CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient
IoBT Operations
- URL: http://arxiv.org/abs/2208.01703v1
- Date: Tue, 2 Aug 2022 19:27:51 GMT
- Title: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient
IoBT Operations
- Authors: Sai Sree Laya Chukkapalli, Anupam Joshi, Tim Finin, Robert F. Erbacher
- Abstract summary: The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units.
This paper describes using CAPD to detect and mitigate adversary actions.
- Score: 1.9116784879310031
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Internet of Battlefield Things (IoBT) will advance the operational
effectiveness of infantry units. However, this requires autonomous assets such
as sensors, drones, combat equipment, and uncrewed vehicles to collaborate,
securely share information, and be resilient to adversary attacks in contested
multi-domain operations. CAPD addresses this problem by providing a
context-aware, policy-driven framework supporting data and knowledge exchange
among autonomous entities in a battlespace. We propose an IoBT ontology that
facilitates controlled information sharing to enable semantic interoperability
between systems. Its key contributions include providing a knowledge graph with
a shared semantic schema, integration with background knowledge, efficient
mechanisms for enforcing data consistency and drawing inferences, and
supporting attribute-based access control. The sensors in the IoBT provide data
that create populated knowledge graphs based on the ontology. This paper
describes using CAPD to detect and mitigate adversary actions. CAPD enables
situational awareness using reasoning over the sensed data and SPARQL queries.
For example, adversaries can cause sensor failure or hijacking and disrupt the
tactical networks to degrade video surveillance. In such instances, CAPD uses
an ontology-based reasoner to see how alternative approaches can still support
the mission. Depending on bandwidth availability, the reasoner initiates the
creation of a reduced frame rate grayscale video by active transcoding or
transmits only still images. This ability to reason over the mission sensed
environment and attack context permits the autonomous IoBT system to exhibit
resilience in contested conditions.
Related papers
- Enhancing Privacy and Security of Autonomous UAV Navigation [0.8512184778338805]
In critical scenarios such as border protection or disaster response, ensuring the secure navigation of autonomous UAVs is paramount.
We propose an innovative approach that combines Reinforcement Learning (RL) and Fully Homomorphic Encryption (FHE) for secure autonomous UAV navigation.
Our proposed approach ensures security and privacy in autonomous UAV navigation with negligible loss in performance.
arXiv Detail & Related papers (2024-04-26T07:54:04Z) - SISSA: Real-time Monitoring of Hardware Functional Safety and
Cybersecurity with In-vehicle SOME/IP Ethernet Traffic [49.549771439609046]
We propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security.
Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication.
Extensive experimental results show the effectiveness and efficiency of SISSA.
arXiv Detail & Related papers (2024-02-21T03:31:40Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Exploring Attack Resilience in Distributed Platoon Controllers with
Model Predictive Control [0.0]
This thesis aims to improve the security of distributed vehicle platoon controllers by investigating attack scenarios and assessing their influence on system performance.
Attack techniques, including man-in-the-middle (MITM) and false data injection (FDI), are simulated using Model Predictive Control (MPC) controller.
Countermeasures are offered and tested, that includes attack analysis and reinforced communication protocols using Machine Learning techniques for detection.
arXiv Detail & Related papers (2024-01-08T20:27:16Z) - Adversarial Client Detection via Non-parametric Subspace Monitoring in
the Internet of Federated Things [3.280202415151067]
Internet of Federated Things (IoFT) represents a network of interconnected systems with federated learning as the backbone.
We propose an effective non-parametric approach FedRR to address the adversarial attack problem.
Our proposed method is capable of accurately detecting adversarial clients and controlling the false alarm rate under the scenario with no attack occurring.
arXiv Detail & Related papers (2023-10-02T18:25:02Z) - Causal Semantic Communication for Digital Twins: A Generalizable
Imitation Learning Approach [74.25870052841226]
A digital twin (DT) leverages a virtual representation of the physical world, along with communication (e.g., 6G), computing, and artificial intelligence (AI) technologies to enable many connected intelligence services.
Wireless systems can exploit the paradigm of semantic communication (SC) for facilitating informed decision-making under strict communication constraints.
A novel framework called causal semantic communication (CSC) is proposed for DT-based wireless systems.
arXiv Detail & Related papers (2023-04-25T00:15:00Z) - Blockchain-aided Secure Semantic Communication for AI-Generated Content
in Metaverse [59.04428659123127]
We propose a blockchain-aided semantic communication framework for AIGC services in virtual transportation networks.
We illustrate a training-based semantic attack scheme to generate adversarial semantic data by various loss functions.
We also design a semantic defense scheme that uses the blockchain and zero-knowledge proofs to tell the difference between the semantic similarities of adversarial and authentic semantic data.
arXiv Detail & Related papers (2023-01-25T02:32:02Z) - HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a
Collaborative IoT Intrusion Detection [0.0]
We propose a hierarchical blockchain-based federated learning framework to enable secure and privacy-preserved collaborative IoT intrusion detection.
The proposed ML-based intrusion detection framework follows a hierarchical federated learning architecture to ensure the privacy of the learning process and organisational data.
The outcome is a securely designed ML-based intrusion detection system capable of detecting a wide range of malicious activities while preserving data privacy.
arXiv Detail & Related papers (2022-04-08T19:06:16Z) - Attribute Inference Attack of Speech Emotion Recognition in Federated
Learning Settings [56.93025161787725]
Federated learning (FL) is a distributed machine learning paradigm that coordinates clients to train a model collaboratively without sharing local data.
We propose an attribute inference attack framework that infers sensitive attribute information of the clients from shared gradients or model parameters.
We show that the attribute inference attack is achievable for SER systems trained using FL.
arXiv Detail & Related papers (2021-12-26T16:50:42Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.