Cyber-Assurance for the Internet of Things - Bookswagon UAE
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Information technology: general topics > Internet: general works > Cyber-Assurance for the Internet of Things
Cyber-Assurance for the Internet of Things

Cyber-Assurance for the Internet of Things


     0     
5
4
3
2
1



International Edition


X
About the Book

Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation.  Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications Aids readers in understanding how to design and build cyber-assurance into the IoT Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking. Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.

Table of Contents:
List of Figures xiii List of Tables xvii Foreword xix Preface xxix Acknowledgments xxxiii Contributors xxxv Acronyms xli Introduction xlvii Part I Embedded Design Security 1 1 Certified Security by Design for the Internet of Things 3 Shiu-Kai Chin 1.1 Introduction 3 1.2 Lessons from the Microelectronics Revolution 3 1.3 Certified Security by Design 5 1.4 Chapter Outline 9 1.5 An Access-Control Logic 9 1.6 An Introduction to HOL 17 1.7 The Access-Control Logic in HOL 25 1.8 Cryptographic Components and Their Models in Higher-Order Logic 30 1.9 Cryptographic Hash Functions 33 1.10 Asymmetric-Key Cryptography 33 1.11 Digital Signatures 36 1.12 Adding Security to State Machines 38 1.13 A Networked Thermostat Certified Secure by Design 49 1.14 Thermostat Use Cases 52 1.15 Security Contexts for the Server and Thermostat 56 1.16 Top-Level Thermostat Secure-State Machine 58 1.17 Refined Thermostat Secure-State Machine 67 1.18 Equivalence of Top-Level and Refined Secure-State Machines 81 1.19 Conclusions 84 Appendix 86 References 99 2 Cyber-assurance Through Embedded Security for The Internet of Things 101 Tyson T. Brooks and Joon Park 2.1 Introduction 101 2.2 Cyber-Security and Cyber-Assurance 106 2.3 Recognition, Fortification, Re-Establishment, Survivability 108 2.4 Conclusion 120 References 122 3 A Secure Update Mechanism for Internet of Things Devices 129 Martin Goldberg 3.1 Introduction 129 3.2 Importance of IOT Security 130 3.3 Applying the Defense In-Depth Strategy for Updating 131 3.4 A Standards Approach 132 3.5 Conclusion 134 References 135 Part II Trust Impact 137 4 Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective 139 M. Bala Krishna 4.1 Introduction 139 4.2 Security and Trust in the Internet of Things 142 4.3 Radio Frequency Identification: Evolution and Approaches 147 4.4 Security and Trust in Wireless Sensor Networks 151 4.5 Applications of Internet of Things and RFID in Real-Time Environment 156 4.6 Future Research Directions and Conclusion 158 References 159 5 THE IMPACT OF IoT DEVICES ON NETWORK TRUST Boundaries 163 Nicole Newmeyer 5.1 Introduction 163 5.2 Trust Boundaries 164 5.3 Risk Decisions and Conclusion 173 References 174 Part III Wearable Automation Provenance 175 6 WEARABLE IoT COMPUTING: INTERFACE, EMOTIONS, Wearer’s Culture, and Security/privacy Concerns 177 Robert McCloud, Martha Lerski, Joon Park, and Tyson T. Brooks 6.1 Introduction 177 6.2 Data Accuracy in Wearable Computing 178 6.3 Interface and Culture 178 6.4 Emotion and Privacy 179 6.5 Privacy Protection Policies for Wearable Devices 181 6.6 Privacy/Security Concerns About Wearable Devices 182 6.7 Expectations About Future Wearable Devices 183 References 184 7 ON VULNERABILITIES OF IoT-BASED Consumer-oriented Closed-loop Control Automation Systems 187 Martin Murillo 7.1 Introduction 187 7.2 Industrial Control Systems and Home Automation Control 189 7.3 Vulnerability Identification 193 7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers 198 7.5 Illustrating Various Attacks Through a Basic Home Heating System Model 200 7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks 203 7.7 Discussion and Conclusion 205 References 206 8 Big Data Complex Event Processing for Internet Of Things Provenance: Benefits for Audit, Forensics, and Safety 209 Mark Underwood 8.1 Overview of Complex Event Processing 209 8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety 211 8.3 Challenges to CEP Adoption in IoT Settings 213 8.4 CEP and IoT Security Visualization 215 8.5 Summary 217 8.6 Conclusion 219 References 220 Part IV Cloud Artificial Intelligence Cyber-physical Systems 225 9 a Steady-state Framework for Assessing Security Mechanisms in a Cloud-of-things Architecture 227 Tyson T. Brooks and Lee McKnight Variable Nomenclature 227 9.1 Introduction 228 9.2 Background 229 9.3 Establishing a Framework for CoT Analysis 232 9.4 The CoT Steady-State Framework 238 9.5 Conclusion 244 References 245 10 An Artificial Intelligence Perspective on Ensuring Cyber-assurance for the Internet Of Things 249 Utku Köse 10.1 Introduction 249 10.2 AI-Related Cyber-Assurance Research for the IoT 250 10.3 Multidisciplinary Intelligence Enabling Opportunities with Ai 252 10.4 Future Research on AI-Based Cyber-Assurance for IoT 254 10.5 Conclusion 255 References 255 11 Perceived Threat Modeling for Cyber-physical Systems 257 Christopher Leberknight 11.1 Introduction 257 11.2 Overview of Physical Security 259 11.3 Relevance to Grounded Theory 261 11.4 Theoretical Model Construction 262 11.5 Experiment 263 11.6 Results 267 11.7 Discussion 275 11.8 Future Research 276 11.9 Conclusion 278 References 279 Appendices A List of Ieee Internet of Things Standards 283 B Glossary 319 C Csbd Thermostat Report 333 D Csbd Access-control Logic Report 415 Bibliography 433 Index 457

About the Author :
Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.


Best Sellers


Product Details
  • ISBN-13: 9781119193869
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Height: 236 mm
  • No of Pages: 528
  • Returnable: N
  • Weight: 839 gr
  • ISBN-10: 1119193869
  • Publisher Date: 03 Feb 2017
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 33 mm
  • Width: 158 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cyber-Assurance for the Internet of Things
John Wiley & Sons Inc -
Cyber-Assurance for the Internet of Things
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber-Assurance for the Internet of Things

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!