Defense 4.0: Internet of Things in Military: Serhat Burmaoglu, Ozcan Saritas, and Haydar Yalcin
Defense 4.0: Internet of Things in Military: Serhat Burmaoglu, Ozcan Saritas, and Haydar Yalcin
14.1 Introduction
S. Burmaoglu
Faculty of Economics and Administrative Sciences, Izmir Katip Celebi University, Izmir, Turkey
O. Saritas (*)
National Research University, Higher School of Economics, Moscow, Russia
e-mail: osaritas@hse.ru
H. Yalcin
Faculty of Economics and Administrative Sciences, Izmir Katip Celebi University, Izmir, Turkey
Faculty of Humanities and Social Sciences, Izmir Katip Celebi University, Izmir, Turkey
is the Internet of Things (IoTs), which affects every aspect of life with a growing
number of devices communicating with each other. The number of connected
devices is expected to reach 50 billion connected devices by 2020, and the potential
market value is expected to be between $2.7 and $6.2 trillion per year by 2025
(Mantyika et al. 2013). While the possibilities introduced by the IoT have been
providing immense benefits, the increasing number of connections makes the system
ever more complex and vulnerable because of the difficulty of securing huge
networks. If one of the main platforms for warfare is going to be the cyberspace
and if the combatants of the future are going to be irregulars, then digitalization of
warfare and cyberterrorism can be considered as the logical paradigm of future
conflict (Rathmell 1997), which should be countered by authorities appropriately.
The aim of this chapter is to discuss how the IoTs will affect the military affairs
and to propose future scenarios for exploring alternative trajectories (Miles et al.
2016) while contributing to the existing literature on the opportunities and threats
brought by new and emerging technologies as well as changing nature of warfare.
Thus, the outline of the chapter is as follows. In the second section, digitalization and
IoT concepts are reviewed from multiple dimensions by considering their social,
technological, economic, environmental, political, and value/cultural (STEEPV)
aspects. Then in the third section, the relationships between defense and IoTs are
investigated with emerging opportunities and threats. In the fourth section, two
scenarios are presented. These predictable and possible scenarios portray alternative
roles the digitalization and IoTs can play in the future warfare. Finally, findings are
discussed, and future implications for research and policy are discussed in the fifth
section.
the Internet has been almost completely dependent on people for its supply of information.
But in the future, things will be able to input data themselves. It will be as though a net is laid
over the physical world, linking up and processing the abundance of data generated by
“smart” things and ubiquitous sensors. This is expected to reveal patterns and make
everything from energy to logistics transparent and potentially open to real-time
optimization.
It is a new term, but not a new process. The precursor operations of IoT were
known as “pervasive computing,” “ubiquitous computing” (ubicomp), and “ambient
intelligence.” Ashton (2009), in his presentation at Procter & Gamble, recommended
1
http://handle.itu.int/11.1002/1000/11559-en?locatt¼format:pdf&auth
14 Defense 4.0: Internet of Things in Military 305
the use of RFID technology in the company’s supply chain application. This kind of
operations could not make progress until the early 1990s because of the high
investment costs of database storage technologies. Once the data storage
expenditures became cheaper, a new data storage model, namely, “cloud,” showed
up. The cloud system used from the 2000s enables IoT, because it provides an
infrastructure, which can replace a central server. It is still possible to access a file or
piece of information, which would normally be hosted by the central server, since
these bytes of information are “distributed” or “replicated” throughout the network.
This kind of applications enables new services like “distributed computing,” where
every device on the network is used as a potential node for storing information. The
IoTs is meant to move these technologies once step further to describe a network
between many and different types of devices.2
Buildings, cars, consumer products, and people then become information spaces
connecting with each other through “Radio Frequency Identification Tags” or
sensors and transmitting all kinds of data through this tags. By connecting the things,
the world has become an interface or a living organism that makes “real-time data
workflow of the connected things.” This organism gives a chance to make a smart
ecology in our everyday life. In order to profit the advantages of the real-time
information flows, we must learn how to make sense and use it. We must have an
ability to read data as “data” or “information,” not a noisy or unusable thing (Daim
et al. 2016). In other words, with the gadgets, sensors, and machines that track our
every move in the real world, it is possible to develop apps and infrastructures that
may learn and predict our actions and emotions. Cloud-based apps are the key to
using leveraged data. IoTs does not function without cloud-based applications to
interpret and transmit the data coming from all the stakeholders. The cloud enables
“turning information into action” via linked data. Cloud-based technologies and IoT
focus more on the functionality and the data, not the devices. In other words, IoT is
more about the data than the hardware that serves it. The hardware is just there to
serve the data to the user’s needs for all aspects of everyday life and thus enables
cheaper IT choices that connect everything with each other. Connected devices
could have their own connected channels. Dedicated channels could also serve as
a backbone for things (devices, etc.) to communicate in case of emergencies. That
way, one network can still stay up if the other one becomes overloaded or offline, for
instance, millions of people streaming a popular video will not bypass an emergency
call or alert.
Through the improvement of the information architecture, IoT technologies not
only improve everyday life of humans but also transform some of the key industries.
Examples are given in Table 14.1 with key changes and potential benefits provided
for the users.
A number of standards and protocols are needed to regulate the IoT systems and
ensure the secure operation of the IoT services. These are discussed in the next
session.
2
http://www.theinternetofthings.eu/what-is-the-internet-of-things
306 S. Burmaoglu et al.
Besides the standards and protocols set by the Internet Engineering Task Force
(IEFT), there are several other protocols which are also under discussion. For
instance, Message Queue Telemetry Transport (MQTT) is a lightweight publish/
subscribe messaging transport connectivity protocol. Developed by IBM, the proto-
col is integrated with the IBM WebSphere application server. Another IoT solution,
ZigBee (or XBee), is a set of application profiles for creating low-rate wireless mesh
networks which has been built upon the 802.15.4-2003 standard. DASH7 Alliance
operated at the 433 MHz frequency range. Among other uses, the system enables
14 Defense 4.0: Internet of Things in Military 307
there is a necessity for an information system architecture, which makes sense the
data for making decisions. Hadoop is one of the powerful options for this kind of
applications. Hadoop is “a framework that allows for the distributed processing of
large data sets across clusters of computers using simple programming models. It is
designed to scale up from single servers to thousands of machines, each offering
local computation and storage. Rather than relying on hardware to deliver high-
availability, the library itself is designed to detect and handle failures at the applica-
tion layer, so delivering a highly-available service on top of a cluster of computers,
each of which may be prone to failures.”3 It has a big potential in big data age such as
Ambari, which is “a web-based tool for provisioning, managing, and monitoring
Apache Hadoop clusters which includes support for Hadoop HDFS, Hadoop
MapReduce, Hive, HCatalog, HBase, ZooKeeper, Oozie, Pig and Sqoop. Ambari
also provides a dashboard for viewing cluster health such as heat maps and ability to
view MapReduce, Pig and Hive applications visually along with features to diagnose
their performance characteristics in a user-friendly manner.”4
With IoTs, a number of new technologies have been deployed as solutions. These
technologies can be seen in many areas, from the creation of data structures that
enable the continuous use of linked data to the next generation of database types.
Technologies made it possible to develop decision support mechanisms that enable
real-time data mining through machine learning. Some of these technologies with
examples for their customized use are as follows:
3
http://hadoop.apache.org/
4
http://hadoop.apache.org/
5
http://hadoop.apache.org/
14 Defense 4.0: Internet of Things in Military 309
6
https://internetofthingsagenda.techtarget.com/feature/Focus-on-wide-data-not-just-big-data-in-
analytics-systems
310 S. Burmaoglu et al.
Wars have always been in human life from the ancient times to the present.
Motivations, shapes, and sizes of wars have changed drastically over time
(Burmaoglu and Saritas 2017). An earlier definition from von Clausewitz (von
Clausewitz 1968) highlights some key components of a war such as “opponent,”
“violence,” and “will,” which refer to the “nature of war,” which is “an act of
violence to compel our opponent to fulfill our will” (p.2). Although the concept of
“violence” has remained the same, the “means” and “ends” of warfare have changed
dramatically in time. For instance, in a more recent definition, Kaldor (2010:272)
outlines the key characteristics of present wars: “War is an act of violence involving
two or more organized groups framed in political terms.” This definition indicates
the increasing number of actors involved in warfare.
From a transformative perspective, it is claimed that when the history of warfare
is analyzed, three generations can be distinguished (Lind et al. 1989; Hammes 2005).
First generation can be described as the “tactics of line and column,” and it reflects its
age with the calculation of number of barrels. Quantity was equal to power at that
time, and keeping the line meant maximizing the firepower. Second generation’s
distinction came with the usage of technology, mobilization, and power of indirect
fires (Artillery). The change of power from manpower to mass power differentiated
these first two generations. The third generation of warfare is characterized by
Blitzkrieg. In contrast to second generation’s technology-driven aspect, Lind et al.
(1989) state that the main motivation of the third generation was “ideas,” where
Germany’s superiority in tactics was considered as a superiority. Lind et al. (1989)
expressed this superiority from offensive and defensive viewpoints. From an offen-
sive viewpoint, this was as an “attack relied on infiltration to bypass and collapse the
enemy’s combat forces rather than seeking to close with and destroy them” (p.23).
On the other hand, the defensive viewpoint considered this superiority as “the
defense was in depth and often invited penetration, which set the enemy up for a
counterattack.” It is noteworthy that the distinctions between generations were made
based on the dominance of military concepts and technologies (Burmaoglu and
Saritas 2017).
The aforementioned generations are mainly concerned with the historical evolu-
tion of wars, but how about future? The changes and transformations observed today
are broader to include overall changes in society, technology, economy, environ-
ment, politics, and values (STEEPV). Although being criticized, the “fourth-genera-
tion warfare” suggested by Lind et al. (1989) and Hammes (2005) takes into account
these broader changes and considers warfare as a twilight zone—between war and
peace, between civilian and military, and between tactics and strategy.
Another interpretation of the transformations regarding today’s wars comes from
Umberto Eco. Narrated by Lucas (Lucas 2010), after two world wars and the Cold
War, by contrast, Eco believed war could no longer be defined with Clausewitzian
fashion, in terms of the straightforward linear vectors of force operating between
clearly defined rival centers of power. In contrast, Eco quoted that “power is no
longer monolithic and monocephalous: it is diffused, packeted, made of the
14 Defense 4.0: Internet of Things in Military 311
Satellite ISR
Satellite ISR
Satellite
Communication
for the seamless flow and diffusion of information and data between military forces
and other actors in war theater.
Combining the conceptual and technological transformations observed in war-
fare, it can be asserted that future wars may be characterized by involving non-state
actors, distributed and cellular type forms, asymmetric nature, and high-tech with the
help of information systems and power of social media. Recent years have seen the
emergence of the network-centric warfare concept. This concept was created with
the increasing need for command and coordination. Such a system constitutes an
information grid that connects the elements of all combat soldiers, weapons, military
equipment, and so on by utilizing computers, sensors, and wired/wireless networks.
In this concept the war power is increased by intelligence superiority through
information sharing and integration as connecting intelligence collection systems,
command and control system, and strike system (Yang et al. 2015).
Figure 14.1 demonstrated the layers of the network structure.
As can be seen in the figure, a central network body is constructed to get the data
from various sources and after analyzing the data transmit it to the theater based on
their levels. This layered structure of network becomes more complicated with
adding more and more data points. Traditional approaches to military doctrine
have been transformed by the network-centric warfare with expanding communica-
tion gateways connecting battlefield assets and headquarters and increasing data
sharing between legacy assets and new deployments.
14 Defense 4.0: Internet of Things in Military 313
7
https://www.credencys.com/blog/internet-of-things-the-agent-of-change-for-the-defense-system/.
Access Date: 16.04.2016.
314 S. Burmaoglu et al.
According to Colonel Eschenbach, these unmanned systems can be used for situa-
tional awareness and enrooting air transportation forces. He envisioned that future
organizational force structure of Army Aviation has been shaped by MUM-T
advantages. Iriarte (2016) has been supporting Eschenbach’s ideas and narrated
the Unmanned Aircraft Systems (UAS) usage interoperable with AH-64 Apache.
Based on her article, the future of this concept will be with increasing autonomy,
reducing workload, and manpower.
From the healthcare point of view, it can be seen that IoTs have the potential to
change the dynamic of healthcare itself. By networking different devices together on
the battlefield and in garrison, information sharing may be more convenient based on
the findings of Military Health System Communications Office (2015). Moreover,
automated alerts for medical staff are produced by theater mobile computing
applications which can increase the quality of medical decisions. These applications
should help improve the readiness of warfighters and perhaps increase their chances
of survivability. IoTs has potential for transformative change in human health. Using
connected devices and wearables, to continuously monitor patients as they live their
lives particularly those with chronic conditions like diabetes, it can improve patient
adherence to prescribed therapies (as procedures that already planned), avoid
hospitalizations (and post-hospitalization complications), and improve the quality
of life for hundreds of millions of patients. McKinsey report predicted this could
have an economic impact of $170 billion to $1.6 trillion per year in 2025.
Finally, it can be said that IoTs has many potential areas in defense sector, but the
obstacles are very hard to overcome in a short time. Hence, it can be interpreted that
the adoption and dissemination of IoT applications need various stages. In the next
section, alternative scenarios are presented to provide alternative narratives on the
context and adoption of IoTs in military.
As discussed in the previous section, IoT has many advantages and disadvantages
for military forces. However, it should be admitted that for some of the sub-military
fields such as reconnaissance and logistics, IoT applications will have a great
contribution. These contributions may also be called as force multipliers. In this
section, the future of war contexts and potential usage of IoTs in these contexts are
represented by using alternative scenario trajectories.
There is a consensus on the existing literature that future wars will be
characterized by their distributed, synchronous, and complex nature. The key
uncertainties are about the visibility of war theaters as well as their boundaries in
terms of where they begin and where they end. New technological developments,
which may be called as intelligent systems, work autonomously with varying
controlled and supervision degrees and collect information by sensing, communi-
cating, and collaborating each other in a war theater. They are enabled by machine
learning, perception, and reasoning. They can process information, undertake defen-
sive actions, and unleash a variety of effects on the adversary. These intelligent
14 Defense 4.0: Internet of Things in Military 315
systems would be used for carrying equipment, shielding troops, and sensing fields
at first. Hence they can be produced with different physical entities ranging from
insect-sized to mid-size and can move over the ground or air. However, especially
for the physical engagement at war, it should be a requirement to authorize humans
for asking responsibility. The physical entities and virtual counterparts would be the
other side of this environment. These virtual self-operating intelligent systems may
be called as “cyber robots.” They can protect C4ISR systems and energy grids and
warn and prevent about incoming cyber threats. Moreover, these systems should be
thought systemically, and all other physical or virtual entities should be considered
as parts of this big collaborative network. The battlefield of the future will be
populated by fewer humans. But these warriors will be physically and cognitively
augmented. They can interact with the autonomous intelligent systems by using
improved man-machine interaction algorithms.
However, from the human side, not only the interaction but also the visibility of
war theaters is an important issue. Disinformation and deception will be essential to
survive and operate on the battlefield of the future. The war theater of the future is
expected to feature a crowded and synchronous battlefield. However, physical
entities will play minor role and will be replaced by cyber entities, which will be
even more difficult to detect and track. Therefore, quantity and quality of informa-
tion and availability of communications, as well as rapid decision-making, will be
crucial. Conventional concepts and approaches would not work because of their
hierarchical structure of decision-making environment, which makes the process
slower and inefficient. In this new environment, decision-making will be distributed
as well as the structure of network. Hence, for future wars, military leadership and
the competencies of leaders would become more important than the present. They
can self-organize and collaborate within these dense networks with the aid of
human-machine teams. Within this context, it is considered that that the key scenario
variations would be defined by the different levels and types of human-machine
interaction. The main question here is to what extent human supervision should be
maintained? Two scenarios are proposed to consider the trajectories of “human-
supervised” and “autonomous” systems. The first scenario is more predictable
considering the current trends, where the second one, as a probable scenario, also
becomes more and more feasible as the speed of technological development
increases and leads to the real Defense 4.0.
One of the key features of the changing nature of warfare is that the future wars will
take place in contexts, where it will be difficult to distinguish friends and enemy.
Instead of battlefields, future wars are expected to take place much closer to human
settlements and cities and, therefore, will become increasingly scattered in multiple
locations. In these cases, operations will increasingly involve UAVs and thus will be
more efficient with the engagement of smaller but more efficient security personnel.
Within this context, seamless connection, continuous data flow, and synchronization
316 S. Burmaoglu et al.
There is a runaway trolley barreling down the railway tracks. Ahead, on the tracks, there are
five people tied up and unable to move. The trolley is headed straight for them. You are
standing some distance off in the train yard, next to a lever. If you pull this lever, the trolley
will switch to a different set of tracks. However, you notice that there is one person on the
side track. You have two options: (1) Do nothing, and the trolley kills the five people on the
main track. (2) Pull the lever, diverting the trolley onto the side track where it will kill one
person. Which is the most ethical choice? And other scenario is a trolley is hurtling down a
track towards five people. You are on a bridge under which it will pass, and you can stop the
train by putting something very heavy in front of it. As it happens, there is a very fat man
next to you—your only way to stop the trolley is to push him over the bridge and onto the
track, killing him to save five. Should you proceed? (Eagleman 2015:126–128)
For the first ethical scenario, most of the people are willing to pull the lever.
However, in the second one, no one wants to push a man over the bridge. Even if the
result is the same, personal interaction changes the behavior.
In order to overcome this problem, training programs should be designed and
implemented for the military leaders and users of weapon systems to make them
capable of developing empathy with the opponents and civilians. Virtual reality or
augmented reality systems are considered to be immensely useful for this purpose.
Consequently, it should be born in mind that challenges related to human-
supervised war environments will exist at all levels, from systems to individuals.
Therefore, both infrastructures, including energy, the ICT, and cloud systems, and
future military personnel and leaders should be developed considering the context
and requirements of this new context of warfare.
14 Defense 4.0: Internet of Things in Military 317
Autonomous war environment can be also called as a new machine era, where the
Defense 4.0 concept will reach its true meaning. In this context, operations, logistics,
and intelligence units will talk to each other and plan actions through artificial
intelligence devices and algorithms. Protocols for authority and responsibility must
be clearly defined in this system, particularly when intelligence is received and
operations activated. Not inferential-based but evidence-based operations should
be authorized. Among the biggest challenges for this scenario are continuous energy
supply, human-machine interaction limitations, and development of cloud comput-
ing and supervised artificial intelligence algorithms.
From the social and human point of view, this can also be considered as a
catastrophic scenario. Although there are a number of benefits, questions regarding
the reliability of systems and the possibility of losing their control create doubts
about the development of this capability.
At first, autonomous systems are expected to be used for the purposes of intelli-
gence and logistics. While cost reductions and efficiency increases will be observed
in logistics, systems like drone swarms will help to collect intelligence from a wider
range of geographical areas. The use of biomimetic colonies in operations within
built up areas will reduce the loss and damage of personnel and vehicles.
From the organizational point of view, information will be collected and
processed of undertaken in data centers. Therefore, it can be said that this scenario
also suggests a degree of centralization in decision-making. This will be particularly
observed in logistics and intelligence units. At the individual level, the processes of
human-machine interaction need to be well considered and planned during
operations.
An important aspect in autonomous war is the role of military leadership. New
generation military leaders should be equipped with virtual management and abstract
thinking skills. The assessment of information from autonomous devices and devel-
oping an operation plan through human-operated systems require new capabilities
beyond conventional defense leadership perspectives.
Overall, access to information and cloud systems, accessibility and synchroniza-
tion, and assessment and decision-making will be among the key characteristics of
this scenario. Without doubt, energy supply will play a crucial role for the seamless
operation of the autonomous systems.
318 S. Burmaoglu et al.
Digitalization and its exploitation may have many facets. One of them is the use of
sensors and sensor technologies. Sensors are increasingly becoming an important
part of our daily life and are used for acquiring online data from technological or
biologic subjects that take part in the war theater. In peace times they are used for
training troops, optimizing weapons, vehicles or maintenance systems, and so
on. The other crucial technology is social media. It is mostly used for human
intelligence. One of the successful examples of using social media is UCINET, a
social network analysis software, which was developed by Harvard scholars to find
Saddam Hussein. Finally, it can be briefly summarized that these technologies are
collecting data or gathering it, and after analysis in appropriate software, the results
are used even in intelligence, operations, logistics, or whatever else. However, using
IoT in military is one-step forward. There are some similarities, but in the case of
IoT, sensors can talk to each other and can act according to their manufacturing
objective. In both scenarios, it can be asserted that the main challenge that military
authorities face is energy. After solving energy sustainability, human-supervised war
environment may be activated easily, because on-going operations will be strength-
ened by benefiting technological capabilities. However, autonomous war environ-
ment is one-step forward from human-supervised war environment.
Both scenarios will have same bottlenecks as ethics and social acceptance. Even
these developments may reveal benefit for community; they may eventually destroy
privacy and freedom of choice. For instance, continuous surveillance of the society
online and offline reminds George Orwell’s world-famous novel 1984 which may
raise concerns about “privacy.” A fine balance will still be required when collecting
information for intelligence while caring for the private lives of citizens, especially
in autonomous war environment.
Acknowledgments The contributions by Professor Ozcan Saritas in this study were prepared
within the framework of the Basic Research Program at the National Research University Higher
School of Economics and supported within the framework of the subsidy by the Russian Academic
Excellence Project ‘5-100’. The contributions by Asst. Professor Haydar Yalcin in this study was
supported by Scientific and Technological Research Council of Turkey Postdoctoral Research
Programme (TUBITAK BIDEP 2219) [1059B191700840].
References
Arreguín-Toft I (2001) How the weak win wars: a theory of asymmetric conflict. Int Secur 26
(1):93–128
Ashton K (2009) That ‘internet of things’ thing. RFiD J 22(7):97–114
Aydogdu A, Burmaoglu S, Saritas O, Cakir S (2017) A nanotechnology roadmapping study for the
Turkish defense industry. Foresight 19(4):354–375. https://doi.org/10.1108/FS-06-2017-0020
Bandyopadhyay S, Balamuralidhar P, Pal A (2013) Interoperation among IoT standards. J ICT
Stand 1(2):253–270
14 Defense 4.0: Internet of Things in Military 319
Burmaoglu S, Saritas O (2017) Changing characteristics of warfare and the future of Military R&D.
Technol Forecast Soc Change 116:151–161
Cartwright J (2015.) www.defensesystems.com/articles/2015/11/12/internet-of-thing-dod-
cartwright-csis.aspx. Accessed 18 Mar 2016
Daim TU, Chiavetta D, Porter AL, Saritas O (eds) (2016) Anticipating future innovation pathways
through large data analysis. Springer, Berlin
Daly M (2016.) http://www.darkreading.com/mobile/internet-of-things-4-security-tips-from-the-
military/a/d-id/1297546. Accessed 18 Mar 2016
Ding C, Wu X, Lv Z (2009) Design and implementation of the Zigbee-based body sensor network
system. In: WiCom’09, 5th International Conference on Wireless Communications, Networking
and Mobile Computing. IEEE, pp 1–4
Eagleman D (2015) The brain: the story of you. Pantheon Books, New York
Foot P (1967) The problem of abortion and the doctrine of the double effect. Oxf Rev 5:1. http://pitt.
edu/~mthompso/readings/foot.pdf. Accessed 09 Jun 2017
Grange DL (2000) Asymmetric warfare: old method, new concern. Natl Strategy Forum Rev.
Winter
Hammes TX (2005) War evolves into the fourth generation. Contemp Secur Policy 26(2):189–221
Health System Communication Office (2015.) http://science.dodlive.mil/2015/07/19/defense-
officials-use-internet-of-things-to-monitor-health/. Accessed 18 Mar 2016
Hoffman FG (2006) Complex irregular warfare: the next revolution in military affairs. Orbis
50:395–411
Iriarte M (2016) MUM-T operations on the US Army’s UAS roadmap. Military Embedded
Systems. http://mil-embedded.com/articles/mum-t-armys-uas-roadmap/. Accessed 08 Jun 2016
Kaldor M (2010) Inconclusive wars: is Clausewitz still relevant in these global times? Glob Policy 1
(3):271–281
Lind W, Nightengale K, Schmitt J, Sutton J, Wilson GI (1989) The changing face of war: into the
fourth generation. Marine Corps Gazette, October 22–26
Lucas GR Jr (2010) Postmodern war. J Milit Ethics 9(4):289–298. https://doi.org/10.1080/
15027570.2010.536399
Mantyika J, Chui M, Dobbs R, Bisson P, Marrs A (2013) Disruptive technologies: advances that
will transform life, business, and the global economy. McKinsey Global Institute Report, May
Miles I, Saritas O, Sokolov A (2016) Foresight for science, technology and innovation. Springer,
Berlin
Rathmell A (1997) Cyber-terrorism: the shape of future conflict? RUSI J 142(5):40–45
Saritas O, Burmaoglu S (2016) Future of sustainable military operations under emerging energy and
security considerations. Technol Forecast Soc Change 102:331–343
Van Creveld M (2010) Technology and war: from 2000 BC to the present. Simon and Schuster
von Clausewitz GC (1968) On war, translated by Colonel JJ Graham. Routledge & Kegan Paul,
London
von Eschenbach T (2016) Unmanned aircraft systems-manned-unmanned teaming. http://
armyaviationmagazine.com/index.php/archive/not-so-current/589-unmanned-aircraft-systems-
manned-unmanned-teaming. Accessed 08 Jun 2016
Yang JS, Lee HJ, Park MW, Eom JH (2015) Security threats on National Defense ICT based on
IoT. Adv Sci Technol Lett 97:94–98
320 S. Burmaoglu et al.