Application of Trust Assessment Techniques to IoBT Systems
Title | Application of Trust Assessment Techniques to IoBT Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Agadakos, I., Ciocarlie, G. F., Copos, B., Emmi, M., George, J., Leslie, N., Michaelis, J. |
Conference Name | MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) |
Date Published | Nov. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4280-7 |
Keywords | computer security, cybersecurity, cybersecurity techniques, diverse asset ownership, human factors, Internet, Internet of battlefield things, Internet of Battlefield Things paradigm, Internet of Things, iobt, IoBT operational environments, IoBT systems, IoT assets, IoT technology, learning (artificial intelligence), machine learning systems, military computing, military operations, military sensing assets, Monitoring, next-generation artificial intelligence, Provenance, pubcrawl, resilience, Scalability, security of data, Sensors, smart cities, Trust, trust assessment techniques, Trusted Computing |
Abstract | Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning systems. Under the emerging Internet of Battlefield Things (IoBT) paradigm, current operational conditions necessitate the development of novel security techniques, centered on establishment of trust for individual assets and supporting resilience of broader systems. To advance current IoBT efforts, a collection of prior-developed cybersecurity techniques is reviewed for applicability to conditions presented by IoBT operational environments (e.g., diverse asset ownership, degraded networking infrastructure, adversary activities) through use of supporting case study examples. The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust of known IoT assets and IoBT systems. |
URL | https://ieeexplore.ieee.org/document/9020774 |
DOI | 10.1109/MILCOM47813.2019.9020774 |
Citation Key | agadakos_application_2019 |
- machine learning systems
- Trusted Computing
- trust assessment techniques
- trust
- smart cities
- sensors
- security of data
- Scalability
- resilience
- pubcrawl
- Provenance
- next-generation artificial intelligence
- Monitoring
- military sensing assets
- military operations
- military computing
- computer security
- learning (artificial intelligence)
- IoT technology
- IoT assets
- IoBT systems
- IoBT operational environments
- iobt
- Internet of Things
- Internet of Battlefield Things paradigm
- Internet of battlefield things
- internet
- Human Factors
- diverse asset ownership
- cybersecurity techniques
- Cybersecurity