|
|
|
|
LEADER |
07219pam a22003491i 4500 |
001 |
180-018095320 |
003 |
Uk |
005 |
20220309130727.0 |
006 |
m || d | |
007 |
cr ||||||||||| |
008 |
161028s2016 nju o 000|0|eng|d |
015 |
|
|
|a GBB6F3225
|2 bnb
|
020 |
|
|
|a 9781119193876 (ePub ebook) :
|c £100.00
|
020 |
|
|
|z 9781119193883 (PDF ebook) :
|c £100.00
|
037 |
|
|
|a 9781119193876
|b Wiley
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|d Uk
|e rda
|e pn
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Brooks, Tyson T.
|e author.
|
245 |
1 |
0 |
|a Cyber-assurance for the internet of things
|c Tyson Brooks
|
250 |
|
|
|a 1st
|
264 |
|
1 |
|a Hoboken
|b Wiley-IEEE Press
|c 2016
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
505 |
0 |
|
|a LIST OF FIGURES xiii <p>LIST OF TABLES xvii</p> <p>FOREWORD xix</p> <p>PREFACE xxix</p> <p>ACKNOWLEDGMENTS xxxiii</p> <p>CONTRIBUTORS xxxv</p> <p>ACRONYMS xli</p> <p>INTRODUCTION xlvii</p> <p><b>PART I EMBEDDED DESIGN SECURITY 1</b></p> <p><b>1 CERTIFIED SECURITY BY DESIGN FOR THE INTERNET OF THINGS 3</b><br /><i>Shiu-Kai Chin</i></p> <p>1.1 Introduction / 3</p> <p>1.2 Lessons from the Microelectronics Revolution / 3</p> <p>1.3 Certified Security by Design / 5</p> <p>1.4 Chapter Outline / 9</p> <p>1.5 An Access-Control Logic / 9</p> <p>1.6 An Introduction to HOL / 17</p> <p>1.7 The Access-Control Logic in HOL / 25</p> <p>1.8 Cryptographic Components and Their Models in Higher-Order Logic / 30</p> <p>1.9 Cryptographic Hash Functions / 33</p> <p>1.10 Asymmetric-Key Cryptography / 33</p> <p>1.11 Digital Signatures / 36</p> <p>1.12 Adding Security to State Machines / 38</p> <p>1.13 A Networked Thermostat Certified Secure by Design / 49</p> <p>1.14 Thermostat Use Cases / 52</p> <p>1.15 Security Contexts for the Server and Thermostat / 56</p> <p>1.16 Top-Level Thermostat Secure-State Machine / 58</p> <p>1.17 Refined Thermostat Secure-State Machine / 67</p> <p>1.18 Equivalence of Top-Level and Refined Secure-State Machines / 81</p> <p>1.19 Conclusions / 84</p> <p>Appendix / 86</p> <p>References / 99</p> <p><b>2 CYBER-ASSURANCE THROUGH EMBEDDED SECURITY FOR THE INTERNET OF THINGS 101</b><br /><i>Tyson T. Brooks and Joon Park</i></p> <p>2.1 Introduction / 101</p> <p>2.2 Cyber-Security and Cyber-Assurance / 106</p> <p>2.3 Recognition, Fortification, Re-Establishment, Survivability / 108</p> <p>2.4 Conclusion / 120</p> <p>References / 122</p> <p><b>3 A SECURE UPDATE MECHANISM FOR INTERNET OF THINGS DEVICES 129</b><br /><i>Martin Goldberg</i></p> <p>3.1 Introduction / 129</p> <p>3.2 Importance of IOT Security / 130</p> <p>3.3 Applying the Defense In-Depth Strategy for Updating / 131</p> <p>3.4 A Standards Approach / 132</p> <p>3.5 Conclusion / 134</p> <p>References / 135</p> <p><b>PART II TRUST IMPACT 137</b></p> <p><b>4 SECURITY AND TRUST MANAGEMENT FOR THE INTERNET OF THINGS: AN RFID AND SENSOR NETWORK PERSPECTIVE 139</b><br /><i>M. Bala Krishna</i></p> <p>4.1 Introduction / 139</p> <p>4.2 Security and Trust in the Internet of Things / 142</p> <p>4.3 Radio Frequency Identification: Evolution and Approaches / 147</p> <p>4.4 Security and Trust in Wireless Sensor Networks / 151</p> <p>4.5 Applications of Internet of Things and RFID in Real-Time Environment / 156</p> <p>4.6 Future Research Directions and Conclusion / 158</p> <p>References / 159</p> <p><b>5 THE IMPACT OF IoT DEVICES ON NETWORK TRUST BOUNDARIES 163</b><br /><i>Nicole Newmeyer</i></p> <p>5.1 Introduction / 163</p> <p>5.2 Trust Boundaries / 164</p> <p>5.3 Risk Decisions and Conclusion / 173</p> <p>References / 174</p> <p><b>PART III WEARABLE AUTOMATION PROVENANCE 175</b></p> <p><b>6 WEARABLE IoT COMPUTING: INTERFACE, EMOTIONS, WEARER’S CULTURE, AND SECURITY/PRIVACY CONCERNS 177</b><br /><i>Robert McCloud, Martha Lerski, Joon Park, and Tyson T. Brooks</i></p> <p>6.1 Introduction / 177</p> <p>6.2 Data Accuracy in Wearable Computing / 178</p> <p>6.3 Interface and Culture / 178</p> <p>6.4 Emotion and Privacy / 179</p> <p>6.5 Privacy Protection Policies for Wearable Devices / 181</p> <p>6.6 Privacy/Security Concerns About Wearable Devices / 182</p> <p>6.7 Expectations About Future Wearable Devices / 183</p> <p>References / 184</p> <p><b>7 ON VULNERABILITIES OF IoT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS 187</b><br /><i>Martin Murillo</i></p> <p>7.1 Introduction / 187</p> <p>7.2 Industrial Control Systems and Home Automation Control / 189</p> <p>7.3 Vulnerability Identification / 193</p> <p>7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers / 198</p> <p>7.5 Illustrating Various Attacks Through a Basic Home Heating System Model / 200</p> <p>7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks / 203</p> <p>7.7 Discussion and Conclusion / 205</p> <p>References / 206</p> <p><b>8 BIG DATA COMPLEX EVENT PROCESSING FOR INTERNET OF THINGS PROVENANCE: BENEFITS FOR AUDIT, FORENSICS, AND SAFETY 209</b><br /><i>Mark Underwood</i></p> <p>8.1 Overview of Complex Event Processing / 209</p> <p>8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety / 211</p> <p>8.3 Challenges to CEP Adoption in IoT Settings / 213</p> <p>8.4 CEP and IoT Security Visualization / 215</p> <p>8.5 Summary / 217</p> <p>8.6 Conclusion / 219</p> <p>References / 220</p> <p><b>PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS 225</b></p> <p><b>9 A STEADY-STATE FRAMEWORK FOR ASSESSING SECURITY MECHANISMS IN A CLOUD-OF-THINGS ARCHITECTURE 227</b><br /><i>Tyson T. Brooks and Lee McKnight</i></p> <p>Variable Nomenclature / 227</p> <p>9.1 Introduction / 228</p> <p>9.2 Background / 229</p> <p>9.3 Establishing a Framework for CoT Analysis / 232</p> <p>9.4 The CoT Steady-State Framework / 238</p> <p>9.5 Conclusion / 244</p> <p>References / 245</p> <p><b>10 AN ARTIFICIAL INTELLIGENCE PERSPECTIVE ON ENSURING CYBER-ASSURANCE FOR THE INTERNET OF THINGS 249</b><br /><i>Utku Köse</i></p> <p>10.1 Introduction / 249</p> <p>10.2 AI-Related Cyber-Assurance Research for the IoT / 250</p> <p>10.3 Multidisciplinary Intelligence Enabling Opportunities with AI / 252</p> <p>10.4 Future Research on AI-Based Cyber-Assurance for IoT / 254</p> <p>10.5 Conclusion / 255</p> <p>References / 255</p> <p><b>11 PERCEIVED THREAT MODELING FOR CYBER-PHYSICAL SYSTEMS 257</b><br /><i>Christopher Leberknight</i></p> <p>11.1 Introduction / 257</p> <p>11.2 Overview of Physical Security / 259</p> <p>11.3 Relevance to Grounded Theory / 261</p> <p>11.4 Theoretical Model Construction / 262</p> <p>11.5 Experiment / 263</p> <p>11.6 Results / 267</p> <p>11.7 Discussion / 275</p> <p>11.8 Future Research / 276</p> <p>11.9 Conclusion / 278</p> <p>References / 279</p> <p>APPENDICES</p> <p>A LIST OF IEEE INTERNET OF THINGS STANDARDS 283</p> <p>B GLOSSARY 319</p> <p>C CSBD THERMOSTAT REPORT 333</p> <p>D CSBD ACCESS-CONTROL LOGIC REPORT 415</p> <p>BIBLIOGRAPHY 433</p> <p>INDEX 457</p>
|
650 |
|
0 |
|a Internet of things
|x Security measures.
|
700 |
1 |
|
|a Brooks, Tyson T.
|e editor.
|
859 |
|
|
|a ELD
|b ebook
|
980 |
|
|
|a 018095320
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1778756587901419520 |
access_facet |
Electronic Resources |
author |
Brooks, Tyson T. |
author2 |
Brooks, Tyson T. |
author2_role |
edt |
author2_variant |
t t b tt ttb |
author_facet |
Brooks, Tyson T., Brooks, Tyson T. |
author_role |
aut |
author_sort |
Brooks, Tyson T. |
author_variant |
t t b tt ttb |
building |
Library A |
callnumber-sort |
|
collection |
sid-180-col-bnbfidbbi |
contents |
LIST OF FIGURES xiii <p>LIST OF TABLES xvii</p> <p>FOREWORD xix</p> <p>PREFACE xxix</p> <p>ACKNOWLEDGMENTS xxxiii</p> <p>CONTRIBUTORS xxxv</p> <p>ACRONYMS xli</p> <p>INTRODUCTION xlvii</p> <p><b>PART I EMBEDDED DESIGN SECURITY 1</b></p> <p><b>1 CERTIFIED SECURITY BY DESIGN FOR THE INTERNET OF THINGS 3</b><br /><i>Shiu-Kai Chin</i></p> <p>1.1 Introduction / 3</p> <p>1.2 Lessons from the Microelectronics Revolution / 3</p> <p>1.3 Certified Security by Design / 5</p> <p>1.4 Chapter Outline / 9</p> <p>1.5 An Access-Control Logic / 9</p> <p>1.6 An Introduction to HOL / 17</p> <p>1.7 The Access-Control Logic in HOL / 25</p> <p>1.8 Cryptographic Components and Their Models in Higher-Order Logic / 30</p> <p>1.9 Cryptographic Hash Functions / 33</p> <p>1.10 Asymmetric-Key Cryptography / 33</p> <p>1.11 Digital Signatures / 36</p> <p>1.12 Adding Security to State Machines / 38</p> <p>1.13 A Networked Thermostat Certified Secure by Design / 49</p> <p>1.14 Thermostat Use Cases / 52</p> <p>1.15 Security Contexts for the Server and Thermostat / 56</p> <p>1.16 Top-Level Thermostat Secure-State Machine / 58</p> <p>1.17 Refined Thermostat Secure-State Machine / 67</p> <p>1.18 Equivalence of Top-Level and Refined Secure-State Machines / 81</p> <p>1.19 Conclusions / 84</p> <p>Appendix / 86</p> <p>References / 99</p> <p><b>2 CYBER-ASSURANCE THROUGH EMBEDDED SECURITY FOR THE INTERNET OF THINGS 101</b><br /><i>Tyson T. Brooks and Joon Park</i></p> <p>2.1 Introduction / 101</p> <p>2.2 Cyber-Security and Cyber-Assurance / 106</p> <p>2.3 Recognition, Fortification, Re-Establishment, Survivability / 108</p> <p>2.4 Conclusion / 120</p> <p>References / 122</p> <p><b>3 A SECURE UPDATE MECHANISM FOR INTERNET OF THINGS DEVICES 129</b><br /><i>Martin Goldberg</i></p> <p>3.1 Introduction / 129</p> <p>3.2 Importance of IOT Security / 130</p> <p>3.3 Applying the Defense In-Depth Strategy for Updating / 131</p> <p>3.4 A Standards Approach / 132</p> <p>3.5 Conclusion / 134</p> <p>References / 135</p> <p><b>PART II TRUST IMPACT 137</b></p> <p><b>4 SECURITY AND TRUST MANAGEMENT FOR THE INTERNET OF THINGS: AN RFID AND SENSOR NETWORK PERSPECTIVE 139</b><br /><i>M. Bala Krishna</i></p> <p>4.1 Introduction / 139</p> <p>4.2 Security and Trust in the Internet of Things / 142</p> <p>4.3 Radio Frequency Identification: Evolution and Approaches / 147</p> <p>4.4 Security and Trust in Wireless Sensor Networks / 151</p> <p>4.5 Applications of Internet of Things and RFID in Real-Time Environment / 156</p> <p>4.6 Future Research Directions and Conclusion / 158</p> <p>References / 159</p> <p><b>5 THE IMPACT OF IoT DEVICES ON NETWORK TRUST BOUNDARIES 163</b><br /><i>Nicole Newmeyer</i></p> <p>5.1 Introduction / 163</p> <p>5.2 Trust Boundaries / 164</p> <p>5.3 Risk Decisions and Conclusion / 173</p> <p>References / 174</p> <p><b>PART III WEARABLE AUTOMATION PROVENANCE 175</b></p> <p><b>6 WEARABLE IoT COMPUTING: INTERFACE, EMOTIONS, WEARER’S CULTURE, AND SECURITY/PRIVACY CONCERNS 177</b><br /><i>Robert McCloud, Martha Lerski, Joon Park, and Tyson T. Brooks</i></p> <p>6.1 Introduction / 177</p> <p>6.2 Data Accuracy in Wearable Computing / 178</p> <p>6.3 Interface and Culture / 178</p> <p>6.4 Emotion and Privacy / 179</p> <p>6.5 Privacy Protection Policies for Wearable Devices / 181</p> <p>6.6 Privacy/Security Concerns About Wearable Devices / 182</p> <p>6.7 Expectations About Future Wearable Devices / 183</p> <p>References / 184</p> <p><b>7 ON VULNERABILITIES OF IoT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS 187</b><br /><i>Martin Murillo</i></p> <p>7.1 Introduction / 187</p> <p>7.2 Industrial Control Systems and Home Automation Control / 189</p> <p>7.3 Vulnerability Identification / 193</p> <p>7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers / 198</p> <p>7.5 Illustrating Various Attacks Through a Basic Home Heating System Model / 200</p> <p>7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks / 203</p> <p>7.7 Discussion and Conclusion / 205</p> <p>References / 206</p> <p><b>8 BIG DATA COMPLEX EVENT PROCESSING FOR INTERNET OF THINGS PROVENANCE: BENEFITS FOR AUDIT, FORENSICS, AND SAFETY 209</b><br /><i>Mark Underwood</i></p> <p>8.1 Overview of Complex Event Processing / 209</p> <p>8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety / 211</p> <p>8.3 Challenges to CEP Adoption in IoT Settings / 213</p> <p>8.4 CEP and IoT Security Visualization / 215</p> <p>8.5 Summary / 217</p> <p>8.6 Conclusion / 219</p> <p>References / 220</p> <p><b>PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS 225</b></p> <p><b>9 A STEADY-STATE FRAMEWORK FOR ASSESSING SECURITY MECHANISMS IN A CLOUD-OF-THINGS ARCHITECTURE 227</b><br /><i>Tyson T. Brooks and Lee McKnight</i></p> <p>Variable Nomenclature / 227</p> <p>9.1 Introduction / 228</p> <p>9.2 Background / 229</p> <p>9.3 Establishing a Framework for CoT Analysis / 232</p> <p>9.4 The CoT Steady-State Framework / 238</p> <p>9.5 Conclusion / 244</p> <p>References / 245</p> <p><b>10 AN ARTIFICIAL INTELLIGENCE PERSPECTIVE ON ENSURING CYBER-ASSURANCE FOR THE INTERNET OF THINGS 249</b><br /><i>Utku Köse</i></p> <p>10.1 Introduction / 249</p> <p>10.2 AI-Related Cyber-Assurance Research for the IoT / 250</p> <p>10.3 Multidisciplinary Intelligence Enabling Opportunities with AI / 252</p> <p>10.4 Future Research on AI-Based Cyber-Assurance for IoT / 254</p> <p>10.5 Conclusion / 255</p> <p>References / 255</p> <p><b>11 PERCEIVED THREAT MODELING FOR CYBER-PHYSICAL SYSTEMS 257</b><br /><i>Christopher Leberknight</i></p> <p>11.1 Introduction / 257</p> <p>11.2 Overview of Physical Security / 259</p> <p>11.3 Relevance to Grounded Theory / 261</p> <p>11.4 Theoretical Model Construction / 262</p> <p>11.5 Experiment / 263</p> <p>11.6 Results / 267</p> <p>11.7 Discussion / 275</p> <p>11.8 Future Research / 276</p> <p>11.9 Conclusion / 278</p> <p>References / 279</p> <p>APPENDICES</p> <p>A LIST OF IEEE INTERNET OF THINGS STANDARDS 283</p> <p>B GLOSSARY 319</p> <p>C CSBD THERMOSTAT REPORT 333</p> <p>D CSBD ACCESS-CONTROL LOGIC REPORT 415</p> <p>BIBLIOGRAPHY 433</p> <p>INDEX 457</p> |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
edition |
1st |
facet_avail |
Online |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-018095320 |
illustrated |
Not Illustrated |
imprint |
Hoboken, Wiley-IEEE Press, 2016 |
imprint_str_mv |
Hoboken Wiley-IEEE Press 2016 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781119193876 (ePub ebook) : |
isbn_isn_mv |
9781119193883 (PDF ebook) : |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:34:31.867Z |
match_str |
brooks2016cyberassurancefortheinternetofthings |
mega_collection |
British National Bibliography |
physical |
1 online resource |
publishDate |
2016 |
publishDateSort |
2016 |
publishPlace |
Hoboken |
publisher |
Wiley-IEEE Press |
record_format |
marcfinc |
record_id |
018095320 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
180 |
spelling |
Brooks, Tyson T. author., Cyber-assurance for the internet of things Tyson Brooks, 1st, Hoboken Wiley-IEEE Press 2016, 1 online resource., text rdacontent, computer rdamedia, online resource rdacarrier, Description based on CIP data; resource not viewed., LIST OF FIGURES xiii <p>LIST OF TABLES xvii</p> <p>FOREWORD xix</p> <p>PREFACE xxix</p> <p>ACKNOWLEDGMENTS xxxiii</p> <p>CONTRIBUTORS xxxv</p> <p>ACRONYMS xli</p> <p>INTRODUCTION xlvii</p> <p><b>PART I EMBEDDED DESIGN SECURITY 1</b></p> <p><b>1 CERTIFIED SECURITY BY DESIGN FOR THE INTERNET OF THINGS 3</b><br /><i>Shiu-Kai Chin</i></p> <p>1.1 Introduction / 3</p> <p>1.2 Lessons from the Microelectronics Revolution / 3</p> <p>1.3 Certified Security by Design / 5</p> <p>1.4 Chapter Outline / 9</p> <p>1.5 An Access-Control Logic / 9</p> <p>1.6 An Introduction to HOL / 17</p> <p>1.7 The Access-Control Logic in HOL / 25</p> <p>1.8 Cryptographic Components and Their Models in Higher-Order Logic / 30</p> <p>1.9 Cryptographic Hash Functions / 33</p> <p>1.10 Asymmetric-Key Cryptography / 33</p> <p>1.11 Digital Signatures / 36</p> <p>1.12 Adding Security to State Machines / 38</p> <p>1.13 A Networked Thermostat Certified Secure by Design / 49</p> <p>1.14 Thermostat Use Cases / 52</p> <p>1.15 Security Contexts for the Server and Thermostat / 56</p> <p>1.16 Top-Level Thermostat Secure-State Machine / 58</p> <p>1.17 Refined Thermostat Secure-State Machine / 67</p> <p>1.18 Equivalence of Top-Level and Refined Secure-State Machines / 81</p> <p>1.19 Conclusions / 84</p> <p>Appendix / 86</p> <p>References / 99</p> <p><b>2 CYBER-ASSURANCE THROUGH EMBEDDED SECURITY FOR THE INTERNET OF THINGS 101</b><br /><i>Tyson T. Brooks and Joon Park</i></p> <p>2.1 Introduction / 101</p> <p>2.2 Cyber-Security and Cyber-Assurance / 106</p> <p>2.3 Recognition, Fortification, Re-Establishment, Survivability / 108</p> <p>2.4 Conclusion / 120</p> <p>References / 122</p> <p><b>3 A SECURE UPDATE MECHANISM FOR INTERNET OF THINGS DEVICES 129</b><br /><i>Martin Goldberg</i></p> <p>3.1 Introduction / 129</p> <p>3.2 Importance of IOT Security / 130</p> <p>3.3 Applying the Defense In-Depth Strategy for Updating / 131</p> <p>3.4 A Standards Approach / 132</p> <p>3.5 Conclusion / 134</p> <p>References / 135</p> <p><b>PART II TRUST IMPACT 137</b></p> <p><b>4 SECURITY AND TRUST MANAGEMENT FOR THE INTERNET OF THINGS: AN RFID AND SENSOR NETWORK PERSPECTIVE 139</b><br /><i>M. Bala Krishna</i></p> <p>4.1 Introduction / 139</p> <p>4.2 Security and Trust in the Internet of Things / 142</p> <p>4.3 Radio Frequency Identification: Evolution and Approaches / 147</p> <p>4.4 Security and Trust in Wireless Sensor Networks / 151</p> <p>4.5 Applications of Internet of Things and RFID in Real-Time Environment / 156</p> <p>4.6 Future Research Directions and Conclusion / 158</p> <p>References / 159</p> <p><b>5 THE IMPACT OF IoT DEVICES ON NETWORK TRUST BOUNDARIES 163</b><br /><i>Nicole Newmeyer</i></p> <p>5.1 Introduction / 163</p> <p>5.2 Trust Boundaries / 164</p> <p>5.3 Risk Decisions and Conclusion / 173</p> <p>References / 174</p> <p><b>PART III WEARABLE AUTOMATION PROVENANCE 175</b></p> <p><b>6 WEARABLE IoT COMPUTING: INTERFACE, EMOTIONS, WEARER’S CULTURE, AND SECURITY/PRIVACY CONCERNS 177</b><br /><i>Robert McCloud, Martha Lerski, Joon Park, and Tyson T. Brooks</i></p> <p>6.1 Introduction / 177</p> <p>6.2 Data Accuracy in Wearable Computing / 178</p> <p>6.3 Interface and Culture / 178</p> <p>6.4 Emotion and Privacy / 179</p> <p>6.5 Privacy Protection Policies for Wearable Devices / 181</p> <p>6.6 Privacy/Security Concerns About Wearable Devices / 182</p> <p>6.7 Expectations About Future Wearable Devices / 183</p> <p>References / 184</p> <p><b>7 ON VULNERABILITIES OF IoT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS 187</b><br /><i>Martin Murillo</i></p> <p>7.1 Introduction / 187</p> <p>7.2 Industrial Control Systems and Home Automation Control / 189</p> <p>7.3 Vulnerability Identification / 193</p> <p>7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers / 198</p> <p>7.5 Illustrating Various Attacks Through a Basic Home Heating System Model / 200</p> <p>7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks / 203</p> <p>7.7 Discussion and Conclusion / 205</p> <p>References / 206</p> <p><b>8 BIG DATA COMPLEX EVENT PROCESSING FOR INTERNET OF THINGS PROVENANCE: BENEFITS FOR AUDIT, FORENSICS, AND SAFETY 209</b><br /><i>Mark Underwood</i></p> <p>8.1 Overview of Complex Event Processing / 209</p> <p>8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety / 211</p> <p>8.3 Challenges to CEP Adoption in IoT Settings / 213</p> <p>8.4 CEP and IoT Security Visualization / 215</p> <p>8.5 Summary / 217</p> <p>8.6 Conclusion / 219</p> <p>References / 220</p> <p><b>PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS 225</b></p> <p><b>9 A STEADY-STATE FRAMEWORK FOR ASSESSING SECURITY MECHANISMS IN A CLOUD-OF-THINGS ARCHITECTURE 227</b><br /><i>Tyson T. Brooks and Lee McKnight</i></p> <p>Variable Nomenclature / 227</p> <p>9.1 Introduction / 228</p> <p>9.2 Background / 229</p> <p>9.3 Establishing a Framework for CoT Analysis / 232</p> <p>9.4 The CoT Steady-State Framework / 238</p> <p>9.5 Conclusion / 244</p> <p>References / 245</p> <p><b>10 AN ARTIFICIAL INTELLIGENCE PERSPECTIVE ON ENSURING CYBER-ASSURANCE FOR THE INTERNET OF THINGS 249</b><br /><i>Utku Köse</i></p> <p>10.1 Introduction / 249</p> <p>10.2 AI-Related Cyber-Assurance Research for the IoT / 250</p> <p>10.3 Multidisciplinary Intelligence Enabling Opportunities with AI / 252</p> <p>10.4 Future Research on AI-Based Cyber-Assurance for IoT / 254</p> <p>10.5 Conclusion / 255</p> <p>References / 255</p> <p><b>11 PERCEIVED THREAT MODELING FOR CYBER-PHYSICAL SYSTEMS 257</b><br /><i>Christopher Leberknight</i></p> <p>11.1 Introduction / 257</p> <p>11.2 Overview of Physical Security / 259</p> <p>11.3 Relevance to Grounded Theory / 261</p> <p>11.4 Theoretical Model Construction / 262</p> <p>11.5 Experiment / 263</p> <p>11.6 Results / 267</p> <p>11.7 Discussion / 275</p> <p>11.8 Future Research / 276</p> <p>11.9 Conclusion / 278</p> <p>References / 279</p> <p>APPENDICES</p> <p>A LIST OF IEEE INTERNET OF THINGS STANDARDS 283</p> <p>B GLOSSARY 319</p> <p>C CSBD THERMOSTAT REPORT 333</p> <p>D CSBD ACCESS-CONTROL LOGIC REPORT 415</p> <p>BIBLIOGRAPHY 433</p> <p>INDEX 457</p>, Internet of things Security measures., Brooks, Tyson T. editor., ELD ebook |
spellingShingle |
Brooks, Tyson T., Cyber-assurance for the internet of things, LIST OF FIGURES xiii <p>LIST OF TABLES xvii</p> <p>FOREWORD xix</p> <p>PREFACE xxix</p> <p>ACKNOWLEDGMENTS xxxiii</p> <p>CONTRIBUTORS xxxv</p> <p>ACRONYMS xli</p> <p>INTRODUCTION xlvii</p> <p><b>PART I EMBEDDED DESIGN SECURITY 1</b></p> <p><b>1 CERTIFIED SECURITY BY DESIGN FOR THE INTERNET OF THINGS 3</b><br /><i>Shiu-Kai Chin</i></p> <p>1.1 Introduction / 3</p> <p>1.2 Lessons from the Microelectronics Revolution / 3</p> <p>1.3 Certified Security by Design / 5</p> <p>1.4 Chapter Outline / 9</p> <p>1.5 An Access-Control Logic / 9</p> <p>1.6 An Introduction to HOL / 17</p> <p>1.7 The Access-Control Logic in HOL / 25</p> <p>1.8 Cryptographic Components and Their Models in Higher-Order Logic / 30</p> <p>1.9 Cryptographic Hash Functions / 33</p> <p>1.10 Asymmetric-Key Cryptography / 33</p> <p>1.11 Digital Signatures / 36</p> <p>1.12 Adding Security to State Machines / 38</p> <p>1.13 A Networked Thermostat Certified Secure by Design / 49</p> <p>1.14 Thermostat Use Cases / 52</p> <p>1.15 Security Contexts for the Server and Thermostat / 56</p> <p>1.16 Top-Level Thermostat Secure-State Machine / 58</p> <p>1.17 Refined Thermostat Secure-State Machine / 67</p> <p>1.18 Equivalence of Top-Level and Refined Secure-State Machines / 81</p> <p>1.19 Conclusions / 84</p> <p>Appendix / 86</p> <p>References / 99</p> <p><b>2 CYBER-ASSURANCE THROUGH EMBEDDED SECURITY FOR THE INTERNET OF THINGS 101</b><br /><i>Tyson T. Brooks and Joon Park</i></p> <p>2.1 Introduction / 101</p> <p>2.2 Cyber-Security and Cyber-Assurance / 106</p> <p>2.3 Recognition, Fortification, Re-Establishment, Survivability / 108</p> <p>2.4 Conclusion / 120</p> <p>References / 122</p> <p><b>3 A SECURE UPDATE MECHANISM FOR INTERNET OF THINGS DEVICES 129</b><br /><i>Martin Goldberg</i></p> <p>3.1 Introduction / 129</p> <p>3.2 Importance of IOT Security / 130</p> <p>3.3 Applying the Defense In-Depth Strategy for Updating / 131</p> <p>3.4 A Standards Approach / 132</p> <p>3.5 Conclusion / 134</p> <p>References / 135</p> <p><b>PART II TRUST IMPACT 137</b></p> <p><b>4 SECURITY AND TRUST MANAGEMENT FOR THE INTERNET OF THINGS: AN RFID AND SENSOR NETWORK PERSPECTIVE 139</b><br /><i>M. Bala Krishna</i></p> <p>4.1 Introduction / 139</p> <p>4.2 Security and Trust in the Internet of Things / 142</p> <p>4.3 Radio Frequency Identification: Evolution and Approaches / 147</p> <p>4.4 Security and Trust in Wireless Sensor Networks / 151</p> <p>4.5 Applications of Internet of Things and RFID in Real-Time Environment / 156</p> <p>4.6 Future Research Directions and Conclusion / 158</p> <p>References / 159</p> <p><b>5 THE IMPACT OF IoT DEVICES ON NETWORK TRUST BOUNDARIES 163</b><br /><i>Nicole Newmeyer</i></p> <p>5.1 Introduction / 163</p> <p>5.2 Trust Boundaries / 164</p> <p>5.3 Risk Decisions and Conclusion / 173</p> <p>References / 174</p> <p><b>PART III WEARABLE AUTOMATION PROVENANCE 175</b></p> <p><b>6 WEARABLE IoT COMPUTING: INTERFACE, EMOTIONS, WEARER’S CULTURE, AND SECURITY/PRIVACY CONCERNS 177</b><br /><i>Robert McCloud, Martha Lerski, Joon Park, and Tyson T. Brooks</i></p> <p>6.1 Introduction / 177</p> <p>6.2 Data Accuracy in Wearable Computing / 178</p> <p>6.3 Interface and Culture / 178</p> <p>6.4 Emotion and Privacy / 179</p> <p>6.5 Privacy Protection Policies for Wearable Devices / 181</p> <p>6.6 Privacy/Security Concerns About Wearable Devices / 182</p> <p>6.7 Expectations About Future Wearable Devices / 183</p> <p>References / 184</p> <p><b>7 ON VULNERABILITIES OF IoT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS 187</b><br /><i>Martin Murillo</i></p> <p>7.1 Introduction / 187</p> <p>7.2 Industrial Control Systems and Home Automation Control / 189</p> <p>7.3 Vulnerability Identification / 193</p> <p>7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers / 198</p> <p>7.5 Illustrating Various Attacks Through a Basic Home Heating System Model / 200</p> <p>7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks / 203</p> <p>7.7 Discussion and Conclusion / 205</p> <p>References / 206</p> <p><b>8 BIG DATA COMPLEX EVENT PROCESSING FOR INTERNET OF THINGS PROVENANCE: BENEFITS FOR AUDIT, FORENSICS, AND SAFETY 209</b><br /><i>Mark Underwood</i></p> <p>8.1 Overview of Complex Event Processing / 209</p> <p>8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety / 211</p> <p>8.3 Challenges to CEP Adoption in IoT Settings / 213</p> <p>8.4 CEP and IoT Security Visualization / 215</p> <p>8.5 Summary / 217</p> <p>8.6 Conclusion / 219</p> <p>References / 220</p> <p><b>PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS 225</b></p> <p><b>9 A STEADY-STATE FRAMEWORK FOR ASSESSING SECURITY MECHANISMS IN A CLOUD-OF-THINGS ARCHITECTURE 227</b><br /><i>Tyson T. Brooks and Lee McKnight</i></p> <p>Variable Nomenclature / 227</p> <p>9.1 Introduction / 228</p> <p>9.2 Background / 229</p> <p>9.3 Establishing a Framework for CoT Analysis / 232</p> <p>9.4 The CoT Steady-State Framework / 238</p> <p>9.5 Conclusion / 244</p> <p>References / 245</p> <p><b>10 AN ARTIFICIAL INTELLIGENCE PERSPECTIVE ON ENSURING CYBER-ASSURANCE FOR THE INTERNET OF THINGS 249</b><br /><i>Utku Köse</i></p> <p>10.1 Introduction / 249</p> <p>10.2 AI-Related Cyber-Assurance Research for the IoT / 250</p> <p>10.3 Multidisciplinary Intelligence Enabling Opportunities with AI / 252</p> <p>10.4 Future Research on AI-Based Cyber-Assurance for IoT / 254</p> <p>10.5 Conclusion / 255</p> <p>References / 255</p> <p><b>11 PERCEIVED THREAT MODELING FOR CYBER-PHYSICAL SYSTEMS 257</b><br /><i>Christopher Leberknight</i></p> <p>11.1 Introduction / 257</p> <p>11.2 Overview of Physical Security / 259</p> <p>11.3 Relevance to Grounded Theory / 261</p> <p>11.4 Theoretical Model Construction / 262</p> <p>11.5 Experiment / 263</p> <p>11.6 Results / 267</p> <p>11.7 Discussion / 275</p> <p>11.8 Future Research / 276</p> <p>11.9 Conclusion / 278</p> <p>References / 279</p> <p>APPENDICES</p> <p>A LIST OF IEEE INTERNET OF THINGS STANDARDS 283</p> <p>B GLOSSARY 319</p> <p>C CSBD THERMOSTAT REPORT 333</p> <p>D CSBD ACCESS-CONTROL LOGIC REPORT 415</p> <p>BIBLIOGRAPHY 433</p> <p>INDEX 457</p>, Internet of things Security measures. |
title |
Cyber-assurance for the internet of things |
title_auth |
Cyber-assurance for the internet of things |
title_full |
Cyber-assurance for the internet of things Tyson Brooks |
title_fullStr |
Cyber-assurance for the internet of things Tyson Brooks |
title_full_unstemmed |
Cyber-assurance for the internet of things Tyson Brooks |
title_short |
Cyber-assurance for the internet of things |
title_sort |
cyber assurance for the internet of things |
topic |
Internet of things Security measures. |
topic_facet |
Internet of things, Security measures. |