Book description
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area.
Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.
Table of contents
- Cover
- Title Page
- Copyright
- List of Contributors
- Foreword
- Preface
- Acknowledgments
- Chapter 1: Overview of Security and Privacy in Cyber-Physical Systems
- Chapter 2: Network Security and Privacy for Cyber-Physical Systems
-
Chapter 3: Tutorial on Information Theoretic Metrics Quantifying Privacy in Cyber-Physical Systems
- 3.1 Social Perspective and Motivation
- 3.2 Information Theoretic Privacy Measures
- 3.3 Privacy Models and Protection
- 3.5 Conclusion and Outlook
- Appendix A Derivation of the Mutual Information Based on the KLD
- Appendix B Derivation of the Mutual Information In Terms of Entropy
- Appendix C Derivation of the Mutual Information Conditioned on
- Appendix D Proof of Corollary 3.1
- References
- Chapter 4: Cyber-Physical Systems and National Security Concerns
- Chapter 5: Legal Considerations of Cyber-Physical Systems and the Internet of Things
- Chapter 6: Key Management in CPSs
- Chapter 7: Secure Registration and Remote Attestation of IoT Devices Joining the Cloud: The Stack4Things Case of Study
-
Chapter 8: Context Awareness for Adaptive Access Control Management in IoT Environments
- 8.1 Introduction
- 8.2 Security Challenges in IoT Environments
- 8.3 Surveying Access Control Models and Solutions for IoT
- 8.4 Access Control Adaptation: Motivations and Design Guidelines
- 8.5 Our Adaptive Context-Aware Access Control Solution for Smart Objects
- 8.6 Open Technical Challenges and Concluding Remarks
- References
- Chapter 9: Data Privacy Issues in Distributed Security Monitoring Systems
- Chapter 10: Privacy Protection for Cloud-Based Robotic Networks
- Chapter 11: Toward Network Coding for Cyber-Physical Systems: Security Challenges and Applications
- Chapter 12: Lightweight Crypto and Security
- Chapter 13: Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities
- Chapter 14: Detecting Data Integrity Attacks in Smart Grid
- Chapter 15: Data Security and Privacy in Cyber-Physical Systems for Healthcare
- Chapter 16: Cyber Security of Smart Buildings
- Chapter 17: The Internet of Postal Things: Making the Postal Infrastructure Smarter
- Chapter 18: Security and Privacy Issues in the Internet of Cows
- Chapter 19: Admission Control-Based Load Protection in the Smart Grid
- Editor Biographies
- Index
- End User License Agreement
Product information
- Title: Security and Privacy in Cyber-Physical Systems
- Author(s):
- Release date: November 2017
- Publisher(s): Wiley-IEEE Press
- ISBN: 9781119226048
You might also like
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …
book
Deciphering Data Architectures
Data fabric, data lakehouse, and data mesh have recently appeared as viable alternatives to the modern …
book
Database Internals
When it comes to choosing, using, and maintaining a database, understanding its internals is essential. But …