A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture

Tyson T. Brooks, Lee McKnight

Research output: Chapter in Book/Entry/PoemChapter


The ability to process large amounts of data with the integration of the Internet of Things (IoT) and cloud computing environments means organizations can trade sophisticated security estimation techniques for more accurate and simple models. By determining tactical and technical parameters of Cloud-of-Things (CoT) wireless equipment and systems, discovering irregularities of electronic tags and their threat levels and analyzing tags/readers strong and weak APs provide the interoperability for organizing and carrying out CoT defense. The basic task of the steady-state model for the CoT will be to support the defense for the CoT network through detecting technical loopholes and topographic structures from the various CoT networks and the data/information stored inside the system. The CoT system will possess a function of automatic identity recognition and needs a steady-state framework for measuring security components and mechanisms of computing devices, communication networks, and sensing devices.

Original languageEnglish (US)
Title of host publicationCyber Assurance for the Internet of Things
PublisherWiley-IEEE Press
Number of pages23
ISBN (Electronic)9781119193784
ISBN (Print)9781119193869
StatePublished - Nov 7 2016


  • Automatic identity recognition
  • Cloud artificial intelligence
  • Cloud-of-things
  • Communication networks
  • Computing devices
  • Internet of things
  • Sensing devices
  • Steady-state model
  • System performance

ASJC Scopus subject areas

  • General Computer Science


Dive into the research topics of 'A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture'. Together they form a unique fingerprint.

Cite this