Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Cover
Title
Copyright
End User License Agreement
Contents
Preface
List of Contributors
A Comprehensive Analysis of Various Threat Detection and Prevention Techniques in IoT Environment
P.S. Pavithra1,* and P. Durgadevi1
1. INTRODUCTION
2. CLASSIFICATION OF IOT LAYERS
2.1. Application Layer
2.2. Middleware Layer
2.3. Network Layer
2.3.1. Low Power Wi-Fi
2.3.2. Zigbee
2.3.3. Near Field Communication (NFC)
2.3.4. BLE
2.3.5. Low Power Wide-Area-Networks (LPWAN)
2.4. Sensor Layer
2.4.1. Mobile Phone Sensors
2.4.2. Healthcare Sensors
2.4.3. Neural Sensors
2.4.4. Environmental and Chemical Sensors
2.4.5. RFID
3. VARIOUS SECURITY ISSUES IN IOT LAYERS
3.1. Phishing Attacks
3.2. Side-Channel Attack
3.3. Unauthorized Access
3.4. Remote to Local (User) Attacks (R2L)
3.5. Probing
3.6. User to Root Attacks (U2R)
3.7. Eavesdropping Attack
3.8. Node Capture Attacks
3.9. Replay Attack
3.10. Wormhole Attack
4. IOT SECURITY
4.1. IoT Security Using IDS
4.2. IoT Security Using Machine Learning Techniques
4.3. IoT Security Issues using Blockchain
4.3.1. Ethereum
4.3.2. Hyperledger Fabric
4.3.3. Hyperledger Sawtooth
4.3.4. EOSIO
4.3.5. Corda
4.3.6. Quorum
4.3.7. Distributed Ledger
4.3.8. Peer to Peer Communication
CONCLUSION
REFERENCES
Security Concerns in Smart Grid Cyber-Physical System
S. Brindha1,* and Anitha Kumari K.2
1. INTRODUCTION
2. SMART GRIDS
2.1. Model for Smart Grid
3. CHARACTERISTICS OF CPS WITH SMART GRID
3.1. Connectivity
3.2. Mobility
3.3. Security &
Privacy
3.4. Flexibility
3.5. Dynamics
3.6. Interoperability
4. COMPONENTS OF SMART GRID
5. APPLICATIONS OF SG-CPS
6. APPLICATIONS OF SMART GRID CYBER PHYSICAL SYSTEM (SG-CPS).

6.1. Advanced Metering Infrastructure (AMI)
6.2. Demand Management
6.3. Electric Vehicles (EVs)
6.4. Wide-Area Situational Awareness
6.5. Distributed Energy Resources and Storage
6.6. Distributed Grid Management
6.7. Energy Management
6.8. Smart Home
6.9. Self-healing Grid
6.10. Power Demand Forecasting
6.11. Power Generation Forecast of Renewable Energy
6.12. Fault Diagnosis and Protection
6.14. Smart Grid Security
7. SECURITY OBJECTIVES IN SG-CPS
7.1. Confidentiality
7.2. Integrity
7.3. Availability
7.4. Accountability
8. CYBER-ATTACKS IN SG-CPS
8.1. Transmission System Attacks
8.2. Interdiction Attacks
8.3. Complex Network (CN)-based Attacks
8.4. Substation Attacks
8.5. Switching Attacks
8.6. PMU Attacks
8.7. Smart Meter Attacks
9. COUNTERMEASURES
9.1. Counter-acting Attacks using Moving Target Defense
9.2. Counter-acting False Data Attacks using Anomaly Detection
CONCLUSION
REFERENCES
Cyber Physical Systems in Clinical Setting
T.P. Kamatchi1,*, Anitha Kumari K.2 and D. Priya1
1. INTRODUCTION
1.1. Cyber Physical Systems
1.2. Definition of Sensor
1.3. Classification of Sensors
1.4. Usage of Sensors
1.5. How Do the Sensors' Function?
1.6. Diverse Variety of Sensors
1.6.1. Touch Sensor
1.6.2. Color Sensor
1.6.3. Humidity Sensor
1.6.4. Magnetic Sensor (Hall Effect Sensor)
1.6.5. Microphone (Sound Sensor)
1.6.6. Flow and Level Sensor
1.6.7. Strain and Weight Sensor
1.7. Key Difficulties in CPS
1.8. Security Challenges in CPS
1.8.1. High Assurance Software
1.8.2. Interoperability
1.8.3. Context Awareness
1.8.4. Autonomy
1.8.5. Security and Privacy
1.8.6. Certifiability
1.8.7. Executable Clinical Workflows
1.8.8. Model-based Development
1.8.9. Physiological Close-loop Control.

1.8.10. Patient Modeling and Simulation
1.8.11. Smart Alarms and Adaptive Patients
1.8.12. User-centered Design
1.8.13. Infrastructure for Medical-Device Integration and Interoperability
1.8.14. Compositionality
1.8.15. Security and Privacy
1.8.16. Verification, Validation and Certification
2. SENSOR NETWORKS AND TRANSMISSION TECHNOLOGIES
2.1. Types of Networks
2.1.1. Body Area Network (BAN)
2.1.2. Personal Area Network (PAN)
2.1.3. Local Area Network (LAN)
2.1.4. Metropolitan Area Network (MAN)
2.1.5. Wide Area Network (WAN)
2.2. Transmission Technologies
2.2.1. Wired Transmission
2.2.2. Wireless Transmission
3. ARCHITECTURE OF CYBER PHYSICAL SYSTEM
3.1. Design Requirements of CPS Architecture
3.1.1. Reliability
3.1.2. Accuracy
3.1.3. Latency
3.1.4. Scalability
3.1.5. Interoperability
3.1.6. Autonomy
3.1.7. Protection and Confidentiality
3.1.8. QoS
3.2. Generic Architecture of CPS
3.3. Service Oriented Architecture (SOA) for CPS
3.3.1. Service Description
3.3.2. Service Composition
3.3.3. Service Registry
3.3.4. Service Discovery
3.3.5. Service Monitoring
3.4. CPS Layer Model
3.4.1. Physical Layer
3.4.2. Network Layer
3.4.3. Decision Layer
3.4.4. Application Layer
3.5. CPS Architecture for Clinical Setting
3.5.1. Physical / Sensor Layer
3.5.2. Network Layer
3.5.3. Decision Layer
3.5.4. Application Layer
3.6. Enabling Technologies for Healthcare Cyber Physical Systems
4. IMPLEMENTATION OF CPS IN CLINICAL SETTING
4.1. Cyber Physical Systems in Clinical Settings
4.2. Mechanism Makes up Cyber Physical Systems
4.3. How Does a Cyber-physical System Operate?
4.4. Implementation of Cyber Physical Systems
4.4.1. Connection Level
4.4.2. Conversion Level
4.4.3. Cyber Level
4.4.4. Cognition Level.

4.4.5. Configuration Level
5. EMERGING CYBER-PHYSICAL SYSTEMS IN CLINICAL SETTINGS
5.1. CPS Based Hospital Asset and Patient Location Tracking System
5.1.1. Working of the Asset Tracking System
5.1.2. Advantages
5.1.3. Similar CPS Applications in Clinical Settings
5.2. Medical CPS (MCPS) and Big Data Platform
5.3. LiveNet
5.4. HipGuard
5.5. AlarmNet
CONCLUSION
REFERENCES
Cyber Physical Systems in Autonomous and Unmanned Aerial Vehicles
Sindhu Rajendran1,*, Shreya S.1, Alaska Tengli1 and Ramavenkateswaran N.1
1. INTRODUCTION
1.1. Evolution of Autonomous Vehicles
1.2. Introduction to Unmanned Aerial Vehicles (UAVs)
2. IMPORTANCE OF CPS
2.1. Advantages of Cyber Physical Systems
2.1.1. Smart-city Administration
2.1.2. Infrastructure
2.1.3. Automotive
2.1.4. Agriculture
2.1.5. Sustainability
2.1.6. Security and Privacy
2.1.7. Health Care
3. CHALLENGES WITH RESPECT TO CYBER PHYSICAL SYSTEMS
3.1. Hybrid
3.2. Multidisciplinary
3.3. Distributed
3.4. Large-scale
3.5. Dynamic
3.6. Adaptive
3.7. Human-in-the-loop
3.8. Steps that can be Taken to Overcome the Mentioned Challenges
3.8.1. Cross-domain
3.8.2. Based on components
3.8.3. Educational
3.8.4. Time-awareness
3.8.5. Trust-conscious
3.8.6. Human-centric
4. ROLE OF CPS IN AUTONOMOUS VEHICLES
4.1. Design Prospects of CPS in Autonomous Vehicles
4.1.1. Model Based Design (MBD)
4.1.2. Cyber-physical Systems
4.1.3. Human-in-the-loop System
4.2. Two Basic Elements are Necessary for these Systems to Operate Effectively
4.2.1. Component-based Design
4.2.2. Design for Security &
Privacy
4.3. Aspects of CPS in the Present Era
4.4. Future Prospects of Cps
5. ROLE OF CPS IN UNMANNED AERIAL VEHICLES
5.1. Present State of Art of Cps in UAVs
5.1.1. ReMinds.

5.1.2. Cps Research Incubator
5.2. Future Prospects of CPS In UAVs
CONCLUSION
REFERENCES
Cyber-Physical System: Advances and Applications in Cyber Security
Sindhu Rajendran1,*, Shilpa S.P.1, Sai Priya L.1 and Ramavenkateswaran N.1
1. INTRODUCTION
1.1. Evolution of CPS
1.1.1. Benefits of CPS
1.1.2. Applications of CPS
2. CHALLENGES IN TERMS OF SECURITY IN CPS
2.1. Network Vulnerabilities
2.2. Platform Vulnerabilities
2.3. Management Vulnerabilities
2.3.1. Assumption and Isolation
2.3.2. Increasing Networking
2.3.3. Diversity
2.4. USB Usage
2.5. Bad Practice
2.6. Spying
2.7. Homogeneity
2.8. Suspicious Employees
3. CPS IN INDUSTRY
3.1. CPS Management System
3.1.1. Types of Threats
4. SYSTEM MODELLING OF CPS
5. CPS SECURITY REQUIREMENTS
5.1. Privacy
5.2. Dependability
5.3. Durability
5.4. Interaction and Coordination
5.5. Operational Security
5.6. System Hardening
6. VARIOUS APPROACHES OF CPS SECURITY
6.1. Binary Hypothesis and Bayesian Detection
6.2. Weighted least square approaches
6.3. DoS Attack Strategies
6.4. Deception Attack Strategies
Replay Attack Strategies
7. DIFFERENT ALGORITHMS FOR CPS SECURITY
7.1. Algorithm for Threat Modeling Approach
7.2. Digital Twinning Algorithm
7.2.1. Overview of the Proposed Framework
7.3. Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical Systems with 1-Based Power System Security Algorithm
7.4. Alignment of CPS Security and Safety Using Failure Graph of Attack-Countermeasure (FACT)
7.4.1. Step 1
7.4.2. Step 2
7.4.3. Step 3
7.4.4. Step 4
8. FUTURE ASPECTS OF IMPROVEMENT
8.1. Upkeep of Security Services
8.2. Confidentiality
8.3. Integrity of Message/Device
8.4. Device and data accessibility.

8.5. Authentication of Devices and Users.

Browse Subjects

Show more subjects...

Statistics

from
to
Export