Files
Abstract
The rapid proliferation of Commercial Off-The-Shelf (COTS) technology has transformed modern warfare,
particularly in network-centric operations. Maritime forces must now integrate low-cost, high-impact solutions
to counter asymmetric threats, including Fast In-Shore Attack Crafts (FIACs) and drone swarms. This study
examines how COTS drones and other commercially available technologies can enhance networked targeting,
intelligence gathering, and operational resilience in naval combat scenarios.
Recent conflicts, particularly in Ukraine, have demonstrated the effectiveness of COTS drones for reconnaissance,
fire control, and direct attack roles. Applying these concepts to naval operations, this paper proposes
a framework for integrating COTS-based sensor networks into Tactical Data Links (TDLs) while maintaining
cybersecurity, interoperability, and real-time operational capability.
A primary challenge in this integration is balancing the Confidentiality, Integrity, and Availability (CIA) Triad
to ensure secure data exchange without compromising real-time decision-making. This paper explores Public Key
Infrastructure (PKI), Web of Trust authentication models, and post-quantum cryptography solutions to mitigate
cyber vulnerabilities while maintaining tactical flexibility. Additionally, it discusses network topology enhancements,
including hardware-based data diodes and sandboxed computing environments, which are currently being
implemented within the Royal Navy’s Shared Infrastructure (SI) approach to Combat Management Systems.
A COTS-enhanced targeting solution is proposed, utilising drone swarms to feed targeting data into naval
gun systems. By leveraging error correction algorithms akin to GPS positioning, multiple low-cost drones can
enhance accuracy, reduce targeting errors, and mitigate adversary countermeasures. The study further outlines a
cost-effective approach to restoring parity between naval forces and asymmetric threats by integrating low-cost
ISTAR platforms with long-range naval artillery and missile systems.
Finally, the challenges posed by quantum computing threats to military cryptographic protocols are addressed,
focusing on hybrid post-quantum