Certified Security by Design for the Internet of Things

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. To learn and draw inspiration from the past, this chapter looks at the 1970s and 1980s when the challenges of designing and implementing very large-scale integrated (VLSI) circuits were encountered and overcome. The chapter defines the syntax, semantics, and inference rules for an access-control logic used to reason about command and control (C2). Cryptographic operations are an integral part of protecting integrity and confidentiality. The chapter also provides algebraic models in higher-order logic (HOL) theorem of idealized cryptographic operations. The chapter describes the objectives of certified security by design (CSBD), provides a simple motivating application as context, and states the critical requirements that must be satisfied to make CSBD a reality.

Original languageEnglish (US)
Title of host publicationCyber Assurance for the Internet of Things
PublisherWiley Blackwell
Pages1-99
Number of pages99
ISBN (Electronic)9781119193784
ISBN (Print)9781119193869
DOIs
StatePublished - Nov 7 2016

Keywords

  • Access-control logic
  • Certified security by design
  • Cryptographic operations
  • Embedded design security
  • Higher-order logic theorem
  • Internet of things
  • Propositional modal logic
  • Very large-scale integrated circuits

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Certified Security by Design for the Internet of Things'. Together they form a unique fingerprint.

Cite this