[AISWorld] Fwd: *Call for Chapter Proposals* - Instituting Cyber-Assurance: Information Assurance for the Internet of Things

Tyson Brooks dr.tyson.brooks at ieee.org
Mon Apr 6 02:31:17 EDT 2015


****FINAL CALL FOR CHAPTER PROPOSALS***  *

*Instituting Cyber-Assurance: Information Assurance for the Internet of
Things*



May 1, 2015: Chapter Proposal Submission

May 15, 2015: Chapter Acceptance Confirmation

September 1, 2015: Final Chapter Submission

January 15, 2016: Publication



*Introduction*

The goal of this book is to present an information assurance (IA) approach
to the Internet of Things (IoT). From an information security/IA
perspective, the IoT must address the delivery of authentic, accurate,
secure, reliable, timely information, regardless of threat conditions, over
the distributed and heterogeneous computing and communication systems.  The
IoT system may range from a hand-held mobile unit to a centralized high
performance information processing system consisting of heterogeneous
communication systems of both tactical (mobile, wireless) and fixed (wired)
communications infrastructures.



This book provides a first in understanding how IA must integrate with IoT
to determine whether individual IoT computer/software components as well as
whole IoT information systems behave and interact only in ways that enable
them to resist or avoid intentional attempts to compromise their correct
operations. In order to make this determination, this book is needed to
understand the variety of IA techniques and technologies to the task of
seeking out defects that have the potential to be successfully targeted as
exploitable vulnerabilities by an attacker (i.e. hacker). Furthermore, this
book will support IA and IoT industry practitioners understanding of how to
design and build IA into the IoT appropriately given certain assumptions
(e.g. wireless networks, use of smart devices, etc.), even when such
assumptions are included in the requirements.



*Objective of the Book*

The objective of the book is to increase the visibility of current research
and emergent trends in IA theory, application, architecture and information
security in the IoT based on theoretical aspects and studies of practical
applications. The book will cover fundamental to advanced concepts
necessary to grasp IoT current IA issues, challenges and solutions as well
as future trends in IoT infrastructures, architectures and applications.
The topics of the book will include the IA protection of IoT systems and
information in storage, processing, or transit from unauthorized access or
modification for M2M devices, radio-frequency identification (RFID),
wireless sensor networks, Smart Grids and supervisory control and data
acquisition (SCADA) systems and IA measures necessary to detect, protect
and defend IoT information and networks/systems to ensure their
availability, integrity, authentication, confidentiality, and
non-repudiation; including providing for restoration of IoT
networks/systems by incorporating protection, detection, and reaction
capabilities. The focus areas include IoT computational and information
sciences, information processing, fusion and circuits, information
protection for IoT networks, IoT sensors and IoT mathematical sciences.



In addition, the educational value of this book is to serve as an effective
bridge between academic research on theory, and science-practitioners work
with IoT technology. It is anticipated that this work will be a primary
source of reading for students wishing to become involved in IA for IoT
research. Additionally, the book is to gather the knowledge and experience
of expert IA and IoT researchers who work in the area of wireless networks,
clouds, information security architecture and IoT and elicit their
knowledge in a collaborative effort that leads to an edited book which will
be one of the first of its kind. The consecutive chapters of this book will
present topics related to the actual IA IoT research that work together to
carry out coordinated functions. The chapters will also present new
information security theory and applications devoted to the improvement and
development of IoT networks.



*Target Audience*

The target audience of this book will be composed of researchers,
professionals and students working in the field of wireless technologies,
information system theory, systems engineering, information security
architecture and security system design along with university professors
and researchers involved in IA and IoT related networking. Through a
collection of edited essays from IA and IoT industry practitioners and
experts, the book will be written for graduate students, researchers and
academics who want to improve their understanding of the latest
developments of IA for the IoT. IA capabilities protect and defend network
availability, protect data integrity, and provide the ability to implement
effective computer network defense (CND) for the IoT. IA is imperative so
that its confidentiality, integrity, availability, and non-repudiation can
be ensured, and that users of that IoT data can be properly identified and
authenticated. Since these IoT networks presents unique IA challenges,
there will be a heavy reliance on the secure communication of urgent and
time-sensitive information over these IoT networks. This book will discuss
the IA needs of the IoT environment, highlighting key IA IoT issues and
identifying the associated security implications so that the general
readers can readily grasp the core ideas in this area of research.



Recommended topics include, but are not limited to, the following:



*Cyber-Hacking and the IoT: *

·         Cyber-threats towards the IoT,

·         Automated IoT vulnerability identification,

·         IoT penetration testing,

·         IoT detection and identification monitors,

·         IoT incident handling/incident response methodologies,

·         IoT digital forensics techniques,

·         IoT secure-by-design systems and,

·         IoT attack strategies


 *IoT Wireless Information Assurance and Communications:  *

·         Research on automated IoT vulnerability assessment and intrusion
detection tools and techniques,

·         Genetic algorithms used to spawn and control intelligent agents
for information assurance for IoT devices,

·         Information hiding in IoT images and text (steganography and
watermarking),

·         Key distribution and security in an IoT network,

·         Tools and techniques for automating the creation and distribution
of interoperable vulnerability IoT knowledge bases,

·         Tools and techniques for automated and analysis and correlation
of anomalies, probes, and detections from multiple sites and to support
post-incident forensic analysis and,

·         Network management and visualization tools that support real time
planning and control of tactical nets as well as tools for intrusion
detection and forensic analysis in hybrid IoT networks


*Cyber-Physical Systems for the IoT:*

·         Synchronized cyber-attacks against the Smart Grid and/or SCADA
systems,

·         Modeling framework for CPS under cyber-attacks,

·         Optimal network clustering for distributed procedures in CPS,

·         SCADA testbeds for CPS and,

·         Secure CPS IA designs



*IoT Information and Data Fusion: *

·         IoT data representation,

·         IoT data encoding and transmission,

·         IoT measurement of the informativeness of both data and the
fusion system and,

·         IoT frameworks which allow diverse input data streams to be
transformed into a unified information fusion space for processing using
more unified and tractable procedures


 *IoT Information and Signal Processing: *

·         IoT signal processing environment,

·         Fuzzy and neural IoT networks,

·         IoT discrete event dynamical systems,

·         Non-linear IoT systems using electronic, biological, optical,
acoustical or electro-optical techniques and,

·         Development of design methods, architectures, and implementations
to minimize IoT power dissipation


 *IoT Radio Frequency (RF) Signal Processing:  *

·         IoT radar component technology, including wide-bandwidth/
low-frequency antennas, high-power transmitters, high-speed signal
processors, and analog-to-digital converters,

·         RFI extraction/avoidance techniques,

·         Optimization of IoT algorithm code,

·         High-precision position IoT GPS/location systems,

·         Self-aligning and calibrating arrays for the IoT and,

·         IoT detection, tracking and classification algorithms


 *IoT Circuits:  *

·         Design tools for integrating RF devices and components, such as
inductors and optics, on IoT processing chips,

·         Circuits, such as mixers, oscillators, amplifiers, phase-locked
loops, voltage-controlled oscillators, digital-to-analog and analog-
to-digital converters and correlators,

·         IoT technology for implementing monolithic transceivers on single
integrated circuits and,

·         IoT processors capable of multiple gigahertz operation



*IoT IA Evaluation Metrics and Risk Mitigation Methods: *

·         Measures and metrics associated with assurance determination of
existing IoT systems (particularly when the existing security perimeter has
been modified operationally) and for the security engineering process
associated with new development (which includes new code and COTS
composition),

·         Means of matching the IA security protection mechanisms to the
existing IoT threat and modifying this set of factors as the threat changes
are sought and,

·         Research into processes and procedures that minimize human error
and vulnerability introduction


*Testing, Assessing, and Mitigating IoT System Vulnerabilities: *

·         IoT system security and vulnerability assessment framework and
methodology,

·         Novel security and vulnerability IoT assessment methods,

·         Adaptive countermeasures to attacks and to IoT system
vulnerability exploitation and,

·         Framework and methodology for building secure, intrusion immune
host and IoT network systems


*Correlation, Fusion, Analysis, and Visualization of Systems Security
Information: *

·         Multi-sensor, multi-site event correlation, analysis, and fusion
for the IoT,

·         Methodology and techniques to improve the quality of attack
indications or warnings for IoT systems and,

·         IoT visualization and presentation


*IoT Sensor Network Communications:  *

·         IoT sensor networking systems, including signal processing and
communications interactions, distributed detection and estimation, and
networking protocols,

·         Ad-hoc IoT sensor network protocols,

·         Energy efficient IoT modems,

·         Secure 6LoWPAN signal processing,

·         Small broadband antenna for the IoT,

·         Forward-error-correction for the IoT and,

·         Ultra wideband systems, including coexistence issues and IoT
system overlays


 *IoT RF Electronics:  *

·         High frequency IoT devices and modules to enhance situational
analysis and increase the communication functionality,

·         Low power, high accuracy IoT frequency control devices for
navigation and communication systems and,

·         Novel IoT RF acoustics and microwave/millimeter wave electron
beam devices



*Modeling of Complex IoT Systems:  *

·         Modeling of multiscale IoT objects and functions,

·         Nonlinear dynamics for IoT communication,

·         Data fusion in complex IoT networks,

·         Dynamics of distributed networks of embedded sensors and
actuators and,

·         Behavioral modeling for IoT hacking behaviors


 *Computational Mathematics for IoT IA:  *

·         Numerical methods on finding solutions to IoT algorithmic
problems associated with currently intractable computational problems and
new applications,

·         Stochastic analysis and applied probability for IoT
networks/systems,

·         IoT statistical methods,

·         Discrete mathematics for IoT networks and,

·         Fundamental issues in IoT parallel computing such as advanced
data structures for parallel architectures, parallel algorithms, graph
theoretic methods applied to a parallel and distributed computation and
models and algorithms for the control of heterogeneous concurrent IoT
computing



*Submissions*

Inquiries and submissions may be forwarded (Word document) to: Dr. Tyson T.
Brooks* IEEE Senior Member @ dr.tyson.brooks at ieee.org



*Submission Procedure*

Submitted papers must be in English and should not have been published
elsewhere or being currently under consideration by any other journal.
Researchers and practitioners are invited to contact the editor and submit
as soon as possible a 2-3 page chapter proposal clearly explaining the
topic of his or her proposed chapter. Authors of accepted submissions will
be informed by the editor of acceptance as soon as possible.



*Important Dates*

May 1, 2015: Chapter Proposal Submission

May 15, 2015: Chapter Acceptance Confirmation

September 1, 2015: Final Chapter Submission

January 15, 2016:  Publication



*Copyright Forms*

Each manuscript must be accompanied by a statement that it has been neither
published nor submitted for publication, in whole or in part, either in a
serial, professional journal or as a part in a book which is formally
published and made available to the public. For the mutual benefit and
protection of authors and publishers it is necessary that authors provide
formal written consent to publish and transfer of copyright before the
publication of the article.



*Publisher*

Wiley-IEEE Press in under consideration for publishing services. For
additional information regarding the publisher, please visit
http://www.wiley.com/WileyCDA/Section/id-301678.html.



*The views expressed by the editor are not necessarily shared by any
institution or organization with which the author may be affiliated.


Dr. Tyson T. Brooks, CEA, PMP
IEEE Senior Member



More information about the AISWorld mailing list