Modeling and design of secure internet of things [electronic resource] / edited by Charles A. Kamhoua [and more]. - Newark : John Wiley & Sons, Incorporated, 2020. - 1 online resource (697 p.)

Description based upon print version of record. Chapter 10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things

Cover -- Title Page -- Copyright Page -- Contents -- About the Editors -- Foreword -- List of Contributors -- Preface -- Chapter 1 Introduction -- 1.1 Introduction -- 1.2 Overview -- 1.3 Roadmap -- 1.4 Summary and Future Work -- References -- Part I Game Theory for Cyber Deception -- Chapter 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation -- 2.1 Introduction -- 2.2 Game Theory in Security -- 2.3 Binary State Space: Leaky Deception Using Signaling Game with Evidence 2.4 Continuous State Space: Knowledge Acquisition and Fundamental Limits of Deception -- 2.5 Adaptive Strategic Cyber Defense for APT in Critical Infrastructure Network -- 2.6 Conclusion -- References -- Chapter 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) -- 3.1 Introduction -- 3.2 Modeling the Spread of an Attack -- 3.3 Experiments -- 3.4 Conclusion -- References -- Chapter 4 Cooperative Spectrum Sharing and Trust Management in IoT Networks -- 4.1 Introduction -- 4.2 Problem Statement -- 4.3 Overview to Physical Layer Secrecy 4.4 Introduction to Stackelberg Games -- 4.5 Proposed Game-Theoretic Spectrum Leasing Model to Enhance Secrecy Rate -- 4.6 Conclusion -- References -- Chapter 5 Adaptation and Deception in Adversarial Cyber Operations -- 5.1 Introduction -- 5.2 Key Aspects of Recent Game Theory Successes -- 5.3 Real-World Adversarial Situations -- 5.4 Paradoxes and Paradoxes Resolved -- 5.5 Summary -- Acknowledgments -- References -- Chapter 6 On Development of a Game-Theoretic Model for Deception-Based Security -- 6.1 Introduction -- 6.2 Related Research -- 6.3 Game-Theoretic Deception Model 6.4 Deception Using N Computing Devices -- 6.5 Deception in a Tree-Based Network Structure -- 6.6 Simulation Results -- 6.7 Conclusion -- References -- Chapter 7 Deception for Cyber Adversaries: Deception for Cyber Adversaries: Status, Challenges, and Perspectives -- 7.1 Introduction -- 7.2 Background -- 7.3 The Taxonomy for Cyber Deception -- 7.4 Game-Theoretic Model for Cyber Deception -- 7.5 Open Challenges and Opportunities -- 7.6 Summary -- References -- Part II IoT Security Modeling and Analysis -- Chapter 8 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling 8.1 Introduction -- 8.2 Vulnerabilities in IoT -- 8.3 Multi-modeling Approach for CPS Vulnerability Analysis -- 8.4 Open Questions and Future Research Directions -- References -- Chapter 9 Securing Smart Cities: Implications and Challenges -- 9.1 Foreword -- 9.2 Detection, Identification, Fingerprinting, and Behavioral Monitoring in Smart Cities -- 9.3 Modeling Smart Cities -- 9.4 The Future: Connecting and Federating IoT Technologies in Smart Cities -- 9.5 Epilogue -- Acknowledgment -- References

9781119593386 1119593387 9781119593379 1119593379


Internet of things--Security measures.


Electronic books.

TK5105.8857

004.67/8