Cyber-Assurance for the Internet of Things
eBook - ePub

Cyber-Assurance for the Internet of Things

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Cyber-Assurance for the Internet of Things

About this book

Presents an Cyber-Assurance approach to the Internet of Things (IoT)

This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation.

  • Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications
  • Aids readers in understanding how to design and build cyber-assurance into the IoT
  • Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance
  • Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field

Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.

Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cyber-Assurance for the Internet of Things by Tyson T. Brooks in PDF and/or ePUB format, as well as other popular books in Computer Science & Cryptography. We have over one million books available in our catalogue for you to explore.

Information

PART I
EMBEDDED DESIGN SECURITY

CHAPTER 1
Certified Security by Design for the Internet of Things

Shiu-Kai Chin
Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA

1.1 Introduction

Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. The pervasiveness of the IoT and its part in critical infrastructure requires incorporating security into the design of components from the start. There are several challenges to incorporating security into the design of IoT components from the start. These challenges include (1) precisely describing confidentiality and integrity policies in ways that are amenable to formal reasoning, (2) maintaining logical consistency among confidentiality and integrity policies and implementation at all levels of abstraction, from high-level behavioral descriptions at the user level, down to implementations at the level of state machines and transition systems, and (3) providing compelling evidence of security that is quickly and easily reproducible by certifiers.
This is not the first time the electrical and computer engineering profession has faced these challenges. In fact, the IoT is compelling evidence of successfully meeting the challenges of design, accountability, consistency, and verifiability across multiple levels of abstraction. To learn and draw inspiration from the past, we need only look back to the 1970s and 1980s when the challenges of designing and implementing very large-scale integrated (VLSI) circuits were encountered and overcome.

1.2 Lessons from the Microelectronics Revolution

In the 1970s, it was inconceivable that designers of algorithms and instruction-set architectures could fashion specialized integrated circuits down to the level of physical layouts. Each level of design had its collection of design detail, for example, transistor models at the circuit design level, and minimum separation distances among metal and polysilicon features at the layout level.
The union of all design concepts spanning algorithm design down to layouts was too much for a single designer to grasp conceptually. The prospect of a single designer accounting for all design details spanning algorithm to layout design was even more daunting. Conway's key insight that made VLSI design possible was:
“… to sidestep tons of accumulated vestigial practices in system architecture, logic design, circuit design and circuit layout, and replace them with a coherent but minimalist set of methods.” (Conway, L 2012)
Specifically, the minimalist set of methods made use of:
  • parameterization, that is, specifying λ as the biggest of all the required minimum feature sizes.
  • idealized transistor behavior as switch behavior,
  • consistent interpretations of voltages, transistor state, truth values,
  • interpretations linking models at multiple levels, spanning layouts to transition systems, and
  • computer-aided design (CAD) tools.
Computer hardware design is often called logic design for good reason. Propositional logic pervades all levels of abstraction in VLSI design. Transistor circuits and layouts are related to logic operators such as negation, nand, and nor. Networks of logic gates implement arithmetic logic units, multiplexers, flip-flops, and registers that are the components of datapaths. Base 2 arithmetic is used precisely because operations on binary numbers conveniently map to logic operations. Timing and control is achieved using finite-state machines. Finite-state machines are parameterized by next-state and output functions described by propositional logic formulas and implemented by combinational logic components. Instruction-set architectures are implemented by a combination of data and control paths, whose operations are controlled and sequenced by finite-state machines. The VLSI-inspired vision for securing the integrity of the IoT is this: harmonize multiple levels of abstraction by using the same logic at all levels to describe behavior at each level. This enables designs at each level of abstraction to be related to behavior at other levels. This provides the means for a continuous t...

Table of contents

  1. Cover
  2. IEEE Press
  3. Title page
  4. Copyright
  5. Dedication
  6. FOREWORD
  7. PREFACE
  8. ACKNOWLEDGMENTS
  9. CONTRIBUTORS
  10. ACRONYMS
  11. INTRODUCTION
  12. PART I EMBEDDED DESIGN SECURITY
  13. PART II TRUST IMPACT
  14. PART III WEARABLE AUTOMATION PROVENANCE
  15. PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS
  16. APPENDIX A LIST OF IEEE INTERNET OF THINGS STANDARDS
  17. APPENDIX B GLOSSARY
  18. APPENDIX C CSBD THERMOSTAT REPORT
  19. APPENDIX D CSBD ACCESS-CONTROL LOGIC REPORT
  20. BIBLIOGRAPHY
  21. INDEX
  22. EULA