Kolawole, Ikeoluwa and Olaobaju, Jesudunsin O. and Akinola, Omolola A. (2025) Deployment of a novel breach-resistant data offloading protocol from tactical edge to cloud via hardened fog gateways. World Journal of Advanced Engineering Technology and Sciences, 15 (3). pp. 946-960. ISSN 2582-8266
![WJAETS-2025-1021.pdf [thumbnail of WJAETS-2025-1021.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJAETS-2025-1021.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Military navigation and command systems face escalating challenges in GPS-degraded or denied environments, necessitating architectures that are both resilient and secure. This study proposes and evaluates a fog-to-cloud framework engineered for real-time, low-latency communication across edge devices—including UAVs, ground vehicles, and maritime units—linked to cloud-based central command. The architecture incorporates adaptive routing algorithms, lightweight encryption, and AI-driven anomaly detection to maintain operational continuity in hostile or electromagnetically contested scenarios. Extensive simulations assessed performance under variable node loads, link disruptions, and cyber-attack conditions. Results revealed that adaptive fog node configurations reduced command latency by up to 48% compared to baseline systems, while maintaining throughput consistency even under high-traffic loads. Packet delivery rates exceeded 95% in predictive routing conditions, and command success ratios remained stable above 92% despite node failure events. Fault tolerance mechanisms, including trust-based link reconfiguration and traffic rerouting, demonstrated resilience and rapid recovery. The architecture also supports horizontal scalability across multi-domain platforms, making it suitable for Joint All-Domain Command and Control (JADC2) strategies and aligned with Department of Defense zero-trust mandates. By integrating distributed intelligence at the fog layer and ensuring encrypted pathways to the cloud, this system offers a robust solution for mission-critical military operations. Future deployments can extend the model to incorporate post-quantum cryptography and real-world testbeds in tactical field environments.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjaets.2025.15.3.1021 |
Uncontrolled Keywords: | Fog computing; Military navigation; GPS-denied environments; Low-latency communication; Adaptive routing; Secure edge networks; Command and control; JADC2; Fault tolerance; Anomaly detection |
Depositing User: | Editor Engineering Section |
Date Deposited: | 16 Aug 2025 13:05 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/4635 |