communication intercept system imposed a large
cognitive load on the soldier.
The results of this study indicate that if the Army
can only adopt one tactical cyber capability for
fielding to its infantrymen, they should proceed with
an RF localization capability. Additionally, the
simulations indicate the importance of not increasing
a soldier’s physical and cognitive load, which can
potentially offset any benefit from a new capability.
6 CONCLUSIONS
As the complexity of the world increases, militaries
are required to perform more complex operations. In
doing so, the soldier system, defined as the soldier,
equipment, and their mission sets, increases in
complexity. Therefore, the addition of new
equipment onto a soldier requires a systems level
analysis that involves having soldiers using the
equipment in an operational environment. Since this
is not feasible for equipment, especially in the
conceptual design phase, simulation will play a
crucial role in this analysis.
Several combat simulations are available, though
many have historically been used for training
purposes; regardless, they can be modified to account
for new soldier capabilities. This paper outlines a
methodology for performing such an analysis.
The paper then presented a case study that
performs a trade space analysis on different tactical-
cyber capabilities given to dismounted soldiers. This
analysis used the combat simulation package IWARS
to compare changes in soldier performance with the
additional of different new tactical cyber capabilities.
This methodology was developed primarily to
perform the analysis on tactical cyber trade-space
presented in the case study. Future works will look at
expanding this methodology to other tactical
equipment including biomechanical enhancements,
future weapons, and autonomous systems.
REFERENCES
Almohammad, A., & Speckhard, A. (2017). ISIS Drones:
Evolution, Leadership, Bases, Operations and
Logistics. International Center for the Study of Violent
Extremism.
Brantly, A., & Collins, L. (2018, November 29). A Bear of
a Problem: Russian Tactical Cyber Operations.
Retrieved December 1, 2019, from
https://mwi.usma.edu/bear-problem-russian-tactical-
cyber-operations/
Congressional Research Service. (2018, September 4).
Electric Grid Cybersecurity. Retrieved October 20,
2019, from https://fas.org/sgp/crs/homesec/R45312.pdf
Headquarters, Department of the Army. (2016). FM 3-21.8:
The Rifel Infantry Platoon and Squad. Washington DC:
Department of the Army.
Hill, R. R., & Miller, J. O. (2017). A history of the United
States military simulation. 2017 Winter Simulation
Conference (pp. 346-364). IEEE.
Hodson, D. D. (2017). Military simulation: A ubiquitous
future. Winter Simulation Conference (pp. 4024-4025).
IEEE.
INCOSE. (2015). Systeems Engineering Handbook.
Hoboken: Wiley.
Leemans, R., & Mittal, V. (2018). A Systems Approach for
Analyzing operational Energy Requirements for the
Warfighter. IEEE Systems Engineering Conference.
Orlando.
Liu, H., Zhang, X., Su, X., Li, X., & Xu, N. (2013). Mobile
localization based on received singal strength and
Pearson's correlation coefficient. IEEE 10th Consumer
Communications and Networking Conference.
McDonnell, J. (2015). A Soldier System Engineering
Architecture Modeling and Systems Approach. NDIA
Systems Engineering Conference. Orlando, FL.
Mittal, V. (2019). Operational Analysis for Dismounted
Soldiers. Proceedings of the 8th Annual World
Conference of the Society for Industrial and Systems
Engineers. Baltimore, MD.
Page, E. H. (2016). Moddeling and Simulation,
Experimentation, and Wargaming-Assessing a
Common Landscape. Mitre.
Porche, I. R., Paul, C., Serena, C., Clarke, C. P., Johnson,
E.-E., & Herrick, D. (2018). Tactical cyber: building a
strategy for cyber support to corps and below. Santa
Monica: RAND Corporation.
Samaloty, N., Schleper, R., Fawkes, M. A., & Muscietta, D.
(2007). Infantry Warrior Simulation (IWARS): A
Soldier-Centric Constructive Simulation. Phalanx,
40(2), 29-31.
Shanker, T., & Richtel, M. (2011, January 16). In new
military, data overload can be deadly. The New York
Times, p. 2011.
Shirey, R. (2000). Internet Security Glossary. GTE/BTN
Technologies.
Tolk, A. (2012). Engineering principles of combat
modeling and distributed simulation. Hoboken, NJ:
Wiley.
Washburn, A., & Kress, M. (2009). Combat Modeling. New
York: Springer.
Wilson, J. R. (2016, October 2). How Military Harvests
Technology from the Commercial Sector. Military and
Aerospace Eletronics.