Modeling and Design of Secure Internet of Things /

"Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass pro...

Full description

Bibliographic Details
Main Authors: Kamhoua, Charles A., editor 636629, Njilla, Laurent L., editor 636630, Kott, Alexander, 1971-, editor 636631, Shetty, Sachin, editor 636632
Format: text
Language:eng
Published: Hoboken, New Jersey : Wiley-IEEE Press, [202
Subjects:
_version_ 1826470246784958464
author Kamhoua, Charles A., editor 636629
Njilla, Laurent L., editor 636630
Kott, Alexander, 1971-, editor 636631
Shetty, Sachin, editor 636632
author_facet Kamhoua, Charles A., editor 636629
Njilla, Laurent L., editor 636630
Kott, Alexander, 1971-, editor 636631
Shetty, Sachin, editor 636632
author_sort Kamhoua, Charles A., editor 636629
collection OCEAN
description "Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."--
first_indexed 2024-03-05T16:45:22Z
format text
id KOHA-OAI-TEST:593300
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:45:22Z
publishDate [202
publisher Hoboken, New Jersey : Wiley-IEEE Press,
record_format dspace
spelling KOHA-OAI-TEST:5933002021-11-11T04:53:22ZModeling and Design of Secure Internet of Things / Kamhoua, Charles A., editor 636629 Njilla, Laurent L., editor 636630 Kott, Alexander, 1971-, editor 636631 Shetty, Sachin, editor 636632 textHoboken, New Jersey : Wiley-IEEE Press,[2020]©2020eng"Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."--Includes bibliographical references and index.1 Introduction -- Part I Game Theory for Cyber Deception -- 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation -- 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) -- 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks -- 5 Adaptation and Deception in Adversarial Cyber Operations -- 6 On Development of a Game-Theoretic Model for Deception-Based Security -- 7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives -- Part II IoT Security Modeling and Analysis -- 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling -- 9 Securing Smart Cities: Implications and Challenges -- 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things -- 11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling -- 12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs -- 13 Anomaly Behavior Analysis of IoT Protocols -- 14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework -- 15 A Coding Theoretic View of Secure State Reconstruction -- 16 Governance for the Internet of Things: Striving Toward Resilience -- Part III IoT Security Design -- 17 Secure and Resilient Control of IoT-Based 3D Printers -- 18 Proactive Defense Against Security Threats on IoT Hardware -- 19 IoT Device Attestation: From a Cross-Layer Perspective -- 20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) -- 21 Leverage SDN for Cyber-Security Deception in Internet of Things -- 22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract -- 23 Intent as a Secure Design Primitive -- 24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications -- 25 Toward Robust Outlier Detector for Internet of Things Applications -- 26 Summary and Future Work."Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."--PSZ_JBInternet of thingsURN:ISBN:9781119593362
spellingShingle Internet of things
Kamhoua, Charles A., editor 636629
Njilla, Laurent L., editor 636630
Kott, Alexander, 1971-, editor 636631
Shetty, Sachin, editor 636632
Modeling and Design of Secure Internet of Things /
title Modeling and Design of Secure Internet of Things /
title_full Modeling and Design of Secure Internet of Things /
title_fullStr Modeling and Design of Secure Internet of Things /
title_full_unstemmed Modeling and Design of Secure Internet of Things /
title_short Modeling and Design of Secure Internet of Things /
title_sort modeling and design of secure internet of things
topic Internet of things
work_keys_str_mv AT kamhouacharlesaeditor636629 modelinganddesignofsecureinternetofthings
AT njillalaurentleditor636630 modelinganddesignofsecureinternetofthings
AT kottalexander1971editor636631 modelinganddesignofsecureinternetofthings
AT shettysachineditor636632 modelinganddesignofsecureinternetofthings