Julian Karoliny;Bernhard Etzlinger;Roya Khanzadeh;Andreas Springer;Hans-Peter Bernhard
{"title":"Network Support Layers Trustworthiness Computation for Wireless Networks","authors":"Julian Karoliny;Bernhard Etzlinger;Roya Khanzadeh;Andreas Springer;Hans-Peter Bernhard","doi":"10.1109/TCOMM.2024.3453388","DOIUrl":null,"url":null,"abstract":"In wireless communications, trustworthiness computation has emerged as a crucial aspect of safeguarding modern systems against cybersecurity threats, ensuring reliable data transmission and upholding user trust. However, there is no unified definition of trustworthiness computation in the literature, and it is often presented as a specifically tailored adaptation of attack detection mechanisms. In contrast, this work introduces a general method for trustworthiness computation in wireless networks. It leverages key system characteristics, such as the channel, timing, and packet information to identify measurable Quality of Service (QoS) features with sufficient sensitivity across varying operational conditions. Building on these features, a novel three-step approach is applied. It employs changepoint detection to identify potential trustworthiness issues, calculates indicators based on the observed features, and finally combines them into a quantitative representation of trustworthiness. This systematic method effectively distinguishes between regular statistical variations in QoS features and actual trustworthiness issues. The applicability of the presented approach is demonstrated using a typical IEEE 802.11 wireless link, where different QoS features and scenarios are defined. These scenarios include network attacks, system malfunctions, and typical operational conditions. Our trustworthiness computation method correctly alerts the system to all trustworthiness issues that we challenge it with.","PeriodicalId":13041,"journal":{"name":"IEEE Transactions on Communications","volume":"73 3","pages":"1879-1894"},"PeriodicalIF":8.3000,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10663457","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Communications","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10663457/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
In wireless communications, trustworthiness computation has emerged as a crucial aspect of safeguarding modern systems against cybersecurity threats, ensuring reliable data transmission and upholding user trust. However, there is no unified definition of trustworthiness computation in the literature, and it is often presented as a specifically tailored adaptation of attack detection mechanisms. In contrast, this work introduces a general method for trustworthiness computation in wireless networks. It leverages key system characteristics, such as the channel, timing, and packet information to identify measurable Quality of Service (QoS) features with sufficient sensitivity across varying operational conditions. Building on these features, a novel three-step approach is applied. It employs changepoint detection to identify potential trustworthiness issues, calculates indicators based on the observed features, and finally combines them into a quantitative representation of trustworthiness. This systematic method effectively distinguishes between regular statistical variations in QoS features and actual trustworthiness issues. The applicability of the presented approach is demonstrated using a typical IEEE 802.11 wireless link, where different QoS features and scenarios are defined. These scenarios include network attacks, system malfunctions, and typical operational conditions. Our trustworthiness computation method correctly alerts the system to all trustworthiness issues that we challenge it with.
期刊介绍:
The IEEE Transactions on Communications is dedicated to publishing high-quality manuscripts that showcase advancements in the state-of-the-art of telecommunications. Our scope encompasses all aspects of telecommunications, including telephone, telegraphy, facsimile, and television, facilitated by electromagnetic propagation methods such as radio, wire, aerial, underground, coaxial, and submarine cables, as well as waveguides, communication satellites, and lasers. We cover telecommunications in various settings, including marine, aeronautical, space, and fixed station services, addressing topics such as repeaters, radio relaying, signal storage, regeneration, error detection and correction, multiplexing, carrier techniques, communication switching systems, data communications, and communication theory. Join us in advancing the field of telecommunications through groundbreaking research and innovation.