Fr. 170.00

Security and Privacy in Cyber-Physical Systems - Foundations, Principles, and Applications

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area.
 
Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.

List of contents

List of Contributors xvii
 
Foreword xxiii
 
Preface xxv
 
Acknowledgments xxix
 
1 Overview of Security and Privacy in Cyber-Physical Systems 1
Glenn A. Fink, ThomasW. Edgar, Theora R. Rice, Douglas G. MacDonald and Cary E. Crawford
 
1.1 Introduction 1
 
1.2 Defining Security and Privacy 1
 
1.2.1 Cybersecurity and Privacy 2
 
1.2.2 Physical Security and Privacy 3
 
1.3 Defining Cyber-Physical Systems 4
 
1.3.1 Infrastructural CPSs 5
 
1.3.1.1 Example: Electric Power 5
 
1.3.2 Personal CPSs 5
 
1.3.2.1 Example: Smart Appliances 6
 
1.3.3 Security and Privacy in CPSs 6
 
1.4 Examples of Security and Privacy in Action 7
 
1.4.1 Security in Cyber-Physical Systems 7
 
1.4.1.1 Protecting Critical Infrastructure from Blended Threat 8
 
1.4.1.2 Cyber-Physical Terrorism 8
 
1.4.1.3 Smart Car Hacking 9
 
1.4.1.4 Port Attack 10
 
1.4.2 Privacy in Cyber-Physical Systems 11
 
1.4.2.1 Wearables 11
 
1.4.2.2 Appliances 12
 
1.4.2.3 Motivating Sharing 12
 
1.4.3 Blending Information and Physical Security and Privacy 12
 
1.5 Approaches to Secure Cyber-Physical Systems 14
 
1.5.1 Least Privilege 14
 
1.5.2 Need-to-Know 15
 
1.5.3 Segmentation 15
 
1.5.4 Defensive Dimensionality 16
 
1.5.4.1 Defense-in-Depth 16
 
1.5.4.2 Defense-in-Breadth 16
 
1.5.5 User-Configurable Data Collection/Logging 17
 
1.5.6 Pattern Obfuscation 17
 
1.5.7 End-to-End Security 17
 
1.5.8 Tamper Detection/Security 18
 
1.6 Ongoing Security and Privacy Challenges for CPSs 18
 
1.6.1 Complexity of Privacy Regulations 18
 
1.6.2 Managing and Incorporating Legacy Systems 19
 
1.6.3 Distributed Identity and Authentication Management 20
 
1.6.4 Modeling Distributed CPSs 20
 
1.7 Conclusion 21
 
References 21
 
2 Network Security and Privacy for Cyber-Physical Systems 25
Martin Henze, Jens Hiller, René Hummen, Roman Matzutt, KlausWehrle andJan H. Ziegeldorf
 
2.1 Introduction 25
 
2.2 Security and Privacy Issues in CPSs 26
 
2.2.1 CPS Reference Model 27
 
2.2.1.1 Device Level 27
 
2.2.1.2 Control/Enterprise Level 27
 
2.2.1.3 Cloud Level 28
 
2.2.2 CPS Evolution 28
 
2.2.3 Security and PrivacyThreats in CPSs 30
 
2.3 Local Network Security for CPSs 31
 
2.3.1 Secure Device Bootstrapping 32
 
2.3.1.1 Initial Key Exchange 33
 
2.3.1.2 Device Life Cycle 33
 
2.3.2 Secure Local Communication 34
 
2.3.2.1 Physical Layer 34
 
2.3.2.2 Medium Access 34
 
2.3.2.3 Network Layer 35
 
2.3.2.4 Secure Local Forwarding for Internet-Connected CPSs 35
 
2.4 Internet-Wide Secure Communication 36
 
2.4.1 Security Challenges for Internet-Connected CPS 37
 
2.4.2 Tailoring End-to-End Security to CPS 38
 
2.4.3 Handling Resource Heterogeneity 39
 
2.4.3.1 Reasonable Retransmission Mechanisms 39
 
2.4.3.2 Denial-of-Service Protection 40
 
2.5 Security and Privacy for Cloud-Interconnected CPSs 41
 
2.5.1 Securely Storing CPS Data in the Cloud 42
 
2.5.1.1 Protection of CPS Data 43
 
2.5.1.2 Access Control 43
 
2.5.2 Securely Processing CPS Data in the Cloud 44
 
2.5.3 Privacy for Cloud-Based CPSs 45
 
2.6 Summary 46
 
2.7 Conclusion and Outlook 47
 
Acknowledgments 48
 
References 48
 
3 Tutorial on Information Theoretic Metrics Quantifying Privacy i

About the author










HOUBING SONG, PhD is an assistant professor in the Department of Electrical, Computer, Software, and Systems Engineering at Embry-Riddle Aeronautical University, Daytona Beach, Florida, and the Director of the Security and Optimization for Networked Globe Laboratory (SONG Lab, www.SONGLab.us). GLENN A. FINK, PhD is a cyber security researcher with the National Security Directorate, Pacific Northwest National Laboratory. He was the lead inventor of PNNL's Digital Ants technology. SABINA JESCHKE, Dr. rer. nat. is a professor in the Department of Mechanical Engineering, RWTH Aachen University, Germany, and Head of the Cybernetics Lab IMA/ZLW & IfU.

Summary

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals.

Product details

Authors Glenn A. Fink, Sabina Jeschke, H Song, Houbing Song, Houbing Fink Song
Assisted by Glen A Fink (Editor), Glenn A Fink (Editor), Glenn Fink (Editor), Glenn A. Fink (Editor), Sabina Jeschke (Editor), Jeschke Sabina (Editor), Houbing Song (Editor), Song Houbing (Editor)
Publisher Wiley, John and Sons Ltd
 
Languages English
Product format Hardback
Released 31.08.2017
 
EAN 9781119226048
ISBN 978-1-119-22604-8
No. of pages 472
Series Wiley - IEEE
Wiley - IEEE
IEEE Press
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Computersicherheit, Informatik, Energie, Netzwerk, ENERGY, computer science, smart grid, Computer Security & Cryptography, Computersicherheit u. Kryptographie, Networking / Security, Netzwerke / Sicherheit

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.