{"id":6590,"date":"2025-09-09T13:25:01","date_gmt":"2025-09-09T17:25:01","guid":{"rendered":"https:\/\/web.uri.edu\/momentum\/?p=6590"},"modified":"2025-10-09T14:08:59","modified_gmt":"2025-10-09T18:08:59","slug":"building-trust-in-computer-networks-cybersecurity-theories-architecture-and-applications","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/momentum\/building-trust-in-computer-networks-cybersecurity-theories-architecture-and-applications\/","title":{"rendered":"Building Trust in Computer Networks: Cybersecurity, Theories, Architecture, and Applications"},"content":{"rendered":"\n<p>In 2006, cybersecurity was still an emerging field. As the internet rapidly expanded, it exposed computer networks, servers, and user devices to a growing range of external threats. Around this time, the concept of \u201ctrust\u201d began to gain attention in the context of how computer systems could evaluate the reliability and security of other entities they interact with.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-1024x683.jpg\" alt=\"\" class=\"wp-image-6592\" srcset=\"https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-1024x683.jpg 1024w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-300x200.jpg 300w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-768x512.jpg 768w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-1536x1024.jpg 1536w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-2048x1365.jpg 2048w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-364x243.jpg 364w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-500x333.jpg 500w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-1000x667.jpg 1000w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-1280x853.jpg 1280w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-2000x1333.jpg 2000w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Sun-v02-1-scaled.jpg 2560w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Yan Sun<br>Professor and Chair, Department of Electrical, Computer and Biomedical Engineering<\/figcaption><\/figure>\n\n\n\n<p>Back then, most research on \u201ctrust\u201d focused on narrow technical models within specific applications. Professor Yan Lindsay Sun was driven by the idea that trust \u2014 something we usually think about in human relationships\u2014could also be applied to computer networks.<\/p>\n\n\n\n<p>&#8220;The research funding from the NSF CAREER award allowed me to&nbsp;bring trust\u2014a social science concept\u2014into computer networking research,\u201d Sun says. \u201cAt the time, trust wasn\u2019t really considered in network security, but I developed&nbsp;a method&nbsp;to integrate this perspective into cybersecurity. In everyday life, we decide whom to trust based on experience and context. I wanted computers to be able to do something similar \u2014 to \u201creason\u201d about which devices or users they could rely on.&#8221;<\/p>\n\n\n\n<p>Her project focused on building a trust infrastructure for computer networks\u2014a system capable of measuring, assigning, and updating levels of trust between digital entities. Her team developed formal mathematical models inspired by social science theories, applied them to real-world cybersecurity problems, and designed trust-based defense mechanisms. This work enables networks to determine, for example, whether to accept data from another source or block it due to suspicious behavior\u2014ultimately strengthening security without compromising performance.<\/p>\n\n\n\n<p>This CAREER award, which was her first federal grant, was a turning point in Sun\u2019s career. The support gave her the foundation to build her research program and her team.<\/p>\n\n\n\n<p>&#8220;With this funding, I was able to recruit my first two Ph.D. students, funding three graduate students in all,\u201d Sun says. \u201cThat\u2019s a big milestone for any new professor. One of them is now an&nbsp;associate professor at Santa Clara University, and she has since graduated many of her own students. Seeing that cycle of mentorship continue is incredibly rewarding.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"717\" src=\"https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-1024x717.jpg\" alt=\"\" class=\"wp-image-6593\" srcset=\"https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-1024x717.jpg 1024w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-300x210.jpg 300w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-768x538.jpg 768w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-1536x1076.jpg 1536w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-2048x1434.jpg 2048w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-364x255.jpg 364w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-500x350.jpg 500w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-1000x700.jpg 1000w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-1280x897.jpg 1280w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-2000x1401.jpg 2000w, https:\/\/web.uri.edu\/momentum\/wp-content\/uploads\/sites\/2226\/Yan-Suns-Students-scaled.jpg 2560w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>A single paper resulting from this grant has been&nbsp;cited more than 870 times by other researchers according to Google Scholar, showing how influential this work has had in the field.<\/p>\n\n\n\n<p>\u201cI\u2019m&nbsp;proud to have been one of the pioneers&nbsp;who helped bridge social science and computer engineering,&#8221; Sun says.<\/p>\n\n\n\n<p>Sun\u2019s work has given the research community a clear understanding of the benefits and costs of building trust-enhanced systems. The proposed theories, approaches, and architecture provided a blueprint toward building trust and evaluating trustworthiness in various networking systems and continue to contribute to making future cyberspace safer and more accessible.<\/p>\n\n\n<section class=\"cl-wrapper cl-quote-wrapper\"><div class=\"cl-quote  \"><blockquote>&#8220;I\u2019m\u00a0proud to have been one of the pioneers\u00a0who helped bridge social science and computer engineering.&#8221;<\/blockquote><cite>Yan Sun, Professor and Chair, Department of Electrical, Computer and Biomedical Engineering<\/cite><\/div><\/section>\n\n\n<p>Her research played an important role in enhancing cybersecurity, which has become&nbsp;more critical than ever, impacting everything from&nbsp;national security&nbsp;to&nbsp;critical infrastructure. Trust is now a widely used concept in cybersecurity\u2014from&nbsp;trustworthy computing&nbsp;to&nbsp;trustworthy AI\u2014for diverse organizations including higher education, industry, and government.&nbsp;<\/p>\n\n\n\n<p>Sun\u2019s CAREER award also made a significant educational impact. More than 630 undergraduate students participated in the online rating Cyber Competition, which not only yielded valuable research datasets, but also raised public awareness of the lack of trust in online reputation systems. The funding also enabled Sun to develop the first cybersecurity course at URI 20 years ago.<\/p>\n\n\n\n<p>Sun continues to build upon that original work. Now the chair of the Department of Electrical, Computer and Biomedical Engineering at the University of Rhode Island, a Fellow of the IEEE, and the founding director of the URI CYPHER Research Center, she leads a multidisciplinary team focused on power grid security and resilience\u2014an area with critical implications for energy infrastructure and national security.<\/p>\n\n\n\n<p>This summer Sun launched the first Cyber-Physical Security and Resilience (CYPHER) Integrated Project Team Meeting on Power and Manufacturing Systems, and for Meeting for Naval Applications. The invitation only events convened leading academic researchers, industry innovators, and government representatives to collaboratively explore solutions to critical challenges in energy systems, manufacturing, and defense-related technologies.<\/p>\n\n\n\n<p>\u201cWhen I think about where it all started,\u201d she reflects, \u201cit really traces back to my&nbsp;first federal grant\u2014the NSF CAREER award I received 20 years ago. It&#8217;s incredible to see how it has grown into something with such&nbsp;broad and lasting impact.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2006, cybersecurity was still an emerging field. As the internet rapidly expanded, it exposed computer networks, servers, and user devices to a growing range of external threats. Around this time, the concept of \u201ctrust\u201d began to gain attention in the context of how computer systems could evaluate the reliability and security of other entities [&hellip;]<\/p>\n","protected":false},"author":701,"featured_media":6592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[32],"tags":[],"class_list":["post-6590","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-momentum-spring-25-body"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/posts\/6590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/users\/701"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/comments?post=6590"}],"version-history":[{"count":4,"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/posts\/6590\/revisions"}],"predecessor-version":[{"id":6657,"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/posts\/6590\/revisions\/6657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/media\/6592"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/media?parent=6590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/categories?post=6590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/momentum\/wp-json\/wp\/v2\/tags?post=6590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}