Cyber-Assurance Through Embedded Security for the Internet of Things

Tyson T. Brooks, Joon S Park

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The Internet of Things (IoT) comprises billions of Internet-connected devices (ICD) or "things", each of which can sense, communicate, compute, and potentially actuate and can have intelligence, multimodal interfaces, physical/virtual identities, and attributes. Cyber-assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents, and unexpected events. The cyber-assurance recognition strategy is to define only the service-level interfaces and leave out domain-specific implementation details. Once the recognition of a cyber-attack has been identified from the recognition process, the fortification process takes place. Reestablishment is a means to return the ICDs to its operational condition after the cyber-attack through remapping to a different route since the ICD was under attack. When the IoT technologies are used as part of mission critical systems, the IoT services should be survivable in order to support the important missions.

Original languageEnglish (US)
Title of host publicationCyber Assurance for the Internet of Things
PublisherWiley Blackwell
Pages101-127
Number of pages27
ISBN (Electronic)9781119193784
ISBN (Print)9781119193869
DOIs
StatePublished - Nov 7 2016

Fingerprint

Internet
Accidents
Internet of things

Keywords

  • Cyber-assurance recognition strategy
  • Cyber-attack
  • Cyber-security
  • Embedded security
  • Internet of things
  • Internet-connected devices
  • Secure packet mechanism
  • Service-level interfaces

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Brooks, T. T., & Park, J. S. (2016). Cyber-Assurance Through Embedded Security for the Internet of Things. In Cyber Assurance for the Internet of Things (pp. 101-127). Wiley Blackwell. https://doi.org/10.1002/9781119193784.ch2

Cyber-Assurance Through Embedded Security for the Internet of Things. / Brooks, Tyson T.; Park, Joon S.

Cyber Assurance for the Internet of Things. Wiley Blackwell, 2016. p. 101-127.

Research output: Chapter in Book/Report/Conference proceedingChapter

Brooks, TT & Park, JS 2016, Cyber-Assurance Through Embedded Security for the Internet of Things. in Cyber Assurance for the Internet of Things. Wiley Blackwell, pp. 101-127. https://doi.org/10.1002/9781119193784.ch2
Brooks TT, Park JS. Cyber-Assurance Through Embedded Security for the Internet of Things. In Cyber Assurance for the Internet of Things. Wiley Blackwell. 2016. p. 101-127 https://doi.org/10.1002/9781119193784.ch2
Brooks, Tyson T. ; Park, Joon S. / Cyber-Assurance Through Embedded Security for the Internet of Things. Cyber Assurance for the Internet of Things. Wiley Blackwell, 2016. pp. 101-127
@inbook{4cde5a2a79514fe1bb4bc7ed4acf74ca,
title = "Cyber-Assurance Through Embedded Security for the Internet of Things",
abstract = "The Internet of Things (IoT) comprises billions of Internet-connected devices (ICD) or {"}things{"}, each of which can sense, communicate, compute, and potentially actuate and can have intelligence, multimodal interfaces, physical/virtual identities, and attributes. Cyber-assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents, and unexpected events. The cyber-assurance recognition strategy is to define only the service-level interfaces and leave out domain-specific implementation details. Once the recognition of a cyber-attack has been identified from the recognition process, the fortification process takes place. Reestablishment is a means to return the ICDs to its operational condition after the cyber-attack through remapping to a different route since the ICD was under attack. When the IoT technologies are used as part of mission critical systems, the IoT services should be survivable in order to support the important missions.",
keywords = "Cyber-assurance recognition strategy, Cyber-attack, Cyber-security, Embedded security, Internet of things, Internet-connected devices, Secure packet mechanism, Service-level interfaces",
author = "Brooks, {Tyson T.} and Park, {Joon S}",
year = "2016",
month = "11",
day = "7",
doi = "10.1002/9781119193784.ch2",
language = "English (US)",
isbn = "9781119193869",
pages = "101--127",
booktitle = "Cyber Assurance for the Internet of Things",
publisher = "Wiley Blackwell",

}

TY - CHAP

T1 - Cyber-Assurance Through Embedded Security for the Internet of Things

AU - Brooks, Tyson T.

AU - Park, Joon S

PY - 2016/11/7

Y1 - 2016/11/7

N2 - The Internet of Things (IoT) comprises billions of Internet-connected devices (ICD) or "things", each of which can sense, communicate, compute, and potentially actuate and can have intelligence, multimodal interfaces, physical/virtual identities, and attributes. Cyber-assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents, and unexpected events. The cyber-assurance recognition strategy is to define only the service-level interfaces and leave out domain-specific implementation details. Once the recognition of a cyber-attack has been identified from the recognition process, the fortification process takes place. Reestablishment is a means to return the ICDs to its operational condition after the cyber-attack through remapping to a different route since the ICD was under attack. When the IoT technologies are used as part of mission critical systems, the IoT services should be survivable in order to support the important missions.

AB - The Internet of Things (IoT) comprises billions of Internet-connected devices (ICD) or "things", each of which can sense, communicate, compute, and potentially actuate and can have intelligence, multimodal interfaces, physical/virtual identities, and attributes. Cyber-assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents, and unexpected events. The cyber-assurance recognition strategy is to define only the service-level interfaces and leave out domain-specific implementation details. Once the recognition of a cyber-attack has been identified from the recognition process, the fortification process takes place. Reestablishment is a means to return the ICDs to its operational condition after the cyber-attack through remapping to a different route since the ICD was under attack. When the IoT technologies are used as part of mission critical systems, the IoT services should be survivable in order to support the important missions.

KW - Cyber-assurance recognition strategy

KW - Cyber-attack

KW - Cyber-security

KW - Embedded security

KW - Internet of things

KW - Internet-connected devices

KW - Secure packet mechanism

KW - Service-level interfaces

UR - http://www.scopus.com/inward/record.url?scp=85019500123&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85019500123&partnerID=8YFLogxK

U2 - 10.1002/9781119193784.ch2

DO - 10.1002/9781119193784.ch2

M3 - Chapter

SN - 9781119193869

SP - 101

EP - 127

BT - Cyber Assurance for the Internet of Things

PB - Wiley Blackwell

ER -