Modeling and Design of Secure Internet of Things

Modeling and Design of Secure Internet of Things

Book Description
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things
Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors―noted experts on the topic―also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential.
The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book:
  • Presents information on game-theory analysis of cyber deception
  • Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation
  • Contains contributions from an international panel of experts
  • Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities
Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.


1. Introduction

Part I - Game Theory for Cyber Deception
2. Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation
3. A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT)
4. Cooperative Spectrum Sharing and Trust Management in IoT Networks
5. Adaptation and Deception in Adversarial Cyber Operations
6. On Development of a Game-Theoretic Model for Deception-Based Security
7. Deception for Cyber Adversaries: Status, Challenges, and Perspectives

Part II - IoT Security Modeling and Analysis
8. Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling
9. Securing Smart Cities: Implications and Challenges
10. Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things
11. Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling
12. Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs
13. Anomaly Behavior Analysis of IoT Protocols
14. Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework
15. A Coding Theoretic View of Secure State Reconstruction
16. Governance for the Internet of Things: Striving Toward Resilience

Part III - IoT Security Design
17. Secure and Resilient Control of IoT-Based 3D Printers
18. Proactive Defense Against Security Threats on IoT Hardware
19. IoT Device Attestation: From a Cross-Layer Perspective
20. Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT)
21. Leverage SDN for Cyber-Security Deception in Internet of Things
22. Decentralized Access Control for IoT Based on Blockchain and Smart Contract
23. Intent as a Secure Design Primitive
24. A Review of Moving Target Defense Mechanisms for Internet of Things Applications
25. Toward Robust Outlier Detector for Internet of Things Applications
26. Summary and Future Work

Download Modeling and Design of Secure Internet of Things PDF or ePUB format free

Free sample

Download in .PDF format

Download in .ePUB format

Add comments
Введите код с картинки:*
Кликните на изображение чтобы обновить код, если он неразборчив
Copyright © 2019