Military Application of Block Chain Technology


nnnRampage commentary: the nature of the block chain technology to the center, making its agreement after the attack has a strong ability to restore. At the same time, the technology also has a very strong encryption of economic security and transparency. At present in the field of finance and non-financial applications have received a lot of attention, including non-financial areas of IBM, Samsung and other companies, as well as the financial sector of the R3 bank group are studying the use of block chain technology innovation. In this paper, Dr. S. Kulshrestha, former navy chief of the Indian Navy Arms Procuratorate, conducted a general analysis of the application of block chain technology in the military field.n
nnTranslation: Clovern
nn”Block-chain agreements are a new class of agreements that have a strong resilience after an attack – and their strong resilience comes from the center.” – Cornell University Emin Gun Professor Sirer.n
nnBasically, block-chain technology is a mutual trust storage device for information transactions between multiple users. It is a centralized, secure way of recording, sharing, storing, and redistributing information. There is no central mechanism for controlling the chain of blocks; it is run by all, monitoring and all the networks. Anyone who can download, run or develop new apps or new types of transactions for free is like an open source code. It can always verify the transaction, and will not affect the privacy of the parties concerned. Block chain technology has the ability to become a disruptive technology in the current decade.n
nn”Block chain is a magical computer, anyone can upload the program and let the program self-implementation, the current and all the previous state of the program are publicly visible, and it has a very strong encryption of economic security , The program running on the chain will continue to be executed in the manner specified by the block chain agreement. “- Vitalik Buterinn
nnThe core of the chain chain technology is “distributed consensus” and “anonymity” [1]. This technology has applications in both financial and nonfinancial sectors. In the non-financial industry, IBM, Amazon, Samsung and other major companies are studying the use of block chain technology innovation. Recent achievable possibilities include “proof of presence” in medical data, legal documents, proof of registration (birth, marriage, death), digital tracking assets, and so on.n
nIBM and Samsung have developed a system called ADEPT [2] (automatic center-to-point remote sensing survey), using the design concept of Bitcoin to build a distributed network of things. ADEPT uses three protocols – BitTorrent (File Sharing), Ether Square (Smart Contract), and TeleHash (Point-to-Point Instant Messaging).n
nIn the financial industry, large banks believe that the block chain is a safe and reliable technology, and is studying a large number of applications. The financial technology company R3 is using the block chain to create a financial application framework for the alliance of 15 major banks. R3’s Corda distributed ledger platform is used by banks to design and use automated execution of the transaction agreement. There are two prototypes that have been created using smart contract distributed books. The consortium includes Barclays, BBVA, BNP Paribas, Commonwealth Bank of Australia, Danske Bank in Denmark, ING Bank, INTESA SANPAOLO, Natixis, Nordea, Scotiabank, UBS, UniCredit, US Bank, and rich countries, bank.n
nn
nMilitary applicationn
nThe NATO Communications and Information Agency is currently evaluating block-chain technology in other areas of military-related applications such as military logistics, procurement and finance, networking, and so on. The proposal has been submitted as part of the 2016 Innovation Challenge [4] to accelerate the most advanced technology transformation solutions to support NATO C4ISR and network capability requirements.n
nThe US Department of Defense (DoD) presents an urgent need for secure messaging and trading platforms that can be accessed using a web browser or standalone native application. As a result, DARPA is seeking a proposal (see SBIR 20162 [v]) to “create a secure messaging and transaction platform that uses a de-centric messaging backbone to separate message creation from message propagation (transmission) and reception So that anyone can securely send information anywhere, or carry out other transactions in multiple traceable channels in the categorized books.n
nn”In general, data integrity is often very important in this respect,” … “nuclear command and control, satellite command and control, and information integrity are very important.” [6] – DARPA Block Chain Project Manager Timothy Boohern
nnn
nKey weapon systemsn
nDARPA awarded Galois a $ 1.8 million contract [7] to build its block-chain application Guardtime keylessed infrastructure KSI to verify that an Integrity Monitoring System could build an unbreakable In the form of code, thereby improving the security of critical weapon systems. KSI can detect high persistence threats (APT) that are hidden in the network. Galois is mainly run in the form of formal verification, which is a technology that provides mathematical assurance that the system can only operate in the same way in all cases.n
nn
nin conclusion n
nBlock chain is a promising technology. However, as with all emerging technologies, the following are important:n
nUsers must be accustomed to, in the block chain technology, electronic transactions are safe and complete.n
nAs the technology is still in its early stages of development, its scale needs to be expanded to solve many problems.n
nA legal framework model must be created, including block-chain technology.n
nSystem migration from existing centralized databases and systems can be a tedious and costly process.n
nThe fact that modern military is focusing on the application of block-chain technology means that the application of this technology is not far from the day when the application of this technology spread to citizenship and spread to ordinary people. In addition, the possibility of illegally using block-chain technology and hacking intrusion into distributed networks is likely to occur in the future, especially when quantum computing technology is mature.n
nAbout the Author:n
nnDr. S. Kulshrestha (retired), Major General of the Indian Navy, has expertise in naval armaments and arms quality assurance. He graduated from the Indian Defense University (NDC) and received a Ph.D. from Jawaharlal Nehru University in New Delhi. He removed the post of Director of the Navy Arms Procuratorate in 2011. He is a non-partisan and writes articles on national defense journals on armaments and localization issues.n
nnPost details:n
nThis article was originally published in the blog of the Center for Land Warfare Studies and was published on IndraStra with the permission of the author and the original publisher. Copyright by the New Delhi Land War Research Center (Center for Land Warfare Studies) all.n
nreferences:n
n[1] BlockChain Technology Beyond Bitcoin, Sutardja Center for Entrepreneurship

Leave a Reply

Your email address will not be published. Required fields are marked *