A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture

Tyson T. Brooks, Lee W McKnight

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The ability to process large amounts of data with the integration of the Internet of Things (IoT) and cloud computing environments means organizations can trade sophisticated security estimation techniques for more accurate and simple models. By determining tactical and technical parameters of Cloud-of-Things (CoT) wireless equipment and systems, discovering irregularities of electronic tags and their threat levels and analyzing tags/readers strong and weak APs provide the interoperability for organizing and carrying out CoT defense. The basic task of the steady-state model for the CoT will be to support the defense for the CoT network through detecting technical loopholes and topographic structures from the various CoT networks and the data/information stored inside the system. The CoT system will possess a function of automatic identity recognition and needs a steady-state framework for measuring security components and mechanisms of computing devices, communication networks, and sensing devices.

Original languageEnglish (US)
Title of host publicationCyber Assurance for the Internet of Things
PublisherWiley Blackwell
Pages225-247
Number of pages23
ISBN (Electronic)9781119193784
ISBN (Print)9781119193869
DOIs
StatePublished - Nov 7 2016

    Fingerprint

Keywords

  • Automatic identity recognition
  • Cloud artificial intelligence
  • Cloud-of-things
  • Communication networks
  • Computing devices
  • Internet of things
  • Sensing devices
  • Steady-state model
  • System performance

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Brooks, T. T., & McKnight, L. W. (2016). A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture. In Cyber Assurance for the Internet of Things (pp. 225-247). Wiley Blackwell. https://doi.org/10.1002/9781119193784.ch9