Edge Computing and Communications Over Untrusted Transport

Source: https://media.defense.gov/2021/Jul/07/2002757862/-1/-1/0/160218-M-BF136-001A.JPG
Source: https://media.defense.gov/2021/Jul/07/2002757862/-1/-1/0/160218-M-BF136-001A.JPG

POSTED:  August 10, 2023

BY: Alok Chawla, Randy D. Bishop, Danielle Tarino

Today’s “gray zone” battlefield has become increasingly digital.  The fielding of “edge” sensors, processing tools, and ubiquitous transport—coupled with global cloud infrastructures—is transforming data collection, exploitation, and sharing, driving rapid decision-making at the speed of relevance.  Adversaries actively target U.S. communications, making it difficult for operators to use untrusted infrastructures securely and surreptitiously.  Securely exfiltrating data from contested networks into U.S.-owned networks at operational tempos remains a significant technical challenge and requires developing technologies that allow us to do so unimpeded.  Future technical solutions must enable us to route, rapidly secure, and obfuscate data while preventing the adversary from detecting, intercepting, or exploiting critical information.  These technologies must also allow secure and covert communications between operators’ smartphones, end-user devices, and local commercial cellular, Wi-Fi, Bluetooth, and navigation satellite sources.

Stay informed when a new SOAR is released

Subscribe to our upcoming state-of-the-art reports

Want to find out more about this topic?

Request a FREE Technical Inquiry!