Details

Modeling and Design of Secure Internet of Things


Modeling and Design of Secure Internet of Things


1. Aufl.

von: Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, Sachin Shetty

125,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 11.06.2020
ISBN/EAN: 9781119593393
Sprache: englisch
Anzahl Seiten: 704

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things</b></p> <p><i>Modeling and Design of Secure Internet of Things</i> offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential.</p> <p>The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book:</p> <ul> <li>Presents information on game-theory analysis of cyber deception</li> <li>Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation</li> <li>Contains contributions from an international panel of experts</li> <li>Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities</li> </ul> <p>Written for researchers and experts in computer science and engineering, <i>Modeling and Design of Secure Internet of Things</i> contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.</p>
<p>About the Editors ix</p> <p>List of Contributors xiii</p> <p>Foreword xix</p> <p>Preface xxiii</p> <p>1 Introduction 1<br /><i>Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty</i></p> <p><b>Part I Game Theory for Cyber Deception </b><b>27</b></p> <p>2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation 29<br /><i>Tao Zhang, Linan Huang, Jeffrey Pawlick, and Quanyan Zhu</i></p> <p>3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) 59<br /><i>Bowei Xi and Charles A. Kamhoua</i></p> <p>4 Cooperative Spectrum Sharing and Trust Management in IoT Networks 79<br /><i>Fatemeh Afghah, Alireza Shamsoshoara, Laurent L. Njilla, and Charles A. Kamhoua</i></p> <p>5 Adaptation and Deception in Adversarial Cyber Operations 111<br /><i>George Cybenko</i></p> <p>6 On Development of a Game-Theoretic Model for Deception-Based Security 123<br /><i>Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, and Laurent L. Njilla</i></p> <p>7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives 141<br /><i>Abdullah Alshammari, Danda B. Rawat, Moses Garuba, Charles A. Kamhoua, and Laurent L. Njilla</i></p> <p><b>Part II IoT Security Modeling and Analysis </b><b>161</b></p> <p>8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling 163<br /><i>Ted Bapty, Abhishek Dubey, and Janos Sztipanovits</i></p> <p>9 Securing Smart Cities: Implications and Challenges 185<br /><i>Ioannis Agadakos, Prashant Anantharaman, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Tancrède Lepoint, Ulf Lindqvist, Michael Locasto, and Liwei Song</i></p> <p>10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things 217<br /><i>Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, and Dong Seong Kim</i></p> <p>11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling 249<br /><i>Hisham Alasmary, Afsah Anwar, Laurent L. Njilla, Charles A. Kamhoua, and Aziz Mohaisen</i></p> <p>12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs 273<br /><i>Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David M. Nicol, Charles A. Kamhoua, and Laurent L. Njilla</i></p> <p>13 Anomaly Behavior Analysis of IoT Protocols 295<br /><i>Pratik Satam, Shalaka Satam, Salim Hariri, and Amany Alshawi</i></p> <p>14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework 331<br /><i>Md Ali Reza Al Amin, Sachin Shetty, Laurent L. Njilla, Deepak K. Tosh, and Charles A. Kamhoua</i></p> <p>15 A Coding Theoretic View of Secure State Reconstruction 357<br /><i>Suhas Diggavi and Paulo Tabuada</i></p> <p>16 Governance for the Internet of Things: Striving Toward Resilience 371<br /><i>S. E. Galaitsi, Benjamin D. Trump, and Igor Linkov</i></p> <p><b>Part III IoT Security Design </b><b>383</b></p> <p>17 Secure and Resilient Control of IoT-Based 3D Printers 385<br /><i>Zhiheng Xu and Quanyan Zhu</i></p> <p>18 Proactive Defense Against Security Threats on IoT Hardware 407<br /><i>Qiaoyan Yu, Zhiming Zhang, and Jaya Dofe</i></p> <p>19 IoT Device Attestation: From a Cross-Layer Perspective 435<br /><i>Orlando Arias, Fahim Rahman, Mark Tehranipoor, and Yier Jin</i></p> <p>20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) 453<br /><i>Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, and Jay Chen</i></p> <p>21 Leverage SDN for Cyber-Security Deception in Internet of Things 479<br /><i>Yaoqing Liu, Garegin Grigoryan, Charles A. Kamhoua, and Laurent L. Njilla</i></p> <p>22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract 505<br /><i>Ronghua Xu, Yu Chen, and Erik Blasch</i></p> <p>23 Intent as a Secure Design Primitive 529<br /><i>Prashant Anantharaman, J. Peter Brady, Ira Ray Jenkins, Vijay H. Kothari, Michael C. Millian, Kartik Palani, Kirti V. Rathore, Jason Reeves, Rebecca Shapiro, Syed H. Tanveer, Sergey Bratus, and Sean W. Smith</i></p> <p>24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications 563<br /><i>Nico Saputro, Samet Tonyali, Abdullah Aydeger, Kemal Akkaya, Mohammad A. Rahman, and Selcuk Uluagac</i></p> <p>25 Toward Robust Outlier Detector for Internet of Things Applications 615<br /><i>Raj Mani Shukla and Shamik Sengupta</i></p> <p>26 Summary and Future Work 635<br /><i>Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty</i></p> <p>Index 647</p>
<p><b>CHARLES A. KAMHOUA, P<small>H</small>D,</b> is a Senior Electronics Engineer at the U.S. Army Research Laboratory's Network Security Branch. <p><b>LAURENT L. NJILLA, P<small>H</small>D,</b> is a researcher at the U.S. Army Research Laboratory's Information Directorate/Cyber Assurance Branch. <p><b>ALEXANDER KOTT, P<small>H</small>D,</b> is the Chief Scientist at the U.S. Army Research Laboratory. <p><b>SACHIN SHETTY, P<small>H</small>D,</b> is an Associate Professor in the Modeling, Simulation and Visualization Engineering Department at Old Dominion University.
<p><b>An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things</b> <p><i>Modeling and Design of Secure Internet of Things</i> offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. <p>The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: <ul> <li>Presents information on game-theory analysis of cyber deception</li> <li>Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation</li> <li>Contains contributions from an international panel of experts</li> <li>Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities</li> </ul> <p>Written for researchers and experts in computer science and engineering, <i>Modeling and Design of Secure Internet of Things</i> contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €