000 07085nam a2200613 i 4500
001 9123990
003 IEEE
005 20220712210028.0
006 m o d
007 cr |n|||||||||
008 201203s2020 nju ob 001 eng d
010 _z 2020028698 (print)
015 _zGBC0E8010 (print)
016 _z019959422 (print)
020 _a9781119593379
_qelectronic
020 _a1119593360
020 _z9781119593362
_qhardback
020 _z9781119593379
_qadobe pdf
020 _z9781119593393
_qePub
024 7 _a10.1002/9781119593386
_2doi
035 _a(CaBNVSL)mat09123990
035 _a(IDAMS)0b0000648cc7f1e5
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK5105.8857
_b.M63 2020eb
082 0 0 _a005.8
_223
245 0 0 _aModeling and design of secure Internet of things /
_cedited by Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, Sachin Shetty.
264 1 _aHoboken, New Jersey :
_bWiley-IEEE Press,
_c[2020]
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2020]
300 _a1 PDF (1 volume).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aIEEE press
504 _aIncludes bibliographical references and index.
505 0 _aAbout the Editors ix -- List of Contributors xiii -- Foreword xix -- Preface xxiii -- 1 Introduction 1 /Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty -- Part I Game Theory for Cyber Deception 27 -- 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation 29 /Tao Zhang, Linan Huang, Jeffrey Pawlick, and Quanyan Zhu -- 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) 59 /Bowei Xi and Charles A. Kamhoua -- 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks 79 /Fatemeh Afghah, Alireza Shamsoshoara, Laurent L. Njilla, and Charles A. Kamhoua -- 5 Adaptation and Deception in Adversarial Cyber Operations 111 /George Cybenko -- 6 On Development of a Game-Theoretic Model for Deception-Based Security 123 /Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, and Laurent L. Njilla -- 7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives 141 /Abdullah Alshammari, Danda B. Rawat, Moses Garuba, Charles A. Kamhoua, and Laurent L. Njilla -- Part II IoT Security Modeling and Analysis 161 -- 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling 163 /Ted Bapty, Abhishek Dubey, and Janos Sztipanovits -- 9 Securing Smart Cities: Implications and Challenges 185 /Ioannis Agadakos, Prashant Anantharaman, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Tancr�de Lepoint, Ulf Lindqvist, Michael Locasto, and Liwei Song -- 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things 217 /Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, and Dong Seong Kim -- 11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling 249 /Hisham Alasmary, Afsah Anwar, Laurent L. Njilla, Charles A. Kamhoua, and Aziz Mohaisen -- 12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs 273 /Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David M. Nicol, Charles A. Kamhoua, and Laurent L. Njilla.
505 8 _a13 Anomaly Behavior Analysis of IoT Protocols 295 /Pratik Satam, Shalaka Satam, Salim Hariri, and Amany Alshawi -- 14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework 331 /Md Ali Reza Al Amin, Sachin Shetty, Laurent L. Njilla, Deepak K. Tosh, and Charles A. Kamhoua -- 15 A Coding Theoretic View of Secure State Reconstruction 357 /Suhas Diggavi and Paulo Tabuada -- 16 Governance for the Internet of Things: Striving Toward Resilience 371 /S. E. Galaitsi, Benjamin D. Trump, and Igor Linkov -- Part III IoT Security Design 383 -- 17 Secure and Resilient Control of IoT-Based 3D Printers 385 /Zhiheng Xu and Quanyan Zhu -- 18 Proactive Defense Against Security Threats on IoT Hardware 407 /Qiaoyan Yu, Zhiming Zhang, and Jaya Dofe -- 19 IoT Device Attestation: From a Cross-Layer Perspective 435 /Orlando Arias, Fahim Rahman, Mark Tehranipoor, and Yier Jin -- 20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) 453 /Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, and Jay Chen -- 21 Leverage SDN for Cyber-Security Deception in Internet of Things 479 /Yaoqing Liu, Garegin Grigoryan, Charles A. Kamhoua, and Laurent L. Njilla -- 22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract 505 /Ronghua Xu, Yu Chen, and Erik Blasch -- 23 Intent as a Secure Design Primitive 529 /Prashant Anantharaman, J. Peter Brady, Ira Ray Jenkins, Vijay H. Kothari, Michael C. Millian, Kartik Palani, Kirti V. Rathore, Jason Reeves, Rebecca Shapiro, Syed H. Tanveer, Sergey Bratus, and Sean W. Smith -- 24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications 563 /Nico Saputro, Samet Tonyali, Abdullah Aydeger, Kemal Akkaya, Mohammad A. Rahman, and Selcuk Uluagac -- 25 Toward Robust Outlier Detector for Internet of Things Applications 615 /Raj Mani Shukla and Shamik Sengupta -- 26 Summary and Future Work 635 /Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty.
505 8 _aIndex 647.
506 _aRestricted to subscribers or individual electronic text purchasers.
520 _a"Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate the Intelligence, Surveillance, and Reconnaissance to Command and Control and battlefield services. There are several reasons for IoT security. First, IoT devices are mass produced rapidly to be low-cost commodity items without security protection in their original design. Second, IoT devices are highly dynamic, mobile, and heterogeneous without common standards. Third, it is imperative to understand the natural world, the physical process(es) under IoT control, and how these real-world processes can be compromised before recommending any relevant security countermeasure. As a result, those systems are the frequent targets of sophisticated cyber attacks that aim to disrupt mission effectiveness."--
_cProvided by publisher.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/03/2020.
650 0 _aInternet of things
_xSecurity measures.
_96353
655 0 _aElectronic books.
_93294
700 1 _aKamhoua, Charles A.,
_eeditor.
_99097
700 1 _aNjilla, Laurent L.,
_eeditor.
_99098
700 1 _aKott, Alexander,
_d1971-
_eeditor.
_929664
700 1 _aShetty, Sachin,
_eeditor.
_99100
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_929665
710 2 _aWiley,
_epublisher.
_929666
830 0 _aIEEE press
_96154
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9123990
942 _cEBK
999 _c74648
_d74648