Index

Symbols

5G, 800

6LoWPAN (IPv6 Low Power Wireless Personal Area Network), 74

802.1X authentication, 363-365

802.1X Flexible Authentication, 366-367

802.11p, 800

A

AAA (authentication, authorization, accounting), 279, 337, 361-362

accounting, 397-398

framework guidelines, 399

requirements, 400-401

centralizing, 268

ODL, 206

standard configuration example, 342-343

tenant/user, 279-280

acceptance, 16

access-accept messages, 362

access-challenge messages, 362

access control

ACLs, 374-376

AWS, 394-397

back-end platform, 637-646

building blocks, 326

complex devices, 345

constrained devices, 345

classes, 345-346

identifying, 348-351

restrictions, 345

data protection, 504

device identification, 336-337

Device Sensor, 340, 343-345

AAA configuration example, 342-343

differentiated authorization privileges, 345

internal/external clients, 341

port security, 341

probe configuration, 344

success, 344

energy limitations, 346-347

equipment health monitoring example, 778-781

IDs, 637-639

Internet draft, 390

ISE profiling, 337-340

Keystone, 640

LDAP, 639

MUD, 390

module, 392

policy types, 390-391

process flow, 393-394

URLs, emitting, 390

multitenancy data sharing, 641, 644

new endpoints, connecting, 639

on demand, 714-718

IPS/IDS, 717-718

self-service portal, 715-717

physical access, 505

power for communication, 347-348

RabbitMQ, 546

role-based. See RBAC

service deployment, 639-641

SGACLs, 384-388

automation, 388

benefits, 384

consumer/provider matrix, 384-386

east–west, 387

microsegmentation, 387

north–south, 387

SGTs, 376-378

smart city sensors, 708-709

TrustSec, 376-379

classification, 380

enforcement, 384

inline tagging, 383

propagation, 381-383

Access control lists. See ACLs

access-reject messages, 362

access-request messages, 362

accidental incidents, 755

accounting, 397-398

data protection, 505

framework guideline, 399

requirements, 400-401

accreditation, 16

acknowledgeable relationship, 414

ACLs (access control lists), 262

SDN data plane, securing, 262

SGACLs, 384-388

automation, 388

benefits, 384

consumer/provider matrix, 384-386

east–west, 387

microsegmentation, 387

north–south, 387

web-type, 606

acquisition and development phase (SDLC), 14-16

actionable IRM, 413

actions, monitoring, 477

activation sequence example, 472, 474

activation status (VNFs), 474

active networking, 185

Adaptive Network Control (ANC), 446-447

Adaptive Security Appliance virtualized (ASAv), 422-423, 470

ADAS (advanced driver assistance systems), 805

AD-SAL (API-driven service abstraction layers), 209-210

Advanced Malware Protection. See AMP

Advanced Message Queuing Protocol (AMQP), 74, 544

Advanced Persistent Threats (APTs), 440-441

AE (application entity), 131

affective computing, 898

aggregators, 101

aggressive mode (IKEv1 phase 1), 582

AGI (Artificial General Intelligence), 891

agility

NFV, 221

OpenFog reference architecture pillar, 135

SDN, 192

AHs (authentication headers), 578

AI (Artificial Intelligence), 98, 878-879

affective computing, 898

cognitive computing, 898-899

components, 891

contextual awareness, 899

cybersecurity systems, 878

DL alignment, 894

hybrid subsymbolic/symbolic, 892

ML collaboration, 899

natural language processing (NLP), 895-896

people-/user-centric approaches, 98

subsymbolic, 891-892

symbolic, 891-892

AIC (availability, integrity, confidentiality), 43

AIOTI (Alliance for the Internet of Things Innovation), 59, 138-140

algorithms

elliptic curve cryptographic algorithms, 353

encryption, 580

hashing, 580

security events, 445

state convergence, 475

Alliance for Telecommunications Industry Solutions (ATIS), 65

alliances, standardization efforts, 56

allocating IT staff, 6

always on strategy, 347

AM (authentication manager), 102

Amazon Web Services. See AWS

AMP (Advanced Malware Protection), 456, 616

AnyConnect client, 616

file policies, 461

FTD, 459-461

point-in-time detection, 456-457

retrospection, 457-458

sandboxing, 458

Umbrella service integration, 465

AMQP (Advanced Message Queuing Protocol), 74, 544

analysis

data, 526

functional requirements, 15

nonfunctional security requirements, 15

protocols, 439

security assurance requirements, 16

analytics, 5

ANC (Adaptive Network Control), 446-447

ANNs (artificial neural networks), 896-897

anomaly detection. See behavioral analysis

anomaly traffic detection, 780-781

ANPR (automatic number plate recognition), 820

anti-tamper and detection, 169

any endpoint, anywhere concept, 25

AnyConnect client, 611-612

configuration, 612

deployment, 611

manufacturing example, 617

authorization, 621

identity, authentication, posture, 618

remediation, 619-620

working components, 618-621

modules, 612-616

AMP, 616

endpoint compliance, 614

Network Access Manager, 614

NVM, 615-616

roaming protection, 614-615

VPN, 612-613

API (application programming interface), 19

back-end platform security, 634-635

deployment preparations, 316

northbound

fog nodes, 662

ODL, 206

northbound (NB APIs), 43

OVS, 197

REST, 634-635

SDN, 191

southbound

fog nodes, 667

ODL, 204

API-driven service abstraction layers (AD-SAL), 209-210

app entities, 139

Apple Face ID/TouchID, 359

application entity (AE), 131

application layers, 46

AIOTI architecture, 138-139

communication, 74

ITU-T Y.2060 reference model, 125

SDN, 191

application programming interfaces. See API

application-specific integrated circuit (ASIC), 374

application visibility and control. See AVC

applications

access, clientless SSL VPNs, 604-609

authenticity, 271

blockchain distributed ledger, 884

certification, 271

cloud-native functions, 242

cloud-ready functions, 242

detectors, 433

fog-ready functions, 242

future connected car, 815

hierarchy, 36

IoT-A RA, 123

isolating, 271

lifecycles, 704-705

penetration testing, 271

SDN, securing, 252-253, 270-271

secure development, 271

vertical, 679

APTs (Advanced Persistent Threats), 440-441

architectural reference model (ARM), 121, 177

architectures, 32-33

AIOTI, 138-140

ANNs, 897

blockchain, 886

bringing IT and OT technologies together, 157

cloud-centric, 32

cloud computing, 106-112

accessibility, 109

advantages, 109

availability, 109, 112

characteristics, 107

compliance, 110

costs, 109

deployment, 107-108

disadvantages, 110

environmental benefits, 109

extensibility, 109

interoperability, 110

IoT adoption, accelerating, 111

maintenance, 109

privacy, 110

QoS, 112

real-time processing, 112

reliability, 109

scalability, 109

security, 110

Cloud Customer Architecture for IoT, 140-142

data-centric, 104-105

digital roadway, 806

documentation, 27

edge computing, 112-113

enterprise-centric, 32

equipment health monitoring example, 772

Federal Sigma VAMA, 864

fog computing, 112

advantages, 116-118

communications, 114

complexity, 118

costs, 117-118

cross-vertical replicability, 117

data handling, 115

disadvantages, 117

edge computing, compared, 113

governance, 117

heterogeneity, 117

mobility, 116

proximity, 116-117

reliability, 117

requirements, 115

security, 117

speed, 116

full IoT stack, 120

AIOTI, 138-140

Cloud Customer Architecture, 140-142

IEEE P2413, 132-133

IoT-A RA, 120-125

IoTivity framework, 142-144

IoTWF, 126-129

ITU-T Y.2060, 125-126

oneM2M, 129-132

OpenFog Consortium, 133-138

gateway-centric, 32

hub-centric, 32

ICN, 100-104

IEEE P2413, 132-133

IoT-A RA, 120-125

IoTWF reference model, 126-129

ISE integrated, 337

ITU-T Y.2060 reference model, 125-126

Lambda, 119-120

layers, 85-86

middleware, 118

mobile-centric, 32

next-generation IoT platforms, 294-295

NFV ETSI, 229

NVF-based, 154-156

ODL reference, 204-207

OF, 193

oil and gas industry security, 756-757

oneM2M, 129-132

open process automation based on Purdue Model of Control, 159

OpenFog Consortium, 133-138

perspectives, 136

pillars, 133-135

security layers, 137

stakeholder views, 137

OVS, 196

people-centric approach, 98-100

references, 87

SDN, 64-65, 154-156, 189-192

segmented based on Purdue Model of Control, 157

server-side, 99

standards, 59-61

system viewpoint, 89, 106

cloud computing, 106-112

edge computing, 112

fog computing, 112-118

thing-centric, 32

universal, 89, 120

CPwE, 153

GridBlocks, 153-154

IIRA, 144-146

Industry 4.0, 148-149

NFV-based, 154-156

OPC-UA, 150-152

SDN-based, 154-156

user-centric approach, 98-100

X-centric approach, 89-97

cloud-centric, 95-96

enterprise-centric, 96-97

Garner defined-centric views, 97

gateway-centric, 94-95

hub-centric, 94

mobile-centric, 93-94

thing-centric, 92-93

ARMs (architectural reference models), 121, 177

ARP attacks, 41

Artificial General Intelligence (AGI), 891

Artificial Intelligence. See AI

artificial neural networks (ANNs), 896-897

Artik, 176

ASAv (Adaptive Security Appliance virtualized), 422-423, 470

ASDM (ASA Security Device Manager), 612

ASI (Artificial Super Intelligence), 891

ASIC (application-specific integrated circuit), 374

assessments, risk, 15, 58

assets

classification, 27

identification, 27

improvements, 742

assurance

IISF, 162

information (IA), 37

sequences, 474-475, 479-481

services, 784-786

ASTM E2158-01, 827

ASTM PS 105-99, 827

ATIS (Alliance for Telecommunications Industry Solutions), 65

attacks

AMP, 456

file policies, 461

FTD, 459-461

point-in-time detection, 456-457

retrospection, 457-458

sandboxing, 458

ARP, 41

authentication, 41

continuum, 11-12

CSRF, 265

data breach costs, 418

Ethernet, 41

identifying risks, 25-28

classification, 27

identification, 25-26

risk scores, 28

jamming, 41

MAC flooding, 41

MITM, 40

oil and gas industry, 755

protocols, 42

TALOS, 456

targets, 39

communication, 41-42

gateways, 40-41

SDN, 42-43

things, 39-40

threat identification, 27

vectors, 38

wireless, 41

attestation, devices, 315

Attribute Value pairs (A/V pairs), 362

audible warning systems, 820

audio systems, police cars, 820

authentication, 38

AAA, 361-362

attacks, 41

A/V pairs, 362

AWS, 395-397

biometrics, 359-360

certificates, 352

Cisco IoT security framework, 170

constrained device limitations, 358

data protection, 504

digital certificates, 352

IEEE 1609.2, 353

PKI, 353-355

revocation, 356-357

SSL pinning, 357

X.509, 352-353

equipment health monitoring example access privileges, 778-780

flexible, 403

HMAC, 264

HTTP, 264

IEEE 802.1X, 363-365

IEEE 802.1X Flexible, 366-367

IPsec peers, 579

MAB (MAC address bypass), 365

MQTT, 533-535

passwords, 357-358

PKI, 351, 354

public key cryptography, 352

RabbitMQ, 547-548

RADIUS, 361-362

REST, 264-267

servers, 363

southbound SDN controller communication, 258

time service, 281

tokens, 265

trust stores, 355

authentication, authorization, and accounting. See AAA

authentication headers (AHs), 578

authentication manager (AM), 102

authenticators, 363

authenticity, 271

authorization

ACLs, 374-376

AWS, 394-397

Cisco IoT security framework, 170

data protection, 504

differentiated privileges, 345

dynamic forms, 368

dynamic privileges, 367

equipment health monitoring example access privileges, 778-780

ISE, 368

MQTT, 535-539

northbound SDN controller communications, securing, 267

policy-based, 403

RabbitMQ, 548-549

RADIUS CoA, 368

request commands, 370-371

Request/Response codes, 369

requests, 368-369

session identification, 369

VLAN assignments, 371-374

RBAC dynamic segmentation, 378

remote HMI access, 621

session identification, 369

SGACLs, 384-388

automation, 388

benefits, 384

consumer/provider matrix, 384-386

east–west, 387

microsegmentation, 387

north–south, 387

SGTs, 376-378

TrustSec, 376-379

classification, 380

enforcement, 384

inline tagging, 383

propagation, 381-383

automatic number plate recognition (ANPR), 820

automation, 5

connected cars deployment, 815, 867-870

contextual, 304, 307

driving system levels, 803-804

equipment health monitoring example, 777-778

extranets

orchestration and NFV, 596

software-based, 597

template-based orchestration and NFV, 595

gas and oil industry, 752

IPS/IDS, 717-718

next-generation IoT platforms, 299

oil and gas industry security, 742-763

asset improvements, 742

challenges, 743-744

equipment health monitoring example. See equipment health monitoring example

field operations, 789

human efficiency and productivity, 742

trends, 743

reusable templates, 469

secure oil and gas opportunities, 735

security, 876

SGACLs, 388

smart cities, 691-692, 721-725

autonomous vehicles

Ethernet approaches, 825

interoperability, 826, 829

layered approach, 850-851

operational lifecycle, 851

sensor data sharing systems and technologies, 824

standards, 826-829

systems and technologies, 823

autoquarantining versus manual quarantine, 782

autoscaling, KPI, 483

availability, 37, 86

cloud computing, 109, 112

data protection, 505

high, 269

IISF, 162

MQTT, 542-543

NFV, 220

OpenFog reference architecture pillar, 135

RabbitMQ, 550-551

availability, integrity, confidentiality (AIC), 43

AVC (application visibility and control), 423, 433, 437

application subcategories, 434

detection sources, 433

detectors, 434

industrial communication protocol example, 435

MODBUS application filter example, 436-437

A/V pairs (Attribute Value pairs), 362

AV-Test, 455

AWS (Amazon Web Services), 176

Amazon Cognito, 395

device registration process, 331-333

IAM, 395-397

policy-based authorization, 394-395

Ayla IoT Platform, 176

Azure, 176

B

B2B (business-to-business) services, 806

back-end architectural layer, 86

back-end platforms, 631-634

access control, 637-646

API security, 634-635

containerized services management, 649-653

dashboard, 635-637

NFVO, 646-647

NSO, 646

operationalization, 633-634

options, 631

overcloud/undercloud, 634

requirements, 631

REST APIs, 634-635

VFM, 648

VIM, 648-649

backing up data, 570

bandwidth, fog computing, 115

battery management, police vehicles, 821

BBF (Broadband Forum Member), 65

behavioral analysis, 440-441

contextual information with adaptive network control, pairing, 446

encrypted traffic analytics, 450-454

ETA

cryptographic compliance, 454

threat detection, 451-452

WannaCry, 454

NaaS, 444-446

oil and gas pump station example, 447-450

solutions, 441

visibility protocols, 442-444

Flexible NetFlow protocol, 444

NBAR2, 444

NetFlow protocol, 442-443

NSEL (Network Security Event Logging), 444

Big Data, 522-526

Big Data Architectures and the Data Lake (Serra), 523

biometric authentication, 359-360

bitumen, 740

blockchains, 877-880

adoption of IoT, accelerating, 887

architectures, 886

challenges, 886

characteristics, 880

compliance, 887

components, 883

computational resources, 886

consensus algorithm, 883

distributed ledger applications, 884

EdgeChain, 889-890

human skills gap, 886

ledger, 883

private, 884

process flow, 882

public, 884

reactive data protection mechanisms, 572

scalability, 886

startups total funding, 880

storage, 886

transactions, 886

types, 884

Bluemix platform, 177

bookmarks, clientless SSL VPN application access, 604-605

boot integrity, 274-275

bootstrapping, secure, 328

BRSKI, 329-330

immutable identities, 328-329

Bosch IoT Suite, 176

bring your own certificates (BYOC), 333

bring your own device (BYOD), 21

Broadband Forum Member (BBF), 65

brokers, 350

BRSKI (Bootstrapping Remote Secure Key Infrastructure), 329-330

BSI (British Standards Institute), 686-687

BSquare DataV, 176

BSS (business support systems), 223

bug scrubs, 270

building blocks, 35

access control, 326

IISF, 163-164

next-generation IoT platforms, 295-303

fog levels, 302

heterogeneous, 297

infrastructure, 301

management, 297

MANO, 297-301

multitenancy, 296

operation, 297

UIs, 297

virtualization, 297

YANG model, 304-306

buildings, smart cities, 680

business-to-business (B2B), 806

business value, 5

businesses

benefits, 54

business-focused services, 805

needs challenges, 863

processes, 37, 86

support systems (BSS), 223

BYOC (bring your own certificates), 333

BYOD (bring your own device), 21

C

CA (certificate authority), 451

cabinets

fog nodes, 660

monitoring, 705-709

monitoring with event-based video, 709-712

data pipeline security, 713-714

deployment, 710-712

triggers, 710

on demand access control, 714-718

IPS/IDS, 717-718

self-service portal, 715-717

CAN (controller area network), 824

canned policies (ISE), 340

CAP (consistency, availability, and partition) theorem, 568-569

CAPEX reduction, 219

carrier-neutral facility (CNF), 418

Carriots IoT Platform, 177

Casado, Martin, 186

catalogs, security, 656

CCTV (closed circuit television) video security use case, 309

architecture overview, 313

cabinet monitoring, 314

deployment, 316-319

description, 312

preparatory work, 315-316

sequence of events, 319-320

triggers, 312

center architectural layer, 86

center hierarchy, 36

Center for the Protection of National Infrastructure (CPNI), 842

centralized deployment security example, 418-420

activation sequence, 472-474

dynamic mapping, 478

ESC, monitoring, 476-477

ETSI MANO components, 468

fulfillment and assurance sequences, 474-475, 479-480

KPI SESSION_COUNT metric, 482-483

KPI VNF monitoring methods, 479

NSD catalog, 471

NSR, 472

reusable templates, 469

rules, 483-486

VMs, 469, 481

VM_ALIVE script, 480-481

VNFs, monitoring, 475

VNFD catalog, 470

certificate authority (CAs), 451

Certificate Revocation Lists (CRLs), 259, 356

certificates, 352

digital, 352

IEEE 1609.2, 353

PKI, 353-355

revocation, 356-357

SSL pinning, 357

X.509, 352-353

DTLS, 350

managing, 333

SUDI, 328-329

certifications

applications, 271

security, 16

cgroups, 654

chaining services, 494-495

choices provided by standards, 54

CIA (confidentiality, integrity, and availability), 43, 503

CIGRE (International Council on Large Electrical Systems), 66

CIP (Common Industrial Protocol), 428-429, 432

Cisco

Adaptive Security Appliance virtualized (ASAv), 422-423, 470

AnyConnect client. See AnyConnect client

CPwE, 153

ENCS, 489

GridBlocks, 153-154

Identity Services Engine (ISE), 336

IoT Cloud Connect, 176

IoT Ready, 329

IoT security framework, 168-171

Kinetic IoT Platform, 177

Next Generational Firewall virtualized (NGFWv), 422-423

NSO, 646

Overlay Transport (OTV), 259

Secure Development Lifecycle, 644

SIO, 456

UCS E-Series servers, 489

citizen experiences, smart cities, 681

City Management Interface, 696

classes, constrained devices, 345-346

classical models versus machine learning, 893

classification

assets, 27

TrustSec, 380

client application detectors, 434

client-based SSL VPNs, 611-612

clientless comparison, 600

configuration, 612

deployment, 611

manufacturing example, 617

authorization, 621

identity, authentication, posture, 618

remediation, 619-620

working components, 618-621

modules, 612-616

AMP, 616

endpoint compliance, 614

Network Access Manager, 614

NVM, 615-616

roaming protection, 614-615

VPN, 612-613

clientless SSL VPNs, 599-611

application access, 604-609

bookmarks, 604-605

plug-ins, 609

port forwarding, 606

smart tunnels, 607

web-type ACLs, 606

client-based comparison, 600

components, 602

DAP, 609

group policies, 602

oil and gas example, 610-611

portal, 602-603

tunnel groups, 601

clients

802.1X, 363

AnyConnect, 611

configuration, 612

deployment, 611

modules, 612-616

Device Sensor, 341

MQTT, 350

vhost, adding, 642

closed circuit television. See CCTV video security use case

cloud-centric architecture, 32, 95-96

cloud computing, 106-112

accessibility, 109

advantages, 109

availability, 109, 112

characteristics, 107

compliance, 110

costs, 109

deployment, 107-108

disadvantages, 110

environmental benefits, 109

extensibility, 109

fog computing comparison, 241

fog fusion, 242

hybrid, 107

interoperability, 110

IoT adoption, accelerating, 111

maintenance, 109

privacy, 110

private, 107

public, 107

QoS, 112

real-time processing, 112

reliability, 109

scalability, 109

security challenges, 110

Cloud Customer Architecture for IoT, 140-142

cloud-native functions, 242

cloud-ready functions, 242

Cloud Security Alliance. See CSA document

cloud to cloud, 406-408

CNF (carrier-neutral facility), 418

CoA (Certificate of Authenticity)

RADIUS, 368

request commands, 370-371

Request/Response codes, 369

requests, 368-369

session identification, 369

VLAN assignments, 371-374

SGT, 781

CoAP (Constrained Application Protocol), 349-350

cognitive computing, 898-899

Cognito (Amazon), 395

collaborative security, 899

collecting data, 507

command validation, 782-783

Common Industrial Protocol (CIP), 428-429, 432

common service functions (CSFs), 131

common services entity (CSE), 131

communication, 71

application layers, 74

attacks, 41-42

channel vulnerabilities, 839

connected cars, 807-808

data, 790

fog computing, 114

fog nodes, 662-664

IoT-centric model, 72

last-mile, 71

MAC layers, 73

network layers, 73-74

node hierarchy, 36

OSI, 70

physical layers, 73

police vehicles, 821

protocols, 70

SDN controller

east-west, securing, 254-256

northbound, securing, 263-268

southbound, securing, 256-260

security, 658-659

smart cities, 682

technologies, 740

transport layers, 74

complex devices, 345

complexity

connected car security, 835

fog computing, 118

minimizing, 309

compliance

blockchain, 887

cloud computing, 110

cryptographic, 454

security, 5

smart cities, 682

components

AI, 891

blockchain, 883

EFM, 561

ENFV, 486-487

full IoT stacks, 674

ICN architecture, 101

NaaS, 445

NFV framework, 64

OF, 193

oil and gas industry security, 757

smart cities, 679

SSL VPNs, 602

computational resources, 886

computer vision, 898

computing data, 508

concierge services, 805

ConfD, deployment preparations, 316

confidentiality, 37

Cisco IoT security framework, 169

data, 568

data protection, 505

MQTT, 539-540

RabbitMQ, 549

confidentiality, integrity, and availability (CIA), 43, 503

configuring

AAA, 342-343

AnyConnect client, 612

management and control, 17

RabbitMQ, 643

connected cars

automated deployment, 867-870

automated driving system levels, 803-804

autonomous, 823-824

benefits, 811-812

business-focused services, 805

categories, 801

communications, 807-808

customer-focused services, 805

data, 815-817

data enabling solutions, 814

data value, 813

development, 801-802

digital roadway architecture, 806

embedded era, 802

emergency fleet vehicles example, 852-854

architecture overview, 854

automation, 867-870

equipment deployment, 865-866

Federal Sigma VAMA, 863-864

intrusion detection and prevention, 858-860

onboard systems deployment, 864-865

OTA secure updates, 855-857

personalized experiences, 862-863

segmentation and zoning, 857-858

Wi-Fi hotspot security, 861-862

equipment deployment, 865-866

estimated car sales 2015–2021, 798

Ethernet approaches, 825

future applications and services, 815

high-tech entrants, 804

industry trends, 798

infotainment era, 802

interoperability, 826

interoperable infrastructure requirements, 829

intrusion detection and prevention, 858-860

IoT value, 810-812

leadership, 799

low prices of technology, 804

mobility concepts, 805

networks, 824-825

onboard systems deployment, 864-865

operational challenges, 863

operational lifecycle, 851

orchestration platform principles, 848

orchestration requirements, 818

OTA secure updates, 855-857

overview, 800

personalized experiences through identity management, 862-863

police vehicles, 819-821

ANPR, 820

audible and visual warning systems, 820

battery management, 821

integrated approach, 821

mobile data terminals, 820

onboard systems and technologies, 819

onboard telematics, 821

operational challenges, 821

orchestrated services, enabling with consolidated orchestrated hardware, 822

radios, 820

speed detection, 820

speed recognition devices, 820

vehicle tracking, 820

video camera and audio systems, 820

wearables, 821

Wi-Fi hotspots, 821

regulatory and policy constraints, 805

revenue and operational opportunities, 816

security, 830

attack surface, 831

challenges, 835

connectivity challenges, 840

considerations, 839

consolidation, 849

data-centric and application-centric fusion, 849

design implementations, 847

driver concerns, 837

encryption, 837

goals, 847-848

industry alliances, 847

layered approach, 850-851

reasons for, 830

safety-criticality, 836

threats, 831-834

U.K. supply chain guidelines, 842-845

upgrades/patches, 840

U.S. supply chain guidelines, 845-846

vulnerabilities, 836-840

segmentation, 857-858

smart city emergency fleet vehicles integration, 719-721

standards, 826-829

Europe, 827

Japan, 827

SAE International, 827, 829

U.K., 827

U.S., 826

technology transition, 802

trends driving changes, 804

urban customers, 805

V2X era, 802

vehicle maintenance data, 813

vendor ecosystem, 809

Wi-Fi hotspot security, 861-862

zoning, 857-858

connectivity

connected car security, 835

connected cars, 840

IoT, 4

new endpoints, 639

on demand access, 714-718

IPS/IDS, 717-718

self-service portal, 715-717

platforms, 173

connectors, 20, 316

consensus algorithm, 883

consistency, availability, and partition (CAP), 568-569

consistency, next-generation IoT platforms, 291

consolidation

connected car security, 849

smart cities, 698

consortia, standardization efforts, 56

constrainable relationship, 414

Constrained Application Protocol (CoAP), 349-350

constrained devices, 345

classes, 345-346

identifying, 348-351

CoAP, 349-350

MQTT, 350-351

limitations, 358

restrictions, 345

Constrained Object Signing and Encryption (COSE), 409

consumer/provider matrix, 384-386

consumers

ICN, 102

software extensions, 173

spaces, SDN-based IPsec IoT, 592

consumption, data, 526

containerized services, back-end platform management, 649-653

context processing, CN, 102

contextual automation, 304, 307

contextual awareness, 899

contextual relationships, 414

continuous monitoring, 17

control layer, SDN, 190

control planes

data protection, 566-567

SDN, 262

security, 659

controller area networks (CANs), 824

controllers

ODL, 206

power, 702-704

SDN

east-west communications, securing, 254-256

northbound communications, securing, 263-268

securing, 252-253

southbound communications, securing, 256-260

TrustSec, 368-378

controlling

Cisco IoT security framework, 170

configuration, 17

oil and gas industry security, 755

OpenFog Consortium architecture, 136

power, 702

security, 16

converged multifaceted platforms, 246-248

Converged Plantwide Ethernet (CPwE), 153

co-operative awareness basic service standards, 827

core networks hierarchy, 36

Core Root of Trust Management (CRTM), 663

COSE (Constrained Object Signing and Encryption), 409

costs, 16

cloud computing, 109

fog computing, 117-118

CPNI (Center for the Protection of National Infrastructure), 842

CPS PWG (Cyber Physical Systems Public Working Group), 77

CPU, reserving, 278

CPwE (Converged Plantwide Ethernet), 153

crashes, 275

Create, Read, Update, and Delete (CRUD), 628-630

criticality, connected car security, 836

CRLs (Certificate Revocation Lists), 259, 356

cross-certification, 355

cross-fog applications, 136

cross-site scripting (XSS), 635

cross-vertical compound IoT applications, 3

cross-vertical replicability, fog computing, 117

CRSF (cross-site forgery attacks), 265, 636

CRTM (Core Root of Trust Management), 663

CRUD (Create, Read, Update, and Delete), 628-630

cryptography

compliance, 454

D-H (Diffie-Hellman), 580

public key, 352

CSA (Cloud Security Alliance) document, 110, 165-168

IoT-specific security controls, 167

recommended security controls, 165-166

security standards, 77

smart city recommendations, 695

CSDL (Cisco Secure Development Lifecycle), 644-646

CSE (common services entity), 131

CSFs (common service functions), 131

CSRF (cross-site request forgery), 636

CTA (Cognitive Threat Analytics), 453

custom application detectors, 434

customer-focused services, 805

customer profiling, 805

Cyber Physical Systems Public Working Group (CPS PWG), 77

cyberattacks, 454

cybersecurity

connected car standards, 827

connected cars, 830

attack surface, 831

automated deployment, 867-870

challenges, 835

connectivity challenges, 840

considerations, 839

consolidation, 849

data-centric and application-centric fusion, 849

design implementations, 847

driver concerns, 837

emergency fleet vehicles example. See emergency fleet vehicles example

encryption, 837

equipment deployment, 865-866

goals, 847-848

industry alliances, 847

intrusion detection and prevention, 858-860

layered approach, 850-851

onboard system deployment, 864-865

operational challenges, 863

operational lifecycle, 851

orchestration platform principles, 848

OTA secure updates, 855-857

personalized experiences through identity management, 862-863

reasons for, 830

safety-criticality, 836

segmentation and zoning, 857-858

threats, 831-834

U.K. supply chain guidelines, 842-845

upgrades/patches, 840

U.S. supply chain guidelines, 845-846

vulnerabilities, 836-840

Wi-Fi hotspots, 861-862

NIST best practices, 659

smart cities, 682, 693-696

Cloud Security Alliance recommendations, 695

threats, 694

standard, 829

D

dACLs (downloadable access control lists), 374

daemons, Docker, 654

DAP (Dynamic Access Policies), 609

dashboard back-end platform, 635-637

dashboards, 627

data

analysis and exposure, 526

anomaly detection. See behavioral analysis

app centric, 697

at rest, 518, 521

Big Data, 526

breach costs, 418

categories, 509-511

centricity, 104

collecting, 507

computing, 508

confidentiality, 568

connected cars

analysis technologies, 817

enabling solutions, 814

future services and applications, 815

monetization, 815

consumption, 526

distribution, 527

driver development, 515-516

durability, 529

end-to-end considerations, 18

endpoint collected, 520

flows, oil and gas industry, 790

four Vs, 813

handling, 115, 821

identification, 25-26

information, compared, 524

ingestion, 524

IoT, 4

lakes, 522-524

leveraging, 509

lifecycles, 507-509

categories, 511

collection, 507

computing, 508

data categories, 509

leveraging, 509

moving, 508

management and analytics, 5

mobile terminals, 820

modeling

dynamic mapping, 478

languages, 68

standards, 67, 70

moving, 508, 527-531

normalization process, 513-517

OpenFog Consortium architecture, 136

permissions, 399

persistency, 529

pipeline

architectural layer, 86

deployment preparations, 316

IoT platforms, 288

security, 713-714, 786-788

planes

MQTT. See MQTT

protection, 531

RabbitMQ. See RabbitMQ

SDN, 262-263

security, 659

preparation, 526

protection, 169, 531

access control, 504

accounting, 505

authentication, 504

authorization, 504

availability, 505

backups, 570

CAP theorem, 568-569

CIA, 503

confidentiality, 505

control plane, 566-567

data virtualization, 564

digital twins, 569

EFM, 560-564

functions, 504

integrity, 505

management plane, 565-566

MQTT. See MQTT

nonrepudiation, 506

physical access, 505

proactive mechanisms, 567-571

RabbitMQ. See RabbitMQ

reactive mechanisms, 571-573

pub/sub systems, 527-530

sanitization, 17

segmentation of responsibilities, 500-502

semistructured, 510

sensor, 824

sharing

multitenancy, 641-644

security, 9

smart cities management, 682

stores, 658

structured, 509

topics, 641

transport, 104

unstructured, 511

value, 512, 813

variety, 512, 813

vehicle maintenance, 813

velocity, 813

veracity, 813

volume, 813

warehouses, 521-522

Data Center Interconnect (DCI), 259

data-centric architecture, 104-105

Data Distribution Service (DDS), 105

Data Plane Development Kit (DPDK), 200

databases, IPsec, 589

Datagram Transport Layer Security (DTLS), 74, 349, 612

DataV, 176

DCI (Data Center Interconnect) protocols, 259

DDS (Data Distribution Service), 105

dead-peer detection (DPD), 584

decentralized decisions, Industry 4.0, 148

decentralized environmental notification standards, 827

decision pipeline, end-to-end considerations, 18

decomposing IoT platform, 27

decryption, dynamic, 592-594

Dedicated Short-Range Communications (DSRC), 353, 800, 827

deep learning (DL), 894-895

deep packet inspection (DPI), 430-432

Def Stan 05-138, 829

delivering next-generation IoT platforms, 293

deployment

AnyConnect client, 611

centralized, 418-420

cloud computing, 107-108

connected cars

equipment, 865-866

onboard systems, 864-865

distributed, 420-421

equipment health monitoring example, 766-771, 777-778

event-based video and security use case, 316-319

event-based videos, 710-712

Federal Sigma VAMA architecture, 864

function packs, 317

hybrids, 422

next-generation IoT platforms, 292

OpenStack, 632

OTT, 89

preparations, 315-316

security enforcement, 90

services, 639-641

services-based, 33

smart cities, automating, 723-725

VFs, 317

design

connected car security, 847

IoT platforms, 87

detection, anomaly traffic, 780-781

detectors (application), 433-434

development

connected cars, 801-802

drivers, 515-516

end-to-end considerations, 19

IoT platforms, 178

secure applications, 271

security test and evaluation, 16

Device Level Ring (DLR), 429

Device Sensor, 340-345

AAA configuration example, 342-343

differentiated authorization privileges, 345

internal/external clients, 341

port security, 341

probe configuration, 344

success, 344

devices

attestation and trust, 315

building blocks for access control, 326

complex, 345

constrained, 345

classes, 345-346

identifying, 348-351

limitations, 358

restrictions, 345

discovery, 102

edge, 302

energy limitations, 346-347

ETA, 453

fog, 302

identifying, 26, 336-337

immutable identities, 328-329

IoT, 123

ITU-T Y.2060 reference model, 126

managed devices per IT person in financial and retail customers, 411-412

naming conventions, 327-328

onboarding, 102

power for communication, 347-348

predicted connection rate, 325

provisioning, 326, 330-331

AWS IoT Example, 331-333

Cisco Identity Services Engine example, 334-336

registering, 330-331

AWS IoT example, 331-333

Cisco Identity Services Engine example, 334-336

security, 9

sharing, 315

trust, establishing, 328

trust stores, 355

D-H (Diffie-Hellman) groups, 580

DHCP (Dynamic Host Control Protocol), 390

differentiating IoT platform, 174

digital certificates, 352

IEEE 1609.2, 353

PKI, 353-355

revocation, 356-357

SSL pinning, 357

X.509, 352-353

digital IoT twins, 295

digital marketing, 805

digital roadway architecture, 806

digital signatures

applications, 271

encrypting, compared, 540

digital technology, 735

digital twins, 569

digitization, oil and gas industry, 737-738

oil and gas industry downstream environment, 752

oil and gas industry midstream environment

benefits, 747-748

challenges, 748-749

pipeline management, 747

oil and gas industry upstream environment

automation, 742

challenges, 743-744

trends, 743

pipeline management applications, 744

direct exchanges, 544

disabling services, 270

disposal, hardware and software, 17

disposition phase, SDLC, 14, 17

distributed control systems, 750

distributed deployment, NFVIS example, 486

ENFV components, 486-487

hardware requirements, 488-490

NFVIS benefits, 488

orchestration, 490

service chaining, 494-495

vBranch Function Pack, 490-493

VMs supported, 490

distributed ledger technology. See blockchains

distributing data, 527

DLs (data lakes), 522-524

DL (deep learning), 894-895

DLR (Device Level Ring), 429

DLUX (OpenDaylight User Experience), 207

DNS (Domain Name System), 462

DNS-based security, 462

recursive, 462

Umbrella, 463

AMP Threat Grid, 465

healthcare industry protection, 465-466

intelligent proxy services, 464-465

response categories, 463

Docker daemon, 654

Docker security, 653-655

downloadable access control lists (dACLs), 374

downstream environment (oil and gas industry), 734, 749

challenges, 753-754

digitization, 752

distributed control systems, 750

IoT benefits, 752

new business needs, 752

overview, 749

refining and processing architecture, 750

technologies, 750-751

DPD (dead-peer detection), 584

DPDK (Data Plane Development Kit), 200

DPI (deep packet inspection), 430-432

DREAD model, 28

driver safety data, connected cars, 815

drivers

development, 515-516

NEDs, 300

DRTM (Dynamic Root of Trust Management), 663

DSLinks, 563

DSRC (Dedicated Short-Range Communications), 353, 800, 827

DTLS (Datagram Transport Layer Security), 74, 349, 612

durability, data, 529

DW (data warehouses), 521-523

dynamic access policies (DAP), 609

dynamic authorization

ACLs, 374-376

forms, 368

ISE, 368

privileges, 367

RADIUS CoA, 368

request commands, 370-371

Request/Response codes, 369

requests, 368-369

session identification, 369

VLAN assignments, 371-374

SGTs, 376-377

dynamic decryption, 592-594

dynamic mapping, 478

dynamic NAT, 424

Dynamic Root of Trust Management (DRTM), 663

dynamic segmentation, 378-380

E

EAPOL (Extensible Authentication Protocol over LAN), 363

east–west

SDN controller communications, securing, 254-256

SGACLs, 387

ECDH (Elliptic Curve Diffie Hellman), 353

ECDSA (Elliptic Curve Digital Signature Algorithm), 329, 353

ecosystems

CSA document, 165-168

IoT-specific security controls, 167

recommended security controls, 165-166

groupins (smart cities), 683

Edge and Fog Processing Module (EFM), 560-564

edge computing, 112

embedded systems, 237

fog computing, compared, 113, 240

legacy systems, 237

MEC, 237-238

edge devices, 302

edge networks, 36

edge nodes, 35

edge tier

Cloud Customer Architecture for IoT, 141

IIRA, 146

EdgeChain, 889-890

EdgeX Foundry platform, 177

EFM (Edge and Fog Processing Module), 560-564

components, 561

computation, 562

data collection, 562

DSLinks, 563

permissions, 563

quarantine, 563

Electronic Security Perimeters (ESP), 23

elliptic curve cryptographic algorithms, 353

Elliptic Curve Diffie Hellman (ECDH), 353

Elliptic Curve Digital Signature Algorithm (ECDSA), 329

embedded era (connected cars), 802

embedded probes, 338

embedded systems (ES), 101, 237

emergency fleet vehicles example, 852-854

architecture overview, 854

automation, 867-870

equipment deployment, 865-866

Federal Sigma VAMA, 863-864

intrusion detection and prevention, 858-860

onboard systems deployment, 864-865

OTA secure updates, 855-857

personalized experiences, 862-863

segmentation and zoning, 857-858

smart city integration, 719-721

Wi-Fi hotspot security, 861-862

emergency police vehicles, 821

ANPR, 820

audible and visual warning systems, 820

battery management, 821

integrated approach, 821

mobile data terminals, 820

onboard systems and technologies, 819-821

onboard telematics, 821

operational challenges, 821

orchestrated services, enabling with consolidated orchestrated hardware, 822

radios, 820

speed detection, 820

speed recognition devices, 820

vehicle tracking, 820

video camera and audio systems, 820

wearables, 821

Wi-Fi hotspots, 821

Encapsulating Security Payload (ESP), 578

Encrypted Traffic Analytics (ETA), 450-454

encryption

algorithms, 580

connected cars, 837

digitally signing, compared, 540

southbound SDN controller communication, 258

transport, 532

ENCS (Enterprise Network Compute System), 489

ENCS 5400, 494-495

end-to-end

development framework, 19

human interaction, 19

manageability and orchestration, 17-18

openness, 18

performance, 20

scalability, 20

security, 20, 163-164

endpoints

any endpoint, anywhere concept, 25

architectural layer, 85

compliance module, 614

data collection storage, 520

hierarchy, 35

IDs, 637

IoT, 3

new, connecting, 639

security, 9

transport encryption, 532

energy

efficiency, 220

limitations, 346-348

enforcement (security)

TrustSec, 384

types of deployments, 90

ENFV (Enterprise Network Virtualization), 486-487

enterprise-centric architectures, 32, 96-97, 154-156

Enterprise Resource Planning (ERP), 37

enterprise risks, 12

enterprise software extensions, 173

enterprise tier, 141

entity-based reference model, 123

E&P (exploration and production), 733

equipment health monitoring example, 763-765

access control, 781

access privileges, 778-780

anomaly traffic detection, 780-781

architecture, 772

automated deployment, 777-778

command validation, 782-783

data pipeline security, 786-788

data pipelines, 771

deployment, 766-771, 865-866

limitations, 765

operational lifecycle, 772

preconfiguration checklist, 773-775

quarantines, 782

requirements, 767

service assurance, 784-786

ERP (Enterprise Resource Planning), 37

ES (embedded systems), 101, 237

ESC

KPI rules, 483-485

NSO activation sequence request, 472-474

NSO fulfillment and assurance sequences, 474-475

VNFs, monitoring, 475

actions, 477

dynamic mapping, 478

metrics, 476

prerequisites, 475

E-Series servers, 489

ESP (Electronic Security Perimeters), 23

ESP (Encapsulating Security Payload), 578

ETA (Encrypted Traffic Analytics), 451

cryptographic compliance, 454

threat detection, 451-452

WannaCry, 454

Ethernet

attacks, 41

connected cars, 825

inline tagging format, 383

EtherNet/IP, 429

ETL (Extract-Transform-Load) model, 521

ETSI (European Telecommunications Standards Institute), 18, 59, 187

architectural standards, 59

MANO, 18

centralized security example, 468

NFV centralized components, 419

NFV

architecture, 229

standards, 66

NFV MANO, 225

benefits, 232

challenges, 229

decoupling service intentions from instantiation process, 230-231

implementation, 231-232

LSO, 226-229

OpenFog convergence, 243-245

OSS/BSS interoperability, 232

security standards, 76

TS 102 637, 827

TS 102 637-1, 827

TS 102 637-2, 827

TS 102 637-3, 827

TS 102 637-4, 827

EUIs (Extended Unique Identifiers), 327

European connected car standards, 827

European Lighthouse Integrated Project, 120

European Telecommunications Standards Institute. See ETSI

event-based videos

security use case, 309

architecture overview, 313

cabinet monitoring, 314

deployment, 316-319

description, 312

preparatory work, 315-316

sequence of events, 319-320

triggers, 312

smart cities, 709-714

data pipeline security, 713-714

deployment, 710-712

triggers, 710

evolution of IoT, 236

evolving technology IoT landscape, 670-671

exchanges

IKEv2, 584-586

RabbitMQ, 544

explicit trust, 355

exploration and production (E&P), 733

exposure, data, 526

Extended Unique Identifiers (EUIs), 327

extensibility

cloud computing, 109

OPC UA, 151

Extensible Authentication Protocol over LAN (EAPOL), 363

Extensible Messaging and Presence Protocol (XMPP), 74, 258

external clients, 341

Extract-Transform-Load (ETL) model, 521

extranets, 594

automating with orchestration and NFV, 596

automating with template-based orchestration and NFV, 595

software-based automation, 597

traditional approach, 594

F

Face ID, 359

fanout exchanges, 544

FCAPS (fault management, configuration management, accounting management, performance management, and security management), 126

FD.io (Fast Data–input/output), 198

Federal Sigma VAMA, deployment

equipment, 865-866

onboard systems, 864-865

FFV

ETSI architectural framework, 229

MANO, 223-232

benefits, 232

challenges, 229

decoupling service intentions from instantiation process, 230-231

implementation, 231-232

LSO, 226-229

OSS/BSS interoperability, 232

FIB (forwarding information base), 199

field operations automation, oil and gas industry, 789

file policies, 461

Filet-o-Firewall vulnerabilities, 42

filtering

CIP, 432

filters, applying, 432

packets

firewalls, 426-427

sanity checking, 431

user definable, 432

financial services, connected cars, 806

fingerprint IDs, 359

Firefox percentage of web pages, 450

firepower-based application detectors, 434

Firepower Management Center (FMC), 459

Firepower Threat Defense (FTD), 459-461

Firepower Threat Defense virtualized (FTDv), 422

firewalls

APTs, 440-441

ASAv, 423

AVC, 433-437

behavioral analysis, 440-441

contextual information with adaptive network control, pairing, 446

Flexible NetFlow protocol, 444

NaaS, 444-446

NetFlow protocol, 442-443

oil and gas pump station example, 447-450

visibility protocols, 442-444

defined, 422

DPI, 430-432

encrypted traffic analytics, 450-454

ETA

cryptographic compliance, 454

threat detection, 451-452

WannaCry, 454

Filet-o-Firewall, 42

FTD, 459-461

IDS/IPS, 437

pattern matching, 438-439

protocol analysis, 439

weaknesses, 439-440

industrial protocols, 428

CIP, 428-429

lack of security, 429

potential solutions, 430

IPS, 438

NAT, 424

NGFWv, 423

overlapping, 425

packet filtering, 426-427

PAT, 425

Fitbit Aria IoT IAM example, 406

cloud to cloud, 406

device to device, 409

native applications to cloud, 408

self-registration, 408

fleet management, connected cars, 806

flexibility

authentication, 403

NFV, 220

Flexible NetFlow (FNF), 444, 447

FlexRay networks, 824

flows

data, oil and gas industry, 790

Fitbit Aria example, 408

MUD, 393-394

flows per second (FPS), 443

FMC (Firepower Management Center), 459

FNF (Flexible NetFlow) protocol, 444

fog computing, 112

advantages, 116-118

cloud computing comparison, 241

cloud fusion, 242

communications, 114

complexity, 118

containerized services, 650

costs, 117-118

cross-vertical replicability, 117

data handling, 115

disadvantages, 117

edge computing, compared, 113, 240

governance, 117

hierarchy, 36

heterogeneity, 117

levels, 302

mobility, 116

nodes, 240

data analysis, 526

data at rest, 521

operating systems, 664

RabbitMQ orchestrated security example, 552-558

security, 660-666

southbound APIs, 667

OpenFog convergence with NFV MANO, 243-245

proximity, 116-117

reliability, 117

requirements, 115

SDX/NFV role, 243

security, 117, 666

smart traffic example, 238-241

speed, 116

Forbes IoT platform key areas, 288

forwarding

graphs, NFV, 222-224

information base (FIB), 199

P4, 202

ports, 606

four Vs of data, 813

FPS (flows per second), 443

FQDN (fully qualified domain name), 602

fracking, 739

frameworks

accounting, 399

Cisco IoT, 168-171

IIAF, 144

IISF, 160-165

assurance, 162

building blocks, 163-164

implementation, 164

recommendations, 162-163

system characteristics, 162

trustworthiness, 161

IoTivity, 142-144

NFV, 63

components, 64

standards, 65-67

Nirvana Stack, 212

OWASP, 168

P4, 201

front-end UIs security, 630, 657

FTD (Firepower Threat Defense), 459-461

FTDv (Firepower Threat Defense virtualized), 422

fulfillment sequences, 474-475, 479-481

full IoT stack architectures, 120

addressing, 670

AIOTI, 138-140

Cloud Customer Architecture, 140-142

components, 674

IEEE P2413, 132-133

IoT-A RA, 120-125

IoTivity framework, 142-144

IoTWF, 126-129

ITU-T Y.2060, 125-126

next-generation IoT platforms, 293

oneM2M, 129-132

OpenFog Consortium, 133-138

fully qualified domain name (FQDN), 602

Function Packs

deploying, 316-317

next-generation platforms, 675

smart cities, 722

YANG model, 306

functional architectures

IoT-A RA, 124

oneM2M, 131

functional requirements, 15, 827

functions

cloud-native, 242

cloud-ready, 242

data protection, 504

fog-ready, 242

OF, 194

OVS, 197

VFs, 298

Future Internet, 3

G

Gartner-defined centric views, 97

Gartner Hype Cycle for Emerging Technologies 2017, 879

Gartner IoT platform recommendations, 289-290

gateways

architecture, 32, 94-95

attacks, 40-41

hierarchy, 35

IoT-A RA, 123

GDPR (General Data Protection Regulation), 499, 571

General Electric Predix, 177

Google Cloud Platform, 176

governance

fog computing, 117

security, 5

smart cities, 682

graph nodes, 199

GridBlocks, 153-154

group policies, SSL VPNs, 602

guidelines

accounting framework, 399

implementation, 53

oil and gas industry, 757

H

handling data

fog computing, 115

police vehicles, 821

hardware

connected cars, 827

disposal, 17

gateway, 40

specific platforms, 173

Hash Based Message Authentication (HMAC), 264

hashing algorithms, 580

header exchanges, 546

healthcare

industry protection with Umbrella, 465-466

smart cities, 681

heterogeneity, 86

fog computing, 117

next-generation IoT platforms, 297

Hewlett-Packard Enterprise Universal of Things Platform, 176

hierarchical data flow model, 158

hierarchy

applications, 36

architecture layers, 85

business processes and services, 86

center/back-end, 86

data pipeline and processing, 86

infrastructure and transport, 85

integration, 86

security, 86

things and endpoints, 85

business processes, 37

center, 36

communication nodes, 36

core networks, 36

edge networks, 36

edge nodes, 35

endpoints, 35

fog networks, 36

gateways, 35

microservices, 36

services, 37

things, 35

high availability

NFV, 220

SDN orchestration, 269

high-level architecture, smart cities, 701

high-level groups, identification, 25

high reliability, next-generation IoT platforms, 293

HMAC (Hash Based Message Authentication), 264

HMI (Human Machine Interface), remote access, 617

authorization, 621

identity, authentication, posture, 618

remediation, 619-620

working components, 618-621

horizontal approaches, smart cities, 685

HTTP (Hypertext Transfer Protocol), 74, 264

HTTPS (HTTP over TLS), 598

HTTPS (Secure HTTP), 74

hub-centric architecture, 32, 94

human efficiency and productivity, oil and gas industry automation, 742

human interaction, end-to-end considerations, 19

human layer, 44

Human Machine Interface. See HMI

hybrid clouds, 107

hybrid deployments, 422

hybrid mode, 190

hybrid subsymbolic/symbolic AI, 892

Hypertext Transfer Protocol (HTTP), 74, 264

I

I am the Cavalry, 77

IA (information assurance), 37

IaaS (infrastructure-as-a service), 108, 173

IACS (Industrial Automation and Control System), 21

IAM (identity and access management)

AWS, 394-397

existing, 325

IoT

Fitbit Aria example, 406-409

OAuth 2.0, 404-405

OpenID Connect 1.0, 405

requirements, 403-404

scaling, 402

self-registration, 408

IBM

Bluemix, 177

Watson, 176

ICN (information-centric network), 100-104

challenges, 103

components, 101

data transport, 104

existing technologies, 103

features, 101

middleware, 102

migration, 104

scalability, 103

security, 103

ICS (Industrial Control Systems), 38

Purdue Model of Control reference model, 160

hierarchical data flow model, 158

open process automation, 159

segmented architecture based on, 157

IDs (identities), 637-639

device registration, 330-331

AWS IoT example, 331-333

Cisco Identity Services Engine example, 334-336

immutable, 328-329

LDAP management, 639

naming conventions, 327-328

personalized connected car experiences, 862-863

trusted devices, establishing, 328

identifying

assets, 27

constrained devices, 348-351

CoAP, 349-350

MQTT, 350-351

data elements, 25-26

device types, 26

devices, 336-337

encrypted network traffic threats, 451-453

equipment health monitoring example access privileges, 778-780

high-level groups, 25

risk, 25

classification, 27

identification, 25-26

risk scores, 28

threat modeling, 27

sessions, 369

subgroups, 26

threats, 27, 878

identities. See IDs

identity and access management. See IAM

Identity Relationship Management (IRM), 326, 413-414

Identity Services Engine. See ISE

IDMZ (Industrial DMZ), 158, 759

IDS (intrusion detection system), 437

connected cars, 858-860

pattern matching, 438-439

protocol analysis, 439

smart city services on demand connectivity, 717-718

weaknesses, 439-440

IEC (International Electrotechnical Commission)

2020 Platform Whitepaper, 155

62351 standard, 78

62443 standard, 78, 500-502, 756

IoT platform definition, 88

IEEE (Institute of Electrical and Electronics Engineers), 59

802.1X authentication, 363-365

802.1X Flexible Authentication, 366-367

802.11-2012 Standard for Information Technology, 826

1455-1999, 826

1609.1-2006, 826

1609.2-2016, 826

1609.2 certificates, 353

1609.3-2016, 826

1609.4-2016, 827

1609.12-2016, 827

architectural standards, 59

P2413 architecture, 132-133

SDN standards, 66

security standards, 76

smart city recommendations, 683

smart city standards, 685

IETF (Internet Engineering Task Force), 60

architectural standards, 60

RFC 6241, 258

SDN/NFV standards, 66

IIAF (Industrial Internet Architecture Framework), 144

IIC (Industrial Internet Consortium), 61, 144

industrial/market standards, 61

security standards, 78

IIoT (Industrial Internet of Things), 3

IIRA (Industrial Internet reference architecture), 144-146

IISF (Industrial Internet Security Framework), 160-165

assurance, 162

building blocks, 163-164

implementation, 164

recommendations, 162-163

system characteristics, 162

trustworthiness, 161

IKE (Internet Key Exchange), 578, 589

IKE_AUTH exchange, 586

IKEv1

IKEv2 comparison, 586

phase 1, 579-582, 586-587

aggressive mode, 582

authentication method, 579

D-H (Diffie-Hellman) groups, 580

encryption algorithms, 580

hashing algorithms, 580

main mode, 580-581

phase 2, 582-584, 588

PFS, 584

quick mode, 582-583

IKEv2 (Internet Key Exchange Protocol Version 2), 584-586

exchange process, 584-586

IKEv1 comparison, 586

phase 1 attributes, 586-587

phase 2 attributes, 588

images

computer vision, 898

Docker, 654

immutable identities, 328-329

immutable relationships, 413

implementation

end to end security, 164

ETSI FNV MANO, 231-232

guidelines, 53

Industry 4.0, 148

ODL, 208

P4, 203

policies, 53

procedures, 54

reference, 87

regulations, 53

requirements, 86

SDLC, 14-16

standards, 53

inband SGT propagation, 381

inbound packet filtering, 426

incident handling standard, connected cars, 829

incident management standard, connected cars, 828

incompatibility, 49

independent network applications, 207

Industrial Automation and Control System (IACS), 21

industrial communication protocols AVC example, 435

Industrial Control Systems. See ICS

Industrial DMZ (IDMZ), 158

industrial environments

IIRA, 144-146

IISF, 160-165

assurance, 162

building blocks, 163-164

implementation, 164

recommendations, 162-163

system characteristics, 162

trustworthiness, 161

Industry 4.0, 148-149

NFV-based, 154-156

OPC-UA, 150-152

Purdue Model of Control Hierarchy framework, 5, 160

hierarchical data flow model, 158

open process automation, 159

segmented architecture based on, 157

SDN-based, 154-156, 592

industrial-focused standards, 61-63

Industrial Internet Architecture Framework (IIAF), 144

Industrial Internet Consortium. See IIC

Industrial Internet Reference Architecture (IIRA), 144-146

Industrial Internet Security Framework. See IISF

Industrial Internet of Things (IIoT), 3

industrial protocols

CIP, 428-429

lack of security, 429

potential solutions, 430

Industry 4.0, 148-149

industry compliance standards, 23

industry convergence and multifaceted platforms, 246-248

Industry Specification Group (ISG), 187

information

assurance (IA), 37

data, compared, 524

modeling, 151

preservation, 17

security, 828

technology security awareness and training standard, 829

technology standard, 826

transparency, 148

information-centric network. See ICN

infotainment era (connected cars), 802, 805

infrastructure

architectural layer, 85

connected car interoperable, 829

next-generation IoT platforms, 301

operational efficiency (smart cities), 681

SDN, 189

control plane, 262

data, 262-263

management, 261

operations, 261

security, 260-263

infrastructure-as-a service (IaaS), 108, 173

ingestion, data, 524

initiation phase (SDLC), 14-15

inline tagging, 383

innovation, NFV, 221

input nodes, 199

insecure devices, 9

inspection, 16

Institute of Electrical and Electronics Engineers. See IEEE

integration

architectural layer, 86

Cloud platform, 177

system, 16

integrity, 37

boot, 274-275

data protection, 505

MQTT, 540-542

RabbitMQ, 549

Intel IoT Platform, 177

intelligent proxy services, 464-465

Intelligent Transportation Systems (ITS), 826-827

intended outcomes, next-generation IoT platforms, 303-308

contextual automation, 307

model-driven, 304-306

service-centric, 304-306

service chaining, 306-307

interfaces. See also UIs

HMI remote access, 617

authorization, 621

identity, authentication, posture, 618

remediation, 619-620

working components, 618-621

OpenFlow, 257

SDN-based IPsec flow protection, 590-591

smart cities, 696

internal application detectors, 434

International Council on Large Electrical Systems (CIGRE), 66

International Telecommunications Union (ITU), 2

Internet Engineering Task Force. See IETF

Internet Key Exchange (IKE), 578, 589

Internet Key Exchange Protocol Version 2. See IKEv2

Internet of People (IoP), 98

Internet Protocol (IP), 73, 169

Internet Reliable Transaction Protocol (IRTP), 60

Internet Research Task Force. See IRTF

Internet Security Association and Key Management Protocol (ISAKMP), 578

Internet Security Research Group (ISRG), 451

Internet Society (ISOC), 66

Internet of Things. See IoT

Internet of Things Architecture Reference Architecture (IoT-A RA), 120-125

interoperability, 49, 86

cloud computing, 110

connected car requirements, 829

connected cars, 826

ETSI FNV MANO, 232

Industry 4.0, 148

IoT platforms, 178

next-generation IoT platforms, 299

next-generation platforms, 672

standards, 50, 54-55

Inter-Vertical Interface, 696

Intra-Application Connectivity Interface, 696

intrusion detection system. See IDS

intrusion prevention system. See IPS

I/O, single root virtualization, 283-285

IoP (Internet of People), 98

IoT (Internet of Things)

building blocks, 35

business value, 5

Cloud Connect, 176

communication, 72

connectivity, 4

cross-vertical compound applications, 3

custom, 7

data, 4

devices, 123

endpoints, 3

entities, 139

evolution, 236

Global Council, 78

IAM

Fitbit Aria example, 406-409

OAuth 2.0, 404-405

OpenID Connect 1.0, 405

performance, 403

policy-based authorization, 403

privacy, 403

requirements, 403-404

scalability, 403

scaling, 402

security best practices, 404

IAP, 77

implementation, 86

interest over time, 2

ITU definition, 2

next-generation. See next-generation IoT

open standard/open architecture systems, 7

people and processes, 3-4

platforms

architecting, 32-33

building out solutions, 175

data pipeline, 288

decomposing, 27

design, 87

development, 178

differentiating, 174

improvements, 179-182

interoperability, 178

key areas, 288

market, 172

maturity, 174

next-generation. See next-generation IoT

orchestration, 288

recommendations, 289-290

security, 178-179

top IoT platforms for 2018, 176-177

Ready, 329

SaaS, 7

scalability, 5

security, 8-9

Security Foundation, 76

servers, 102

staff allocation, 6

Suite platform, 176

things, 3

threats, 8

transformation into PaaS, 7

IoT-A RA (Internet of Things Architecture Reference Architecture), 120-125

entity-based reference model, 123

functional architecture, 124

reference model, 121

IoT layer, AIOTI architecture, 138

IoTivity, 60, 142-144

IoTWF (IoT World Forum) reference model, 126-129

IP (Internet Protocol), 73, 169

iPhone Face ID system, 360

IPS (intrusion prevention system), 438

connected cars, 858-860

pattern matching, 438-439

protocol analysis, 439

smart city services on demand connectivity, 717-718

weaknesses, 439-440

IPsec

AHs (authentication headers), 578

databases, 589

ESP, 578

IKE, 578

IPsec/IKE within NSF, 589

peer authentication, 579

SA negotiation, 582-584

SDN-based

dynamic decryption, 592-594

flow protection, 589-591

IoT application, 592-594

site-to-site VPNs, 576

IKEv1 phase 1, 579-582

IKEv1 phase 2, 582-584

IKEv1/v2 phase 1 attributes, 586-587

IKEv1/v2 phase 2 attributes, 588

IKEv2, 584-586

IKEv2 versus IKEv1, 586

Software-Defined Networking (SDN)-based IPsec Flow Protection Internet draft, 588

IPSO Alliance, 60

IPv6 Low Power Wireless Personal Area Network (6LoWPAN), 74

IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), 73

IRM (Identity Relationship Management), 326, 413-414

IRTF (Internet Research Task Force), 60

SDN standards, 66

security standards, 78

IRTP (Internet Reliable Transaction Protocol), 60

ISAKMP (Internet Security Association and Key Management Protocol), 578

ISE (Identity Services Engine), 336

authorization, 368

canned policies, 340

collector and analyzer, 338

consumer/provider matrix, 384-386

CSDL, 644-646

embedded probes, 338

integrated architecture, 337

on demand access control example, 715-717

profiling, 337-340

provisioning, 334-336

SGACLs, 387-388

TrustSec controller, 378

ISG (Industry Specification Group), 187

ISO 27-35, 828

ISO 9797-1, 828

ISO 12207, 828

ISO 15408, 828

ISO 27001, 828

ISO 27002, 828

ISO 27010, 828

ISO 27018, 828

ISO 27034, 828

ISO 29101, 828

ISO 29119, 829

ISOC (Internet Society), 66

isolation

applications, 271

multi-administrator, 282-283

performance and latency, 278

ISRG (Internet Security Research Group), 451

IT

bringing together with OT technologies, 157

connected cars standard, 828

OT convergence, 156

staff allocation, 6

IT/OT

convergence, 159

integration, 788

technology separation, 758-759

ITS (Intelligent Transportation Systems), 826-827

ITU (International Telecommunications Union), 2

ITU-T (ITU Telecommunication Standardization Sector), 60, 66

ITU-T Y.2060 reference model, 125-126

J

jamming attacks, 41

Japan connected car standards, 827

JavaScript, 635

JOSE (JavaScript Object Signing and Encryption), 409

K

Kaa platform, 177

Kantara Initiative, 413-414

Key Performance Indicators. See KPIs

keys

BRSKI, 329-330

IKE, 578

PKI, 353-355

private, 276-278

PSKs, 41, 579

public, 352

QKD, 276

Keystone, 640

Kinetic IoT Platform, 177

KPIs (Key Performance Indicators), 20, 274

autoscaling, 483

rules, 483-485

SESSION_OUT metric, 482-483

VM_ALIVE script, 480-481

VM_SCALING metric, 481

VNF monitoring, 475, 479

Kubernetes security best practices, 656-658

L

L2MP (Layer 2 Multipath), 259

Lambda architectures, 119-120

languages

data modeling, 68

natural language processing (NLP), 895-896

last-mile communication, 71

latency

fog computing, 115

performance struggle, 278

Layer 2 Multipath (L2MP), 259

Layer 3 inline tagging format, 383

layered data bus, 146

layered security, 43

application, 46

device, 45

human, 44

network, 45-46

physical, 44

layers

AIOTI architecture, 138

application, 74, 125, 138-139

architectural, 85-86

Cloud Customer Architecture for IoT, 141

connected car security, 850-851

device, 126

IoT, 138

MAC, 73

MQTT, 532

network

AIOTI architecture, 138

communication, 73-74

ITU-T Y.2060 reference model, 125

ODL, 204-207

AAA, 206

controllers, 206

DLUX, 207

independent network applications, 207

MD-SAL, 205

NeXT UI, 207

northbound APIs, 206

plug-ins, 204

southbound APIs, 204

OPC UA, 150

physical, 73

SDN, 189-192

applications layer, 191

control layer, 190

infrastructure layer, 189

service support, 125

transport, 74

LDAP (Lightweight Directory Access Protocol)

data pipeline security, 713-714

data topics, 641

ID management, 639

Keystone comparison, 640

MUD URLs, emitting, 390

multitenancy data sharing, 641, 644

RabbitMQ queries, 548

vhost clients, adding, 642

least privilege, SDN orchestration, 269

ledger, blockchains, 883

legacy systems, 237

legislation standards, 54

Let’s Encrypt, 451

Level 1 vehicles, 804

Level 2 vehicles, 804

Level 3 vehicles, 804

Level 4 vehicles, 804

Level 5 vehicles, 804

levels of automated driving systems, 803-804

leveraging data, 509

lifecycle service orchestration (LSO), 226-229

lifecycles

data, 507-509

categories, 511

collection, 507

computing, 508

data categories, 509

leveraging, 509

moving, 508

secure remote management, 704-705

system (SDLC), 13

LINs (local interconnect networks), 824

lldpSystemDescription variable, 343

LLN (low-power and lossy networks), 73

local interconnect networks (LINs), 824

local service gateway (LSG), 101

local sys_admin accounts, creating, 399

logging SDN orchestration, 270

logical segmentation, 22

loops, attacks, 41

low-power and lossy networks (LLNs), 73

lower power strategy, 347

LSG (local service gateway), 101

LSO (lifecycle service orchestration), 226-229

LTE-V (LTE-Vehicle), 800

LTI Mosaic, 177

M

M2M (Machine-to-Machine), 3, 173

M4 Rack Server, 489

MAB (MAC address bypass), 365

MAC addresses

EUIs, 327

flooding, 41

layers, 73

machine learning. See ML

main mode (IKEv1 phase 1), 580-581

maintenance

cloud computing, 109

oil and gas industry, 752

malicious incidents, oil and gas industry security, 755

Malware Block policy, 387

malware protection

AMP, 456

file policies, 461

FTD, 459-461

point-in-time detection, 456-457

retrospection, 457-458

sandboxing, 458

TALOS, 456

man-in-the-middle attacks (MITM), 40

managed device count per IT person for financial and/or retail customers, 411-412

management

configuration, 17

containerized services, 649-653

data, 5

IoT-A RA, 124

next-generation IoT platforms, 297

police vehicle systems, 821

publish-subscribe, 102

management planes

data protection, 565-566

SDN, 261

security, 658

management UIs (user interfaces), 627-628

MANO (Management and Orchestration), 18

end-to-end considerations, 17-18

next-generation IoT platforms, 297-301

next-generation platforms, 671

NFV, 223-232, 243-245

NFV ETSI, 225

benefits, 232

challenges, 229

decoupling service intentions from instantiation process, 230-231

implementation, 231-232

LSO, 226-229

OSS/BSS interoperability, 232

OpenFog Consortium architecture, 136

manual versus autoquarantining, 782

manufacturer usage description. See MUD

Manufacturers Alliance for Productivity and Innovation (MAPI), 62

manufacturing

AnyConnect client example, 617

authorization, 621

identity, authentication, posture, 618

remediation, 619-620

working components, 618-621

clientless portal example, 603

CPwE, 153

GridBlocks, 153-154

segmentation of data responsibilities, 500, 502

Manufacturing 4.0, 3

Manufacturing Execution (MES), 37

manufacturing focused approaches

CPwE, 153

GridBlocks, 153-154

Manufacturer Usage Description. See MUD

MAPI (Manufacturers Alliance for Productivity and Innovation), 62

market-focused standards, 61-63

market IoT platform, 172

Marz, Nathan, 120

maturity, IoT platform, 174

mbed platform, 177

McKeown, Nick, 186

MD5 (Message Digest Algorithm), 580

MD-SAL (model-driven service abstraction layer)

AD-SAL, comparison, 209-210

ODL, 205

MEC (Multi-access Edge Computing), 237-238

Media Oriented Systems Transport (MOST), 825

media sanitization, 17, 829

mediums, 41

MEF (Metro Ethernet Forum), 66

memory, reserving, 278

menu access permissions, 399

MES (Manufacturing Execution), 37

message authentication codes, 828

Message Digest Algorithm (MD5), 580

Message Queue Telemetry Transport. See MQTT

message sets for vehicle/roadside communications standard, 826

metrics

monitoring, 476

VMs, scaling, 481

Metro Ethernet Forum (MEF), 66

microsegmentation, 387

microservices, 36

Microsoft

Azure, 176

DREAD model, 28

middleware

architectures, 118

ICN, 102

midstream environment (oil and gas industry),734, 744

challenges, 748-749

digitization, 747

new business needs, 747

pipeline, 744-748

migration, ICN challenges, 104

million packets per second (MPPS), 199

MindSphere, 176

minimizing complexity, 309

MITM (man-in-the-middle attacks), 40

ML (machine learning), 98, 878-879, 893

AI collaboration, 899

classical models approach, comparison, 893

connected cars, 815

deep learning (DL), 894-895

neural networks, 896-897

people-/user-centric approaches, 98

supervised, 894

mobile-centric architectures, 32, 93-94

mobile data terminals, police vehicles, 820

mobility, fog computing, 116

Mocana by Mocana platform, 177

MODBUS application filter example, 436-437

models

intended outcomes, 304-306

reference, 87

service abstraction layer (MD-SAL), 205

modules

AnyConnect client, 612-616

AMP, 616

endpoint compliance, 614

Network Access Manager, 614

NVM, 615-616

roaming protection, 614-615

VPN, 612-613

MUD, 392

pluggable authentication (PAM), 646

monitoring

actions, 477

continuous, 17

event-based videos, 709-712

data pipeline security, 713-714

deployment, 710-712

triggers, 710

metrics, 476

police vehicle systems, 821

power, 702

street cabinets, 705-709

VNFs, 475

dynamic mapping, 478

ESC, 476-477

fulfillment and assurance sequences, 479-480

KPI monitoring methods, 479

prerequisites, 475

VM alive script, 480-481

Mosaic, 177

MOST (Media Oriented Systems Transport), 825

moving data, 508, 527-531

MPPS (million packets per second), 199

MQTT (Message Queuing Telemetry Transport Protocol), 350-351, 532-533, 540

authentication, 533-535

authorization, 535-539

availability, 542-543

brokers, 350

clients, 350

confidentiality, 539-540

integrity, 540-542

layers, 532

repudiation, 543

transport protection, 532

MUD (Manufacturer Usage Description), 78, 390

driver development, 516

Internet draft, 390

module, 392

policy types, 390-391

process flow, 393-394

telemetry sensors, adding to street cabinets, 707

URLs, emitting, 390

Multi-access Edge Computing (MEC), 237-238

multi-administrator isolation, 282-283

multitenancy

data sharing, 641, 644

deployment preparations, 315

next-generation IoT platforms, 296

smart cities, 698

TEEs, 666

user profiles/roles, 628-630

N

NaaS (Network as a Service), 444-446

NAC (Network Access Control), 42

namespaces, 654

naming conventions, 327-328

naming services, 102

NAT (network address translation), 424-425

National Highway Traffic Safety Administration (NHTSA), 803, 845-846

National Institute of Standards and Technologies. See NIST

National Service Framework (NSF), 589

native applications, 408

NAT-T (NAT-Traversal), 583

natural intelligence (NI), 890

natural language processing (NLP), 895-896

navigation services, 805

NB APIs (northbound APIs), 43

NBAR2 (Network-Based Application Recognition), 444

NEDs (Network Element Drivers), 300, 316

NERC (North American Electric Reliability Corporation), 78

NETCONF (IETF RFC 6241), 258

NetFlow protocol, 442-443

Netrounds, 784

Network Access Control (NAC), 42

Network Access Manager, 614

network address translation (NAT), 424-425

Network as a Service (NaaS), 444-446

Network-Based Application Recognition (NBAR2), 444

Network Element Drivers (NEDs), 300, 316

network enforced policies, 170

network functions virtualization. See NFV

network functions virtualization infrastructure. See NFVI

network layer, 45-46

AIOTI architecture, 138

communication, 73-74

ITU-T Y.2060 reference model, 125

Network Security Event Logging (NSEL), 444

Network Services Descriptors (NSD) catalog, 471

network services entity (NSE), 131

Network Services Orchestrator. See NSO

Network Storage Resource (NSR), 472

Network Visibility Module (NVM), 615-616

networks

active networking, 185

AIOTI architecture, 139

connected cars, 824-825

IoT-A RA, 123

low-power and lossy, 73

proximity, 146

smart cities, 682

neural networks, 896-897

next-gen IPS (NGIPS), 423

Next Generation Firewall virtualized (NGFWv), 422-423

next-generation IoT, 291

architecture, 294-295

building blocks, 295-303

fog levels, 302

heterogeneous, 297

infrastructure, 301

management, 297

MANO, 297-301

multitenancy, 296

operation, 297

UIs, 297

virtualization, 297

complexity, minimizing, 309

consistency, 291

delivery, 293

deployment, 292

event-based video and security use case, 309-321

architecture overview, 313

cabinet monitoring, 314

description, 312

preparatory work, 315-316

triggers, 312

evolving technology landscape, 670

full IoT stacks, 293, 670

Function Packs, 675

high reliability, 293

intended outcomes, 303-308

contextual automation, 307

model-driven, 304-306

service-centric, 304-306

service chaining, 306-307

interoperability, 299, 672

MANO, 671

reference architecture, 293

requirements, 308

scaling, 293

services, 299

standards, 292

NeXT UI, 207

NFV (network function virtualization), 7, 63, 187

adoption acceleration, 218

agility, 221

architectures, 154-156

CAPEX reduction, 219

challenges, 233-235

components, 64

energy efficiency, 220

extranet automation, 596

flexibility, 220

fog computing, 243

forwarding graphs, 222-224

high availability, 220

history, 187

innovation, 221

IoT enabling capabilities, 235

MANO, 243-245

multi-administrator isolation, 282-283

NFVI, 222-223

ODL alignment (OPNFV), 67, 211

OPEX reduction, 219

SDN, compared, 187

security, 272

authenticated time service, 281

backdoors, 281-282

boot integrity, 274-275

multi-administrator isolation, 282-283

performance isolation, 278

private keys, 276-278

secure crash, 275

SRIOV, 283-285

tenant/user AAA, 279-280

threat landscape, 273

SRIOV, 283-285

standards, 65-67

telecom benefits, 219-221

template-based extranet automation, 595

VNFC, 221

NFVI (network functions virtualization infrastructure), 222-223, 486

ENFV components, 486-487

hardware requirements, 488-490

NFVIS benefits, 488

orchestration, 490

service chaining, 494-495

vBranch Function Pack, 490-493

VMs supported, 490

NFVO (NFV orchestrator), 226

back-end platform, 646-647

containerized services, 650

NSO, 646

NGFWv (Next Generation Firewall virtualized), 422-423

NGIPS (next-gen IPS), 423

NHTSA (National Highway Traffic Safety Administration), 803, 845-846

NI (natural intelligence), 890

Nirvana Stack, 212

NIST (National Institute of Standards and Technologies), 77

CPS PWG, 77

cybersecurity best practices, 659

NISTIR 7628 guidelines, 77

security recommendations, 15

SP 800-30, 829

SP 800-50, 829

SP 800-61, 829

SP 800-88, 829

SP 800-1600 Systems Security Engineering publication, 77

NISTIR 7628 guidelines, 77

NLP (natural language processing), 895-896

nodes

edge, 35

fog, 240

cabinets, 660

communications, 664

core software, 662-664

data analysis, 526

data at rest, 521

drives, 664

northbound communications, 662

operating system security, 664

RA, 662

RabbitMQ orchestrated security example, 552-558

runtime environments, 665

security, 660-662, 666

southbound APIs, 667

virtualization, 665

graph, 199

input, 199

nonfunctional security requirements analysis, 15

nonrepudiation, 38

data protection, 506

MQTT, 543

northbound SDN controller communications, securing, 267-268

RabbitMQ, 552

normal off power strategy, 347

normalization, data, 513-517

North American Electric Reliability Corporation (NERC), 78

northbound APIs (NB APIs), 43

fog nodes, 662

ODL, 206

OVS, 197

SDN, 191

northbound SDN controller communications, securing, 263-266

authorization, 267

checks and balances, 268

nonrepudiation, 267-268

REST authentication, 264-267

north–south SGACLs, 387

NSD (Network Services Descriptors) catalog, 471

NSE (network services entity), 131

NSEL (Network Security Event Logging), 444

NSF (National Service Framework), 589

NSO (Network Services Orchestrator), 646

centralized security example, 469

activation sequence, 472-474

fulfillment and assurance sequences, 474-475

NSD catalog, 471

NSR, 472

VNFD catalog, 470

PAM, 646

scalability, 647

NSR (Network Storage Resource), 472

NVM (Network Visibility Module), 615-616

O

OAM (operation and management), 192

OASIS (Organization for the Advancement of Structured Information Standards), 61

OAuth 2.0

IoT IAM, 404-405

MQTT authorization, 537-539

Object Management Group, 60

OCF (Open Connectivity Foundation), 60, 142

OCSP (Online Certificate Status Protocol), 259

ODCA (Open Data Centre Alliance), 67

ODD (operational design domain), 804

ODL (OpenDaylight), 203-212

AD-SAL versus MD-SAL, 209-210

implementation, 208

Nirvana Stack, 212

objectives, 204

OPNFV, 211

reference architecture, 204-207

AAA, 206

controllers, 206

DLUX, 207

independent network applications, 207

MD-SAL, 205

NeXT UI, 207

northbound APIs, 206

plug-ins, 204

southbound APIs, 204

SDN standards, 67

SDNi, 254

ODVA (Open DeviceNet Vendors Association), 61

OF (OpenFlow), 186, 192-195

components, 193

functions, 194

interface, 257

ONF, 193

strength, 192

OFC (OpenFog Consortium), 61

architecture, 133-138

NFV MANO convergence, 243-245

perspectives, 136

pillars, 133-135

security layers, 137

stakeholder views, 137

offloading traffic, 198

OIF (Optical Internetworking Forum), 67

oil and gas industry, 729

clientless SSL VPNs, 610-611

data flows, 790

demand and consumption, 730

digital technology investments, 735

downstream environment, 749

activities, 734

challenges, 753-754

digitization, 752

distributed control systems, 750

IoT benefits, 752

new business needs, 752

overview, 749

refining and processing architecture, 750

technologies, 750-751

E&P (exploration and production), 733

equipment health monitoring, 763-765

access control, 781

access privileges, 778-780

anomaly traffic detection, 780-781

architecture, 772

automated deployment, 777-778

command validation, 782-783

data pipelines, 771, 786-788

deployment, 766-771

limitations, 765

operational lifecycle, 772

preconfiguration checklist, 773-775

quarantines, 782

requirements, 767

service assurance, 784-786

fatality rate, 731

field operations automation, 789

future communication requirements, 790

IoT and digitization examples, 737-738

IoT goals, 731

IoT impact, 789

IT/OT integration, 788

maintenance, 752

midstream environment, 744

activities, 734

challenges, 748-749

digitization, 747

IoT benefits, 747-748

new business needs, 747

pipeline architecture, 744

pipeline management applications, 744-746

new requirements, 788

price per barrel of oil, 730

secure automation opportunities, 735

security, 754-763

accidental incidents, 755

architectures, 756-757

automation requirements, 762-763

budget constraints, 762

components, 757

control systems, 755

IDMZ, 759

IEC 62443 approach, 756

IT/OT technology separation, 758-759

malicious incidents, 755

requirements, 760-761

risk outcomes, 755

standards and guidelines, 757

vulnerabilities, 754

upstream environment

activities, 733

automation, 742-743

challenges, 743-744

communication and solution technologies, 740

fracking, 739

oil sands mining, 740

overview, 739

value, 731-734

oil sands mining, 740

OLE for Process Control (OPC), 62

on demand access control, 714-718

IPS/IDS, 717-718

self-service portal, 715-717

onboard systems, deployment, 864-865

onboard telematics, 821

onboarding

attack target, 40

devices, 102, 334-336

smart city sensors, 706-707

oneM2M architecture, 129-132

CSFs, 131

functional architecture, 131

industrial/market standards, 62

layered model, 130

ONF (Open Networking Foundation), 67, 186, 193, 257

Online Certificate Status Protocol (OSCP), 259, 357

Online Trust Alliance. See OTA

OPC (OLE for Process Control), 62

OPC Foundation, 152

OPC-UA (OPC Unified Architecture), 150-152

Open API Initiative, 61

Open Connectivity Foundation (OCF), 60, 142

Open Data Centre Alliance (ODCA), 67

Open DeviceNet Vendors Association (ODVA), 61

Open Group Open Process Automation, 61

open interoperable standards, 55

Open Networking Foundation (ONF), 67, 186, 193, 257

Open Platform for NFV (OPNFV), 67, 211

open platforms, smart cities, 677

open process automation architecture, Purdue Model of Control, 159

open standards, 55

Open Systems Interconnection (OSI), 70

Open vSwitch. See OVS

Open Web Application Security Project (OWASP), 76, 168

OpenDaylight. See ODL

OpenDaylight User Experience (DLUX), 207

OpenFlow. See OF

OpenFog Consortium. See OFC

OpenID Connect 1.0, 405

openness, 86

end-to-end considerations, 18

OpenFog reference architecture pillar, 135

SDN, 192

smart city platforms, 697

OpenStack platform, 632

operation and management (OAM), 192

operation support systems (OSS), 223

operational design domain (ODD), 804

operational lifecycle, 772

operational plane, 261

Operational Technology (OT), IT convergence, 156-157, 788

operationalization, back-end platforms, 633-634

operations

challenges, 821, 863

next-generation IoT platforms, 297

requirements, 86-87

operations and maintenance phase (SDLC), 14, 17

OPEX reduction, 219

OPNFV (Open Platform for NFV), 67, 211

Optical Internetworking Forum (OIF), 67

Oracle Integrated Cloud, 177

orchestration, 5

connected cars, 818, 848

extranet automation, 596

IoT capabilities, 288, 691

NFVIS distributed deployment, 490

police vehicles, 822

RabbitMQ fog node level security example, 552-558

SDN, 268-270

smart cities, 690, 697

system of systems platform for smart cities, 699-700

template-based extranet automation, 595

Organization for the Advancement of Structured Information Standards (OASIS), 61

OSCP (Online Certificate Status Protocol), 357

OSI (Open Systems Interconnection) model, 70

OSS (operation support systems), 223

OT (Operational Technology), IT convergence, 156-157, 788

OTA (Online Trust Alliance), 76

lifecycle management, 821

secure updates, 855-857

security standards, 76

OTA (over-the-air), 821

OTT (over the top), 89, 673

OTV (Cisco Overlay Transport), 259

out of band SGT propagation, 381

outbound packet filtering, 426

overcloud, 634

overlapping firewalls, 425

OVS (Open vSwitch), 195-198

architecture, 196

capabilities, 196

features, 198

functions, 197

traffic management, 197

traffic offloading, 198

Ovum Research IoT platform recommendations, 290

OWASP (Open Web Application Security Project), 76, 168

P

P4 (Programming Protocol-Independent Packet Processors), 201-203

forwarding model, 202

framework, 201

implementation, 203

PaaS (Platform as a Service), 7, 108

packets

DPI, 430-432

filtering

firewalls, 426-427

sanity checking, 431

user definable, 432

vector, 198-200

PAD (Peer Authorization Database), 589

PAM (pluggable authentication modules), 646

partial solutions, 88

passwords, authentication, 357-358

PAT (port address translation), 425

patches, 840

pattern matching, 438-439

PCI-SIG (PCI Special Interest Group), 284

peer systems, 124

penetration testing, 271

people (IoT), 4

people-centric architecture approach, 98-100

Perfect Forward Secrecy (PFS), 584

performance

end-to-end considerations, 20

IoT IAM, 403

isolation, 278

OpenFog Consortium architecture, 136

V2V standard requirements, 827

permissions

data, 399

EFM, 563

menu access, 399

RabbitMQ, 546

persistency, data, 529

personal health monitoring services, 805

personalized connected car experiences, 815, 862-863

perspective approach. See system viewpoint

PFS (Perfect Forward Secrecy), 584

phasor measurement unit (PMU) zones, 23

PHY (physical layers), 213

physical access, 505

physical entities, 123

physical layers (PHY), 73, 213

physical security, 9, 38, 44

physical segmentation, 21

pillars

IA, 37

OpenFog reference architecture, 133-135

pipelines (oil and gas)

architecture, 744

challenges, 748-749

data security, 786-788

digitization, 747

IoT benefits, 747-748

management applications, 744-746

new business needs, 747

PKI (Private Key Infrastructure), 351-355

placement, platforms, 89

planning security, 16

Platform as a Service (PaaS), 7

Platform Exchange Grid (pxGrid), 446

platforms

back-end, 631-634

access control, 637-646

API security, 634-635

containerized services management, 649-653

dashboard, 635-637

NFVO, 646-647

operationalization, 633-634

options, 631

overcloud/undercloud, 634

requirements, 631

REST APIs, 634-635

VFM, 648

VIM, 648-649

converged and multifaceted, 246-248

definition, 88

independence, 151

open, 677

OTT IoT, 673

placement, 89

public shared, 89

Smart City, 692-693

plug-ins

clientless SSL VPN application access, 609

ODL, 204

RabbitMQ, 548

pluggable authentication modules (PAM), 646

PMU (phasor measurement unit) zones, 23

point-in-time protection, 456-457

police vehicles, 821

ANPR, 820

audible and visual warning systems, 820

battery management, 821

integrated approach, 821

mobile data terminals, 820

onboard systems and technologies, 819-821

onboard telematics, 821

operational challenges, 821

orchestrated services, enabling with consolidated orchestrated hardware, 822

radios, 820

smart city integration, 719-721

speed detection, 820

speed recognition devices, 820

vehicle tracking, 820

video camera and audio systems, 820

wearables, 821

Wi-Fi hotspots, 821

policies

authorization, 403

implementation, 53

MUD, 390-391

network enforced, 170

port address translation (PAT), 425

portals

self-service, 714-717

SSL VPNs, 602-603

ports

application detectors, 434

forwarding, 606

security, 341

posture, 28, 618

power

communication, 347-348

monitoring and controlling in smart cities, 702

virtualization, 702-704

preconfiguration checklist, 773-775

Predix, 177

presentation, 5

preserving information, 17

preshared keys. See PSKs

preventing threats. See IPS

preventive automated maintenance, 742

privacy

cloud computing, 110

Cloud Customer Architecture for IoT, 142

connected cars standard, 828

IISF, 162

IoT-A RA, 124

IoT IAM, 403

people-/user-centric approaches, 100

private blockchain, 884

private clouds, 107

private keys, 276-278

privileges, dynamic authorization, 367

proactive data protection mechanisms, 567-571

proactive mode (SDN), 190

probes

Device Sensor, 344

embedded within ISE, 338

ISE profiling capability leveraging, 338

procedures, 17, 54

processes, 4, 393-394

processing

architectural layer, 86

context, 102

profile provisioning, 330-331

AWS IoT example, 331-333

attributes, associating, 331

certificate and associated key pair, 332

certificate management, 333

connection kit, downloading, 332

temperature sensor, adding to registry, 331

Cisco Identity Services Engine example, 334-336

profiles, users, 628-630

profiling ISE process, 337-340

Programming Protocol-Independent Packet Processors. See P4

propagation, TrustSec, 381-383

protecting data, 531

backups, 570

CAP theorem, 568-569

control plane, 566-567

data virtualization, 564

digital twins, 569

EFM, 560-564

components, 561

computation, 562

data collection, 562

DSLinks, 563

permissions, 563

quarantine, 563

management plane, 565-566

MQTT, 532-533

authentication, 533-535

authorization, 535-539

availability, 542-543

confidentiality, 539-540

integrity, 540-542

layers, 532

nonrepudiation, 543

transport encryption, 532

proactive mechanisms, 567-571

RabbitMQ, 544-547

access control, 546

authentication, 547-548

authorization, 548-549

availability, 550-551

confidentiality, 549

exchanges, 544

fog node orchestration example, 552-558

integrity, 549

nonrepudiation, 552

permissions, 546

plug-ins, 548

vhosts, 546-547

reactive mechanisms, 571-573

protocols, 41

6LoWPAN, 74

AMQP, 74

analysis, 439

CIP, 428

CoAP, 349-350

communication, 70

DCI, 259

DTLS, 74, 612

Flexible NetFlow, 444

HTTP, 74, 264

HTTPS, 74, 598

IKE, 578

IKEv1, 579, 586-587

aggressive mode, 582

authentication mode, 579

D-H groups, 580

encryption algorithms, 580

hashing algorithms, 580

IKEv2 comparison, 586

main mode, 580-581

IKEv2, 584-588

exchange process, 584-586

IKEv1 comparison, 586

industrial

CIP, 428-432

lack of security, 429

potential solutions, 430

IP, 73

IPsec. See IPsec

L2MP, 259

MQTT. See MQTT

NetFlow, 442-443

OCSP, 259, 357

OTV, 259

OVS supported, 196

RPL, 73

SNMP, 259

SXP, 381

TCP, 74

TLS, 74

UDP, 74

vulnerabilities, 42

VXLAN, 259

XMPP, 74, 258

prototype with OAuth2, 410

provisioning devices, 326, 330-331

AWS IoT example, 331-333

Cisco Identity Services Engine example, 334-336

proximity

fog computing, 116-117

IIRA, 146

PSKs (preshared keys), 349

cracking, 41

IPsec peer authentication, 579

public blockchains, 884

public clouds, 107

public keys, 352

public platforms, 89

public services, on demand access control, 714-718

IPS/IDS, 717-718

self-service portal, 715-717

public shared platforms, 89

publish-subscribe management, 102

pub/sub systems, 527-530

Purdue Model of Control, 157-160

hierarchy, 5, 158

open process automation, 159

segmentation of data responsibilities, 500-502

segmented architecture based on, 157

pxGrid (Platform Exchange Grid), 446

Q

QKD (quantum key distribution), 276

QoS (Quality of Service), cloud computing, 112

quadruple silo, 683

quarantines

EFM, 563

equipment health monitoring example, 782

R

RA (remote attestation), 662

RabbitMQ, 544-547

access control, 546

authentication, 547-548

authorization, 548-549

availability, 550-551

confidentiality, 549

configuring, 643

exchanges, 544

fog node level orchestration example, 552-558

fog node running TEEs deployment, 554

orchestrated transaction, 556-558

tenant administrator responsibilities, 555-556

integrity, 549

nonrepudiation, 552

permissions, 546

plug-ins, 548

vhosts, 546-547

Radio Frequency Identification (RFID), 327

radios, police vehicles, 820

RADIUS, 361-362

A/V pairs, 362

CoA, 368

request commands, 370-371

Request/Response codes, 369

requests, 368-369

session identification, 369

VLAN assignments, 371-374

message types, 362

RAMI 4.0, 148

ransomware programs, 454

rating threats, 28

RawPublicKey, 349

RBAC (role-based access control), 169

Cisco IoT security framework, 169

dynamic segmentation based on, 378

multitenancy data sharing, 644

reactive data protection mechanisms, 571-573

reactive mode (SDN), 189

real-time processing, cloud computing, 112

recommendations, IoT platforms, 289-290

recursive DNS, 462

reference architectures, 87

IIRA, 144-146

next-generation IoT platforms, 293

ODL, 204-207

AAA, 206

controllers, 206

DLUX, 207

independent network applications, 207

MD-SAL, 205

NeXT UI, 207

northbound APIs, 206

plug-ins, 204

southbound APIs, 204

OpenFog Consortium, 133-138

perspectives, 136

pillars, 133-135

security layers, 137

stakeholder views, 137

RAMI 4.0, 148

reference implementation, 87

reference models, 87

AIOTI architecture, 138

GridBlocks, 153-154

IoT-A RA, 121

IoTR-A RA entity-based, 123

ITU-T Y.2060, 125-126

IoTWF, 126-129

Purdue Model of Control, 157-160

hierarchical data flow model, 158

open process automation, 159

segmented architecture based on, 157

reference standards, 59-61

registering devices, 330-331

AWS IoT example, 331-333

Cisco Identity Services Engine example, 334-336

regulations, 53

regulatory bodies, 56

RelayR IoT Middleware Platform, 177

reliability, 86

cloud computing, 109

fog computing, 115-117

high, 293

IISF, 162

OpenFog reference architecture pillar, 135

SDN, 190

standards, 54

remediation

remote HMI access, 619-620

threats, 878

remote access

connected cars, 806

Human Management Interface (HMI), 617

VPNs, 598

remote access SSL-based VPNs, 598

AnyConnect client, 611

configuration, 612

deployment, 611

manufacturing example, 617-621

modules, 612-616

client-based, 600, 612

clientless, 599-611

application access, 604-609

client-based comparison, 600

components, 602

DAP, 609

group policies, 602

oil and gas example, 610-611

portal, 602-603

tunnel groups, 601

HTTPS, 598

multiple solutions, 599

reverse proxy, 599

remote attestation (RA), 662

remote management, 704-705

repeatability, 597

reporting, 16

Representational State Transfer. See REST

Request/Response codes (CoA), 369-371

requirements

accounting, 400-401

back-end platform security, 631

connected car interoperability infrastructures, 829

connected car orchestration, 818

equipment health monitoring example, 767

fog computing, 115

IoT IAM, 403-404

IoT implementation and operation, 86

next-generation IoT platforms, 308

NFVIS hardware, 488-490

oil and gas industry, 760-761, 788-790

SDN-based IPsec flow protection interface, 590

security, 75

reserving CPU/memory, 278

resilience, IISF, 162

REST (Representational State Transfer), 349

APIs, 634-635

authentication, 264-267

CoAP, 349-350

data at, 518, 521

restrictions, constrained devices, 345

retrospection malware detection, 457-458

reusable templates, 469

reverse proxy, 599

revocation, 259, 267, 356-357

RFID (Radio Frequency Identification), 327

risks

assessing, 15, 58, 829

biometric authentication, 360

identifying, 25

classification, 27

identification, 25-26

risk scores, 28

threat modeling, 27

oil and gas industry security malicious/accidental attacks, 755

scores, 28

roaming protection, AnyConnect client, 614-615

Rockwell Automation, 153

role-based access control. See RBAC

roles

IDs, 637-639

users, 628-630

RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks), 73

RSA-encrypted nonces, 579

RSA signatures, 579

rules, centralized security, 483-486

runtime environments, 665

S

SAs, 582-584

SaaS (Software as a Service)

cloud computing deployment, 108

IoT, 7

SAD (Security Association Database), 589

SAE (Society of Automotive Engineers)

automated driving system levels, 803-804

International connected car standards, 827-829

J2735, 827

J2945/1, 827

J3061, 827

J3101, 827

safety

IISF, 162

standards, 54

SA_INIT Exchange, 585

Salesforce IoT Cloud, 176

Samsung Artik, 176

sandboxing, 458

sanity checking, 431

SANS paper, Security Evaluation of Z-Wave Wireless Protocol, 40

SAP Cloud Platform, 177

SASL (Simple Authentication and Security Layer), 547

scalability, 86, 191

blockchain, 886

cloud computing, 109

data-centric architectures, 105

end-to-end considerations, 20

ICN, 103

IoT, 5

IoT IAM, 402-403

IRM, 413

KPI, 483

next-generation IoT platforms, 293

NSO, 647

OpenFog reference architecture pillar, 135

standards, 54

VMs, 481

SDK (software development kits), 20

SDLC (System Development Lifecycle), 13

acquisition and development, 14-16

assessment, 14

disposition, 14, 17

implementation, 14-16

initiation, 14-15

operations and maintenance, 14, 17

SDN (software-defined networking), 7, 64-65, 185, 188

agility, 192

applications, 270-271

architectures, 154-156, 189-192

applications layer, 191

control layer, 190

infrastructure layer, 189

northbound API, 191

southbound API, 191

attacks, 42-43

controllers

east-west communication, securing, 254-256

northbound communication, securing, 263-268

securing, 252-253

southbound communication, securing, 256-260

history, 185

infrastructure

control plane, 262

data, 262-263

management, 261

operations, 261

securing, 260-263

IPsec

dynamic decryption, 592-594

flow protection, 588-591

IoT application, 592-594

NFV, compared, 187

OAM, 192

ODL, 203-212

AD-SAL versus MD-SAL, 209-210

implementation, 208

Nirvana Stack, 212

objectives, 204

OPNFV, 211

reference architecture, 204-207

OF, 192-195

components, 193

functions, 194

ONF, 193

strength, 192

openness, 192

orchestration, 268-270

OVS, 195-198

architecture, 196

capabilities, 196

features, 198

functions, 197

traffic management, 197

traffic offloading, 198

P4, 201-203

forwarding model, 202

framework, 201

implementation, 203

reliability, 190

scalability, 191

SDR, 212-214

SDX

challenges, 233-235

fog computing, 243

IoT enabling capabilities, 235

security

applications, 270-271

controller, 252-253

controller east-west communications, 254-256

controller northbound communications, 263-268

controller southbound communications, 256-260

infrastructure, 260-263

orchestration, 268-270

services, 270-271

underlying operating system, 253

services, 270-271

standards, 65-67

strengths, 186-191

underlying operating system, 253

VPP, 198-200

data plane programmability, 200

directed graph of nodes, 199

DPDK, 200

WANs, 214-217

SDNi (SDN Controller Inter-communication), 254-255

SDO (standards development organizations), 130

SD-PHY (software-defined PHY), 213

SDR (software-defined radio), 212-214

SD-WANs (software-defined wide-area networks), 186

SDWN (software-defined wireless networking), 186

SDX (software-defined X), 186

challenges, 233-235

fog computing, 243

history, 186

IoT enabling capabilities, 235

secure boot, 274-275

secure bootstrapping, 328

BRSKI, 329-330

immutable identities, 328-329

secure crash, 275

Secure Hash Algorithm (SHA), 580

Secure HTTP (HTTPS), 74

Secure Key Exchange Mechanism (SKEME), 578

Secure Sockets Layer. See SSL

Secure Technology Alliance, 76

Secure Unique Device Identification (SUDI), 328-329

security, 8-9

architectural layer, 86

assurance requirements analysis, 16

attack continuum, 11-12

automating, 876

catalogs, 656

cloud computing, 110

collaborative, 899

communications, 658-659

compliance and governance, 5

connected cars, 830

attack surface, 831

challenges, 835

connectivity challenges, 840

considerations, 839

consolidation, 849

data-centric and application-centric fusion, 849

design implementations, 847

driver concerns, 837

encryption, 837

goals, 847-848

industry alliances, 847

layered approach, 850-851

reasons for, 830

safety-criticality, 836

threats, 831-834

U.K. supply chain guidelines, 842-845

upgrades/patches, 840

U.S. supply chain guidelines, 845-846

vulnerabilities, 836-840

control, 16

control planes, 659

data pipelines, 713-714

data planes, 659

data sharing, 9

data stores, 658

DNS-based. See DNS-based security

Docker, 653-655

end-to-end considerations, 20

endpoints, 9

enforcing, 90

fog agents, 666

fog computing, 115-117

ICN, 103

insecure devices, 9

IoT-A RA, 124

IoT platforms, 178-179

Kubernetes best practices, 656-658

layers, 43

application, 46

device, 45

human, 44

network, 45-46

physical, 44

management planes, 658

NFV, 272

authenticated time service, 281

backdoors, 281-282

boot integrity, 274-275

multi-administrator isolation, 282-283

performance isolation, 278

private keys, 276-278

secure crash, 275

SRIOV, 283-285

tenant/user AAA, 279-280

threat landscape, 273

NIST recommendations, 15

oil and gas industry, 754-763

accidental incidents, 755

architectures, 756-757

automation requirements, 762-763

budget constraints, 762

components, 757

control systems, 755

IDMZ, 759

IEC 62443 approach, 756

IT/OT technology separation, 758-759

malicious incidents, 755

new requirements, 788

requirements, 760-761

risk outcomes, 755

standards and guidelines, 757

vulnerabilities, 754

OPC UA, 151

OpenFog Consortium architecture, 136

OpenFog reference architecture pillar, 134

physical, 9, 38, 44

planning, 16

police vehicles, 821

requirements, 75

risk assessments, 15

SDN

applications, 270-271

controller, 252-253

controller east-west communications, 254-256

controller northbound communications, 263-268

controller southbound communications, 256-260

infrastructure, 260-263

orchestration, 268-270

services, 270-271

underlying operating system, 253

smart cities, 681, 693-696

Cloud Security Alliance recommendations, 695

threats, 694

spanning the enterprise, 12

standards, 54, 75-78

technology lifecycles, 9

threats, 8

Security Association Database (SAD), 589

Security Evaluation of Z-Wave Wireless Protocol, 40

security events algorithms, 445

Security Group Firewall (SGFW), 384

Security Group Tag ACL (SGACL), 384

Security Group Tags. See SGTs

Security Intelligence Operations (SIO), 456

Security Policy Database (SPD), 589

segmentation, 21-25

architectures, 157

connected car security, 857

data responsibilities, 500-502

dynamic decryption, 592

dynamic RBAC-based, 378

industry compliance standards, 23

logical, 22

physical, 21

security policies, 22

self-registration workflow, 334-336

self-service portals, 714-717

semantics, people-/user-centric approaches, 99

semistructured data, 510

sensors

data, sharing, 824

smart cities

access control, 708-709

onboarding, 706-707

sequences

activation, 472-474

event-based video and security use case, 319-320

fulfillment and assurance, 474-481

Serra, James, 523

servers

architecture, 99

authentication, 363

IoT, 102

UCS E-Series, 489

services

architectural layer, 86

assurance, 784-786

catalogs, 656

chaining, 306-307

next-generation IoT platforms, 304

NFVIS distributed deployment, 494-495

cloud computing deployment, 108

connected cars, 805

containerized, managing, 649-653

deployment, 33, 639-641

disabling SDN orchestration, 270

discovery, 102

future connected car, 815

hierarchy, 37

ICN, 102

intelligent proxy, 464-465

intended outcomes, 304-306

IoT-A RA, 123

microservices, 36

naming, 102

network orchestrator. See NSO

next-generation IoT platforms, 299, 304

SDN, 270-271

smart cities, 691-692

support layer, 125

SESSION_OUT metric, 482-483

sessions

IDs, 369, 533

tickets, 533

SGACL (Security Group Tag ACL), 384

automation, 388

benefits, 384

consumer/provider matrix, 384-386

east–west, 387

microsegmentation, 387

north–south, 387

SGFW (Security Group Firewall), 384

SGIP (Smart Grid Interoperability Panel), 62

SGT (Security Group Tag), 376-377

dynamic assignment, 380

enforcement, 384

equipment health monitoring example, 781

inline tagging, 383

NetFlow records information, 447

propagation, 381-383

RBAC-based segmentation, 378

static assignment, 380

static/dynamic assignment, 380

SGT Exchange Protocol (SXP), 381

SHA (Secure Hash Algorithm), 580

sharing

data, 9, 641, 644

devices, 315

sensor data, 824

Shenker, Scott, 186

show authentication session command, 371

Siemens MindSphere, 176

signatures, 579

siloed systems, police vehicles, 821

silos, 683

Simple Authentication and Security Layer (SASL), 547

Simple Network Management Protocol (SNMP), 259

single root I/O virtualization (SRIOV), 283-285

SIO (Security Intelligence Operations), 456

SIoT (social IoT), 98

site-to-site IPsec VPNs, 576

IKEv1, 586-588

IKEv1 phase 1, 579-582

aggressive mode, 582

authentication method, 579

D-H (Diffie-Hellman) groups, 580

encryption algorithms, 580

hashing algorithms, 580

main mode, 580-581

IKEv1 phase 2, 582-584

NAT-T (NAT-Traversal), 583

PFS, 584

quick mode, 582

IKEv2, 584-586

exchange process, 584-586

phase 1 attributes, 586-587

phase 2 attributes, 588

versus IKEv1, 586

SKEME (Secure Key Exchange Mechanism), 578

smart cities

automation, 721-722

benefits, 693

buildings, 680

challenges, 684

citizen experience, 681

city-wide platforms, 692-693

common components, 679

common platform implementation, 696

compliance, 682

connected cars, 806

consolidation, 698

cybersecurity, 682

data-app centric, 697

data management, 682

defined, 676

deployment automation, 723-725

economic impact of IoT deployments, 688

ecosystem groupings, 683

emergency vehicle fleet management, 719-721

event-based video, 709-714

governance, 682

growth, 678

healthcare, 681

high-level architecture, 701

horizontal approaches, 685

infrastructure operational efficiency, 681

interface types, 696

investments, 676

IoT orchestration capabilities, 691

market segments, 676

multitenancy, 698

networking and communications, 682

open platforms, 677

orchestration, 690, 697

platform openness, 697

power monitoring and control, 702

public service connectivity on demand, 714-718

IPS/IDS, 717-718

self-service portal, 715-717

quadruple silo, 683

secure remote application lifecycle management, 704-705

security, 681, 693-696

sensors, 706-709

services benefiting from automation capabilities, 691-692

standards, 685-687

street cabinet monitoring, 705-709

system of systems, 690, 699-700

threats, 678

traditional city operating models, 685

transportation and urban mobility, 680

vendors, 689

vertical applications overview, 679

virtualization of power controllers, 702, 704

workforces, 681

Smart City Platform, 692-693

smart factories, 148

Smart Grid Interoperability Panel (SGIP), 62

smart traffic system fog example, 238-241

smart tunnels, 607

SMC (Stealthwatch Management Console), 445, 453

SNMP (Simple Network Management Protocol), 259

social IoT (SIoT), 98

Society of Automotive Engineers. See SAE

software

connected cars, 828-829

disposal, 17

extranet automation, 597

lifecycle processes, 828

Software as a Service. See SaaS

software-defined networking. See SDN

software-defined PHY (SD-PHY), 213

software-defined radio (SDR), 212-214

software-defined wide-area networks (SD-WANs), 186

software-defined X. See SDX

software development kits (SDK), 20

solution technologies, oil and gas upstream environment, 740

Sourcefire Vulnerability Research team (VRT), 456

southbound APIs

fog nodes, 667

ODL, 204

SDN, 191

southbound SDN controller communications, securing, 256-259

authentication, 258

checks and balances, 260

encryption, 258

revocation, 259

SNMP, 259

SP 800-1600 Systems Security Engineering publication, 77

SPD (Security Policy Database), 589

speed

detection services, 820

fog computing, 116

recognition devices, 820

SRIOV (single root I/O virtualization), 283-285

SSL (Secure Sockets Layer), 598

AnyConnect client, 611

configuration, 612

deployment, 611

manufacturing example, 617-621

modules, 612-616

client-based, 600, 612

clientless, 599-611

application access, 604-609

client-based comparison, 600

components, 602

DAP, 609

group policies, 602

oil and gas example, 610-611

portal, 602-603

tunnel groups, 601

HTTPS, 598

multiple solutions, 599

pinning, 357

reverse proxy, 599

stakeholder views, OpenFog Consortium, 137

standards

advantages, 57

alignment, 50

alliances, 56

architectural, 59-61

bodies, 56

business benefits, 54

choices, 54

choosing, 57

connected cars, 826-829

Europe, 827

Japan, 827

SAE International, 827-829

U.K., 827

U.S., 826

considerations, 50-52, 57

consortia, 56

data modeling, 67, 70

defining, 54-56

history, 50

implementation, 53

industrial-focused, 61-63

interoperability, 50-55

legislation, 54

main groups, 58

market-focused, 61-63

next-generation IoT platforms, 292

NFV, 65-67

oil and gas industry security, 757

open, 55

regulatory bodies, 56

reliability, 54

safety, 54

scalability, 54

SDN, 65-67

security, 54, 75-78

smart cities, 685-687

standards bodies, 56

standards development organizations (SDO), 130

state convergence algorithm, 475

static NAT, 424

static SGT assignment, 380

Stealthwatch Flow Collector, 445, 453

Stealthwatch Management Console (SMC), 445

storage

blockchain, 886

endpoint collected data, 520

ICN, 102

structured data, 509

subgroups, identifying, 26

subsymbolic AI, 891-892

SUDI (Secure Unique Device Identification), 328-329

supervised ML, 894

supply chain guidelines, 842-845

SXP (SGT Exchange Protocol), 381

symbolic AI, 891-892

system

application detectors, 433

hierarchy

applications, 36

business processes, 37

center, 36

communication nodes, 36

core networks, 36

edge networks, 36

edge nodes, 35

endpoints, 35

fog networks, 36

gateways, 35

microservices, 36

services, 37

things, 35

integration, 16

interaction, 5

System Development Lifecycle. See SDLC

system of systems, smart cities, 690, 699-700

system viewpoint, 89, 106

cloud computing, 106-112

advantages, 109

characteristics, 107

deployment, 107-108

disadvantages, 110

edge computing, 112-113

fog computing, 112

advantages, 116-118

communications, 114

data handling, 115

disadvantages, 117

edge computing, compared, 113

requirements, 115

OpenFog reference architecture, 136

T

TALOS (Advanced Malware Protection), 456

TAM (ternary content addressable memory), 374

targeted marketing, connected cars, 815

targets, attacks, 39

communication, 41-42

gateways, 40-41

SDN, 42-43

things, 39-40

TCP (Transmission Control Protocol), 74

technical assistance, Industry 4.0, 148

technologies

downstream environment (oil and gas), 750-752

Gartner Hype Cycle for Engineering Technologies 2017, 879

lifecycles, 9

oil and gas industry, 744

transition, 802

upstream environment (oil and gas), 739

TEEs (trusted execution environments), 302, 666, 711

telecom industry

NFV benefits, 219-221

revenue gap, 218

telemetry sensors, adding to street cabinets, 706-707

Telit Application Enablement Platform, 177

templates

extranet automation, 595

reusable, 469

tenants

AAA, 279-280

execution environments, 302, 666, 711

multitenancy, 296

ternary content addressable memory (TAM), 374

testing

developmental security test and evaluation, 16

penetration, 271

Tetra (Terrestrial Trunked Radio), 820

thing-centric architecture, 32, 92-93

Thing Shadow, 397

things

architectural layer, 85

attack target, 39

attacks, 40

hierarchy, 35

IoT, 3

ThingWorx IoT platform, 176

Thread Group, industrial/market standards, 62

Threat Grid, 458, 465

threats, 8

AI cybersecurity systems, 878

AMP, 456

file policies, 461

FTD, 459-461

point-in-time detection, 456-457

retrospection, 457-458

sandboxing, 458

AnyConnect protection, 616

APTs, 440-441

attack continuum, 11-12

connected cars, 831-834

data breach costs, 418

detecting. See IDS

documenting, 27

encrypted network traffic, 451-453

identifying, 27, 878

modeling, 27

NFV, 273

preventing. See IPS

public shared platforms, 89

rating, 28

remediation, 878

SDN orchestration, 269

smart cities, 678, 694

TALOS, 456

WannaCry, 454

tiers

Cloud Customer Architecture for IoT, 141

IIRA, 146

time service, 281

TLS (Transport Layer Security), 74, 539

TND (Trusted Network Detection), 613

tokens

authentication, 265

biometric, 360

top IoT platforms for 2018, 176-177

topic exchanges, 545

TouchID, 359

TPM (Trust Platform Module), 355

traditional city operating models, 685

traffic

APTs, 440-441

behavioral analysis, 440-441

contextual information with adaptive network control, pairing, 446

NaaS, 444-446

oil and gas pump station example, 447-450

solutions, 441

visibility protocols, 442-444

encrypted analytics, 450-454

equipment health monitoring example, 780-781

ETA

cryptographic compliance, 454

threat detection, 451-452

WannaCry, 454

offloading, 198

OVS management, 197

packet filtering, 426-427

transactions

blockchain, 886

people-/user-centric approaches, 99

transferable relationships, 414

Transmission Control Protocol (TCP), 74

transport architectural layer, 85

transport encryption, 532

Transport Layer Security (TLS), 74, 539

transport layers, communication, 74

transportation

smart cities, 680

smart traffic fog computing example, 238-241

triggers, smart city event-based video, 710

trust

CRTM, 663

devices, 315, 328

DRTM, 663

execution environments, 302, 666, 711

explicit, 355

IISF, 161

relationships, 171

stores, 355

Trust Platform Module (TPM), 355

Trusted Network Detection (TND), 613

TrustSec, 376-379

classification, 380

controllers, 368

enforcement, 384

fields (Flexible NetFlow), 447

inline tagging, 383

propagation, 381-383

tunnels

smart, 607

SSL VPNs, 601

Twistlock, 654

U

UCS C220 M4 Rack Server, 489

UCS E-Series servers, 489

UDP (User Datagram Protocol), 74

UIs (user interfaces), 297

front-end, 630, 657

management, 627-628

next-generation IoT platforms, 297

U.K. connected car standards, 827

Umbrella, 463

AMP Threat Grid, 465

healthcare industry protection, 465-466

intelligent proxy services, 464-465

response categories, 463

umbrella groups for IoT security, 61

undercloud, back-end platforms, 634

underlying operating systems, securing, 253

uniform resource indicators (URIs), 327

unique identifiers

EUIs, 327

SUDI, 328-329

universal architectures, 89, 120

CPwE, 153

GridBlocks, 153-154

IIRA, 144-146

Industry 4.0, 148-149

NFV-based, 154-156

OPC-UA, 150-152

SDN-based, 154-156

Universal IoT Platform, 176

Universal Plug and Play (UPnP), 42

unstructured data, 511

updates

OTA secure, 855-857

SDN orchestration, 270

upgrading connected car security, 840

UPnP (Universal Plug and Play), 42

upstream environment (oil and gas industry), 733

automation, 742-743

challenges, 743-744

communication and solution technologies, 740

fracking, 739

oil sands mining, 740

overview, 739

urban mobility, smart cities, 680

URIs (uniform resource indicators), 327

U.S.

connected car standards, 826

supply chain guidelines, 845-846

User Datagram Protocol (UDP), 74

users

application detectors, 433

architecture, 98-100

IDs, 637-639

interfaces. See UIs

interaction, 124

packet filtering, 432

roles/profiles, 628-630

V

V2C (vehicle-to-cloud), 807

V2D (vehicle-to-device), 808

V2G (vehicle-to-grid), 808

V2I (vehicle-to-infrastructure), 807

V2P (vehicle-to-pedestrian), 807

V2V (vehicle-to-vehicle), 807, 827

V2X (vehicle-to-everything), 802, 808

validation, commands, 782-783

value

automating security, 876

data, 512, 813

oil and gas, 731-734

variety, data, 512, 813

vBranch Function Pack, 490-493

Vector Packet Processing (VPP), 198-200

vectors, attack, 38

vehicle-to-cloud (V2C), 807

vehicle-to-device (V2D), 808

vehicle-to-everything (V2X), 802, 808

vehicle-to-grid (V2G), 808

vehicle-to-infrastructure (V2I), 807

vehicle-to-pedestrian (V2P), 807

vehicle-to-vehicle (V2V), 807, 827

vehicles

care services, 806

maintenance services, 813

tracking, 820

velocity, 813, 876

vendors

ecosystem, 809

smart cities, 689

veracity, data, 813

vertical applications, 679

VFs (virtual functions), 298, 317

VFM (Virtual Function Manager), 245, 300

back-end platform, 648

containerized services, 650

vhosts

clients, adding, 642

RabbitMQ, 546-547

video

cameras, police vehicles, 820

computer vision, 898

event-based, 709-714

data pipeline security, 713-714

deployment, 710-712

triggers, 710

security use case, 309-321

architecture overview, 313

cabinet monitoring, 314

deployment, 316-319

description, 312

preparatory work, 315-316

sequence of events, 319-320

triggers, 312

VIM (Virtual Infrastructure Manager), 228, 300

back-end platform, 648-649

containerized services, 650

Virtual Extensible Lan (VXLAN), 259

Virtual Function Manager. See VFM

virtual functions (VFs), 298, 317

Virtual Infrastructure Manager. See VIM

virtual LANs. See VLANs

Virtual Machines. See VMs

virtual network function component (VNFC), 221

Virtual Network Function Descriptor (VNFD) catalog, 470

virtual network functions. See VNFs

virtual routing and forwarding (VRF), 23

virtualization

centralized deployment. See centralized deployment security example

data, 564

distributed deployment, 486-495

fog nodes, 665

next-generation IoT platforms, 297

power controllers, 702-704

single root I/O, 283-285

VNFs, 278

visibility

Cisco IoT security framework, 170

NaaS, 444-446

protocols, 442-444

visual warning systems, police cars, 820

visualization, 627

VLANs (virtual LANs)

assignments via CoA, 371-374

logical segmentation, 22

VMs (Virtual Machines)

alive rule, 484

centralized security example, 469

NFVIS supported, 490

overloaded/underloaded rules, 484

scaling, 481

SRIOV, 283-285

VM_ALIVE KPI script, 480-481

VM_ALIVE rule, 484

VM_OVERLOADED rule, 484

VM_UNDERLOADED_EMPTY rule, 484

VMware IoT platform key areas, 288

VNFs (virtual network functions), 154, 187

activation status, 474

centralized deployment, 419

crashes, 275

fulfillment and assurance sequences, 474-475

monitoring, 475

dynamic mapping, 478

ESC, 476-477

fulfillment and assurance sequences, 479-480

KPI monitoring methods, 479

prerequisites, 475

VM alive script, 480-481

OFL alignment, 67, 211

performance isolation, 278

private keys, 276-278

time service authentication, 281

virtualization, 278

VNFC (virtual network function component), 221

VNFD (Virtual Network Function Descriptor) catalog, 470

VNFM (VNF manager), 227, 274

volume, data, 813

VPNs

AnyConnect client, 612-613

extranets. See extranets

remote access SSL-based. See remote-access SSL-based VPNs

site-to-site IPsec, 576

IKEv1 phase 1, 579-582, 586-587

IKEv1 phase 2, 582-584, 588

IKEv2 phase 1, 586-587

IKEv2 phase 2, 584-588

IKEv2 versus IKEv1, 586

VPP (Vector Packet Processing), 198-200

VRF (virtual routing and forwarding), 23

VRT (Vulnerability Research team), 456

vulnerabilities

connected cars, 836-840

JavaScript, 635

oil and gas industry security, 754

VXLAN (Virtual Extensible Lan), 259

W

WANs (wide-area networks), 214-217

WannaCry, 454

Watson, 176

WAVE (Wireless Access in Vehicular Environments) standards, 826

weaknesses, IDS/IPS, 439-440

wearables, police vehicles, 821

web application detectors, 434

websites

AIOTI, 59

ATIS, 65

BBF, 65

BRSKI Internet Draft, 330

CIGRE, 66

Cisco Kinetic IoT Platform, 177

CPwE, 153

CSA, 77

DDS, 105

EdgeX Foundry, 177

ETSI, 59, 66, 76

FD.io, 198

GridBlocks, 153

I am the Cavalry, 77

IBM Bluemix, 177

IEC 62351 standard, 78

IEC 62443 standard, 78

IEEE, 59, 66, 76

IETF, 60, 66

IIC, 61, 78

Intel IoT Platform, 177

IoT

IAP, 77

Global Council, 78

IoTivity, 60

Security Foundation, 76

IPSO Alliance, 60

IRTF, 60, 66, 78

ISOC, 66

ITS, 826

ITU-T, 60, 66

MAPI, 62

MEF, 66

NERC, 78

NIST, 77

NIST SP 800-1600 Systems Security Engineering publication, 77

OASIS, 61

Object Management Group, 60

OCF, 60

ODCA, 67

ODVA, 61

OFC, 61

OIF, 67

oneM2M, 62

ONF, 67

OPC, 62

Open API Initiative, 61

Open Group Open Process Automation, 61

OpenDaylight Foundation, 67

OPNFV, 67

OTA, 76

OWASP, 76, 168

PCS PWG, 77

RelayR IoT Middleware, 177

SAP Cloud Platform, 177

Secure Technology Alliance, 76

SGIP, 62

Telit Application Enablement Platform, 177

Thread Group, 62

web-type ACLs, 606

wide-area networks (WANs), 214, 217

Wi-Fi hotspots

police vehicles, 821

security, 861-862

wireless attacks, 41

Wireless Access in Vehicular Environments (WAVE), 826

workforces, smart cities, 681

X

X.509 certificates, 352-353, 390

X-centric architecture, 89-97

cloud-centric, 95-96

data-centric, 104-105

enterprise-centric, 96-97

Gartner-defined centric views, 97

gateway-centric, 94-95

hub-centric, 94

information-centric. See ICN

mobile-centric, 93-94

people-/user-centric, 98-100

thing-centric, 92-93

XMPP (Extensible Messaging and Presence Protocol), 74, 258

XSS (cross-site scripting), 635

Y

YANG, 68

building blocks, 304-306

deployment preparations, 316

Function Pack, 306

MUD, 391

Z

zoning

connected car security, 857-858

PMU, 23

ZT (ZeroTouch), 667

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.243.184