Modeling and Design of Secure Internet of Things /
"Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass pro...
Main Authors: | , , , |
---|---|
Format: | text |
Language: | eng |
Published: |
Hoboken, New Jersey : Wiley-IEEE Press,
[202
|
Subjects: |
_version_ | 1826470246784958464 |
---|---|
author | Kamhoua, Charles A., editor 636629 Njilla, Laurent L., editor 636630 Kott, Alexander, 1971-, editor 636631 Shetty, Sachin, editor 636632 |
author_facet | Kamhoua, Charles A., editor 636629 Njilla, Laurent L., editor 636630 Kott, Alexander, 1971-, editor 636631 Shetty, Sachin, editor 636632 |
author_sort | Kamhoua, Charles A., editor 636629 |
collection | OCEAN |
description | "Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."-- |
first_indexed | 2024-03-05T16:45:22Z |
format | text |
id | KOHA-OAI-TEST:593300 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:45:22Z |
publishDate | [202 |
publisher | Hoboken, New Jersey : Wiley-IEEE Press, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5933002021-11-11T04:53:22ZModeling and Design of Secure Internet of Things / Kamhoua, Charles A., editor 636629 Njilla, Laurent L., editor 636630 Kott, Alexander, 1971-, editor 636631 Shetty, Sachin, editor 636632 textHoboken, New Jersey : Wiley-IEEE Press,[2020]©2020eng"Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."--Includes bibliographical references and index.1 Introduction -- Part I Game Theory for Cyber Deception -- 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation -- 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) -- 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks -- 5 Adaptation and Deception in Adversarial Cyber Operations -- 6 On Development of a Game-Theoretic Model for Deception-Based Security -- 7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives -- Part II IoT Security Modeling and Analysis -- 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling -- 9 Securing Smart Cities: Implications and Challenges -- 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things -- 11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling -- 12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs -- 13 Anomaly Behavior Analysis of IoT Protocols -- 14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework -- 15 A Coding Theoretic View of Secure State Reconstruction -- 16 Governance for the Internet of Things: Striving Toward Resilience -- Part III IoT Security Design -- 17 Secure and Resilient Control of IoT-Based 3D Printers -- 18 Proactive Defense Against Security Threats on IoT Hardware -- 19 IoT Device Attestation: From a Cross-Layer Perspective -- 20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) -- 21 Leverage SDN for Cyber-Security Deception in Internet of Things -- 22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract -- 23 Intent as a Secure Design Primitive -- 24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications -- 25 Toward Robust Outlier Detector for Internet of Things Applications -- 26 Summary and Future Work."Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."--PSZ_JBInternet of thingsURN:ISBN:9781119593362 |
spellingShingle | Internet of things Kamhoua, Charles A., editor 636629 Njilla, Laurent L., editor 636630 Kott, Alexander, 1971-, editor 636631 Shetty, Sachin, editor 636632 Modeling and Design of Secure Internet of Things / |
title | Modeling and Design of Secure Internet of Things / |
title_full | Modeling and Design of Secure Internet of Things / |
title_fullStr | Modeling and Design of Secure Internet of Things / |
title_full_unstemmed | Modeling and Design of Secure Internet of Things / |
title_short | Modeling and Design of Secure Internet of Things / |
title_sort | modeling and design of secure internet of things |
topic | Internet of things |
work_keys_str_mv | AT kamhouacharlesaeditor636629 modelinganddesignofsecureinternetofthings AT njillalaurentleditor636630 modelinganddesignofsecureinternetofthings AT kottalexander1971editor636631 modelinganddesignofsecureinternetofthings AT shettysachineditor636632 modelinganddesignofsecureinternetofthings |