Cyber-Assurance for the Internet of Things

Author: Tyson T. Brooks  

Publisher: John Wiley & Sons Inc‎

Publication year: 2016

E-ISBN: 9781119193883

P-ISBN(Paperback): 9781118612477

P-ISBN(Hardback):  9781119193869

Subject: TP393 computer network

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Presents an Cyber-Assurance approach to the Internet of Things (IoT)

This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. 

  • Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications
  • Aids readers in understanding how to design and build cyber-assurance into the IoT
  • Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance
  • Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field

Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.

Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.

Chapter

Preface

Acknowledgments

Contributors

Acronyms

Introduction

Transiting Information Assurance toward Cyber-Assurance for the IoT

References

PART 1 Embedded Design Security

1 Certified Security by Design for the Internet of Things

1.1 Introduction

1.2 Lessons from the Microelectronics Revolution

1.3 Certified Security by Design

1.3.1 Concepts of Operations

1.3.2 A Networked Thermostat as a Motivating Example

1.4 Chapter Outline

1.5 An Access-Control Logic

1.5.1 Syntax

1.5.2 Semantics

1.5.3 Inference Rules

1.5.4 Describing Access-Control Concepts in the C2 Calculus

1.6 An Introduction to HOL

1.7 The Access-Control Logic in HOL

1.7.1 Syntax of the Access-Control Logic in HOL

1.7.2 Semantics of the Access-Control Logic in HOL

1.7.3 C2 Inference Rules in HOL

1.8 Cryptographic Components and Their Models in Higher-Order Logic

1.8.1 Symmetric-Key Cryptography

1.9 Cryptographic Hash Functions

1.10 Asymmetric-Key Cryptography

1.11 Digital Signatures

1.12 Adding Security to State Machines

1.12.1 Instructions and Transition Types

1.12.2 High-Level Secure-State Machine Description

1.12.3 Semantics of Lists of Access-Control Logic Formulas Defined

1.12.4 Secure-State Machines Using Message and Certificate Structures

1.13 A Networked Thermostat Certified Secure by Design

1.13.1 Thermostat Commands: Privileged and Non-Privileged

1.13.2 Thermostat Principals and Their Privileges

1.14 Thermostat Use Cases

1.14.1 Manual Operation

1.14.2 User Control via the Server

1.14.3 Utility Control via the Server

1.15 Security Contexts for the Server and Thermostat

1.15.1 Server Security Context

1.15.2 Thermostat Security Context

1.16 Top-Level Thermostat Secure-State Machine

1.16.1 States and Operating Modes

1.16.2 State Interpretation Function

1.16.3 Next-State Function

1.16.4 Input Authentication Function

1.16.5 Output Type and Output Function

1.16.6 Transition Theorems

1.17 Refined Thermostat Secure-State Machine

1.17.1 Thermostat Orders and Messages

1.17.2 Authenticating and Checking the Integrity of Messages

1.17.3 Interpreting Messages

1.17.4 Thermostat Certificates

1.17.5 Certificate Interpretation Function

1.17.6 Transition Theorems

1.18 Equivalence of Top-Level and Refined Secure-State Machines

1.19 Conclusions

AppendiX

1.A.1 The Definition of ACL Formulas, Kripke Structures, Principals, Integrity Levels, and Security Levels in HOL

1.A.2 The Definition of the Evaluation Function EM[[–]] in HOL

1.A.3 Definition of Transition Relation TR

1.A.4 Definition of Transition Relation TR2

References

2 Cyber-Assurance Through Embedded Security for the Internet of Things

2.1 Introduction

2.1.1 Related Work in Embedded Security

2.2 Cyber-Security and Cyber-Assurance

2.3 Recognition, Fortification, Re-Establishment, Survivability

2.3.1 Recognition

2.3.2 Fortification

2.3.3 Re-establishment

2.3.4 Survivability

2.4 Conclusion

References

3 A Secure Update Mechanism for Internet of Things Devices

3.1 Introduction

3.1.1 Defining IoT Device

3.2 Importance of IOT Security

3.2.1 Importance of Updating

3.3 Applying the Defense in-Depth Strategy for Updating

3.4 A Standards Approach

3.4.1 Secure Transport

3.4.2 Update Verification

3.5 Conclusion

References

PART 2 Trust Impact

4 Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective

4.1 Introduction

4.1.1 Issues and Challenges in Security and Trust Management

4.1.2 Design Metrics in Security and Trust Management Systems

4.2 Security and Trust in the Internet of Things

4.2.1 Heterogeneity in IoT Security Management

4.2.2 Security Management in IoT Systems

4.2.3 Trust Management in IoT Systems

4.3 Radio Frequency Identification: Evolution and Approaches

4.3.1 Categories of RFID Product Authentication

4.3.2 RFID Solutions for Sensor Networks

4.3.3 RFID Protocols and Performance Aspects

4.4 Security and Trust in Wireless Sensor Networks

4.4.1 Trust Management Protocols in Sensor Networks

4.5 Applications of Internet of Things and Rfid in Real-Time Environment

4.5.1 Vehicular IoT

4.5.2 Advance Services in Internet of Things

4.6 Future Research Directions and Conclusion

References

5 The Impact of IoT Devices on Network Trust Boundaries

5.1 Introduction

5.2 Trust Boundaries

5.2.1 Trusted Device

5.2.2 Untrusted Device

5.3 Risk Decisions and Conclusion

References

PART 3 Wearable Automation Provenance

6 Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns

6.1 Introduction

6.2 Data Accuracy in Wearable Computing

6.3 Interface and Culture

6.4 Emotion and Privacy

6.5 Privacy Protection Policies for Wearable Devices

6.6 Privacy/Security Concerns About Wearable Devices

6.7 Expectations About Future Wearable Devices

References

7 On Vulnerabilities of IoT-Based Consumer-Oriented Closed-Loop Control Automation Systems

7.1 Introduction

7.2 Industrial Control Systems and Home Automation Control

7.3 Vulnerability Identification

7.3.1 Open-Loop to Closed-Loop Systems Vulnerability Implications

7.3.2 The Compromising of the Feedback Loop Elements

7.3.3 The Compromising of the New Player: The Service Provider

7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers

7.5 Illustrating various attacks through a basic home heating system model

7.5.1 Compromise of the Reference Signals

7.5.2 Compromise of the Feedback System: Persistent DoS Attack

7.5.3 Compromise of the Feedback System: Changing a Gain Parameter or Compromising the Data Integrity of the Feedback Loop

7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks

7.7 Discussion and Conclusion

References

8 Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety

8.1 Overview of Complex Event Processing

8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety

8.2.1 Provenance Defined for Risk Areas in IoT Audit and Safety

8.3 Challenges to CEP Adoption in IoT Settings

8.4 CEP and IoT Security Visualization

8.5 Summary

8.6 Conclusion

References

PART 4 Cloud Artificial Intelligence Cyber-Physical Systems

9 A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture

Variable Nomenclature

9.1 Introduction

9.2 Background

9.2.1 Related Work

9.3 Establishing a Framework for Cot Analysis

9.3.1 Defining Path Loss for System Performance

9.3.2 Foundations of the Steady-State Framework

9.4 The Cot Steady-State Framework

9.4.1 Hypothetical Performance Evaluation

9.5 Conclusion

References

10 An Artificial Intelligence Perspective on Ensuring Cyber-Assurance for the Internet of Things

10.1 Introduction

10.2 AI-Related Cyber-Assurance Research for The IoT

10.3 Multidisciplinary Intelligence Enabling Opportunities with AI

10.3.1 A Generic Approach for AI for Different Disciplines

10.4 Future Research on AI-Based Cyber-Assurance for IoT

10.5 Conclusion

References

11 Perceived Threat Modeling for Cyber-Physical Systems

11.1 Introduction

11.2 Overview of Physical Security

11.3 Relevance to Grounded Theory

11.3.1 Different Design Modes of the Approach

11.3.2 Grounded Theory and Qualitative and Quantitative Methods

11.4 Theoretical Model Construction

11.5 Experiment

11.5.1 Semi-Structured Interviews

11.5.2 Triangulation

11.5.3 Pre-testing

11.5.4 Qualitative Interview Guidelines

11.5.5 Description of Subjects

11.5.6 Procedure

11.6 Results

11.6.1 Initial Conceptual Model

11.6.2 Analysis of Situational Characteristics

11.6.3 Analysis of Cognitive Demographics

11.7 Discussion

11.8 Future Research

11.9 Conclusion

References

APPENDIX A List of IEEE Internet of Things Standards

APPENDIX B Glossary

APPENDIX C CSBD Thermostat Report

APPENDIX D CSBD Access-Control Logic Report

Bibliography

Index

EULA

The users who browse this book also browse