Certified Security by Design for the Internet of Things

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. To learn and draw inspiration from the past, this chapter looks at the 1970s and 1980s when the challenges of designing and implementing very large-scale integrated (VLSI) circuits were encountered and overcome. The chapter defines the syntax, semantics, and inference rules for an access-control logic used to reason about command and control (C2). Cryptographic operations are an integral part of protecting integrity and confidentiality. The chapter also provides algebraic models in higher-order logic (HOL) theorem of idealized cryptographic operations. The chapter describes the objectives of certified security by design (CSBD), provides a simple motivating application as context, and states the critical requirements that must be satisfied to make CSBD a reality.

Original languageEnglish (US)
Title of host publicationCyber Assurance for the Internet of Things
PublisherWiley Blackwell
Pages1-99
Number of pages99
ISBN (Electronic)9781119193784
ISBN (Print)9781119193869
DOIs
StatePublished - Nov 7 2016

Fingerprint

Access control
Integrated circuits
Semantics
Internet of things

Keywords

  • Access-control logic
  • Certified security by design
  • Cryptographic operations
  • Embedded design security
  • Higher-order logic theorem
  • Internet of things
  • Propositional modal logic
  • Very large-scale integrated circuits

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Chin, S. K. (2016). Certified Security by Design for the Internet of Things. In Cyber Assurance for the Internet of Things (pp. 1-99). Wiley Blackwell. https://doi.org/10.1002/9781119193784.ch1

Certified Security by Design for the Internet of Things. / Chin, Shiu Kai.

Cyber Assurance for the Internet of Things. Wiley Blackwell, 2016. p. 1-99.

Research output: Chapter in Book/Report/Conference proceedingChapter

Chin, SK 2016, Certified Security by Design for the Internet of Things. in Cyber Assurance for the Internet of Things. Wiley Blackwell, pp. 1-99. https://doi.org/10.1002/9781119193784.ch1
Chin SK. Certified Security by Design for the Internet of Things. In Cyber Assurance for the Internet of Things. Wiley Blackwell. 2016. p. 1-99 https://doi.org/10.1002/9781119193784.ch1
Chin, Shiu Kai. / Certified Security by Design for the Internet of Things. Cyber Assurance for the Internet of Things. Wiley Blackwell, 2016. pp. 1-99
@inbook{06b2059a2a544bc59729609f6aa5e5e9,
title = "Certified Security by Design for the Internet of Things",
abstract = "Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. To learn and draw inspiration from the past, this chapter looks at the 1970s and 1980s when the challenges of designing and implementing very large-scale integrated (VLSI) circuits were encountered and overcome. The chapter defines the syntax, semantics, and inference rules for an access-control logic used to reason about command and control (C2). Cryptographic operations are an integral part of protecting integrity and confidentiality. The chapter also provides algebraic models in higher-order logic (HOL) theorem of idealized cryptographic operations. The chapter describes the objectives of certified security by design (CSBD), provides a simple motivating application as context, and states the critical requirements that must be satisfied to make CSBD a reality.",
keywords = "Access-control logic, Certified security by design, Cryptographic operations, Embedded design security, Higher-order logic theorem, Internet of things, Propositional modal logic, Very large-scale integrated circuits",
author = "Chin, {Shiu Kai}",
year = "2016",
month = "11",
day = "7",
doi = "10.1002/9781119193784.ch1",
language = "English (US)",
isbn = "9781119193869",
pages = "1--99",
booktitle = "Cyber Assurance for the Internet of Things",
publisher = "Wiley Blackwell",

}

TY - CHAP

T1 - Certified Security by Design for the Internet of Things

AU - Chin, Shiu Kai

PY - 2016/11/7

Y1 - 2016/11/7

N2 - Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. To learn and draw inspiration from the past, this chapter looks at the 1970s and 1980s when the challenges of designing and implementing very large-scale integrated (VLSI) circuits were encountered and overcome. The chapter defines the syntax, semantics, and inference rules for an access-control logic used to reason about command and control (C2). Cryptographic operations are an integral part of protecting integrity and confidentiality. The chapter also provides algebraic models in higher-order logic (HOL) theorem of idealized cryptographic operations. The chapter describes the objectives of certified security by design (CSBD), provides a simple motivating application as context, and states the critical requirements that must be satisfied to make CSBD a reality.

AB - Incorporating security into the design of components used in the Internet of Things (IoT) is essential for securing the operations of the IoT and the cyber-physical infrastructure upon which society depends. To learn and draw inspiration from the past, this chapter looks at the 1970s and 1980s when the challenges of designing and implementing very large-scale integrated (VLSI) circuits were encountered and overcome. The chapter defines the syntax, semantics, and inference rules for an access-control logic used to reason about command and control (C2). Cryptographic operations are an integral part of protecting integrity and confidentiality. The chapter also provides algebraic models in higher-order logic (HOL) theorem of idealized cryptographic operations. The chapter describes the objectives of certified security by design (CSBD), provides a simple motivating application as context, and states the critical requirements that must be satisfied to make CSBD a reality.

KW - Access-control logic

KW - Certified security by design

KW - Cryptographic operations

KW - Embedded design security

KW - Higher-order logic theorem

KW - Internet of things

KW - Propositional modal logic

KW - Very large-scale integrated circuits

UR - http://www.scopus.com/inward/record.url?scp=85019482403&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85019482403&partnerID=8YFLogxK

U2 - 10.1002/9781119193784.ch1

DO - 10.1002/9781119193784.ch1

M3 - Chapter

SN - 9781119193869

SP - 1

EP - 99

BT - Cyber Assurance for the Internet of Things

PB - Wiley Blackwell

ER -