Cognitive Security: Securing the Burgeoning Landscape of Mobile Networks

被引:0
|
作者
Zheng, Yao [1 ]
Moini, Assad [1 ]
Lou, Wenjing [2 ]
Hou, Y. Thomas [3 ]
Kawamoto, Yuichi [4 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Virginia Tech, Comp Sci, Blacksburg, VA USA
[3] Virginia Tech, Elect & Comp Engn, Blacksburg, VA USA
[4] Tohoku Univ, Sendai, Miyagi 980, Japan
来源
IEEE NETWORK | 2016年 / 30卷 / 04期
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of personal wearable as well as embedded devices point to the emergence of networks of unprecedented size and complexity in the near future. Unfortunately, traditional network security solutions fall short of addressing the unique security requirements of the emerging environment given their general emphasis on administratively managed, preconfigured security context and strong physical security mechanisms. To cope with the security challenges of this emerging environment, novel cognitive-inspired security architectures have been proposed that emphasize dynamic, autonomous trust management. Cognitive security systems take advantage of sensing and computing capabilities of smart devices to analyze raw sensor data and apply machine learning techniques to make security decisions. In this article, we present a canonical representation of cognitive security architectures and examine the practicality of using these architectures to address the security challenges of rapidly growing networks of mobile/embedded autonomous devices including the ability to identify threats simply based on symptoms, without necessarily understanding attack methods. Using authentication as the main focus, we introduce our canonical representation and define various categories of contextual information commonly used by cognitive security architectures to handle authentication requirements, and highlight key advantages and disadvantages of each category. We then examine three grand challenges facing the cognitive security research including the tension between automation and security, the unintended consequences of using machine learning techniques as a basis for making security decisions, and the revocation problem in the context of cognitive security. We conclude by offering some insight into solution approaches to these challenges.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [1] An Overview of the Security Landscape of Virtual Mobile Networks
    Ahmad, Ijaz
    Pinola, Jarno
    Harjula, Ilkka
    Suomalainen, Jani
    Harjula, Erkki
    Huusko, Jyrki
    Kumar, Tanesh
    IEEE ACCESS, 2021, 9 : 169014 - 169030
  • [2] Security Threats in Mobile Cognitive Radio Networks
    Trubin, I. S.
    PROCEEDINGS OF 2018 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS 2018), 2018,
  • [3] Securing cognitive radio networks
    Leon, O.
    Hernandez-Serrano, J.
    Soriano, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (05) : 633 - 652
  • [4] The burgeoning antibody landscape
    Huston, James S.
    PROTEIN ENGINEERING DESIGN & SELECTION, 2016, 29 (10): : 399 - 401
  • [5] Securing mobile networks in an operational setting
    Ivancic, WD
    Shell, D
    CCW 2003: IEEE 18TH ANNUAL WORKSHOP ON COMPUTER COMMUNICATIONS, PROCEEDINGS, 2003, : 139 - 147
  • [6] Securing wireless sensor networks: Security architectures
    Boyle, David
    Newe, Thomas
    Journal of Networks, 2008, 3 (01) : 65 - 77
  • [7] Securing Ad Hoc networks by mobile firewall
    Yi, Ping
    Wu, Yue
    Li, Jianhua
    Journal of Information and Computational Science, 2007, 4 (02): : 839 - 850
  • [8] Securing Cognitive Radio Networks using blockchains
    Sajid, Adnan
    Khalid, Bilal
    Ali, Mudassar
    Mumtaz, Shahid
    Masud, Usman
    Qamar, Farhan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 816 - 826
  • [9] Securing Cognitive Wireless Sensor Networks: A Survey
    Fragkiadakis, Alexandros
    Angelakis, Vangelis
    Tragos, Elias Z.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [10] Applicability of quantum cryptography for securing mobile communication networks
    Marhoefer, Michael
    Wimberger, Ilse
    Pnppe, Andreas
    LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, 2007, : 97 - +