Comments From Reviewers |
|
xv | |
Preface |
|
xxi | |
Chapter 1 Introduction-The Internet of Things |
|
1 | (26) |
|
You Are Never Too Young to Start Good Habits |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (2) |
|
|
5 | (2) |
|
Not About Information Dissemination Paradigms |
|
|
5 | (1) |
|
Not About Information Sharing |
|
|
5 | (1) |
|
Not About Wireless Networking |
|
|
5 | (1) |
|
The IoT Is (Mostly) Not About Privacy |
|
|
6 | (1) |
|
The "Old" Internet of Data, Voice, and Video |
|
|
7 | (1) |
|
|
8 | (2) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Who Are the Major Players in the IoT? |
|
|
10 | (9) |
|
|
10 | (1) |
|
A Simplified View of the IoT Stakeholders: Grouping by Asset Class |
|
|
11 | (1) |
|
Endpoint Device as an Asset Class |
|
|
12 | (2) |
|
Gateway as an Asset Class |
|
|
14 | (1) |
|
Network as an Asset Class |
|
|
14 | (2) |
|
Data Centers and Clouds as an Asset Class |
|
|
16 | (3) |
|
Why Do They Care? Stakeholders From a Different Angle |
|
|
19 | (6) |
|
Who Has Access to Data in the IoT? |
|
|
19 | (1) |
|
The "What for?" Question of Data in the IoT |
|
|
20 | (2) |
|
The "Where" Things Happen to Data in the IoT Question |
|
|
22 | (1) |
|
Network Determinism in the IoT |
|
|
22 | (1) |
|
The "How" Question of IoT Data Management |
|
|
23 | (2) |
|
A Risk-Based Approach to the Security "How" Question of the IoT |
|
|
25 | (1) |
|
Final Word on Who/What/Where/How |
|
|
25 | (1) |
|
|
25 | (2) |
Chapter 2 The Anatomy of the Internet of Things |
|
27 | (30) |
|
When Does the IoT Actually Get Here? |
|
|
27 | (1) |
|
IPv4 Does Not Do IoT Any Favors |
|
|
27 | (1) |
|
|
28 | (2) |
|
|
28 | (1) |
|
What Does IPv6 Mean for IoT in General? |
|
|
28 | (2) |
|
The Architectural Framework of the IoT: Endpoints, Gateways, Networks, and DCs/Clouds |
|
|
30 | (1) |
|
Getting Below the Vision Layer |
|
|
30 | (1) |
|
Understanding the IoT at the System Layer |
|
|
30 | (1) |
|
Endpoint Asset Class in the IoT |
|
|
31 | (3) |
|
|
32 | (1) |
|
Sensing Versus Processing |
|
|
33 | (1) |
|
Gateway Asset Class in the IoT |
|
|
34 | (1) |
|
Not Just a Part of the Network |
|
|
34 | (1) |
|
Gateways as Information Processors |
|
|
34 | (1) |
|
Gateways as Localized Intrusion Prevention Agents |
|
|
35 | (1) |
|
Network Asset Class in the IoT |
|
|
35 | (11) |
|
|
37 | (1) |
|
The Many Layers of Different Networks |
|
|
38 | (1) |
|
Lots of Media, But Not Necessarily a Lot of Options |
|
|
38 | (1) |
|
IP and Reduced-Calorie IP |
|
|
39 | (1) |
|
Low-Cal Is Not Necessarily Better |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
The Network Is the Dial Tone |
|
|
41 | (1) |
|
The Network You Know Versus the Network You Don't |
|
|
41 | (1) |
|
|
42 | (1) |
|
Network Costs Are a Business Risk, Too |
|
|
43 | (1) |
|
The Network Tides Are Changing |
|
|
43 | (2) |
|
The Network Is Going White Box and Open Source |
|
|
45 | (1) |
|
Cloud and Data Center as an Asset Class |
|
|
46 | (8) |
|
|
46 | (1) |
|
Define Cloud in this Day and Age: Call It a Dare |
|
|
47 | (1) |
|
Private and Dedicated: Before the Cloud |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (2) |
|
Architectural and Business Models of the Cloud |
|
|
51 | (1) |
|
Technically Distributed Clouds |
|
|
51 | (1) |
|
Commercially Distributed DCs and Cloud Brokers |
|
|
52 | (1) |
|
Aggregating Brokers and the IoT |
|
|
53 | (1) |
|
|
53 | (1) |
|
One More Important Thing About Clouds and DCs in the IoT |
|
|
54 | (1) |
|
|
54 | (3) |
Chapter 3 Requirements and Risk Management |
|
57 | (24) |
|
A Parable for Requirements and Risk Management |
|
|
57 | (2) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
What Are Security Requirements? |
|
|
60 | (2) |
|
Translation, Please! Organizational and Business Process Requirements in Plain(er) Language |
|
|
62 | (1) |
|
Business/Organization Requirements |
|
|
62 | (1) |
|
Business Process/Operational Requirements |
|
|
62 | (1) |
|
|
63 | (1) |
|
Really-Who Wants to Know All This Requirements Stuff?! |
|
|
63 | (2) |
|
Risk, Requirements, and Deliverables |
|
|
65 | (1) |
|
Technical Requirements: This Is Where We Draw the Line |
|
|
66 | (1) |
|
Applications and Services Composing the IoT |
|
|
67 | (1) |
|
Operational Efficiency (as Ying) |
|
|
67 | (1) |
|
User Satisfaction (as Yang) |
|
|
68 | (1) |
|
Industry Use Cases, Efficiencies, and Satisfaction |
|
|
68 | (10) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Public Safety and Military |
|
|
71 | (1) |
|
|
71 | (1) |
|
Food and Fanning Infrastructure |
|
|
72 | (1) |
|
Manufacturing and Heavy Industry |
|
|
73 | (1) |
|
|
74 | (1) |
|
Energy: Utilities and the Smart Grid |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
Information and Communications Technology |
|
|
77 | (1) |
|
|
78 | (3) |
Chapter 4 Business and Organizational Requirements |
|
81 | (24) |
|
Parable for Business and Organizational Requirements |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Business and Organizational Requirements in the IoT |
|
|
83 | (1) |
|
Organizational Requirements Restated |
|
|
84 | (1) |
|
Regulatory and Legal Requirements |
|
|
84 | (3) |
|
Pay Now, Pay Later: Compliance Is Not an Option |
|
|
85 | (1) |
|
Hybrid Regulation: Laws and Industrial Standards in the Regulatory Environment of the IoT |
|
|
85 | (1) |
|
IoT Regulatory Examples and Hybridism |
|
|
85 | (2) |
|
Proving Compliance: The $64,000 Question |
|
|
87 | (1) |
|
|
87 | (2) |
|
Do You Know What You Don't Know? |
|
|
88 | (1) |
|
|
89 | (2) |
|
Differentiation in the Face of Commoditization |
|
|
89 | (1) |
|
Moving From Vertical Markets to Ecosystems |
|
|
90 | (1) |
|
Internal Policy Requirements |
|
|
91 | (2) |
|
Auditing and Standards in the IoT |
|
|
93 | (10) |
|
|
94 | (1) |
|
Defining Audit Scope in the IoT |
|
|
94 | (1) |
|
Short-Term Pain, Long-Term Gain: Third-Party Audit Versus Self-Assessment |
|
|
95 | (1) |
|
Witches Brew: Standards and the Art of the Audit Scopes |
|
|
96 | (1) |
|
Standards Bodies Impacts on the IoT |
|
|
97 | (1) |
|
Standards Bodies Born of Government |
|
|
97 | (1) |
|
Standards Bodies Born of Industry Groups and Associations |
|
|
98 | (1) |
|
|
99 | (2) |
|
What to Expect From Security Standards in the IoT |
|
|
101 | (1) |
|
Terminology From IoT Security Standards |
|
|
101 | (1) |
|
Reference Models, Reference Architectures, and the IoT |
|
|
102 | (1) |
|
|
102 | (1) |
|
Put It All Together: Standards Aid Risk Management in the IoT |
|
|
103 | (1) |
|
|
103 | (2) |
Chapter 5 Operational and Process Requirements |
|
105 | (8) |
|
Parable for Operational and Process Requirements |
|
|
105 | (2) |
|
|
107 | (1) |
|
|
107 | (2) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Device [ Custodians]-Longevity Specialists |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
Operational and Process Requirements in the IoT |
|
|
109 | (1) |
|
Organizational Risks and Requirements |
|
|
110 | (1) |
|
The Remaining Chapters in This Book |
|
|
110 | (3) |
Chapter 6 Safety Requirements in the Internet of Things |
|
113 | (12) |
|
Safety Is Not Exactly the Same as Security |
|
|
114 | (1) |
|
|
114 | (1) |
|
Reliability and Consistency |
|
|
115 | (1) |
|
Nontoxic and Biocompatible |
|
|
116 | (1) |
|
|
116 | (1) |
|
Safety and Change Management in the IoT |
|
|
117 | (1) |
|
Divisibility of Safety and Service Delivery Updates and Longevity |
|
|
118 | (1) |
|
Startup and Shutdown Efficiency (Minimization of Complexity) |
|
|
118 | (1) |
|
|
119 | (1) |
|
Isolation of Safety and Control From Service Delivery |
|
|
120 | (1) |
|
Safety Monitoring Versus Management and Service Delivery |
|
|
121 | (1) |
|
Recovery and Provisioning at the Edge |
|
|
121 | (1) |
|
Misuse and Unintended Applications |
|
|
122 | (1) |
|
|
123 | (2) |
Chapter 7 Confidentiality and Integrity and Privacy Requirements in the IoT |
|
125 | (16) |
|
Data Confidentiality and Integrity |
|
|
125 | (11) |
|
|
126 | (1) |
|
Aging Out: Confidentiality That Lasts the Test of Time |
|
|
126 | (1) |
|
Untampered Data-Prove the Integrity of the Data and Authenticity |
|
|
127 | (1) |
|
Prove Deletion and Decommissioning |
|
|
127 | (1) |
|
|
128 | (1) |
|
Attestation of Capability and Functionality |
|
|
128 | (1) |
|
|
129 | (1) |
|
Erasure Code and Data Gravity |
|
|
130 | (1) |
|
|
130 | (1) |
|
Integrated Reporting: Endpoint, Gateway, Network, Clouds, and DCs |
|
|
131 | (1) |
|
Knowing Versus Learning in Provisioning |
|
|
131 | (1) |
|
Horizontal Logging: Across the Life Cycle |
|
|
132 | (2) |
|
Device Feedback: "Is the Damn Thing On or Off?" |
|
|
134 | (2) |
|
Privacy and Personal Data Regulations |
|
|
136 | (2) |
|
Regulatory and Statutory Privacy |
|
|
136 | (1) |
|
|
136 | (1) |
|
Illustration: Privacy and Smart Home Automation |
|
|
137 | (1) |
|
|
138 | (3) |
Chapter 8 Availability and Reliability Requirements in the IoT |
|
141 | (16) |
|
Availability and Reliability |
|
|
141 | (1) |
|
Simplicity Versus Complexity |
|
|
142 | (1) |
|
Network Performance and SLAB |
|
|
142 | (1) |
|
Access to IoT Design and Documentation |
|
|
143 | (1) |
|
Application and System Design |
|
|
143 | (1) |
|
User Interface Design Documentation |
|
|
144 | (1) |
|
Reporting and System Documentation |
|
|
144 | (1) |
|
Self-Healing and Self-Organizing |
|
|
144 | (1) |
|
Remote Diagnostics and Management |
|
|
145 | (2) |
|
Resource Consumption and Energy Management |
|
|
147 | (1) |
|
Energy Consumption Adjustment and Management |
|
|
148 | (1) |
|
|
148 | (1) |
|
Flow Classification and QoS |
|
|
149 | (2) |
|
Flow Control and QoS Is the Network |
|
|
150 | (1) |
|
Flow Control and QoS in the Endpoint or Gateway |
|
|
150 | (1) |
|
Interchangeability and Vendor-Neutral Standards |
|
|
151 | (1) |
|
Lifetimes, Upgrading, Patching, and Disposal |
|
|
152 | (1) |
|
Heartbeats, Census, and Inventory |
|
|
153 | (1) |
|
Documentation and Training |
|
|
153 | (1) |
|
The Discovery-Exploit Window and Cyber-Intelligence |
|
|
154 | (1) |
|
|
155 | (2) |
Chapter 9 Identity and Access Control Requirements in the IoT |
|
157 | (20) |
|
Interoperability of I&A Controls |
|
|
158 | (1) |
|
Multiparty Authentication and Cryptography in the IoT |
|
|
158 | (5) |
|
Weak or Expensive: The Old Cryptosystem and Techniques Don't Scale to the IoT |
|
|
159 | (1) |
|
Multiparty Authentication and Data Protection |
|
|
160 | (3) |
|
Mass Authentication and Authorization |
|
|
163 | (1) |
|
Autonomics (Self-Configuring, Intelligent Adaptions) |
|
|
164 | (1) |
|
|
164 | (2) |
|
Discovery and Search in the IoT |
|
|
166 | (1) |
|
Authentication and Credentials Requirements |
|
|
166 | (2) |
|
Anonymity and Authentication of IoT Devices |
|
|
167 | (1) |
|
Tamper-Proof, Hardware-Based Authentication |
|
|
168 | (1) |
|
Authorization Requirements in the IoT |
|
|
168 | (1) |
|
Attribute-Based Access Control (ABAC) |
|
|
169 | (2) |
|
|
170 | (1) |
|
Writing Versus Reading in the IoT |
|
|
171 | (1) |
|
Concurrency Privileges Become Uncommon in the IoT World |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Interoperability and New Forms of Identity Lookup |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
Chapter 10 Usage Context and Environmental Requirements in the IoT |
|
177 | (20) |
|
|
178 | (1) |
|
|
178 | (4) |
|
Sources of Threat Intelligence |
|
|
179 | (1) |
|
Consuming Threat Intelligence |
|
|
180 | (1) |
|
Where to Apply Threat Intelligence in the IoT |
|
|
180 | (1) |
|
How Might You Use Threat Intelligence? |
|
|
180 | (2) |
|
Access to and Awareness of Date and Time |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
Presence of People (Living Beings) as Context |
|
|
183 | (1) |
|
|
184 | (1) |
|
Context Versus State of IoT Application |
|
|
184 | (1) |
|
Location, Location, Location |
|
|
185 | (4) |
|
Context as a Combination of Location Inputs |
|
|
186 | (1) |
|
Geolocation and Electronic Tracking Policy Requirements |
|
|
187 | (2) |
|
Mapping IoT Service Requirements to Location and Tracking Technologies |
|
|
189 | (1) |
|
|
189 | (3) |
|
Received Signal Strength (RSS) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
Time Difference of Arrival (TDOA) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Automated Accessibility and Usage Conditions |
|
|
193 | (2) |
|
|
195 | (2) |
Chapter 11 Interoperability, Flexibility, and Industrial Design Requirements in the IoT |
|
197 | (24) |
|
Interoperability of Components |
|
|
197 | (1) |
|
|
198 | (1) |
|
Self-Defining Components and Architecture |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (2) |
|
Next Generation Wireless Network Requirements Standardized Interfaces |
|
|
203 | (1) |
|
Limit or Minimize Black-Box Components |
|
|
204 | (1) |
|
|
205 | (1) |
|
Understanding When Good Is Good Enough |
|
|
206 | (1) |
|
Network Flow Reversal and Data Volumes |
|
|
207 | (2) |
|
IP Address Translation: IPv4 and IPv6 |
|
|
208 | (1) |
|
What Are the New Network Requirements? What Is Changing? |
|
|
209 | (1) |
|
The IoT Network Security Perimeter: Hard on the Outside |
|
|
210 | (1) |
|
Control the "Net Within the 'Net'": Network Segmentation |
|
|
211 | (1) |
|
|
212 | (1) |
|
Virtualization: Both Network and Application |
|
|
213 | (3) |
|
Network Function Virtualization and the White Box |
|
|
213 | (1) |
|
|
213 | (2) |
|
Software-Defined Networking and Network Function Virtualization |
|
|
215 | (1) |
|
How Do NFV and SDN Contribute to the Assurance of the IoT? |
|
|
215 | (1) |
|
The Other Side of the NFV-and-SDN Coin |
|
|
216 | (1) |
|
Transportability of Subscriptions and Service: Supporting Competitive Service Provision |
|
|
216 | (2) |
|
Diversity and Utility of Application Interfaces |
|
|
218 | (1) |
|
|
219 | (2) |
Chapter 12 Threats and Impacts to the IoT |
|
221 | (58) |
|
|
221 | (3) |
|
Understanding Threat in the IoT |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (4) |
|
New Threat Agents in the IoT |
|
|
228 | (4) |
|
Chaotic Actors and Vigilantes |
|
|
229 | (1) |
|
|
230 | (2) |
|
Business (Organizational) Threats |
|
|
232 | (16) |
|
Regulatory and Legal Threats |
|
|
232 | (5) |
|
|
237 | (5) |
|
|
242 | (4) |
|
|
246 | (2) |
|
Operational and Process Threats in the IoT |
|
|
248 | (29) |
|
|
249 | (4) |
|
Confidentiality and Integrity Threats |
|
|
253 | (6) |
|
Availability and Resiliency Threats |
|
|
259 | (3) |
|
Identity and Access Threats |
|
|
262 | (6) |
|
Usage Environment and Context Threats |
|
|
268 | (3) |
|
Interoperability and Flexibility Threats |
|
|
271 | (6) |
|
|
277 | (2) |
Chapter 13 RIoT Control |
|
279 | (90) |
|
Managing Business and Organizational Risk in the IoT |
|
|
280 | (15) |
|
|
280 | (4) |
|
Regulatory Vulnerabilities and Risks |
|
|
284 | (8) |
|
Health and Safety Regulation Risk |
|
|
292 | (1) |
|
Reidentification Vulnerabilities and Risk Management |
|
|
292 | (1) |
|
|
293 | (1) |
|
Labeling and Fair Warning in the IoT |
|
|
294 | (1) |
|
Financial Vulnerabilities and Risks |
|
|
295 | (4) |
|
|
295 | (4) |
|
Liability and Insurance Risks |
|
|
299 | (1) |
|
Competitive and Market Risks |
|
|
299 | (6) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
Privacy Arbitrage: Varying Costs to Maintain Privacy Compliance |
|
|
301 | (1) |
|
|
301 | (3) |
|
Increased User Support Costs |
|
|
304 | (1) |
|
|
305 | (2) |
|
Operational and Process Risk in the IoT |
|
|
307 | (6) |
|
|
307 | (2) |
|
|
309 | (1) |
|
Network Segmentation and Safety |
|
|
310 | (3) |
|
Confidentiality and Integrity |
|
|
313 | (19) |
|
To Encrypt or Not Encrypt? |
|
|
314 | (1) |
|
Delegation of Functions: Detection Versus Prevention |
|
|
314 | (1) |
|
Multiparty Authentication and Cryptography in the IoT |
|
|
314 | (1) |
|
Weak or Expensive: The Old Cryptosystem and Techniques Don't Scale to the IoT |
|
|
315 | (2) |
|
Multiparty Authentication and Data Protection |
|
|
317 | (1) |
|
Multiparty Horizontal Authentication and Data Protection |
|
|
318 | (1) |
|
Multiparty Cascading Authentication and Data Protection |
|
|
318 | (1) |
|
Hardware-Based Versus Software-Based Processing |
|
|
318 | (3) |
|
|
321 | (1) |
|
|
322 | (2) |
|
Network Function Virtualization and Root of Trust |
|
|
324 | (6) |
|
Counterfeit Goods Prevention in the IoT |
|
|
330 | (1) |
|
|
331 | (1) |
|
Availability and Reliability |
|
|
332 | (4) |
|
Public Cloud Services for IoT |
|
|
333 | (1) |
|
Voice Communications Vulnerabilities and Risk in the IoT |
|
|
334 | (1) |
|
Smart Gateways for the IoT |
|
|
335 | (1) |
|
Identity and Access Controls |
|
|
336 | (7) |
|
Reidentification and Reidentification Risk |
|
|
337 | (2) |
|
Attribute-Based Access Control and Encryption |
|
|
339 | (2) |
|
Granular Identification and Authentication and Scaling Risks |
|
|
341 | (1) |
|
|
342 | (1) |
|
Usage Context and Operating Environment |
|
|
343 | (5) |
|
Location, Location, Location |
|
|
343 | (1) |
|
Reputation, Reputation, Reputation (Threat Intelligence) |
|
|
344 | (4) |
|
Interoperability and Flexibility |
|
|
348 | (14) |
|
5G, Complexity, and Conventional IT |
|
|
348 | (3) |
|
Brittle and Unpatchable Systems |
|
|
351 | (1) |
|
|
352 | (1) |
|
Unmanaged Interdependency Risks |
|
|
353 | (6) |
|
|
359 | (1) |
|
Aging Out: Security That Lasts the Test of Time |
|
|
360 | (1) |
|
Software-Defined Networking and Network Function Virtualization |
|
|
360 | (2) |
|
Skills and IoT Risk Management |
|
|
362 | (6) |
|
Communications Infrastructure Engineering Scope of Practice |
|
|
363 | (5) |
|
|
368 | (1) |
Index |
|
369 | |