Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite

Files

Abstract

The rapid proliferation of Commercial Off-The-Shelf (COTS) technology has transformed modern warfare, particularly in network-centric operations. Maritime forces must now integrate low-cost, high-impact solutions to counter asymmetric threats, including Fast In-Shore Attack Crafts (FIACs) and drone swarms. This study examines how COTS drones and other commercially available technologies can enhance networked targeting, intelligence gathering, and operational resilience in naval combat scenarios. Recent conflicts, particularly in Ukraine, have demonstrated the effectiveness of COTS drones for reconnaissance, fire control, and direct attack roles. Applying these concepts to naval operations, this paper proposes a framework for integrating COTS-based sensor networks into Tactical Data Links (TDLs) while maintaining cybersecurity, interoperability, and real-time operational capability. A primary challenge in this integration is balancing the Confidentiality, Integrity, and Availability (CIA) Triad to ensure secure data exchange without compromising real-time decision-making. This paper explores Public Key Infrastructure (PKI), Web of Trust authentication models, and post-quantum cryptography solutions to mitigate cyber vulnerabilities while maintaining tactical flexibility. Additionally, it discusses network topology enhancements, including hardware-based data diodes and sandboxed computing environments, which are currently being implemented within the Royal Navy’s Shared Infrastructure (SI) approach to Combat Management Systems. A COTS-enhanced targeting solution is proposed, utilising drone swarms to feed targeting data into naval gun systems. By leveraging error correction algorithms akin to GPS positioning, multiple low-cost drones can enhance accuracy, reduce targeting errors, and mitigate adversary countermeasures. The study further outlines a cost-effective approach to restoring parity between naval forces and asymmetric threats by integrating low-cost ISTAR platforms with long-range naval artillery and missile systems. Finally, the challenges posed by quantum computing threats to military cryptographic protocols are addressed, focusing on hybrid post-quantum

Details

PDF

Statistics

from
to
Export
Download Full History