Security and Privacy in Cyber-Physical Systems Foundations, Principles, and Applications 1st edition by Houbing Song, Glenn A. Fink, Sabina Jeschke – Ebook PDF Instant Download/DeliveryISBN: 1119226066, 9781119226062
Full download Security and Privacy in Cyber-Physical Systems Foundations, Principles, and Applications 1st edition after payment.
Product details:
ISBN-10 : 1119226066
ISBN-13 : 9781119226062
Author : Houbing Song, Glenn A. Fink, Sabina Jeschke
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area.
Security and Privacy in Cyber-Physical Systems Foundations, Principles, and Applications 1st Table of contents:
Chapter 1: Overview of Security and Privacy in Cyber-Physical Systems
1.1 Introduction
1.2 Defining Security and Privacy
1.3 Defining Cyber-Physical Systems
1.4 Examples of Security and Privacy in Action
1.5 Approaches to Secure Cyber-Physical Systems
1.6 Ongoing Security and Privacy Challenges for CPSs
1.7 Conclusion
References
Chapter 2: Network Security and Privacy for Cyber-Physical Systems
2.1 Introduction
2.2 Security and Privacy Issues in CPSs
2.3 Local Network Security for CPSs
2.4 Internet-Wide Secure Communication
2.5 Security and Privacy for Cloud-Interconnected CPSs
2.6 Summary
2.7 Conclusion and Outlook
Acknowledgments
References
Chapter 3: Tutorial on Information Theoretic Metrics Quantifying Privacy in Cyber-Physical Systems
3.1 Social Perspective and Motivation
3.2 Information Theoretic Privacy Measures
3.3 Privacy Models and Protection
3.5 Conclusion and Outlook
Appendix A Derivation of the Mutual Information Based on the KLD
Appendix B Derivation of the Mutual Information In Terms of Entropy
Appendix C Derivation of the Mutual Information Conditioned on
Appendix D Proof of Corollary 3.1
References
Chapter 4: Cyber-Physical Systems and National Security Concerns
4.1 Introduction
4.2 National Security Concerns Arising from Cyber-Physical Systems
4.3 National Security Implications of Attacks on Cyber-Physical Systems
4.4 Conclusion
References
Chapter 5: Legal Considerations of Cyber-Physical Systems and the Internet of Things
5.1 Introduction
5.2 Privacy and Technology in Recent History
5.3 The Current State of Privacy Law
5.4 Meeting Future Challenges
References
Chapter 6: Key Management in CPSs
6.1 Introduction
6.2 Key Management Security Goals and Threat Model
6.3 CPS Key Management Design Principles
6.4 CPS Key Management
6.5 CPS Key Management Challenges and Open Research Issues
6.6 Summary
References
Chapter 7: Secure Registration and Remote Attestation of IoT Devices Joining the Cloud: The Stack4Things Case of Study
7.1 Introduction
7.2 Background
7.3 Reference Scenario and Motivation
7.4 Stack4Things Architecture
7.5 Capabilities for Making IoT Devices Secure Over the Cloud
7.6 Adding Security Capabilities to Stack4Things
7.7 Conclusion
References
Chapter 8: Context Awareness for Adaptive Access Control Management in IoT Environments
8.1 Introduction
8.2 Security Challenges in IoT Environments
8.3 Surveying Access Control Models and Solutions for IoT
8.4 Access Control Adaptation: Motivations and Design Guidelines
8.5 Our Adaptive Context-Aware Access Control Solution for Smart Objects
8.6 Open Technical Challenges and Concluding Remarks
References
Chapter 9: Data Privacy Issues in Distributed Security Monitoring Systems
9.1 Information Security in Distributed Data Collection Systems
9.2 Technical Approaches for Assuring Information Security
9.3 Approaches for Building Trust in Data Collection Systems
9.4 Conclusion
References
Chapter 10: Privacy Protection for Cloud-Based Robotic Networks
10.1 Introduction
10.2 Cloud Robot Network: Use Case, Challenges, and Security Requirements
10.3 Establishment of Cloud Robot Networks
10.4 Communication Security
10.5 Security Management of Cloud Robot Networks
10.6 Related Work
10.7 Conclusion
References
Chapter 11: Toward Network Coding for Cyber-Physical Systems: Security Challenges and Applications
11.1 Introduction
11.2 Background on Network Coding and Its Applications
11.3 Security Challenges
11.4 Secure Network Coding
11.5 Applications of Network Coding in Providing Security
11.6 Conclusion
Acknowledgment
References
Chapter 12: Lightweight Crypto and Security
12.1 Introduction
12.2 Cyber-Physical Systems
12.3 Security and Privacy in Cyber-Physical Systems
12.4 Lightweight Cryptography Implementations for Security and Privacy in CPSs
12.5 Opportunities and Challenges
12.6 Conclusion
Acknowledgments
References
Chapter 13: Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities
13.1 Introduction
13.2 WSN Applications in Smart Cities
13.3 Cyber-Physical Vulnerabilities
13.4 Solution Approaches
13.5 Conclusion
Acknowledgment
References
Chapter 14: Detecting Data Integrity Attacks in Smart Grid
14.1 Introduction
14.2 Literature Review
14.3 Network and Threat Models
14.4 Our Approach
14.5 Performance Evaluation
14.6 Extension
14.7 Conclusion
References
Chapter 15: Data Security and Privacy in Cyber-Physical Systems for Healthcare
15.1 Introduction
15.2 Medical Cyber-Physical Systems
15.3 Data Security and Privacy Issues and Challenges in WBANs
15.4 Existing Security and Privacy Solutions in WBAN
15.5 Conclusion
References
Chapter 16: Cyber Security of Smart Buildings
16.1 What Is a Smart Building?
16.2 Communication Protocols for Smart Buildings
16.3 Attacks
16.4 Solutions to Protect Smart Buildings
16.5 Recent Trends in Smart Building Security Research
16.6 Conclusion and Outlook
References
Chapter 17: The Internet of Postal Things: Making the Postal Infrastructure Smarter
17.1 Introduction
17.2 Scoping the Internet of Postal Things
17.3 Identifying Internet of Postal Things Applications
17.4 The Future of IoPT
17.5 Conclusion
References
Chapter 18: Security and Privacy Issues in the Internet of Cows
18.1 Precision Livestock Farming
18.2 Security and Privacy of IoT in Agriculture
18.3 Conclusion
References
Chapter 19: Admission Control-Based Load Protection in the Smart Grid
19.1 Introduction
19.2 Related Work
19.3 Our Approach
19.4 Performance Evaluation
19.5 Conclusion
People also search for Security and Privacy in Cyber-Physical Systems Foundations, Principles, and Applications 1st:
cyber and physical security
physical security vs information security
physical security issues in information security
security and privacy in cyber-physical systems
what is privacy in cyber security