Recent Advances in Systems Safety and Security (eBook)
XI, 262 Seiten
Springer International Publishing (Verlag)
978-3-319-32525-5 (ISBN)
This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.
Foreword 6
Contents 8
Contributors 10
1 The Theory of Witness-Functions 13
Abstract 13
1 Introduction 14
1.1 Notations 14
2 An Increasing Protocol Keeps Its Secret Inputs 17
2.1 Safe Functions 18
3 Safe Functions 19
4 The Witness-Functions 20
5 Analysis of the Woo-Lam Protocol (Amended Version) with a Witness-Function 22
5.1 Analysis of the Generalized Roles of A 24
5.2 Analysis of the Generalized Roles of B 25
5.3 Analysis of the Generalized Roles of S 26
6 Results and Interpretation 29
7 Related Works 29
8 Conclusion and Future Work 29
References 30
2 Quantification of Centralized/Distributed Secrecy in Stochastic Discrete Event Systems 32
Abstract 32
1 Introduction 33
2 Notation and Preliminaries 34
3 Illustrative Example: AES Side-Channel Attack 35
4 Quantification of Secrecy Loss in Centralized Setting 37
5 Quantification of Distributed Secrecy Loss in Stochastic PODESs Under Bounded-Delay Communications 43
6 Conclusion 49
Acknowledgments 49
Appendix 50
References 50
3 Framework for Cognitive Radio Deployment in Large Scale WSN-UAV Surveillance 52
Abstract 52
1 Introduction 53
2 Related Work 55
3 System Architecture 56
3.1 MUROS Framework 56
3.2 Communication Structure Description as Basis for CR Scheme 60
4 Cooperative Spectrum Sensing Scheme for CR 62
5 Cognitive Radio Testbed for WSN-UAV Collaborative Monitoring 64
6 Conclusion 65
Acknowledgment 66
References 66
4 Using Modeling and Dynamic Simulation Techniques for Systems’ Safety and Security 68
Abstract 68
1 Introduction 70
2 Reactive Distillation—The Mathematical Model Summary 71
2.1 The New Model Structure 73
2.2 Modeling Principles 74
2.2.1 Main Model 74
2.2.2 Phase Splitting Algorithm 76
3 Model Validation 79
4 A Short Case-Study: Results 82
5 Conclusion 87
References 87
5 HAZOP-Based Security Analysis for Embedded Systems: Case Study of Open Source Immobilizer Protocol Stack 89
Abstract 89
1 Introduction 89
2 Related Works 91
2.1 Safety Analysis Techniques 91
2.2 Security Analysis Techniques 92
3 Security Analysis 94
3.1 Security Analysis Flow in System Development 94
3.2 Threat Analysis 95
3.2.1 Objectives 95
3.2.2 Target Diagram 96
3.2.3 Guidewords 96
3.2.4 Analysis Sheet 97
3.3 Risk Assessment 97
4 A Case Study 98
4.1 Open Source Immobilizer Protocol Stack (OSIPS) 98
4.2 Assumptions 100
4.3 Threat Analysis 100
4.4 Risk Assessment 101
5 Discussion 102
6 Conclusion 105
References 105
6 Multimodal Heterogeneous Monitoring of Super-Extended Objects: Modern View 107
Abstract 107
1 Introduction 107
2 Research Objective 109
3 Architecture of Heterogeneous Multimodal Monitoring System 110
3.1 General Principles of Heterogeneous Multimodal Monitoring System Architecture 110
3.2 Information Channels of Heterogeneous Multimodal Monitoring System 113
4 The Guaranteed Detection of the Spatial-Time Events in Multi-channel Monitoring Systems 113
4.1 The Robust Guaranteed Detection of the Spatial-Time Events with Usage of Simultaneously Data Processing in Several Channels 114
4.1.1 Requirements for the Decision Procedure 114
4.1.2 Selecting a Robust Signaling Function /rho 116
4.1.3 Guaranteed Detection Method of the SES 117
4.2 Method of Adaptive Sequential Real-Time Detection of Spatial-Time Events in Multichannel Monitoring Systems 119
4.2.1 SES’s Detection Problem Set and Requirements for the Decision Procedure 120
4.2.2 Method of Adaptive Sequential Real-Time SES’s Detection 120
5 Classifications of Spatial-Time Events 122
5.1 The Multimodal Algorithm of STE Classification 122
5.2 The STE Classification Algorithm Application Results 124
6 Conclusions 125
References 125
7 Image Based Control of a Simple Mobile Robotic System 127
Abstract 127
1 Introduction 128
2 System Configuration 129
2.1 Data Processing for Obstacle Avoidance 132
2.2 Data Processing for Target Detection and Tracking 133
2.3 Data Transmission 135
3 System Implementation 135
3.1 Software Development Environments 136
3.2 Navigation Module—Compass 139
3.3 Processing Units 139
3.4 Microcontroller—Mobile Platform Connection 140
4 Experiments and Tests for Different Algorithms 141
4.1 Experimental Results Concerning Motor Control 141
4.2 Experimental Results Concerning Obstacle Avoidance 141
4.3 Experimental Results on Tracking Targets (Objects) 145
5 Conclusions and Further Work 146
Acknowledgement 146
References 146
8 On Using a Cloud-Based Approach to Develop a Mobile Asset Management Solution 148
Abstract 148
1 Introduction 149
2 Service Oriented Architectures in Cloud Computing 150
3 The Safemobile S4I Arhitecture 151
4 Mobile Asset Management System Description and Architecture 153
4.1 Mobile Asset Management System Main Features 153
4.2 Mobile Asset Management System Components 155
4.3 The User Interface 159
4.4 The System Administration Module 162
5 Conclusions 163
Acknowledgment 163
References 163
9 Execution of an IEC61499 Application on a Remote Server 165
Abstract 165
1 Introduction 165
2 System Architecture 166
3 Remote Web-Based Execution System 168
3.1 System Modeling 168
3.2 Preparing the Application 169
3.3 Data Transmission and Processing 173
3.4 The Web Interface 173
3.5 The Web Server 175
3.6 The Application Manager 176
3.7 The Algorithm Execution Module 179
3.8 The Remote Device 180
4 Aspects Regarding Communication Quality 180
5 System Evaluation 182
5.1 Network Signal Loss 183
5.2 Network Congestion 183
5.3 Application Manager Fail 183
6 Conclusion 184
References 184
10 Evolution of Legal Issues of Honeynets 186
Abstract 186
1 Introduction 186
2 Related Research 188
3 Honeynet’s Generations 189
3.1 Description of the 1st Generation of Honeynets 190
3.2 Description of the 2nd Generation of Honeynets 190
3.3 Description of the 3rd Generation of Honeynets 191
4 Introduction to Legal Issues of Honeypots and Honeynets 192
5 Data Capture 193
5.1 Issue of Privacy 194
5.2 The 1st Generation of Honeynets 195
5.3 The 2nd and the 3rd Generation of Honeynets 196
6 Data Control 196
6.1 Issue of Liability 197
6.2 The 1st Generation of Honeynets 197
6.3 The 2nd and the 3rd Generation of Honeynets 198
7 Data Collection 199
7.1 Geographical Location of Data 200
7.2 Jurisdiction and Applicable Law 200
7.3 Civil Law 201
7.4 Criminal Law 202
8 Data Analysis and Data Presentation 203
8.1 Sharing and Publishing Network Traces 203
8.2 Digital Evidence 204
9 Conclusion 205
Acknowledgments 206
References 206
11 A Risk Screening System by Network Diagram Recognition for Information Security Audit 208
Abstract 208
1 Introduction 208
2 Information Security Audit Process 210
2.1 Outline of Audit Process 210
2.2 Problem in Audit Planning 211
3 Risk Screening System by Network Diagram Recognition 212
3.1 Requirements 212
3.2 System Design 213
3.3 Network Diagram Recognition 214
3.4 Rule-Based Risk Identification 216
4 Conclusion 216
References 217
12 Risk Analysis and Optimal Model for Efficiency of Reengineering the Independent Power Grids 218
Abstract 218
1 Introduction 219
2 Mathematical model 220
3 Monitoring Priorities 221
4 Risk Analisys 226
5 Risks Management and Mitigation 228
6 Conclusion 228
References 229
13 Innovative Fuzzy Approach on Analyzing Industrial Control Systems Security 230
Abstract 230
1 Introduction 230
2 Fuzzy Modelling Applied in Control Systems Security 232
3 Attacker Profile 233
4 Attack Success Rate Estimation 239
5 Industrial Case Study—Attack Success Rate Estimation for a Gas Compressor Station Wireless Sensor Node 242
6 Conclusion 244
References 245
14 IPv6 Sensor Networks Modeling for Security and Communication Evaluation 247
Abstract 247
1 Introduction 248
2 Background 249
2.1 Constraints in Wireless Sensor Networks 249
2.2 Security Properties in Wireless Sensor Networks 250
2.3 Specification of IPv6 over Sensor Network Technologies 251
3 Existing Security Architectures for WSNs 252
3.1 Authentication and Encryption Solutions 253
3.2 Key Management Mechanisms 254
3.3 Contiki OS and µIPv6 254
4 Implementation of ContikiSec Mechanism 256
5 Evaluation and Simulation Results 259
6 Conclusion 263
Acknowledgments 264
References 264
Index 266
Erscheint lt. Verlag | 25.5.2016 |
---|---|
Reihe/Serie | Studies in Systems, Decision and Control | Studies in Systems, Decision and Control |
Zusatzinfo | XI, 262 p. 104 illus., 66 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Technik ► Nachrichtentechnik | |
Schlagworte | Cloud Computing • Large Scale Distributed Monitoring Systems • systems safety • Systems Security • wireless sensor networks |
ISBN-10 | 3-319-32525-6 / 3319325256 |
ISBN-13 | 978-3-319-32525-5 / 9783319325255 |
Haben Sie eine Frage zum Produkt? |
Größe: 9,3 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich