logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

[eBook Code] Cyber-Assurance for the Internet of Things

[eBook Code] Cyber-Assurance for the Internet of Things (eBook Code, 1st)

Tyson T. Brooks (엮은이)
Wiley-IEEE Press
208,520원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
166,810원 -20% 0원
0원
166,810원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

[eBook Code] Cyber-Assurance for the Internet of Things
eBook 미리보기

책 정보

· 제목 : [eBook Code] Cyber-Assurance for the Internet of Things (eBook Code, 1st) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9781119193883
· 쪽수 : 520쪽
· 출판일 : 2016-12-08

목차

LIST OF FIGURES xiii

LIST OF TABLES xvii

FOREWORD xix

PREFACE xxix

ACKNOWLEDGMENTS xxxiii

CONTRIBUTORS xxxv

ACRONYMS xli

INTRODUCTION xlvii

PART I EMBEDDED DESIGN SECURITY 1

1 CERTIFIED SECURITY BY DESIGN FOR THE INTERNET OF THINGS 3
Shiu-Kai Chin

1.1 Introduction / 3

1.2 Lessons from the Microelectronics Revolution / 3

1.3 Certified Security by Design / 5

1.4 Chapter Outline / 9

1.5 An Access-Control Logic / 9

1.6 An Introduction to HOL / 17

1.7 The Access-Control Logic in HOL / 25

1.8 Cryptographic Components and Their Models in Higher-Order Logic / 30

1.9 Cryptographic Hash Functions / 33

1.10 Asymmetric-Key Cryptography / 33

1.11 Digital Signatures / 36

1.12 Adding Security to State Machines / 38

1.13 A Networked Thermostat Certified Secure by Design / 49

1.14 Thermostat Use Cases / 52

1.15 Security Contexts for the Server and Thermostat / 56

1.16 Top-Level Thermostat Secure-State Machine / 58

1.17 Refined Thermostat Secure-State Machine / 67

1.18 Equivalence of Top-Level and Refined Secure-State Machines / 81

1.19 Conclusions / 84

Appendix / 86

References / 99

2 CYBER-ASSURANCE THROUGH EMBEDDED SECURITY FOR THE INTERNET OF THINGS 101
Tyson T. Brooks and Joon Park

2.1 Introduction / 101

2.2 Cyber-Security and Cyber-Assurance / 106

2.3 Recognition, Fortification, Re-Establishment, Survivability / 108

2.4 Conclusion / 120

References / 122

3 A SECURE UPDATE MECHANISM FOR INTERNET OF THINGS DEVICES 129
Martin Goldberg

3.1 Introduction / 129

3.2 Importance of IOT Security / 130

3.3 Applying the Defense In-Depth Strategy for Updating / 131

3.4 A Standards Approach / 132

3.5 Conclusion / 134

References / 135

PART II TRUST IMPACT 137

4 SECURITY AND TRUST MANAGEMENT FOR THE INTERNET OF THINGS: AN RFID AND SENSOR NETWORK PERSPECTIVE 139
M. Bala Krishna

4.1 Introduction / 139

4.2 Security and Trust in the Internet of Things / 142

4.3 Radio Frequency Identification: Evolution and Approaches / 147

4.4 Security and Trust in Wireless Sensor Networks / 151

4.5 Applications of Internet of Things and RFID in Real-Time Environment / 156

4.6 Future Research Directions and Conclusion / 158

References / 159

5 THE IMPACT OF IoT DEVICES ON NETWORK TRUST BOUNDARIES 163
Nicole Newmeyer

5.1 Introduction / 163

5.2 Trust Boundaries / 164

5.3 Risk Decisions and Conclusion / 173

References / 174

PART III WEARABLE AUTOMATION PROVENANCE 175

6 WEARABLE IoT COMPUTING: INTERFACE, EMOTIONS, WEARER’S CULTURE, AND SECURITY/PRIVACY CONCERNS 177
Robert McCloud, Martha Lerski, Joon Park, and Tyson T. Brooks

6.1 Introduction / 177

6.2 Data Accuracy in Wearable Computing / 178

6.3 Interface and Culture / 178

6.4 Emotion and Privacy / 179

6.5 Privacy Protection Policies for Wearable Devices / 181

6.6 Privacy/Security Concerns About Wearable Devices / 182

6.7 Expectations About Future Wearable Devices / 183

References / 184

7 ON VULNERABILITIES OF IoT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS 187
Martin Murillo

7.1 Introduction / 187

7.2 Industrial Control Systems and Home Automation Control / 189

7.3 Vulnerability Identification / 193

7.4 Modeling and Simulation of Basic Attacks to Control Loops and Service Providers / 198

7.5 Illustrating Various Attacks Through a Basic Home Heating System Model / 200

7.6 A Glimpse of Possible Economic Consequences of Addressed Attacks / 203

7.7 Discussion and Conclusion / 205

References / 206

8 BIG DATA COMPLEX EVENT PROCESSING FOR INTERNET OF THINGS PROVENANCE: BENEFITS FOR AUDIT, FORENSICS, AND SAFETY 209
Mark Underwood

8.1 Overview of Complex Event Processing / 209

8.2 The Need: IoT Security Challenges in Audit, Forensics, and Safety / 211

8.3 Challenges to CEP Adoption in IoT Settings / 213

8.4 CEP and IoT Security Visualization / 215

8.5 Summary / 217

8.6 Conclusion / 219

References / 220

PART IV CLOUD ARTIFICIAL INTELLIGENCE CYBER-PHYSICAL SYSTEMS 225

9 A STEADY-STATE FRAMEWORK FOR ASSESSING SECURITY MECHANISMS IN A CLOUD-OF-THINGS ARCHITECTURE 227
Tyson T. Brooks and Lee McKnight

Variable Nomenclature / 227

9.1 Introduction / 228

9.2 Background / 229

9.3 Establishing a Framework for CoT Analysis / 232

9.4 The CoT Steady-State Framework / 238

9.5 Conclusion / 244

References / 245

10 AN ARTIFICIAL INTELLIGENCE PERSPECTIVE ON ENSURING CYBER-ASSURANCE FOR THE INTERNET OF THINGS 249
Utku Köse

10.1 Introduction / 249

10.2 AI-Related Cyber-Assurance Research for the IoT / 250

10.3 Multidisciplinary Intelligence Enabling Opportunities with AI / 252

10.4 Future Research on AI-Based Cyber-Assurance for IoT / 254

10.5 Conclusion / 255

References / 255

11 PERCEIVED THREAT MODELING FOR CYBER-PHYSICAL SYSTEMS 257
Christopher Leberknight

11.1 Introduction / 257

11.2 Overview of Physical Security / 259

11.3 Relevance to Grounded Theory / 261

11.4 Theoretical Model Construction / 262

11.5 Experiment / 263

11.6 Results / 267

11.7 Discussion / 275

11.8 Future Research / 276

11.9 Conclusion / 278

References / 279

APPENDICES

A LIST OF IEEE INTERNET OF THINGS STANDARDS 283

B GLOSSARY 319

C CSBD THERMOSTAT REPORT 333

D CSBD ACCESS-CONTROL LOGIC REPORT 415

BIBLIOGRAPHY 433

INDEX 457

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책