A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture

Tyson T. Brooks, Lee W McKnight

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The ability to process large amounts of data with the integration of the Internet of Things (IoT) and cloud computing environments means organizations can trade sophisticated security estimation techniques for more accurate and simple models. By determining tactical and technical parameters of Cloud-of-Things (CoT) wireless equipment and systems, discovering irregularities of electronic tags and their threat levels and analyzing tags/readers strong and weak APs provide the interoperability for organizing and carrying out CoT defense. The basic task of the steady-state model for the CoT will be to support the defense for the CoT network through detecting technical loopholes and topographic structures from the various CoT networks and the data/information stored inside the system. The CoT system will possess a function of automatic identity recognition and needs a steady-state framework for measuring security components and mechanisms of computing devices, communication networks, and sensing devices.

Original languageEnglish (US)
Title of host publicationCyber Assurance for the Internet of Things
PublisherWiley Blackwell
Pages225-247
Number of pages23
ISBN (Electronic)9781119193784
ISBN (Print)9781119193869
DOIs
StatePublished - Nov 7 2016

Fingerprint

Cloud computing
Interoperability
Telecommunication networks
Internet of things

Keywords

  • Automatic identity recognition
  • Cloud artificial intelligence
  • Cloud-of-things
  • Communication networks
  • Computing devices
  • Internet of things
  • Sensing devices
  • Steady-state model
  • System performance

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Brooks, T. T., & McKnight, L. W. (2016). A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture. In Cyber Assurance for the Internet of Things (pp. 225-247). Wiley Blackwell. https://doi.org/10.1002/9781119193784.ch9

A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture. / Brooks, Tyson T.; McKnight, Lee W.

Cyber Assurance for the Internet of Things. Wiley Blackwell, 2016. p. 225-247.

Research output: Chapter in Book/Report/Conference proceedingChapter

Brooks, Tyson T. ; McKnight, Lee W. / A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture. Cyber Assurance for the Internet of Things. Wiley Blackwell, 2016. pp. 225-247
@inbook{63d63360f1cb453b9881a14074386770,
title = "A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture",
abstract = "The ability to process large amounts of data with the integration of the Internet of Things (IoT) and cloud computing environments means organizations can trade sophisticated security estimation techniques for more accurate and simple models. By determining tactical and technical parameters of Cloud-of-Things (CoT) wireless equipment and systems, discovering irregularities of electronic tags and their threat levels and analyzing tags/readers strong and weak APs provide the interoperability for organizing and carrying out CoT defense. The basic task of the steady-state model for the CoT will be to support the defense for the CoT network through detecting technical loopholes and topographic structures from the various CoT networks and the data/information stored inside the system. The CoT system will possess a function of automatic identity recognition and needs a steady-state framework for measuring security components and mechanisms of computing devices, communication networks, and sensing devices.",
keywords = "Automatic identity recognition, Cloud artificial intelligence, Cloud-of-things, Communication networks, Computing devices, Internet of things, Sensing devices, Steady-state model, System performance",
author = "Brooks, {Tyson T.} and McKnight, {Lee W}",
year = "2016",
month = "11",
day = "7",
doi = "10.1002/9781119193784.ch9",
language = "English (US)",
isbn = "9781119193869",
pages = "225--247",
booktitle = "Cyber Assurance for the Internet of Things",
publisher = "Wiley Blackwell",

}

TY - CHAP

T1 - A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture

AU - Brooks, Tyson T.

AU - McKnight, Lee W

PY - 2016/11/7

Y1 - 2016/11/7

N2 - The ability to process large amounts of data with the integration of the Internet of Things (IoT) and cloud computing environments means organizations can trade sophisticated security estimation techniques for more accurate and simple models. By determining tactical and technical parameters of Cloud-of-Things (CoT) wireless equipment and systems, discovering irregularities of electronic tags and their threat levels and analyzing tags/readers strong and weak APs provide the interoperability for organizing and carrying out CoT defense. The basic task of the steady-state model for the CoT will be to support the defense for the CoT network through detecting technical loopholes and topographic structures from the various CoT networks and the data/information stored inside the system. The CoT system will possess a function of automatic identity recognition and needs a steady-state framework for measuring security components and mechanisms of computing devices, communication networks, and sensing devices.

AB - The ability to process large amounts of data with the integration of the Internet of Things (IoT) and cloud computing environments means organizations can trade sophisticated security estimation techniques for more accurate and simple models. By determining tactical and technical parameters of Cloud-of-Things (CoT) wireless equipment and systems, discovering irregularities of electronic tags and their threat levels and analyzing tags/readers strong and weak APs provide the interoperability for organizing and carrying out CoT defense. The basic task of the steady-state model for the CoT will be to support the defense for the CoT network through detecting technical loopholes and topographic structures from the various CoT networks and the data/information stored inside the system. The CoT system will possess a function of automatic identity recognition and needs a steady-state framework for measuring security components and mechanisms of computing devices, communication networks, and sensing devices.

KW - Automatic identity recognition

KW - Cloud artificial intelligence

KW - Cloud-of-things

KW - Communication networks

KW - Computing devices

KW - Internet of things

KW - Sensing devices

KW - Steady-state model

KW - System performance

UR - http://www.scopus.com/inward/record.url?scp=85019464377&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85019464377&partnerID=8YFLogxK

U2 - 10.1002/9781119193784.ch9

DO - 10.1002/9781119193784.ch9

M3 - Chapter

SN - 9781119193869

SP - 225

EP - 247

BT - Cyber Assurance for the Internet of Things

PB - Wiley Blackwell

ER -