Cognitive Security: Securing the Burgeoning Landscape of Mobile Networks

被引:0
|
作者
Zheng, Yao [1 ]
Moini, Assad [1 ]
Lou, Wenjing [2 ]
Hou, Y. Thomas [3 ]
Kawamoto, Yuichi [4 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Virginia Tech, Comp Sci, Blacksburg, VA USA
[3] Virginia Tech, Elect & Comp Engn, Blacksburg, VA USA
[4] Tohoku Univ, Sendai, Miyagi 980, Japan
来源
IEEE NETWORK | 2016年 / 30卷 / 04期
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of personal wearable as well as embedded devices point to the emergence of networks of unprecedented size and complexity in the near future. Unfortunately, traditional network security solutions fall short of addressing the unique security requirements of the emerging environment given their general emphasis on administratively managed, preconfigured security context and strong physical security mechanisms. To cope with the security challenges of this emerging environment, novel cognitive-inspired security architectures have been proposed that emphasize dynamic, autonomous trust management. Cognitive security systems take advantage of sensing and computing capabilities of smart devices to analyze raw sensor data and apply machine learning techniques to make security decisions. In this article, we present a canonical representation of cognitive security architectures and examine the practicality of using these architectures to address the security challenges of rapidly growing networks of mobile/embedded autonomous devices including the ability to identify threats simply based on symptoms, without necessarily understanding attack methods. Using authentication as the main focus, we introduce our canonical representation and define various categories of contextual information commonly used by cognitive security architectures to handle authentication requirements, and highlight key advantages and disadvantages of each category. We then examine three grand challenges facing the cognitive security research including the tension between automation and security, the unintended consequences of using machine learning techniques as a basis for making security decisions, and the revocation problem in the context of cognitive security. We conclude by offering some insight into solution approaches to these challenges.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [31] Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
    Sanchez, Luis
    Lanza, Jorge
    Munoz, Luis
    Ahola, Kimmo
    Alutoin, Mikko
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 52 (02) : 393 - 409
  • [32] Securing the Control Channel of Software-Defined Mobile Networks
    Liyanage, Madhusanka
    Ylianttila, Mika
    Gurtov, Andrei
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [33] Identity Based Schemes for Securing Mobile Ad Hoc Networks
    Ghosh, Uttam
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2514 - 2517
  • [34] Securing DSR with mobile agents in wireless ad hoc networks
    Abosamra, Ahmed
    Hashem, Mohamed
    Darwish, Gamal
    EGYPTIAN INFORMATICS JOURNAL, 2011, 12 (01) : 29 - 36
  • [35] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511
  • [36] Security in vehicular networks for the mobile internet
    Lindlbauer, Marc
    VDI Berichte, 2007, (2016): : 185 - 200
  • [37] Security in third Generation Mobile Networks
    Xenakis, C
    Merakos, L
    COMPUTER COMMUNICATIONS, 2004, 27 (07) : 638 - 650
  • [38] Security issues in mobile information networks
    Hardjono, T
    Seberry, J
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1021 - 1026
  • [39] Reducing security overhead for mobile networks
    Zhang, FG
    Mu, Y
    Susilo, W
    19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 398 - 403
  • [40] Security in Mobile ADHOC Networks: Survey
    Kariyannavar, Sharat S.
    Thakur, Shreyas
    Maheshwari, Aastha
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 135 - 143