Network Support Layers Trustworthiness Computation for Wireless Networks

IF 8.3 2区 计算机科学 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Transactions on Communications Pub Date : 2024-09-02 DOI:10.1109/TCOMM.2024.3453388
Julian Karoliny;Bernhard Etzlinger;Roya Khanzadeh;Andreas Springer;Hans-Peter Bernhard
{"title":"Network Support Layers Trustworthiness Computation for Wireless Networks","authors":"Julian Karoliny;Bernhard Etzlinger;Roya Khanzadeh;Andreas Springer;Hans-Peter Bernhard","doi":"10.1109/TCOMM.2024.3453388","DOIUrl":null,"url":null,"abstract":"In wireless communications, trustworthiness computation has emerged as a crucial aspect of safeguarding modern systems against cybersecurity threats, ensuring reliable data transmission and upholding user trust. However, there is no unified definition of trustworthiness computation in the literature, and it is often presented as a specifically tailored adaptation of attack detection mechanisms. In contrast, this work introduces a general method for trustworthiness computation in wireless networks. It leverages key system characteristics, such as the channel, timing, and packet information to identify measurable Quality of Service (QoS) features with sufficient sensitivity across varying operational conditions. Building on these features, a novel three-step approach is applied. It employs changepoint detection to identify potential trustworthiness issues, calculates indicators based on the observed features, and finally combines them into a quantitative representation of trustworthiness. This systematic method effectively distinguishes between regular statistical variations in QoS features and actual trustworthiness issues. The applicability of the presented approach is demonstrated using a typical IEEE 802.11 wireless link, where different QoS features and scenarios are defined. These scenarios include network attacks, system malfunctions, and typical operational conditions. Our trustworthiness computation method correctly alerts the system to all trustworthiness issues that we challenge it with.","PeriodicalId":13041,"journal":{"name":"IEEE Transactions on Communications","volume":"73 3","pages":"1879-1894"},"PeriodicalIF":8.3000,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10663457","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Communications","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10663457/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

In wireless communications, trustworthiness computation has emerged as a crucial aspect of safeguarding modern systems against cybersecurity threats, ensuring reliable data transmission and upholding user trust. However, there is no unified definition of trustworthiness computation in the literature, and it is often presented as a specifically tailored adaptation of attack detection mechanisms. In contrast, this work introduces a general method for trustworthiness computation in wireless networks. It leverages key system characteristics, such as the channel, timing, and packet information to identify measurable Quality of Service (QoS) features with sufficient sensitivity across varying operational conditions. Building on these features, a novel three-step approach is applied. It employs changepoint detection to identify potential trustworthiness issues, calculates indicators based on the observed features, and finally combines them into a quantitative representation of trustworthiness. This systematic method effectively distinguishes between regular statistical variations in QoS features and actual trustworthiness issues. The applicability of the presented approach is demonstrated using a typical IEEE 802.11 wireless link, where different QoS features and scenarios are defined. These scenarios include network attacks, system malfunctions, and typical operational conditions. Our trustworthiness computation method correctly alerts the system to all trustworthiness issues that we challenge it with.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线网络的网络支持层可信度计算
在无线通信中,可信计算已经成为保护现代系统免受网络安全威胁、确保可靠数据传输和维护用户信任的关键方面。然而,文献中对可信度计算并没有统一的定义,通常被认为是对攻击检测机制的一种专门定制的适应。本文介绍了无线网络中可信度计算的一种通用方法。它利用关键的系统特征(如通道、定时和包信息)来识别可测量的服务质量(QoS)特征,并在不同的操作条件下具有足够的灵敏度。在这些特性的基础上,应用了一种新的三步方法。它使用变更点检测来识别潜在的可信度问题,根据观察到的特征计算指标,最后将它们组合成可信度的定量表示。这种系统的方法有效地区分了QoS特征的常规统计变化和实际的可信度问题。使用典型的IEEE 802.11无线链路演示了所提出方法的适用性,其中定义了不同的QoS特性和场景。这些场景包括网络攻击、系统故障和典型操作情况。我们的可信性计算方法正确地提醒系统注意我们提出的所有可信性问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Communications
IEEE Transactions on Communications 工程技术-电信学
CiteScore
16.10
自引率
8.40%
发文量
528
审稿时长
4.1 months
期刊介绍: The IEEE Transactions on Communications is dedicated to publishing high-quality manuscripts that showcase advancements in the state-of-the-art of telecommunications. Our scope encompasses all aspects of telecommunications, including telephone, telegraphy, facsimile, and television, facilitated by electromagnetic propagation methods such as radio, wire, aerial, underground, coaxial, and submarine cables, as well as waveguides, communication satellites, and lasers. We cover telecommunications in various settings, including marine, aeronautical, space, and fixed station services, addressing topics such as repeaters, radio relaying, signal storage, regeneration, error detection and correction, multiplexing, carrier techniques, communication switching systems, data communications, and communication theory. Join us in advancing the field of telecommunications through groundbreaking research and innovation.
期刊最新文献
Novel Transform Based Optimization for Resource Allocation and Task Offloading in Communication Networks A Novel Cross-Entropy Receiver for Random Time-Hopping Covert Satellite Systems Rydberg-Atom-Based Superdirective Receivers: Array Modeling and Performance Analysis Resource Allocation in RIS-assisted Integrated Sensing, Communication, and Computation Network Coarse-to-Fine Doppler Compensation in 6G VLEO: Dual-Head Temporal Convolutional Network Acquisition with CP-Aided Tracking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1