Security and privacy in cyber physical systems

9.37  ·  2,906 ratings  ·  328 reviews
Posted on by
security and privacy in cyber physical systems

Cybersecurity and Privacy in Cyber Physical Systems by Yassine Maleh

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It





Presents high-quality contributions addressing related theoretical and practical aspects



Improves the readers awareness of cybersecurity and privacy in CPSs



Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies



Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs



Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs



Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs



This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security.



Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.
File Name: security and privacy in cyber physical systems.zip
Size: 99956 Kb
Published 11.01.2019

Science and Technology

CPS and IoT play an increasingly important role in critical infrastructure, government and everyday life. Automobiles, medical devices, building controls and the smart grid are examples of CPS. Each includes smart networked systems with embedded sensors, processors and actuators that sense and interact with the physical world and support real-time, guaranteed performance in safety-critical applications. The closely related area of IoT continues to emerge and expand as costs drop and the confluence of sensors, platforms and networks increases. The consequences of unintentional faults or malicious attacks could have severe impact on human lives and the environment. Advances in networking, computing, sensing and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, however, security often is left for later.

Due to migration of article submission systems, please check the status of your submitted manuscript in the relevant system below:. Once production of your article has started, you can track the status of your article via Track Your Accepted Article. A cyber-physical system CPS is a complex blend of physical and computer components in which physical systems are usually monitored or controlled by computer-based algorithms with possibly humans in the loop. In cyber physical systems, physical and software components are deeply intertwined, each operating on different spatial and temporal scales, exhibiting multiple and distinct behavioral modalities, and interacting with each other in a myriad of ways that change with context. Examples of CPS include smart grid, autonomous transportation systems, medical monitoring, process control systems, robotics systems, and automatic pilot avionics. New smart CPSs will drive innovation and competition in sectors such as food and agriculture, energy, different modes of transportation including air and automobiles, building design and automation, healthcare and medical implants, and advanced manufacturing.

As you have seen from the previous chapters, cyber-physical systems CPS are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them across application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties.

Bibliographic Information

Written by a team of experts at the forefront of the cyber-physical systems CPS revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems CPS are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. Fink Thomas W. Edgar Theora R.

1 thoughts on “Cybersecurity and Privacy in Cyber Physical Systems by Yassine Maleh

  1. Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and.

Leave a Reply