Cognitive Security: Securing the Burgeoning Landscape of Mobile Networks

被引:0
|
作者
Zheng, Yao [1 ]
Moini, Assad [1 ]
Lou, Wenjing [2 ]
Hou, Y. Thomas [3 ]
Kawamoto, Yuichi [4 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Virginia Tech, Comp Sci, Blacksburg, VA USA
[3] Virginia Tech, Elect & Comp Engn, Blacksburg, VA USA
[4] Tohoku Univ, Sendai, Miyagi 980, Japan
来源
IEEE NETWORK | 2016年 / 30卷 / 04期
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of personal wearable as well as embedded devices point to the emergence of networks of unprecedented size and complexity in the near future. Unfortunately, traditional network security solutions fall short of addressing the unique security requirements of the emerging environment given their general emphasis on administratively managed, preconfigured security context and strong physical security mechanisms. To cope with the security challenges of this emerging environment, novel cognitive-inspired security architectures have been proposed that emphasize dynamic, autonomous trust management. Cognitive security systems take advantage of sensing and computing capabilities of smart devices to analyze raw sensor data and apply machine learning techniques to make security decisions. In this article, we present a canonical representation of cognitive security architectures and examine the practicality of using these architectures to address the security challenges of rapidly growing networks of mobile/embedded autonomous devices including the ability to identify threats simply based on symptoms, without necessarily understanding attack methods. Using authentication as the main focus, we introduce our canonical representation and define various categories of contextual information commonly used by cognitive security architectures to handle authentication requirements, and highlight key advantages and disadvantages of each category. We then examine three grand challenges facing the cognitive security research including the tension between automation and security, the unintended consequences of using machine learning techniques as a basis for making security decisions, and the revocation problem in the context of cognitive security. We conclude by offering some insight into solution approaches to these challenges.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [41] Security in vehicular networks for the mobile Internet
    Lindlbauer, Marc
    AUTOMOTIVE SECURITY, 2007, 2016 : 185 - 200
  • [42] Broadcast Security in Future Mobile Networks
    Rohlik, M.
    Vanek, T.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (10) : 69 - 75
  • [43] Security Service Technology for Mobile Networks
    Aiqun Hu Tao Li Mingfu Xue(Information Security Research Center of Southeast University
    ZTE Communications, 2011, 9 (03) : 49 - 54
  • [44] SIP for Mobile Networks and Security Model
    Wan, Huaxu
    Su, Guiping
    Ma, Hongyran
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1809 - +
  • [45] Security aspects in future mobile networks
    Bakmaz, Bojan
    Bakmaz, Miodrag
    Bojkovic, Zoran
    PROCEEDINGS OF IWSSIP 2008: 15TH INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING, 2008, : 479 - 482
  • [46] Security Solutions in Mobile Autonomic Networks
    Aljnidi, Mohamad
    Leneutre, Jean
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2101 - 2106
  • [47] Security issues in mobile data networks
    Nayak, D
    Rajendran, N
    Phatak, DB
    Gulati, VP
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3229 - 3233
  • [48] Security and Privacy in Wireless and Mobile Networks
    Kambourakis, Georgios
    Gomez Marmol, Felix
    Wang, Guojun
    FUTURE INTERNET, 2018, 10 (02)
  • [49] Mobile Corporate Networks Security Control
    Kravets, Alla G.
    Al-Ashval, Mohammed
    2016 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2016,
  • [50] Security in mobile ad hoc networks
    Carvalho, Marco
    IEEE SECURITY & PRIVACY, 2008, 6 (02) : 72 - 75