Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Preface
O’Reilly Safari
How to Contact Us
Acknowledgments
1. Brave New Internet
Worst-Case Scenarios: Cyber Love Canal
What’s Different?
Lifetimes
The IoT in the Physical World
Inevitable and Unfortunate Decay
Zero-Days and Forever-Days
The Fix is In?
The IoT’s Impact on the Physical World
Houses
Cars
Traffic
Airplanes
Infrastructure
Medicine
The Physical World’s Impact on the IoT
Missing Things
Large Attack Surface
Jumping Across Boundaries
Worst-Case Scenarios: Cyber Pearl Harbor
Targeted Malicious Attacks in the IoT
Where to Go Next
What Do We Do?
What Comes Next
Works Cited
2. Examples and Building Blocks
Computing Devices
Basic Elements
Moore’s Law
How IoT Systems Differ
Architectures for an IoT
Connection to Other Computers
Connection to the Physical World
The Backend
The Bigger Picture
What’s Next
Works Cited
3. The Future Has Been Here Before
Bug Background
Integer Overflow
Race Conditions
Memory Corruption
Impossible Scenarios
Smart Health IT
The Therac-25
The Sad Story
Today
Past and Future
Smart Grid
The Balancing Act
Lights Out in 2003
Root Causes
Today
Past and Future
Smart Vehicles
The Dawn of Fly-by-Wire
Fear of the A320
What Happened Next
Past and Future
Today
Not Repeating Past Mistakes
Works Cited
4. Overcoming Design Patterns for Insecurity
Anti-Pattern: Doing Too Much
Instance: Failure of Input Validation
Instance: Excess Power
Instance: Differential Parsing
Anti-Pattern: Coding Blunders
Anti-Pattern: Authentication Blunders
Instance: No Authentication
Instance: Default Credentials
Instance: Permanent Credentials
Instance: No Delegation
Instance: Easy Exposure
Moving Forward
Anti-Pattern: Cryptography Blunders
Instance: Bad Randomness
Instance: Common Keys
Instance: Bad PKI
Instance: Aging of Cryptography and Protocols
A Better Future
Works Cited
5. Names and Identity in the IoT
Who Is That, Really?
Beyond Bits
Authorization
The Standard Cryptographic Toolkit
The Somewhat Impossible
Symmetric Cryptography
Public Key Cryptography
Public Key Infrastructure
Cryptographic Hashing
The Price Tag
The Newer Toolkit
Macaroons
Blockchains
PUFs
Addresses and Names
IoT Challenges
Ontologies of Association
Ontologies of Interaction
PKI and Large Populations
Constrained Devices and Channels
Privacy Side Effects
Cryptographic Decay
Moving Forward
Works Cited
6. The Internet of Tattletale Devices
Cautionary Tales
IoC Privacy Spills
IoT Privacy Worries
When Things Betray Their Owners
Your Things May Talk to Police
Your Things May Phone Home
Your Things May Talk to the Wrong People
Emerging Infrastructure for Spying
Wearables and Health
Internet of Big Brother’s Things
Getting What We Want
Saying What We Want
Law and Standards
Technological Enforcement
Works Cited
7. Business, Things, and Risks
How the IoT Changes Business
Disrupting Business Operations
Disrupting the Profit Paradigm
“Google Moments”?
Profit and Safety
In History
In the IoT
In the Human Mind
When the User Is the Product
In History
In the IoT
Profit and Technological Choices
In History
In the IoT
Hacking and Business
Businesses and Things and People
Works Cited
8. Laws, Society, and Things
When Technology Evades Law
Case Study: VW Emissions
“Weasel Words”
When Law Stops Scrutiny of Technology
Case Study: The DMCA
When New Things Don’t Fit Old Paradigms
Send in the Drones
License to Self-Drive
Healthy Entertainment
Things “on the Witness Stand”
Looking Forward
Works Cited
9. The Digital Divide and the IoT
How Digital Divides Emerged in the IoC
The Digital Divide
How Digital Divides May Continue in the IoT
Connectivity to Machines
Connectivity Between People
When IT Is Required to Support Basic Rights
Certificates
Entitlements and Risks
In the Smart City
The IoT Enforcing Preexisting Socioeconomic Divides
The IoT Creating Divides Among Connected Classes
Looking Forward
Works Cited
10. The Future of Humans and Machines
A Framework for Interconnection
Semiotic Triads, in 2013
Semiotic Triads, in the 1920s
Human/Machine Interconnection in the IoT
Mapping, Literally
Mapping, Figuratively
Uncanny Descents
Ethical Choices in the IoT Age
Perception of Boundaries in the IoT Age
Human Work in the IoT Age
Brave New Internet, with Brave New People in It
Works Cited
Index
← Prev
Back
Next →
← Prev
Back
Next →