Willkommen, schön sind Sie da!
Logo Ex Libris

Cyber-Assurance for the Internet of Things

  • E-Book (pdf)
  • 520 Seiten
(0) Erste Bewertung abgeben
Bewertungen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT envi... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hier erhalten Sie Ihren Download-Link.
CHF 105.00
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.

Beschreibung

Presents an Cyber-Assurance approach to the Internet of Things (IoT)

This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. 

  • Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications
  • Aids readers in understanding how to design and build cyber-assurance into the IoT
  • Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance
  • Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field

Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.

Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.

Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.



Autorentext

Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.



Klappentext

Presents an Cyber-Assurance approach to the Internet of Things (IoT)

This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation.

  • Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications
  • Aids readers in understanding how to design and build cyber-assurance into the IoT
  • Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance
  • Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field

Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.



Inhalt
LIST OF FIGURES xiii

LIST OF TABLES xvii

FOREWORD xix

PREFACE xxix

ACKNOWLEDGMENTS xxxiii

CONTRIBUTORS xxxv

ACRONYMS xli

INTRODUCTION xlvii

PART I EMBEDDED DESIGN SECURITY 1

1 CERTIFIED SECURITY BY DESIGN FOR THE INTERNET OF THINGS 3
Shiu-Kai Chin

1.1 Introduction / 3

1.2 Lessons from the Microelectronics Revolution / 3

1.3 Certified Security by Design / 5

1.4 Chapter Outline / 9

1.5 An Access-Control Logic / 9

1.6 An Introduction to HOL / 17

1.7 The Access-Control Logic in HOL / 25

1.8 Cryptographic Components and Their Models in Higher-Order Logic / 30

1.9 Cryptographic Hash Functions / 33

1.10 Asymmetric-Key Cryptography / 33

1.11 Digital Signatures / 36

1.12 Adding Security to State Machines / 38

1.13 A Networked Thermostat Certified Secure by Design / 49

1.14 Thermostat Use Cases / 52

1.15 Security Contexts for the Server and Thermostat / 56

1.16 Top-Level Thermostat Secure-State Machine / 58

1.17 Refined Thermostat Secure-State Machine / 67

1.18 Equivalence of Top-Level and Refined Secure-State Machines / 81

1.19 Conclusions / 84

Appendix / 86

References / 99

2 CYBER-ASSURANCE THROUGH EMBEDDED SECURITY FOR THE INTERNET OF THINGS 101
Tyson T. Brooks and Joon Park

2.1 Introduction / 101

2.2 Cyber-Security and Cyber-Assurance / 106

2.3 Recognition, Fortification, Re-Establishment, Survivability / 108

2.4 Conclusion / 120

References / 122

3 A SECURE UPDATE MECHANISM FOR INTERNET OF THINGS DEVICES 129
Martin Goldberg

3.1 Introduction / 129

3.2 Importance of IOT Security / 130

3.3 Applying the Defense In-Depth Strategy for Updating / 131

3.4 A Standards Approach / 132

3.5 Conclusion / 134

References / 135

PART II TRUST IMPACT 137

4 SECURITY AND TRUST MANAGEMENT FOR THE INTERNET OF THINGS: AN RFID AND SENSOR NETWORK PERSPECTIVE 139
M. Bala Krishna

4.1 Introduction / 139

4.2 Security and Trust in the Internet of Things / 142

4.3 Radio Frequency Identification: Evolution and Approaches / 147

4.4 Security and Trust in Wireless Sensor Networks / 151

4.5 Applications of Internet of Things and RFID in Real-Time Environment / 156

4.6 Future Research Directions and Conclusion / 158

References / 159

5 THE IMPACT OF IoT DEVICES ON NETWORK TRUST BOUNDARIES 163
Nicole Newmeyer

5.1 Introduction / 163

5.2 Trust Boundaries / 164

5.3 Risk Decisions and Conclusion / 173

References / 174

PART III WEARABLE AUTOMATION PROVENANCE 175

6 WEARABLE IoT COMPUTING: INTERFACE, EMOTIONS, WEARER'S CULTURE, AND SECURITY/PRIVACY CONCERNS 177
Robert McCloud, Martha Lerski, Joon Park, and Tyson T. Brooks

6.1 Introduction / 177

6.2 Data Accuracy in Wearable Computing / 178

6.3 Interface and Culture / 178

6.4 Emotion and Privacy / 179

6.5 Privacy Protection Policies for Wearable Devices / 181

6.6 Privacy/Security Concerns About Wearable Devices / 182

6.7 Expectations About Future Wearable Devices / 183

References / 184

7 ON VULNERABILITIES OF IoT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS 187
Martin Murillo

7.1 Introduction / 187

7.2 Industrial Control Systems and Home Automation Control / 189

7.3 Vulnerability Identification / 193

7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers / 198

7.5 Illustrating Various Attacks Through a Basic Home Heating System Model / 200

7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks / 203

7.7 Discussion and Conclusion / 205

References / 206

8 BIG DATA COMPLEX EVENT PROCESSING FOR INTERNET OF THINGS PROVENANCE: BENEFITS FOR AUDIT, FORENSICS, AND SAFETY 209
Mark Underwood

8.1 Overview of Complex Event Processing / 209

8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety / 211

8.3 Challenges to CEP Adoption in IoT Settings / 213

8.4 CEP and IoT Security Visualization / 215

8.5 Summary / 217

8.6 Conclusion / 219

References / 220

PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS 225

9 A STEADY-STATE FRAMEWORK FOR ASSESSING SECURITY MECHANISMS IN A CLOUD-OF-THINGS ARCHITECTURE 227
Tyson T. Brooks and Lee McKnight

Variable Nomenclature / 227

9.1 Introduction / 228

9.2 Background / 229

9.3 Establishing a Framework for CoT Analysis / 232

9.4 The CoT Steady-State Framework / 238

9.5 Conclusion / ...

Produktinformationen

Titel: Cyber-Assurance for the Internet of Things
Editor:
EAN: 9781119193883
ISBN: 978-1-119-19388-3
Digitaler Kopierschutz: Adobe-DRM
Format: E-Book (pdf)
Herausgeber: Wiley-IEEE Press
Genre: Technik
Anzahl Seiten: 520
Veröffentlichung: 08.12.2016
Jahr: 2016
Untertitel: Englisch
Dateigrösse: 46.3 MB