An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things
Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributorsnoted experts on the topicalso include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential.
The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book:
Presents information on game-theory analysis of cyber deceptionIncludes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generationContains contributions from an international panel of expertsAddresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities
Written for researchers and experts in computer science and engineering,Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.
About the Editors ix
List of Contributors xiii
Foreword xix
Preface xxiii
1 Introduction 1Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty
Part I Game Theory for Cyber Deception27
2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation 29Tao Zhang, Linan Huang, Jeffrey Pawlick, and Quanyan Zhu
3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) 59Bowei Xi and Charles A. Kamhoua
4 Cooperative Spectrum Sharing and Trust Management in IoT Networks 79Fatemeh Afghah, Alireza Shamsoshoara, Laurent L. Njilla, and Charles A. Kamhoua
5 Adaptation and Deception in Adversarial Cyber Operations 111George Cybenko
6 On Development of a Game-Theoretic Model for Deception-Based Security 123Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, and Laurent L. Njilla
7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives 141Abdullah Alshammari, Danda B. Rawat, Moses Garuba, Charles A. Kamhoua, and Laurent L. Njilla
Part II IoT Security Modeling and Analysis161
8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling 163Ted Bapty, Abhishek Dubey, and Janos Sztipanovits
9 Securing Smart Cities: Implications and Challenges 185Ioannis Agadakos, Prashant Anantharaman, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Tancrède Lepoint, Ulf Lindqvist, Michael Locasto, and Liwei Song
10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things 217Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, and Dong Seong Kim
11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling 249Hisham Alasmary, Afsah Anwar, Laurent L. Njilla, Charles A. Kamhoua, and Aziz Mohaisen
12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs 273Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David M. Nicol, Charles A. Kamhoua, and Laurent L. Njilla
13 Anomaly Behavior Analysis of IoT Protocols 295Pratik Satam, Shalaka Satam, Salim Hariri, and Amany Alshawi
14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework 331Md Ali Reza Al Amin, Sachin Shetty, Laurent L. Njilla, Deepak K. Tosh, and Charles A. Kamhoua
15 A Coding Theoretic View of Secure State Reconstruction 357Suhas Diggavi and Paulo Tabuada
16 Governance for the Internet of Things: Striving Toward Resilience 371S. E. Galaitsi, Benjamin D. Trump, and Igor Linkov
Part III IoT Security Design383
17 Secure and Resilient Control of IoT-Based 3D Printers 385Zhiheng Xu and Quanyan Zhu
18 Proactive Defense Against Security Threats on IoT Hardware 407Qiaoyan Yu, Zhiming Zhang, and Jaya Dofe
19 IoT Device Attestation: From a Cross-Layer Perspective 435Orlando Arias, Fahim Rahman, Mark Tehranipoor, and Yier Jin
20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) 453Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, and Jay Chen
21 Leverage SDN for Cyber-Security Deception in Internet of Things 479Yaoqing Liu, Garegin Grigoryan, Charles A. Kamhoua, and Laurent L. Njilla
22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract 505Ronghua Xu, Yu Chen, and Erik Blasch
23 Intent as a Secure Design Primitive 529Prashant Anantharaman, J. Peter Brady, Ira Ray Jenkins, Vijay H. Kothari, Michael C. Millian, Kartik Palani, Kirti V. Rathore, Jason Reeves, Rebecca Shapiro, Syed H. Tanveer, Sergey Bratus, and Sean W. Smith
24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications 563Nico Saputro, Samet Tonyali, Abdullah Aydeger, Kemal Akkaya, Mohammad A. Rahman, and Selcuk Uluagac
25 Toward Robust Outlier Detector for Internet of Things Applications 615Raj Mani Shukla and Shamik Sengupta
26 Summary and Future Work 635Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty
Index 647