I. Introduction
In general, military tactical networks consist of field devices that use flat communication protocol to provide real-time terrain and mission intelligence to soldiers [1]. Commonly, soldiers rely on mission intelligence and communication in-frastructure to make quick judgments that impact the mission's outcome. Therefore, loss or rogue mission-related data can put the adversaries at an advantage [2]. However, traditional military tactical networks lack robust security mechanisms to ensure the security and integrity of mission intelligence. In general, the non-segmented network takes the trustworthiness of field devices and communication data for granted. Thus, traditional military tactical networks are vulnerable to state-of-art cyber attacks [3], including denial of service (DoS), identity spoofing, and data manipulation attacks that disrupt network traffic flows. In addition, adversaries can exploit the security vulnerabilities to introduce rogue field devices that transmit malicious information to soldiers and central commands, disrupting the mission's objectives and outcomes.