
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cyber-Assurance for the Internet of Things
About this book
Presents an Cyber-Assurance approach to the Internet of Things (IoT)
This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation.
- Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications
- Aids readers in understanding how to design and build cyber-assurance into the IoT
- Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance
- Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field
Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.
Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
PART I
EMBEDDED DESIGN SECURITY
CHAPTER 1
Certified Security by Design for the Internet of Things
1.1 Introduction
1.2 Lessons from the Microelectronics Revolution
“… to sidestep tons of accumulated vestigial practices in system architecture, logic design, circuit design and circuit layout, and replace them with a coherent but minimalist set of methods.” (Conway, L 2012)
- parameterization, that is, specifying λ as the biggest of all the required minimum feature sizes.
- idealized transistor behavior as switch behavior,
- consistent interpretations of voltages, transistor state, truth values,
- interpretations linking models at multiple levels, spanning layouts to transition systems, and
- computer-aided design (CAD) tools.
Table of contents
- Cover
- IEEE Press
- Title page
- Copyright
- Dedication
- FOREWORD
- PREFACE
- ACKNOWLEDGMENTS
- CONTRIBUTORS
- ACRONYMS
- INTRODUCTION
- PART I EMBEDDED DESIGN SECURITY
- PART II TRUST IMPACT
- PART III WEARABLE AUTOMATION PROVENANCE
- PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS
- APPENDIX A LIST OF IEEE INTERNET OF THINGS STANDARDS
- APPENDIX B GLOSSARY
- APPENDIX C CSBD THERMOSTAT REPORT
- APPENDIX D CSBD ACCESS-CONTROL LOGIC REPORT
- BIBLIOGRAPHY
- INDEX
- EULA