Cybersecurity and Privacy in Cyber Physical Systems
eBook - ePub

Cybersecurity and Privacy in Cyber Physical Systems

  1. 434 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Cybersecurity and Privacy in Cyber Physical Systems

Book details
Book preview
Table of contents
Citations

About This Book

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It



  • Presents high-quality contributions addressing related theoretical and practical aspects


  • Improves the reader's awareness of cybersecurity and privacy in CPSs


  • Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies


  • Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs


  • Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs


  • Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs

This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security.

Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Cybersecurity and Privacy in Cyber Physical Systems by Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq in PDF and/or ePUB format, as well as other popular books in Ciencia de la computación & Tecnología de la información. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2019
ISBN
9780429558924
CYBER-PHYSICAL SYSTEMS: VULNERABILITIES, ATTACKS AND THREATS
I
Chapter 1, “Improving Security and Privacy for Cyber-Physical Systems,” analyzes the threats and attacks in various cyber-physical system domains and discusses the defensive approaches for avoiding such attacks. Different security studies have been compared in this chapter with a focus on issues and solutions by considering the impact of cyber-attacks, attack modeling and security architecture deployment.
Chapter 2, “Vulnerability Analysis for Cyber-Physical Systems,” provides a brief overview of the vulnerability analysis of cyber-physical systems. The chapter introduces cyber-physical systems (CPS) and discusses the different attacks and threats that prevail in CPS and countermeasures to prevent or mitigate risks. A detailed assessment of vulnerabilities in various CPSs such as industrial control systems (ICSs), distributed control systems (DCSs), and smart grids is analyzed.
Chapter 3, “State Estimation-Based Attack Detection in Cyber-Physical Systems: Limitations and Solutions,” presents a detailed case study regarding model-based attack detection procedures for CPSs. In particular, data from a real-world water treatment plant is collected and analyzed.
Chapter 1
Improving Security and Privacy in Cyber-Physical Systems
Sumaiya Thaseen, Aswani Kumar Cherukuri and Amir Ahmad
Contents
1.1 Introduction
1.2 Security Objectives for Cyber-Physical Systems
1.2.1 Security
1.2.1.1 Physical
1.2.1.2 Cyber
1.2.2 Privacy
1.2.2.1 Confidentiality
1.2.2.2 Integrity
1.2.2.3 Availability
1.2.2.4 Authenticity
1.3 CPS Attacks and Threats
1.3.1 Eavesdropping
1.3.2 Compromised-Key Attack
1.3.3 Man-in-the-Middle Attack
1.3.4 Denial-of-Service (DoS) Attack
1.3.5 CPS Defense Mechanisms
1.4 CPS Security Perspectives
1.4.1 Intrusion Detection Systems
1.4.2 Estimation of Consequences of Cyber Attacks
1.4.3 Modeling of CPS Attacks
1.4.4 CPS Attacks Detection
1.4.5 Development of Security Architecture
1.5 CPS Architecture and Attacks
1.5.1 Attacks at the Perception Layer
1.5.2 Attacks at the Transmission Layer
1.5.3 Attacks at the Application Layer
1.6 Attack Mitigation Strategy
1.6.1 Risk Assessment for CPS
1.6.2 Single-Layer Solutions for CPS
1.6.3 Multilayer Solutions for CPS
1.6.4 Security Framework for CPS
1.7 Conclusion and Future Research Direction
References
1.1 Introduction
The integration of different cyber and physical components utilizing modern computing technologies is termed as cyber-physical systems (CPSs). The Internet of Things (IoT) paradigm ensures secure and energy-efficient transfer of information between the physical and the cyber world. Many applications such as smart medicine, smart vehicles, smart city, mobile systems and defense systems use CPS as the basis for the development. The development of CPS was originally considered as an innovation to improve the quality of human life and to get rid of routine work. The CPS has been a key target in some of the highly publicized security breaches over the last decade. Cyber- and physical-security concepts cannot protect CPSs from unexpected vulnerabilities arising due to the crossover effects and complex interdependencies; physical attacks may cause compromise or damage to the information system; cyber attacks can cause physical malfunctions. Cyber threats seen in nature which originate in cyberspace are scalable but create an impact on the physical space of the system.
Barriers of CPS include security issues, various protocols and standards, and power supply devices. The risk of intrusions and attacks in CPS is also due to the self-sufficiency and remote location of CPS devices. A critical challenge is encountered when there is human interaction with CPSs. Interpreting human–machine behavior and developing appropriate models considering the situational and environmental changes are huge and challenging tasks. Such changes are essential in military and air traffic systems (Sztipanovits et al., 2012).
The primary problems identified for CPS security (Xinlan et al., 2010) are (1) awareness of threats and possible consequences of attacks for modeling security threats, (2) understanding the unique characteristics of CPSs and their variations from traditional information technology security, and (3) discussion of the security mechanisms applicable to CPSs to design reliable and fault-tolerant architectures for detection and prevention of cyber and physical threats. Another issue with security is there are many stakeholders. They all distinguish various security threats and risks and focus towards different goals. Thus, the consideration is to ensure multiple levels of security for the stakeholders involved in their respective contexts and environments. CPS requires an improved infrastructure with sensor-enabled automatic systems including computational devices and physical processes. There are different kinds of data transported to and from different devices, in the format that is required by the devices using specific communication mechanism which the device can handle. As a result, security and privacy are the key concerns for CPS design, development and operation. The aim of this chapter is to discuss the potential attacks in CPSs and help designers of emerging CPSs to build more secure, privacy-enhanced products in the future.
The sections of the chapter are organized as follows: Section 1.2 highlights the security and privacy in C...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. Preface
  8. Editorial Advisory Board and Reviewers
  9. Editors
  10. Contributors
  11. SECTION I CYBER-PHYSICAL SYSTEMS: VULNERABILITIES, ATTACKS AND THREATS
  12. SECTION II SECURITY AND PRIVACY IN CLOUD AND EMBEDDED SYSTEMS FOR CYBER-PHYSICAL SYSTEMS
  13. SECTION III SECURITY AND PRIVACY IN BIG DATA CYBER-PHYSICAL SYSTEMS
  14. SECTION IV CYBERSECURITY IN CYBER-PHYSICAL SYSTEMS
  15. Index