Security for Resilient IoBT Systems: Emerging Research Directions
Title | Security for Resilient IoBT Systems: Emerging Research Directions |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Agadakos, I., Ciocarlie, G. F., Copos, B., George, J., Leslie, N., Michaelis, J. |
Conference Name | IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) |
Date Published | April |
Publisher | IEEE |
ISBN Number | 978-1-7281-1878-9 |
Keywords | adversary activities, computer network security, contested battlefield environments, continued advances, cryptography, cybersecurity, diverse asset ownership, human factors, individual assets, Internet of battlefield things, Internet of Battlefield Things paradigm, Internet of Things, iobt, IoT technology, learning (artificial intelligence), Linear programming, machine learning systems, military computing, military operations, military sensing assets, next-generation artificial intelligence, operational conditions, Optimization, organisational aspects, Provenance, pubcrawl, resilience, resilient IoBT systems, Scalability, security techniques, Sensors, Task Analysis, Trust, Trusted Computing |
Abstract | Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning systems. Under the emerging Internet of Battlefield Things (IoBT) paradigm, a multitude of operational conditions (e.g., diverse asset ownership, degraded networking infrastructure, adversary activities) necessitate the development of novel security techniques, centered on establishment of trust for individual assets and supporting resilience of broader systems. To advance current IoBT efforts, a set of research directions are proposed that aim to fundamentally address the issues of trust and trustworthiness in contested battlefield environments, building on prior research in the cybersecurity domain. These research directions focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) Ensuring continued trust of known IoBT assets and systems. |
URL | https://ieeexplore.ieee.org/document/9093784 |
Citation Key | agadakos_security_2019 |
- resilience
- military operations
- military sensing assets
- next-generation artificial intelligence
- operational conditions
- optimization
- organisational aspects
- Provenance
- pubcrawl
- military computing
- resilient IoBT systems
- Scalability
- security techniques
- sensors
- Task Analysis
- trust
- Trusted Computing
- Internet of battlefield things
- computer network security
- contested battlefield environments
- continued advances
- Cryptography
- Cybersecurity
- diverse asset ownership
- Human Factors
- individual assets
- adversary activities
- Internet of Battlefield Things paradigm
- Internet of Things
- iobt
- IoT technology
- learning (artificial intelligence)
- Linear programming
- machine learning systems