Title | Evaluating Machine Learning Classifiers for Data Sharing in Internet of Battlefield Things |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Karim, Hassan, Rawat, Danda B. |
Conference Name | 2021 IEEE Symposium Series on Computational Intelligence (SSCI) |
Date Published | dec |
Keywords | blockchain, confidentiality, Dynamics, Force, Forestry, homomorphic encryption, human factors, Internet of battlefield things, iobt, machine learning, privacy preservation, pubcrawl, resilience, Resiliency, Robot sensing systems, Scalability, Support vector machines, Training, V2X |
Abstract | The most widely used method to prevent adversaries from eavesdropping on sensitive sensor, robot, and war fighter communications is mathematically strong cryptographic algorithms. However, prevailing cryptographic protocol mandates are often made without consideration of resource constraints of devices in the internet of Battlefield Things (IoBT). In this article, we address the challenges of IoBT sensor data exchange in contested environments. Battlefield IoT (Internet of Things) devices need to exchange data and receive feedback from other devices such as tanks and command and control infrastructure for analysis, tracking, and real-time engagement. Since data in IoBT systems may be massive or sparse, we introduced a machine learning classifier to determine what type of data to transmit under what conditions. We compared Support Vector Machine, Bayes Point Match, Boosted Decision Trees, Decision Forests, and Decision Jungles on their abilities to recommend the optimal confidentiality preserving data and transmission path considering dynamic threats. We created a synthesized dataset that simulates platoon maneuvers and IED detection components. We found Decision Jungles to produce the most accurate results while requiring the least resources during training to produce those results. We also introduced the JointField blockchain network for joint and allied force data sharing. With our classifier, strategists, and system designers will be able to enable adaptive responses to threats while engaged in real-time field conflict. |
DOI | 10.1109/SSCI50451.2021.9659886 |
Citation Key | karim_evaluating_2021 |