語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
IoT Security : = Modeling Development and Validation of IoT Technology.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
IoT Security :/
其他題名:
Modeling Development and Validation of IoT Technology.
作者:
Osho, John Ajetunmobi.
面頁冊數:
1 online resource (232 pages)
附註:
Source: Dissertations Abstracts International, Volume: 84-04, Section: A.
Contained By:
Dissertations Abstracts International84-04A.
標題:
Data integrity. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29408759click for full text (PQDT)
ISBN:
9798352650486
IoT Security : = Modeling Development and Validation of IoT Technology.
Osho, John Ajetunmobi.
IoT Security :
Modeling Development and Validation of IoT Technology. - 1 online resource (232 pages)
Source: Dissertations Abstracts International, Volume: 84-04, Section: A.
Thesis (Ph.D.)--Auburn University, 2022.
Includes bibliographical references
Modern design and development practices advocates including security as early as possible in the overall IoT engineering strategy. Tuning products late in the product cycle is costly due to changes rippling across components, so it is cheaper to fix errors early in the design and development phase. Security underscores this principle. It is more cost effective to integrate security protections into a product than it is to patch vulnerabilities. In the secure design of the IoT, the research focuses on integrity and availability security principles. The research establishes a methodology and tool for modeling and describing functionality and security of an IoT device. The Framework allows the secure modeling, design, and validation of functional requirements, security requirements, specification, and constraints by defining a methodology and developing a validation tool using a software engineering and digital twin prototyping concepts. The research methodology is investigated by demonstrating proposed framework on a case study IoT device, the Temperature LED Indicator, and a commercial-grade IoT device, and a Sonoff BASIC R3 WiFi switch. The deliverables of the research are the description of the IoT device, the IoT device, an emulator and a verification and validation tool. The verification and validation tool to verify the IoT device functions according to specification during normal operation and goes out of specification during a cyber-attack.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798352650486Subjects--Topical Terms:
2142314
Data integrity.
Index Terms--Genre/Form:
542853
Electronic books.
IoT Security : = Modeling Development and Validation of IoT Technology.
LDR
:02781nmm a2200361K 4500
001
2354514
005
20230414084817.5
006
m o d
007
cr mn ---uuuuu
008
241011s2022 xx obm 000 0 eng d
020
$a
9798352650486
035
$a
(MiAaPQ)AAI29408759
035
$a
(MiAaPQ)Auburn104158362
035
$a
AAI29408759
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Osho, John Ajetunmobi.
$3
3694866
245
1 0
$a
IoT Security :
$b
Modeling Development and Validation of IoT Technology.
264
0
$c
2022
300
$a
1 online resource (232 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 84-04, Section: A.
500
$a
Advisor: Umphress, David; Yampolskiy, Mark; Springall, Drew; Purdy, Gregory.
502
$a
Thesis (Ph.D.)--Auburn University, 2022.
504
$a
Includes bibliographical references
520
$a
Modern design and development practices advocates including security as early as possible in the overall IoT engineering strategy. Tuning products late in the product cycle is costly due to changes rippling across components, so it is cheaper to fix errors early in the design and development phase. Security underscores this principle. It is more cost effective to integrate security protections into a product than it is to patch vulnerabilities. In the secure design of the IoT, the research focuses on integrity and availability security principles. The research establishes a methodology and tool for modeling and describing functionality and security of an IoT device. The Framework allows the secure modeling, design, and validation of functional requirements, security requirements, specification, and constraints by defining a methodology and developing a validation tool using a software engineering and digital twin prototyping concepts. The research methodology is investigated by demonstrating proposed framework on a case study IoT device, the Temperature LED Indicator, and a commercial-grade IoT device, and a Sonoff BASIC R3 WiFi switch. The deliverables of the research are the description of the IoT device, the IoT device, an emulator and a verification and validation tool. The verification and validation tool to verify the IoT device functions according to specification during normal operation and goes out of specification during a cyber-attack.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Data integrity.
$3
2142314
650
4
$a
Privacy.
$3
528582
650
4
$a
Computer science.
$3
523869
650
4
$a
Industrial engineering.
$3
526216
650
4
$a
Information technology.
$3
532993
650
4
$a
Web studies.
$3
2122754
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0984
690
$a
0546
690
$a
0489
690
$a
0646
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
Auburn University.
$3
1020457
773
0
$t
Dissertations Abstracts International
$g
84-04A.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29408759
$z
click for full text (PQDT)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9476870
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入