Introduction

Linan Huang, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Human cognitive capacities and the needs of human-centric solutions for “Industry 5.0” make humans an indispensable component in Cyber-Physical Systems (CPSs), referred to as Human-Cyber-Physical Systems (HCPSs), where AI-powered technologies are incorporated to assist and augment humans. The close integration between humans and technologies in Sect. 1.1 and cognitive attacks in Sect. 1.2.4 poses emerging security challenges, where attacks can exploit vulnerabilities of human cognitive processes, affect their behaviors, and ultimately damage the HCPS. Defending HCPSs against cognitive attacks requires a new security paradigm, which we refer to as “cognitive security” in Sect. 1.2.5. The vulnerabilities of human cognitive systems and the associated methods of exploitation distinguish cognitive security from “cognitive reliability” and give rise to a distinctive CIA triad, as shown in Sects. 1.2.5.1 and 1.2.5.2, respectively. Section 1.2.5.3 introduces cognitive and technical defense methods that deter the kill chain of cognitive attacks and harden the cognitive security. System scientific perspectives in Sect. 1.3 offer a promising direction to address the new challenges of cognitive security by developing quantitative, modular, multi-scale, and transferable solutions. Figure 1.1 illustrates the structure of Chap. 1.

Original languageEnglish (US)
Title of host publicationSpringerBriefs in Computer Science
PublisherSpringer
Pages1-25
Number of pages25
DOIs
StatePublished - 2023

Publication series

NameSpringerBriefs in Computer Science
VolumePart F267
ISSN (Print)2191-5768
ISSN (Electronic)2191-5776

Keywords

  • CIA triad
  • Cognitive attacks
  • Cognitive reliability
  • Cognitive security
  • Cognitive vulnerability
  • Cyber security
  • Data science
  • Human-centered AI
  • Human-cyber-physical systems
  • System science

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Introduction'. Together they form a unique fingerprint.

Cite this