digital fog of war’ around Iranian cyberattacks

March 13, 2026

Hostilities on the digital front have intensified since the outbreak of war between the US, Israel and Iran, with many...

US moves closer to retaliation over hacking as cyber woes grow

Cyberattack Disrupts Operations at MedTech Giant Stryker

March 11, 2026

A cybersecurity incident affecting Stryker Corporation—one of the world’s largest manufacturers of medical devices—has drawn renewed attention to the growing...

Next Post
Nuclear Symbol

Smaller detection device effective for nuclear treaty verification, archaeology digs

Latest Defense News

US needs top cyber coordinator, better hacker ‘deterrence’

‘Digital fog of war’ around Iranian cyberattacks

March 13, 2026
US military says aircraft crash in Iraq killed 4 crew members

US military says aircraft crash in Iraq killed 4 crew members

March 13, 2026
Northrop Grumman moves to boost B-21 Raider output

Northrop Grumman moves to boost B-21 Raider output

March 13, 2026
US Navy evacuates virus-struck aircraft carrier Roosevelt

US military ‘not ready’ to escort tankers through Hormuz Strait

March 12, 2026
Israel cancels leave for combat units after Iran consulate strike

US says Iran campaign cost $11 billion in six days

March 12, 2026
US moves closer to retaliation over hacking as cyber woes grow

Cyberattack Disrupts Operations at MedTech Giant Stryker

March 11, 2026

Defense Forum Discussions

  • NZDF General discussion thread
  • Royal Australian Navy Discussions and Updates 2.0
  • Indonesian Aero News
  • Middle East Defence & Security
  • New Zealand Army
  • F-35 Program - General Discussion
  • Royal New Zealand Navy Discussions and Updates
  • The Russian-Ukrainian War Thread
  • Indonesia: 'green water navy'
  • Japan Air Self-Defence Force
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com