About the Editors ixList of Contributors xiiiForeword xixPreface xxiii1 Introduction 1Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin ShettyPart I Game Theory for Cyber Deception 272 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation 29Tao Zhang, Linan Huang, Jeffrey Pawlick, and Quanyan Zhu3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) 59Bowei Xi and Charles A. Kamhoua4 Cooperative Spectrum Sharing and Trust Management in IoT Networks 79Fatemeh Afghah, Alireza Shamsoshoara, Laurent L. Njilla, and Charles A. Kamhoua5 Adaptation and Deception in Adversarial Cyber Operations 111George Cybenko6 On Development of a Game-Theoretic Model for Deception-Based Security 123Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, and Laurent L. Njilla7 Deception for Cyber Adversaries: Status, Challenges, and Perspectives 141Abdullah Alshammari, Danda B. Rawat, Moses Garuba, Charles A. Kamhoua, and Laurent L. NjillaPart II IoT Security Modeling and Analysis 1618 Cyber-Physical Vulnerability Analysis of IoT Applications Using Multi-Modeling 163Ted Bapty, Abhishek Dubey, and Janos Sztipanovits9 Securing Smart Cities: Implications and Challenges 185Ioannis Agadakos, Prashant Anantharaman, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Tancrède Lepoint, Ulf Lindqvist, Michael Locasto, and Liwei Song10 Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things 217Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, and Dong Seong Kim11 Addressing Polymorphic Advanced Threats in Internet of Things Networks by Cross-Layer Profiling 249Hisham Alasmary, Afsah Anwar, Laurent L. Njilla, Charles A. Kamhoua, and Aziz Mohaisen12 Analysis of Stepping-Stone Attacks in Internet of Things Using Dynamic Vulnerability Graphs 273Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David M. Nicol, Charles A. Kamhoua, and Laurent L. Njilla13 Anomaly Behavior Analysis of IoT Protocols 295Pratik Satam, Shalaka Satam, Salim Hariri, and Amany Alshawi14 Dynamic Cyber Deception Using Partially Observable Monte-Carlo Planning Framework 331Md Ali Reza Al Amin, Sachin Shetty, Laurent L. Njilla, Deepak K. Tosh, and Charles A. Kamhoua15 A Coding Theoretic View of Secure State Reconstruction 357Suhas Diggavi and Paulo Tabuada16 Governance for the Internet of Things: Striving Toward Resilience 371S. E. Galaitsi, Benjamin D. Trump, and Igor LinkovPart III IoT Security Design 38317 Secure and Resilient Control of IoT-Based 3D Printers 385Zhiheng Xu and Quanyan Zhu18 Proactive Defense Against Security Threats on IoT Hardware 407Qiaoyan Yu, Zhiming Zhang, and Jaya Dofe19 IoT Device Attestation: From a Cross-Layer Perspective 435Orlando Arias, Fahim Rahman, Mark Tehranipoor, and Yier Jin20 Software-Defined Networking for Cyber Resilience in Industrial Internet of Things (IIoT) 453Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, and Jay Chen21 Leverage SDN for Cyber-Security Deception in Internet of Things 479Yaoqing Liu, Garegin Grigoryan, Charles A. Kamhoua, and Laurent L. Njilla22 Decentralized Access Control for IoT Based on Blockchain and Smart Contract 505Ronghua Xu, Yu Chen, and Erik Blasch23 Intent as a Secure Design Primitive 529Prashant Anantharaman, J. Peter Brady, Ira Ray Jenkins, Vijay H. Kothari, Michael C. Millian, Kartik Palani, Kirti V. Rathore, Jason Reeves, Rebecca Shapiro, Syed H. Tanveer, Sergey Bratus, and Sean W. Smith24 A Review of Moving Target Defense Mechanisms for Internet of Things Applications 563Nico Saputro, Samet Tonyali, Abdullah Aydeger, Kemal Akkaya, Mohammad A. Rahman, and Selcuk Uluagac25 Toward Robust Outlier Detector for Internet of Things Applications 615Raj Mani Shukla and Shamik Sengupta26 Summary and Future Work 635Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin ShettyIndex 647
CHARLES A. KAMHOUA, PHD, is a Senior Electronics Engineer at the U.S. Army Research Laboratory's Network Security Branch.LAURENT L. NJILLA, PHD, is a researcher at the U.S. Army Research Laboratory's Information Directorate/Cyber Assurance Branch.ALEXANDER KOTT, PHD, is the Chief Scientist at the U.S. Army Research Laboratory.SACHIN SHETTY, PHD, is an Associate Professor in the Modeling, Simulation and Visualization Engineering Department at Old Dominion University.