Pramod Anantharam is a research at the Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) where he is a key member of the Semantic Sensor Web project. He is...
Hani M. Alzaid: CFC: Securing the Internet of Things through Progressive Threat Detection and Management
The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age. Securing the Internet of Things through Progressive Threat Detection and Management. For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series. ISSN: 1948-9730
Recently, Radio Frequency Identification (RFID) technology has achieved a widespread applicability in identification and tracking applications. For example, RFID tags are alternatives of barcode systems that are attached to objects to read objects information using reader. RFID technology is simple and easy to implement, but this technology cannot detect any environmental or physical parameters such as temperature, humidity, and pulse rate. Hence, sensors are used and becoming popular in many monitoring and surveillance applications since they are cheap, easy to deploy, configure, monitor and control. However, RFID readers and sensors have a very short communication range. Wi-Fi network with larger communication range can increase the coverage area of a monitoring application and form a network of immense capabilities by working with sensor, RFID, and other technologies, known as Internet of Things (IoT).
IoT is a network of things that allows objects interaction through the use of sensors, RFID tags, and other wireless technologies and thus, brings thousands of everyday use objects such as home appliances, PDA, cell phones, home laptops, and vehicles under the same network. For instance, a weight scale device can display weight information on an iPhone and send weight information to a doctor by integrating the weight scale with Wi-Fi or short range radio technologies (e.g., Bluetooth). If cloths have RFID tags, a washing machine with a RFID reader can read cloths information and adjust water requirement and washing time accordingly. Recently IoT has attracted a widespread interest and applicability. However, designing a large scale future IoT architecture using short communication range and resource constrained sensor and RFID networks is a great challenge. More importantly, bringing all these wireless devices to one architecture may open new doors for attacks. The main purpose of this book is to highlight challenges centered on IoT and its security.
The main objectives of this comprehensive and timely book are to: publish high quality original works highlighting IoTsecurity issues. The book will present state-of-the-art methodologies in IoT security, implementation, applications, modeling for threats detections and countermeasures; illustrate the benefits of detection and prevention threats applications in IoT networks, modeling, and analysis. The book will also identify the main issues that face efficient and effective countermeasures implementation in IoT security; demonstrate by examples how the performance of IoTsecurity can be evaluated. This book will provide professors, researchers, students, and professionals with cutting-edge research on threat detections, preventions, and countermeasures of IoT security; present the trends in countermeasures (modeling, application, analysis, etc); discuss the main features of current IoT security simulations. The book will also point out the main trends in IoT security evaluation and their tools, introduce the most popular academic and professional IoT simulators, and finally, provide a complete compilation of the problems that arise during the use of IoT security and the solutions that are applied to them.
The intended audience includes academics, researchers, post-graduate students, developers, professionals, network designers, network analysts, telecommunication system designers, technology specialists, practitioners, and people who are interested in using simulation in computer network security. Another projected audience is the researchers and academicians who identify methodologies, concepts, tools, and applications through reference citations, literature reviews, quantitative/qualitative results, and discussions. The book is designed to be a first choice reference at university libraries, academic institutions, research and development centers, information technology centers, and any institutions interested in using, designing, modeling, and analyzing computer networks security. The book is designed to be used as a textbook for courses teaching computer networks security, simulation, and modeling for under/post graduate students.
Proposals and chapters of interest include, but are not limited to, the following topic:
Definition, features and types of IoT.
Implementation, application and modeling for threats detections and countermeasures destined for IoT networks.
State-of-the-art methodologies in IoT security.
IoT and privacy.
IoT and Integrity.
IoT and Confidentiality.
IoT and Authentication.
IoT case studies, field studies, and applications.
IoT implementation issues.
User experience with IoT.
User interface of IoT technology.
Demonstrate by examples how the performance of IoT security can be evaluated and measured.
Introduce the most popular academic and professional IoT simulators in which security can be implemented. This includes discussion on the main features of current IoT security simulations. Also it includes demonstration by examples how the performance of IoT security can be evaluated and measured.
Contributors are invited to submit on or before April 15, 2014, a 2-3 page chapter proposal clearly explaining the mission, priorities, structure, and format of his/her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 15, 2014 about the status of their proposals, and chapter guidelines will be sent accordingly. Full chapters are expected to be submitted by August 30, 2014. All submitted chapters are subject to double blind reviews. Contributors may also be requested to serve as reviewers for this project.
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2015.
Proposal Submission Deadline: April 15, 2014
Full Chapter Submission: August 30, 2014
Review Results: November 15, 2014
Revised Chapter Submission: December 30, 2015
Hani Alzaid, Center for Cyber Security, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia
Basel Alomair, Center for Cyber Security, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia
Saleh Almotiri, National Cyber Security Center, Riyadh, Saudi Arabia
Nidal Nasser, Alfaisal University, Riyadh, Saudi Arabia
International Advisory Committee
Javier Lopez, Network, Information and Computer Security Lab, University of Malaga.
Radha Poovendran, Network Security Lab, University of Washington.
Hossam Hussanein, Queens Telecommuincations Research Lab, Queens University.
Anis Koubaa, Prince Sultan University/CISTER Research Unit.
hmalzaid at kacst.edu.sa
For more details, please visit the following link
Hani Alzaid, PhD | Assistant Research Professor | King Abdulaziz City for Science and Technology