Description
Presents an Cyber-Assurance approach to the Internet of Things (IoT)
This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation.
- Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications
- Aids readers in understanding how to design and build cyber-assurance into the IoT
- Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance
- Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field
Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.
Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.
Chapter
Transiting Information Assurance toward Cyber-Assurance for the IoT
PART 1 Embedded Design Security
1 Certified Security by Design for the Internet of Things
1.2 Lessons from the Microelectronics Revolution
1.3 Certified Security by Design
1.3.1 Concepts of Operations
1.3.2 A Networked Thermostat as a Motivating Example
1.5 An Access-Control Logic
1.5.4 Describing Access-Control Concepts in the C2 Calculus
1.6 An Introduction to HOL
1.7 The Access-Control Logic in HOL
1.7.1 Syntax of the Access-Control Logic in HOL
1.7.2 Semantics of the Access-Control Logic in HOL
1.7.3 C2 Inference Rules in HOL
1.8 Cryptographic Components and Their Models in Higher-Order Logic
1.8.1 Symmetric-Key Cryptography
1.9 Cryptographic Hash Functions
1.10 Asymmetric-Key Cryptography
1.12 Adding Security to State Machines
1.12.1 Instructions and Transition Types
1.12.2 High-Level Secure-State Machine Description
1.12.3 Semantics of Lists of Access-Control Logic Formulas Defined
1.12.4 Secure-State Machines Using Message and Certificate Structures
1.13 A Networked Thermostat Certified Secure by Design
1.13.1 Thermostat Commands: Privileged and Non-Privileged
1.13.2 Thermostat Principals and Their Privileges
1.14 Thermostat Use Cases
1.14.2 User Control via the Server
1.14.3 Utility Control via the Server
1.15 Security Contexts for the Server and Thermostat
1.15.1 Server Security Context
1.15.2 Thermostat Security Context
1.16 Top-Level Thermostat Secure-State Machine
1.16.1 States and Operating Modes
1.16.2 State Interpretation Function
1.16.3 Next-State Function
1.16.4 Input Authentication Function
1.16.5 Output Type and Output Function
1.16.6 Transition Theorems
1.17 Refined Thermostat Secure-State Machine
1.17.1 Thermostat Orders and Messages
1.17.2 Authenticating and Checking the Integrity of Messages
1.17.3 Interpreting Messages
1.17.4 Thermostat Certificates
1.17.5 Certificate Interpretation Function
1.17.6 Transition Theorems
1.18 Equivalence of Top-Level and Refined Secure-State Machines
1.A.1 The Definition of ACL Formulas, Kripke Structures, Principals, Integrity Levels, and Security Levels in HOL
1.A.2 The Definition of the Evaluation Function EM[[–]] in HOL
1.A.3 Definition of Transition Relation TR
1.A.4 Definition of Transition Relation TR2
2 Cyber-Assurance Through Embedded Security for the Internet of Things
2.1.1 Related Work in Embedded Security
2.2 Cyber-Security and Cyber-Assurance
2.3 Recognition, Fortification, Re-Establishment, Survivability
3 A Secure Update Mechanism for Internet of Things Devices
3.1.1 Defining IoT Device
3.2 Importance of IOT Security
3.2.1 Importance of Updating
3.3 Applying the Defense in-Depth Strategy for Updating
3.4.2 Update Verification
4 Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective
4.1.1 Issues and Challenges in Security and Trust Management
4.1.2 Design Metrics in Security and Trust Management Systems
4.2 Security and Trust in the Internet of Things
4.2.1 Heterogeneity in IoT Security Management
4.2.2 Security Management in IoT Systems
4.2.3 Trust Management in IoT Systems
4.3 Radio Frequency Identification: Evolution and Approaches
4.3.1 Categories of RFID Product Authentication
4.3.2 RFID Solutions for Sensor Networks
4.3.3 RFID Protocols and Performance Aspects
4.4 Security and Trust in Wireless Sensor Networks
4.4.1 Trust Management Protocols in Sensor Networks
4.5 Applications of Internet of Things and Rfid in Real-Time Environment
4.5.2 Advance Services in Internet of Things
4.6 Future Research Directions and Conclusion
5 The Impact of IoT Devices on Network Trust Boundaries
5.3 Risk Decisions and Conclusion
PART 3 Wearable Automation Provenance
6 Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns
6.2 Data Accuracy in Wearable Computing
6.3 Interface and Culture
6.5 Privacy Protection Policies for Wearable Devices
6.6 Privacy/Security Concerns About Wearable Devices
6.7 Expectations About Future Wearable Devices
7 On Vulnerabilities of IoT-Based Consumer-Oriented Closed-Loop Control Automation Systems
7.2 Industrial Control Systems and Home Automation Control
7.3 Vulnerability Identification
7.3.1 Open-Loop to Closed-Loop Systems Vulnerability Implications
7.3.2 The Compromising of the Feedback Loop Elements
7.3.3 The Compromising of the New Player: The Service Provider
7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers
7.5 Illustrating various attacks through a basic home heating system model
7.5.1 Compromise of the Reference Signals
7.5.2 Compromise of the Feedback System: Persistent DoS Attack
7.5.3 Compromise of the Feedback System: Changing a Gain Parameter or Compromising the Data Integrity of the Feedback Loop
7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks
7.7 Discussion and Conclusion
8 Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety
8.1 Overview of Complex Event Processing
8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety
8.2.1 Provenance Defined for Risk Areas in IoT Audit and Safety
8.3 Challenges to CEP Adoption in IoT Settings
8.4 CEP and IoT Security Visualization
PART 4 Cloud Artificial Intelligence Cyber-Physical Systems
9 A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture
9.3 Establishing a Framework for Cot Analysis
9.3.1 Defining Path Loss for System Performance
9.3.2 Foundations of the Steady-State Framework
9.4 The Cot Steady-State Framework
9.4.1 Hypothetical Performance Evaluation
10 An Artificial Intelligence Perspective on Ensuring Cyber-Assurance for the Internet of Things
10.2 AI-Related Cyber-Assurance Research for The IoT
10.3 Multidisciplinary Intelligence Enabling Opportunities with AI
10.3.1 A Generic Approach for AI for Different Disciplines
10.4 Future Research on AI-Based Cyber-Assurance for IoT
11 Perceived Threat Modeling for Cyber-Physical Systems
11.2 Overview of Physical Security
11.3 Relevance to Grounded Theory
11.3.1 Different Design Modes of the Approach
11.3.2 Grounded Theory and Qualitative and Quantitative Methods
11.4 Theoretical Model Construction
11.5.1 Semi-Structured Interviews
11.5.4 Qualitative Interview Guidelines
11.5.5 Description of Subjects
11.6.1 Initial Conceptual Model
11.6.2 Analysis of Situational Characteristics
11.6.3 Analysis of Cognitive Demographics
APPENDIX A List of IEEE Internet of Things Standards
APPENDIX C CSBD Thermostat Report
APPENDIX D CSBD Access-Control Logic Report