Title: Strengthening the security of cognitive packet networks

Authors: Ricardo Lent; Georgia Sakellari; George Loukas

Addresses: Intelligent Systems and Networks Group, Electrical and Electronic Engineering, Imperial College, SW7 2BT, London, UK ' School of Architecture, Computing and Engineering, University of East London, E16 2RD, London, UK ' School of Computing and Mathematical Sciences, University of Greenwich, SE10 9LS, UK

Abstract: Route selection in cognitive packet networks (CPNs) occurs continuously for active flows and is driven by the users' choice of a quality of service (QoS) goal. Because routing occurs concurrently to packet forwarding, CPN flows are able to better deal with unexpected variations in network status, while still achieving the desired QoS. Random neural networks (RNNs) play a key role in CPN routing and are responsible to the next-hop decision making of CPN packets. By using reinforcement learning, RNNs' weights are continuously updated based on expected QoS goals and information that is collected by packets as they travel on the network experiencing the current network conditions. CPN's QoS performance had been extensively investigated for a variety of operating conditions. Its dynamic and self-adaptive properties make them suitable for withstanding availability attacks, such as those caused by worm propagation and denial-of-service attacks. However, security weaknesses related to confidentiality and integrity attacks have not been previously examined. Here, we look at related network security threats and propose mechanisms that could enhance the resilience of CPN to confidentiality, integrity and availability attacks.

Keywords: network security; cognitive packet networks; CPN routing; network performance; integrity attacks; confidentiality attacks; route selection; quality of service; QoS performance; random neural networks; RNNs; reinforcement learning; next-hop decision making.

DOI: 10.1504/IJAIP.2014.059584

International Journal of Advanced Intelligence Paradigms, 2014 Vol.6 No.1, pp.14 - 27

Received: 07 Jan 2013
Accepted: 23 Mar 2013

Published online: 28 Jun 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article