Cybersecurity and Privacy in Cyber Physical Systems
  1. 434 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

About this book

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It

  • Presents high-quality contributions addressing related theoretical and practical aspects
  • Improves the reader's awareness of cybersecurity and privacy in CPSs
  • Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies
  • Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs
  • Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs
  • Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs

This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security.

Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.

Tools to learn more effectively

Saving Books

Saving Books

Keyword Search

Keyword Search

Annotating Text

Annotating Text

Listen to it instead

Listen to it instead

Information

Publisher
CRC Press
Year
2019
eBook ISBN
9780429558924
CYBER-PHYSICAL SYSTEMS: VULNERABILITIES, ATTACKS AND THREATS
I
Chapter 1, “Improving Security and Privacy for Cyber-Physical Systems,” analyzes the threats and attacks in various cyber-physical system domains and discusses the defensive approaches for avoiding such attacks. Different security studies have been compared in this chapter with a focus on issues and solutions by considering the impact of cyber-attacks, attack modeling and security architecture deployment.
Chapter 2, “Vulnerability Analysis for Cyber-Physical Systems,” provides a brief overview of the vulnerability analysis of cyber-physical systems. The chapter introduces cyber-physical systems (CPS) and discusses the different attacks and threats that prevail in CPS and countermeasures to prevent or mitigate risks. A detailed assessment of vulnerabilities in various CPSs such as industrial control systems (ICSs), distributed control systems (DCSs), and smart grids is analyzed.
Chapter 3, “State Estimation-Based Attack Detection in Cyber-Physical Systems: Limitations and Solutions,” presents a detailed case study regarding model-based attack detection procedures for CPSs. In particular, data from a real-world water treatment plant is collected and analyzed.
Chapter 1
Improving Security and Privacy in Cyber-Physical Systems
Sumaiya Thaseen, Aswani Kumar Cherukuri and Amir Ahmad
Contents
1.1 Introduction
1.2 Security Objectives for Cyber-Physical Systems
1.2.1 Security
1.2.1.1 Physical
1.2.1.2 Cyber
1.2.2 Privacy
1.2.2.1 Confidentiality
1.2.2.2 Integrity
1.2.2.3 Availability
1.2.2.4 Authenticity
1.3 CPS Attacks and Threats
1.3.1 Eavesdropping
1.3.2 Compromised-Key Attack
1.3.3 Man-in-the-Middle Attack
1.3.4 Denial-of-Service (DoS) Attack
1.3.5 CPS Defense Mechanisms
1.4 CPS Security Perspectives
1.4.1 Intrusion Detection Systems
1.4.2 Estimation of Consequences of Cyber Attacks
1.4.3 Modeling of CPS Attacks
1.4.4 CPS Attacks Detection
1.4.5 Development of Security Architecture
1.5 CPS Architecture and Attacks
1.5.1 Attacks at the Perception Layer
1.5.2 Attacks at the Transmission Layer
1.5.3 Attacks at the Application Layer
1.6 Attack Mitigation Strategy
1.6.1 Risk Assessment for CPS
1.6.2 Single-Layer Solutions for CPS
1.6.3 Multilayer Solutions for CPS
1.6.4 Security Framework for CPS
1.7 Conclusion and Future Research Direction
References
1.1 Introduction
The integration of different cyber and physical components utilizing modern computing technologies is termed as cyber-physical systems (CPSs). The Internet of Things (IoT) paradigm ensures secure and energy-efficient transfer of information between the physical and the cyber world. Many applications such as smart medicine, smart vehicles, smart city, mobile systems and defense systems use CPS as the basis for the development. The development of CPS was originally considered as an innovation to improve the quality of human life and to get rid of routine work. The CPS has been a key target in some of the highly publicized security breaches over the last decade. Cyber- and physical-security concepts cannot protect CPSs from unexpected vulnerabilities arising due to the crossover effects and complex interdependencies; physical attacks may cause compromise or damage to the information system; cyber attacks can cause physical malfunctions. Cyber threats seen in nature which originate in cyberspace are scalable but create an impact on the physical space of the system.
Barriers of CPS include security issues, various protocols and standards, and power supply devices. The risk of intrusions and attacks in CPS is also due to the self-sufficiency and remote location of CPS devices. A critical challenge is encountered when there is human interaction with CPSs. Interpreting human–machine behavior and developing appropriate models considering the situational and environmental changes are huge and challenging tasks. Such changes are essential in military and air traffic systems (Sztipanovits et al., 2012).
The primary problems identified for CPS security (Xinlan et al., 2010) are (1) awareness of threats and possible consequences of attacks for modeling security threats, (2) understanding the unique characteristics of CPSs and their variations from traditional information technology security, and (3) discussion of the security mechanisms applicable to CPSs to design reliable and fault-tolerant architectures for detection and prevention of cyber and physical threats. Another issue with security is there are many stakeholders. They all distinguish various security threats and risks and focus towards different goals. Thus, the consideration is to ensure multiple levels of security for the stakeholders involved in their respective contexts and environments. CPS requires an improved infrastructure with sensor-enabled automatic systems including computational devices and physical processes. There are different kinds of data transported to and from different devices, in the format that is required by the devices using specific communication mechanism which the device can handle. As a result, security and privacy are the key concerns for CPS design, development and operation. The aim of this chapter is to discuss the potential attacks in CPSs and help designers of emerging CPSs to build more secure, privacy-enhanced products in the future.
The sections of the chapter are organized as follows: Section 1.2 highlights the security and privacy in C...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. Preface
  8. Editorial Advisory Board and Reviewers
  9. Editors
  10. Contributors
  11. SECTION I CYBER-PHYSICAL SYSTEMS: VULNERABILITIES, ATTACKS AND THREATS
  12. SECTION II SECURITY AND PRIVACY IN CLOUD AND EMBEDDED SYSTEMS FOR CYBER-PHYSICAL SYSTEMS
  13. SECTION III SECURITY AND PRIVACY IN BIG DATA CYBER-PHYSICAL SYSTEMS
  14. SECTION IV CYBERSECURITY IN CYBER-PHYSICAL SYSTEMS
  15. Index

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Cybersecurity and Privacy in Cyber Physical Systems by Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq, Yassine Maleh,Mohammad Shojafar,Ashraf Darwish,Abdelkrim Haqiq in PDF and/or ePUB format, as well as other popular books in Informatica & Reti di computer. We have over one million books available in our catalogue for you to explore.