Page 65 - Artificial Intelligence for the Internet of Everything
P. 65

Intelligent Autonomous Things on the Battlefield  51


              (deceptive information) produced by an adversary malware residing in
              friendly things or otherwise inserted into the environment. Both humans
              and things are susceptible to deception, and humans are likely to experience
              cognitive challenges when surrounded by opaque things that might be
              providing them with untrustworthy information (Kott & Alberts, 2017).
                 This situation reminds us that the adversarial nature of the battlefield
              environment is a concern of exceptional importance, above all others.
              The intelligent things will have to deal with an intelligent, capable adversary.
              The adversary will bring about physical destruction, either by means such as
              gunfire (also known as “kinetic” effects) or by using directed energy
              weapons. The adversary will jam the communication channels between
              things, and between things and humans. The adversary will deceive things
              by presenting them with misleading information. Recent research in adver-
              sarial learning comes to mind in this connection (Papernot et al., 2016).
              Perhaps most dangerously, the adversary will attack intelligent things by
              depositing malware on them.



              3.3 AI WILL FIGHT THE CYBER ADVERSARY

              A key assumption that must be made regarding the IoBT is that in a conflict
              with a technically sophisticated adversary, IoBT will be a heavily contested
              battlefield (Kott, Alberts, & Wang, 2015). Enemy software cyber agents,
              or malware, will infiltrate our networks and attack our intelligent things.
              To fight them, things will need artificial cyber hunters—intelligent, auton-
              omous, mobile agents specialized in active cyber defense and residing
              on IoBT.
                 Such agents will stealthily patrol the networks, detect the enemy mal-
              ware while remaining concealed, and then destroy or degrade the enemy
              malware. They will do so mostly autonomously, because human cyber
              experts will be always scarce on the battlefield. They will be adaptive because
              the enemy malware is constantly evolving. They will be stealthy because the
              enemy malware will try to find and kill them. At this time, such capabilities
              do not exist but are a topic of research (Theron et al., 2018). We will now
              explore the desired characteristics of an intelligent autonomous agent
              operating in the context of IoBT.
                 Under consideration is a thing—a simple senor or a complex military
              vehicle—on which one or more computers resides. Each computer contrib-
              utes considerably to the operation of the thing or systems installed on the
   60   61   62   63   64   65   66   67   68   69   70