Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Table of Contents
List of Contributors
Foreword
Preface
Acknowledgments
Chapter 1: Overview of Security and Privacy in Cyber-Physical Systems
1.1 Introduction
1.2 Defining Security and Privacy
1.3 Defining Cyber-Physical Systems
1.4 Examples of Security and Privacy in Action
1.5 Approaches to Secure Cyber-Physical Systems
1.6 Ongoing Security and Privacy Challenges for CPSs
1.7 Conclusion
References
Chapter 2: Network Security and Privacy for Cyber-Physical Systems
2.1 Introduction
2.2 Security and Privacy Issues in CPSs
2.3 Local Network Security for CPSs
2.4 Internet-Wide Secure Communication
2.5 Security and Privacy for Cloud-Interconnected CPSs
2.6 Summary
2.7 Conclusion and Outlook
Acknowledgments
References
Chapter 3: Tutorial on Information Theoretic Metrics Quantifying Privacy in Cyber-Physical Systems
3.1 Social Perspective and Motivation
3.2 Information Theoretic Privacy Measures
3.3 Privacy Models and Protection
3.5 Conclusion and Outlook
Appendix A Derivation of the Mutual Information Based on the KLD
Appendix B Derivation of the Mutual Information In Terms of Entropy
Appendix C Derivation of the Mutual Information Conditioned on x
Appendix D Proof of Corollary 3.1
References
Chapter 4: Cyber-Physical Systems and National Security Concerns
4.1 Introduction
4.2 National Security Concerns Arising from Cyber-Physical Systems
4.3 National Security Implications of Attacks on Cyber-Physical Systems
4.4 Conclusion
References
Chapter 5: Legal Considerations of Cyber-Physical Systems and the Internet of Things
5.1 Introduction
5.2 Privacy and Technology in Recent History
5.3 The Current State of Privacy Law
5.4 Meeting Future Challenges
References
Chapter 6: Key Management in CPSs
6.1 Introduction
6.2 Key Management Security Goals and Threat Model
6.3 CPS Key Management Design Principles
6.4 CPS Key Management
6.5 CPS Key Management Challenges and Open Research Issues
6.6 Summary
References
Chapter 7: Secure Registration and Remote Attestation of IoT Devices Joining the Cloud: The Stack4Things Case of Study
7.1 Introduction
7.2 Background
7.3 Reference Scenario and Motivation
7.4 Stack4Things Architecture
7.5 Capabilities for Making IoT Devices Secure Over the Cloud
7.6 Adding Security Capabilities to Stack4Things
7.7 Conclusion
References
Chapter 8: Context Awareness for Adaptive Access Control Management in IoT Environments
8.1 Introduction
8.2 Security Challenges in IoT Environments
8.3 Surveying Access Control Models and Solutions for IoT
8.4 Access Control Adaptation: Motivations and Design Guidelines
8.5 Our Adaptive Context-Aware Access Control Solution for Smart Objects
8.6 Open Technical Challenges and Concluding Remarks
References
Chapter 9: Data Privacy Issues in Distributed Security Monitoring Systems
9.1 Information Security in Distributed Data Collection Systems
9.2 Technical Approaches for Assuring Information Security
9.3 Approaches for Building Trust in Data Collection Systems
9.4 Conclusion
References
Chapter 10: Privacy Protection for Cloud-Based Robotic Networks
10.1 Introduction
10.2 Cloud Robot Network: Use Case, Challenges, and Security Requirements
10.3 Establishment of Cloud Robot Networks
10.4 Communication Security
10.5 Security Management of Cloud Robot Networks
10.6 Related Work
10.7 Conclusion
References
Chapter 11: Toward Network Coding for Cyber-Physical Systems: Security Challenges and Applications
11.1 Introduction
11.2 Background on Network Coding and Its Applications
11.3 Security Challenges
11.4 Secure Network Coding
11.5 Applications of Network Coding in Providing Security
11.6 Conclusion
Acknowledgment
References
Chapter 12: Lightweight Crypto and Security
12.1 Introduction
12.2 Cyber-Physical Systems
12.3 Security and Privacy in Cyber-Physical Systems
12.4 Lightweight Cryptography Implementations for Security and Privacy in CPSs
12.5 Opportunities and Challenges
12.6 Conclusion
Acknowledgments
References
Chapter 13: Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities
13.1 Introduction
13.2 WSN Applications in Smart Cities
13.3 Cyber-Physical Vulnerabilities
13.4 Solution Approaches
13.5 Conclusion
Acknowledgment
References
Chapter 14: Detecting Data Integrity Attacks in Smart Grid
14.1 Introduction
14.2 Literature Review
14.3 Network and Threat Models
14.4 Our Approach
14.5 Performance Evaluation
14.6 Extension
14.7 Conclusion
References
Chapter 15: Data Security and Privacy in Cyber-Physical Systems for Healthcare
15.1 Introduction
15.2 Medical Cyber-Physical Systems
15.3 Data Security and Privacy Issues and Challenges in WBANs
15.4 Existing Security and Privacy Solutions in WBAN
15.5 Conclusion
References
Chapter 16: Cyber Security of Smart Buildings
16.1 What Is a Smart Building?
16.2 Communication Protocols for Smart Buildings
16.3 Attacks
16.4 Solutions to Protect Smart Buildings
16.5 Recent Trends in Smart Building Security Research
16.6 Conclusion and Outlook
References
Chapter 17: The Internet of Postal Things: Making the Postal Infrastructure Smarter
17.1 Introduction
17.2 Scoping the Internet of Postal Things
17.3 Identifying Internet of Postal Things Applications
17.4 The Future of IoPT
17.5 Conclusion
References
Chapter 18: Security and Privacy Issues in the Internet of Cows
18.1 Precision Livestock Farming
18.2 Security and Privacy of IoT in Agriculture
18.3 Conclusion
References
Chapter 19: Admission Control-Based Load Protection in the Smart Grid
19.1 Introduction
19.2 Related Work
19.3 Our Approach
19.4 Performance Evaluation
19.5 Conclusion
References
Editor Biographies
Index
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →