Cyber-Assurance Through Embedded Security for the Internet of Things

Tyson T. Brooks, Joon Park

Research output: Chapter in Book/Entry/PoemChapter

2 Scopus citations

Abstract

The Internet of Things (IoT) comprises billions of Internet-connected devices (ICD) or "things", each of which can sense, communicate, compute, and potentially actuate and can have intelligence, multimodal interfaces, physical/virtual identities, and attributes. Cyber-assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents, and unexpected events. The cyber-assurance recognition strategy is to define only the service-level interfaces and leave out domain-specific implementation details. Once the recognition of a cyber-attack has been identified from the recognition process, the fortification process takes place. Reestablishment is a means to return the ICDs to its operational condition after the cyber-attack through remapping to a different route since the ICD was under attack. When the IoT technologies are used as part of mission critical systems, the IoT services should be survivable in order to support the important missions.

Original languageEnglish (US)
Title of host publicationCyber Assurance for the Internet of Things
PublisherWiley-IEEE Press
Pages101-127
Number of pages27
ISBN (Electronic)9781119193784
ISBN (Print)9781119193869
DOIs
StatePublished - Nov 7 2016

Keywords

  • Cyber-assurance recognition strategy
  • Cyber-attack
  • Cyber-security
  • Embedded security
  • Internet of things
  • Internet-connected devices
  • Secure packet mechanism
  • Service-level interfaces

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Cyber-Assurance Through Embedded Security for the Internet of Things'. Together they form a unique fingerprint.

Cite this