Securing Autonomous Systems

نویسندگان

  • Zia Hayat
  • Jeff Reeve
  • Chris Boutle
  • Martin Field
چکیده

The security of an autonomous system, which consists of autonomous entities, could be compromised as a result of a physical or electronic attack. The compromise of information assets such as a system’s processing base or its communications links could potentially place an enemy ahead in terms of the OODA (Observe, Orient, Decide and Act) loop; it is this aspect of electronic warfare, which is considered in this introductory paper, ensuring that the correct information is provided to the correct entities at the correct time. In this paper particular emphasis is placed on information security and system state trust as much work has already been done to preserve the confidentiality, integrity and availability of data whilst in storage and transit. A key challenge within autonomous systems is to achieve automatic information valuation enabling individual systems to dynamically derive the classification of any information they posses. This is particularly important when decentralised information sharing is required, ensuring that only authorised entities have access to potentially sensitive information. A high-level model for representing information value (and classification) based upon context-aware computing concepts is described. If decision autonomy can be described as delegation of authority then rationally one would only prescribe higher levels of decision autonomy to a given entity if sufficient trustworthiness can be associated with it. However how is trustworthiness ascertained? A number of techniques for achieving this are described and surveyed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing G-20's Key Autonomus Systems and their Intermeshing using As-Analyzer

Several thousands of interconnected autonomous systems form the Internet, which is regarded as the most powerful communication infrastructure today. Measuring the network and monitoring its vital parameters is crucial for securing continuous availability and steady performance of the Internet. This paper introduces AS-Analyzer, a tool for gathering and analyzing data related to autonomous syste...

متن کامل

Agent-Based Container Security Systems: An Interdisciplinary Perspective

Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vendors from effective interoperability. Hence, this paper proposes an interdisciplinary perspective incorporating the agent paradigm of computer science. In this approach interaction between different autonomous entities i...

متن کامل

A shared secret-based algorithm for securing the OLSR routing protocol

The strongest feature of ad hoc networks is its capability to be rapidly deployed anywhere and anytime without relying on a pre-existing infrastructure. From there, ad hoc networks offer the advantages to be auto-organized, ubiquitous, dynamic and completely autonomous. As a counter part, securing them becomes a more difficult task, especially because of the absence of centralized entities in t...

متن کامل

PERIODIC SOLUTIONS OF CERTAIN THREE DIMENSIONAL AUTONOMOUS SYSTEMS

There has been extensive work on the existence of periodic solutions for nonlinear second order autonomous differantial equations, but little work regarding the third order problems. The popular Poincare-Bendixon theorem applies well to the former but not the latter (see [2] and [3]). We give a necessary condition for the existence of periodic solutions for the third order autonomous system...

متن کامل

Rotation number and its properties for iterated function and non-autonomous systems  

The main purpose of this paper is to introduce the rotation number for non-autonomous and iterated function systems. First, we define iterated function systems and the lift of these types of systems on the unit circle. In the following, we define the rotation number and investigate the conditions of existence and uniqueness of this number for our systems. Then, the notions rotational entropy an...

متن کامل

SECURING INTERPRETABILITY OF FUZZY MODELS FOR MODELING NONLINEAR MIMO SYSTEMS USING A HYBRID OF EVOLUTIONARY ALGORITHMS

In this study, a Multi-Objective Genetic Algorithm (MOGA) is utilized to extract interpretable and compact fuzzy rule bases for modeling nonlinear Multi-input Multi-output (MIMO) systems. In the process of non- linear system identi cation, structure selection, parameter estimation, model performance and model validation are important objectives. Furthermore, se- curing low-level and high-level ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006