Visible to the public Security for Resilient IoBT Systems: Emerging Research Directions

TitleSecurity for Resilient IoBT Systems: Emerging Research Directions
Publication TypeConference Paper
Year of Publication2019
AuthorsAgadakos, I., Ciocarlie, G. F., Copos, B., George, J., Leslie, N., Michaelis, J.
Conference NameIEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
Date PublishedApril
ISBN Number978-1-7281-1878-9
Keywordsadversary activities, computer network security, contested battlefield environments, continued advances, cryptography, cybersecurity, diverse asset ownership, human factors, individual assets, Internet of battlefield things, Internet of Battlefield Things paradigm, Internet of Things, iobt, IoT technology, learning (artificial intelligence), Linear programming, machine learning systems, military computing, military operations, military sensing assets, next-generation artificial intelligence, operational conditions, Optimization, organisational aspects, Provenance, pubcrawl, resilience, resilient IoBT systems, Scalability, security techniques, Sensors, Task Analysis, Trust, Trusted Computing

Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning systems. Under the emerging Internet of Battlefield Things (IoBT) paradigm, a multitude of operational conditions (e.g., diverse asset ownership, degraded networking infrastructure, adversary activities) necessitate the development of novel security techniques, centered on establishment of trust for individual assets and supporting resilience of broader systems. To advance current IoBT efforts, a set of research directions are proposed that aim to fundamentally address the issues of trust and trustworthiness in contested battlefield environments, building on prior research in the cybersecurity domain. These research directions focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) Ensuring continued trust of known IoBT assets and systems.

Citation Keyagadakos_security_2019