Securing Cyber-Physical Systems -

Securing Cyber-Physical Systems

Al-Sakib Khan Pathan (Herausgeber)

Buch | Hardcover
424 Seiten
2015
Crc Press Inc (Verlag)
978-1-4987-0098-6 (ISBN)
159,95 inkl. MwSt
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry.

CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical—their availability and correct operation is essential. This book focuses on the security of such mission-critical systems.

Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including:



Securing modern electrical power systems
Using moving target defense (MTD) techniques to secure CPS
Securing wireless sensor networks (WSNs) used for critical infrastructures
Mechanisms to improve cybersecurity and privacy in transportation CPS
Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles
Security issues, vulnerabilities, and challenges in the Internet of Things
Machine-to-machine (M2M) communication security
Security of industrial control systems
Designing "trojan-resilient" integrated circuits

While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Al-Sakib Khan Pathan received his PhD degree (MS leading to PhD) in computer engineering in 2009 from Kyung Hee University, South Korea. He received a BSc degree in computer science and information technology from the Islamic University of Technology, Bangladesh, in 2003. He is currently an assistant professor in the Computer Science Department at the International Islamic University Malaysia, Malaysia. Until June 2010, he served as an assistant professor in the Computer Science and Engineering Department at BRAC University, Bangladesh. Prior to holding this position, he worked as a researcher at the Networking Lab, Kyung Hee University, South Korea, up to August 2009. His research interests include wireless sensor networks, network security, and e-services technologies.

Securing Power Systems. ICT Modeling for Cosimulation of Integrated Cyberpower Systems. Moving Target Defense Mechanisms in Cyber-Physical Systems. Ontological Framework–Assisted Embedded System Design with Security Consideration in a Cyber-Physical Power System Environment. WSNProtectLayer: Security Middleware for Wireless Sensor Networks. Securing Transportation Cyber-Physical Systems. Securing the Future Autonomous Vehicle: A Cyber-Physical Systems Approach. A Study of Security Issues, Vulnerabilities, and Challenges in the Internet of Things. Security and Privacy in the IPv6-Connected Internet of Things. Security Issues and Approaches in M2M Communications. Securing Embedded Systems: Cyberattacks, Countermeasures, and Challenges. Using Software-Defined Networking to Mitigate Cyberattacks in Industrial Control Systems. Tackling Cross-Site Scripting (XSS) Attacks in Cyberspace. Trojan-Resilient Circuits. Intrusion Detection, Prevention, and Response System (IDPRS) for Cyber-Physical Systems (CPSs). Security-Integrated Quality-of-Service Paradigm for Cyber-Physical Systems.

Zusatzinfo 21 Tables, black and white; 151 Illustrations, black and white
Verlagsort Bosa Roca
Sprache englisch
Maße 178 x 254 mm
Gewicht 952 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Web / Internet
Technik Nachrichtentechnik
ISBN-10 1-4987-0098-5 / 1498700985
ISBN-13 978-1-4987-0098-6 / 9781498700986
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95