Home Page Icon
Home Page
Table of Contents for
Part I. Introduction to the Internet of Things (IoT) and IoT Security
Close
Part I. Introduction to the Internet of Things (IoT) and IoT Security
by Marcelo Yannuzzi, Rik Irons-Mclean, Anthony Sabella
Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT
Cover
About this eBook
Title Page
Copyright Page
About the Author(s)
About the Technical Reviewers
Dedications
Acknowledgments
Contents at a Glance
Contents
Reader Services
Icons Used in This Book
Command Syntax Conventions
Foreword: The Challenge and Opportunity of IoT Security
Introduction
Part I. Introduction to the Internet of Things (IoT) and IoT Security
Chapter 1. Evolution of the Internet of Things (IoT)
Defining the Internet of Things
Making Technology and Architectural Decisions
Is the Internet of Things Really So Vulnerable?
Summary
References
Chapter 2. Planning for IoT Security
The Attack Continuum
The IoT System and Security Development Lifecycle
The End-to-End Considerations
Segmentation, Risk, and How to Use Both in Planning the Consumer/Provider Communications Matrix
Summary
References
Chapter 3. IoT Security Fundamentals
The Building Blocks of IoT
The IoT Hierarchy
Primary Attack Targets
Layered Security Tiers
Summary
References
Chapter 4. IoT and Security Standards and Best Practices
Today’s Standard Is No Standard
Defining Standards
The Challenge with Standardization
IoT “Standards” and “Guidance” Landscape
Standards for NFV, SDN, and Data Modeling for Services
Communication Protocols for IoT
Specific Security Standards and Guidelines
Summary
References
Chapter 5. Current IoT Architecture Design and Challenges
What, Why, and Where? A Summary
Approaches to IoT Architecture Design
General Approaches
Industrial/Market Focused
NFV- and SDN-Based Architectures for IoT
Approaches to IoT Security Architecture
The IoT Platform Design of Today
Summary
References
Part II. Leveraging Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for IoT
Chapter 6. Evolution and Benefits of SDX and NFV Technologies and Their Impact on IoT
A Bit of History on SDX and NFV and Their Interplay
Software-Defined Networking
Network Functions Virtualization
The Impact of SDX and NFV in IoT and Fog Computing
Summary
References
Chapter 7. Securing SDN and NFV Environments
Security Considerations for the SDN Landscape
Security Considerations for the NFV Landscape
Summary
References
Chapter 8. The Advanced IoT Platform and MANO
Next-Generation IoT Platforms: What the Research Says
Next-Generation IoT Platform Overview
Example Use Case Walkthrough
Summary
References
Part III. Security Services: For the Platform, by the Platform
Chapter 9. Identity, Authentication, Authorization, and Accounting
Introduction to Identity and Access Management for the IoT
Access Control
Authentication Methods
Dynamic Authorization Privileges
Manufacturer Usage Description
AWS Policy-based Authorization with IAM
Accounting
Scaling IoT Identity and Access Management with Federation Approaches
Evolving Concepts: Need for Identity Relationship Management
Summary
References
Chapter 10. Threat Defense
Centralized and Distributed Deployment Options for Security Services
Fundamental Network Firewall Technologies
Industrial Protocols and the Need for Deeper Packet Inspection
Alternative Solution: Deep Packet Inspection
Application Visibility and Control
Intrusion Detection System and Intrusion Prevention System
Advanced Persistent Threats and Behavioral Analysis
Malware Protection and Global Threat Intelligence
DNS-Based Security
Centralized Security Services Deployment Example Using NSO, ESC, and OpenStack
Distributed Security Services Deployment Example Using Cisco Network Function Virtualization Infrastructure Software (NFVIS)
Summary
References
Chapter 11. Data Protection in IoT
Data Lifecycle in IoT
Data at Rest
Data in Use
Data on the Move
Protecting Data in IoT
Summary
References
Chapter 12. Remote Access and Virtual Private Networks (VPN)
Virtual Private Network Primer
Site-to-Site IPsec VPN
Software-Defined Networking-Based IPsec Flow Protection IETF Draft
Applying SDN-Based IPsec to IoT
Software-Based Extranet Using Orchestration and NFV
Remote Access VPN
Summary
References
Chapter 13. Securing the Platform Itself
(A) Visualization Dashboards and Multitenancy
(B) Back-End Platform
(C) Communications and Networking
(D) Fog Nodes
(E) End Devices or “Things”
Summary
References
Part IV. Use Cases and Emerging Standards and Technologies
Chapter 14. Smart Cities
Use Cases Introduction
The Evolving Technology Landscape for IoT
The Next-Generation IoT Platform for Delivering Use Cases Across Verticals: A Summary
Smart Cities
Smart Cities Overview
The IoT and Secure Orchestration Opportunity in Cities
Security in Smart Cities
Smart Cities Example Use Cases
Summary
References
Chapter 15. Industrial Environments: Oil and Gas
Industry Overview
The IoT and Secure Automation Opportunity in Oil and Gas
The Upstream Environment
The Midstream Environment
The Downstream and Processing Environments
Security in Oil and Gas
Oil and Gas Security and Automation Use Cases: Equipment Health Monitoring and Engineering Access
Evolving Architectures to Meet New Use Case Requirements
Summary
References
Chapter 16. The Connected Car
Connected Car Overview
The IoT and Secure Automation Opportunity for Connected Cars
Security for Connected Cars
Connected Car Security and Automation Use Case
Summary
References
Chapter 17. Evolving Concepts That Will Shape the Security Service Future
A Smarter, Coordinated Approach to IoT Security
Blockchain Overview
Blockchain for IoT Security
Machine Learning and Artificial Intelligence Overview
Machine Learning
Deep Learning
Natural Language Processing and Understanding
Neural Networks
Computer Vision
Affective Computing
Cognitive Computing
Contextual Awareness
Machine Learning and Artificial Intelligence for IoT Security
Summary
References
Index
Code Snippets
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Introduction
Next
Next Chapter
Chapter 1. Evolution of the Internet of Things (IoT)
Part I. Introduction to the Internet of Things (IoT) and IoT Security
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset