O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security and Privacy in Cyber-Physical Systems

Book Description

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area.  

Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing.  A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS. 

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. List of Contributors
  5. Foreword
  6. Preface
  7. Acknowledgments
  8. Chapter 1: Overview of Security and Privacy in Cyber-Physical Systems
    1. 1.1 Introduction
    2. 1.2 Defining Security and Privacy
    3. 1.3 Defining Cyber-Physical Systems
    4. 1.4 Examples of Security and Privacy in Action
    5. 1.5 Approaches to Secure Cyber-Physical Systems
    6. 1.6 Ongoing Security and Privacy Challenges for CPSs
    7. 1.7 Conclusion
    8. References
  9. Chapter 2: Network Security and Privacy for Cyber-Physical Systems
    1. 2.1 Introduction
    2. 2.2 Security and Privacy Issues in CPSs
    3. 2.3 Local Network Security for CPSs
    4. 2.4 Internet-Wide Secure Communication
    5. 2.5 Security and Privacy for Cloud-Interconnected CPSs
    6. 2.6 Summary
    7. 2.7 Conclusion and Outlook
    8. Acknowledgments
    9. References
  10. Chapter 3: Tutorial on Information Theoretic Metrics Quantifying Privacy in Cyber-Physical Systems
    1. 3.1 Social Perspective and Motivation
    2. 3.2 Information Theoretic Privacy Measures
    3. 3.3 Privacy Models and Protection
    4. 3.5 Conclusion and Outlook
    5. Appendix A Derivation of the Mutual Information Based on the KLD
    6. Appendix B Derivation of the Mutual Information In Terms of Entropy
    7. Appendix C Derivation of the Mutual Information Conditioned on
    8. Appendix D Proof of Corollary 3.1
    9. References
  11. Chapter 4: Cyber-Physical Systems and National Security Concerns
    1. 4.1 Introduction
    2. 4.2 National Security Concerns Arising from Cyber-Physical Systems
    3. 4.3 National Security Implications of Attacks on Cyber-Physical Systems
    4. 4.4 Conclusion
    5. References
  12. Chapter 5: Legal Considerations of Cyber-Physical Systems and the Internet of Things
    1. 5.1 Introduction
    2. 5.2 Privacy and Technology in Recent History
    3. 5.3 The Current State of Privacy Law
    4. 5.4 Meeting Future Challenges
    5. References
  13. Chapter 6: Key Management in CPSs
    1. 6.1 Introduction
    2. 6.2 Key Management Security Goals and Threat Model
    3. 6.3 CPS Key Management Design Principles
    4. 6.4 CPS Key Management
    5. 6.5 CPS Key Management Challenges and Open Research Issues
    6. 6.6 Summary
    7. References
  14. Chapter 7: Secure Registration and Remote Attestation of IoT Devices Joining the Cloud: The Stack4Things Case of Study
    1. 7.1 Introduction
    2. 7.2 Background
    3. 7.3 Reference Scenario and Motivation
    4. 7.4 Stack4Things Architecture
    5. 7.5 Capabilities for Making IoT Devices Secure Over the Cloud
    6. 7.6 Adding Security Capabilities to Stack4Things
    7. 7.7 Conclusion
    8. References
  15. Chapter 8: Context Awareness for Adaptive Access Control Management in IoT Environments
    1. 8.1 Introduction
    2. 8.2 Security Challenges in IoT Environments
    3. 8.3 Surveying Access Control Models and Solutions for IoT
    4. 8.4 Access Control Adaptation: Motivations and Design Guidelines
    5. 8.5 Our Adaptive Context-Aware Access Control Solution for Smart Objects
    6. 8.6 Open Technical Challenges and Concluding Remarks
    7. References
  16. Chapter 9: Data Privacy Issues in Distributed Security Monitoring Systems
    1. 9.1 Information Security in Distributed Data Collection Systems
    2. 9.2 Technical Approaches for Assuring Information Security
    3. 9.3 Approaches for Building Trust in Data Collection Systems
    4. 9.4 Conclusion
    5. References
  17. Chapter 10: Privacy Protection for Cloud-Based Robotic Networks
    1. 10.1 Introduction
    2. 10.2 Cloud Robot Network: Use Case, Challenges, and Security Requirements
    3. 10.3 Establishment of Cloud Robot Networks
    4. 10.4 Communication Security
    5. 10.5 Security Management of Cloud Robot Networks
    6. 10.6 Related Work
    7. 10.7 Conclusion
    8. References
  18. Chapter 11: Toward Network Coding for Cyber-Physical Systems: Security Challenges and Applications
    1. 11.1 Introduction
    2. 11.2 Background on Network Coding and Its Applications
    3. 11.3 Security Challenges
    4. 11.4 Secure Network Coding
    5. 11.5 Applications of Network Coding in Providing Security
    6. 11.6 Conclusion
    7. Acknowledgment
    8. References
  19. Chapter 12: Lightweight Crypto and Security
    1. 12.1 Introduction
    2. 12.2 Cyber-Physical Systems
    3. 12.3 Security and Privacy in Cyber-Physical Systems
    4. 12.4 Lightweight Cryptography Implementations for Security and Privacy in CPSs
    5. 12.5 Opportunities and Challenges
    6. 12.6 Conclusion
    7. Acknowledgments
    8. References
  20. Chapter 13: Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities
    1. 13.1 Introduction
    2. 13.2 WSN Applications in Smart Cities
    3. 13.3 Cyber-Physical Vulnerabilities
    4. 13.4 Solution Approaches
    5. 13.5 Conclusion
    6. Acknowledgment
    7. References
  21. Chapter 14: Detecting Data Integrity Attacks in Smart Grid
    1. 14.1 Introduction
    2. 14.2 Literature Review
    3. 14.3 Network and Threat Models
    4. 14.4 Our Approach
    5. 14.5 Performance Evaluation
    6. 14.6 Extension
    7. 14.7 Conclusion
    8. References
  22. Chapter 15: Data Security and Privacy in Cyber-Physical Systems for Healthcare
    1. 15.1 Introduction
    2. 15.2 Medical Cyber-Physical Systems
    3. 15.3 Data Security and Privacy Issues and Challenges in WBANs
    4. 15.4 Existing Security and Privacy Solutions in WBAN
    5. 15.5 Conclusion
    6. References
  23. Chapter 16: Cyber Security of Smart Buildings
    1. 16.1 What Is a Smart Building?
    2. 16.2 Communication Protocols for Smart Buildings
    3. 16.3 Attacks
    4. 16.4 Solutions to Protect Smart Buildings
    5. 16.5 Recent Trends in Smart Building Security Research
    6. 16.6 Conclusion and Outlook
    7. References
  24. Chapter 17: The Internet of Postal Things: Making the Postal Infrastructure Smarter
    1. 17.1 Introduction
    2. 17.2 Scoping the Internet of Postal Things
    3. 17.3 Identifying Internet of Postal Things Applications
    4. 17.4 The Future of IoPT
    5. 17.5 Conclusion
    6. References
  25. Chapter 18: Security and Privacy Issues in the Internet of Cows
    1. 18.1 Precision Livestock Farming
    2. 18.2 Security and Privacy of IoT in Agriculture
    3. 18.3 Conclusion
    4. References
  26. Chapter 19: Admission Control-Based Load Protection in the Smart Grid
    1. 19.1 Introduction
    2. 19.2 Related Work
    3. 19.3 Our Approach
    4. 19.4 Performance Evaluation
    5. 19.5 Conclusion
    6. References
  27. Editor Biographies
  28. Index
  29. End User License Agreement