000778886 000__ 04629cam\a2200517Mi\4500 000778886 001__ 778886 000778886 005__ 20230306142859.0 000778886 006__ m\\\\\o\\d\\\\\\\\ 000778886 007__ cr\nn\nnnunnun 000778886 008__ 170107s2017\\\\sz\\\\\\o\\\\\000\0\eng\d 000778886 019__ $$a967866156$$a968184056$$a974650298$$a981873604 000778886 020__ $$a9783319513287$$q(electronic book) 000778886 020__ $$a3319513281$$q(electronic book) 000778886 020__ $$z9783319513270 000778886 020__ $$z3319513273 000778886 0247_ $$a10.1007/978-3-319-51328-7$$2doi 000778886 035__ $$aSP(OCoLC)ocn967877981 000778886 035__ $$aSP(OCoLC)967877981$$z(OCoLC)967866156$$z(OCoLC)968184056$$z(OCoLC)974650298$$z(OCoLC)981873604 000778886 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dN$T$$dYDX$$dIDEBK$$dGW5XE$$dCNCGM$$dUAB$$dOCLCQ$$dNJR$$dMERUC$$dUPM$$dOCLCF$$dIOG 000778886 049__ $$aISEA 000778886 050_4 $$aTK5105.67 000778886 050_4 $$aTA1-2040 000778886 08204 $$a004.6$$223 000778886 08204 $$a620 000778886 1001_ $$aLin, Chung-Wei. 000778886 24510 $$aSecurity-aware design for cyber-physical systems :$$ba platform-based approach /$$cChung-Wei Lin, Alberto Sangiovanni-Vincentelli. 000778886 260__ $$aCham :$$bSpringer,$$c2017. 000778886 300__ $$a1 online resource (106 pages) 000778886 336__ $$atext$$btxt$$2rdacontent 000778886 337__ $$acomputer$$bc$$2rdamedia 000778886 338__ $$aonline resource$$bcr$$2rdacarrier 000778886 347__ $$atext file$$bPDF$$2rda 000778886 5050_ $$aAcronyms; 1 Introduction; 2 Security Threats in Cyber-Physical Systems; 3 Security-Aware Design Methodology; 3.1 Security-Aware Mapping; 3.2 Security Mechanism Selection; 3.3 Architecture Selection; 3.4 Examples of Security-Aware Design; 3.5 Summary; 4 Security Mechanisms for CAN Protocol; 4.1 System Model and Attacker Model; 4.2 Security Mechanisms; 4.2.1 Basic Authentication; 4.2.2 Advanced Mechanism; 4.3 Counter Implementation; 4.4 Counter Reset Mechanisms; 4.4.1 Self-healing Reset Mechanism; 4.4.2 Network-Wide Reset Mechanisms; 4.5 Analysis; 4.6 Summary. 000778886 5058_ $$a5 Security-Aware Mapping for CAN-Based Systems5.1 System Model and Formulation; 5.1.1 System Model; 5.1.2 Security Constraints and Key Distribution; 5.1.3 Safety Constraints; 5.2 Mapping Algorithm; 5.2.1 Constraints; 5.2.2 Objective Function; 5.2.3 MILP-Based Algorithm; 5.3 Extension; 5.3.1 Path-Based Security Constraints; 5.3.2 Objective Function; 5.3.3 Algorithm; 5.4 Experimental Results; 5.4.1 Comparison with a Greedy Heuristic; 5.4.2 Comparison with Non-integrated Approaches; 5.4.3 Extension; 5.5 Summary; 6 Security-Aware Mapping for TDMA-Based Systems; 6.1 System Model and Formulation. 000778886 5058_ $$a6.2 Time-Delayed Release of Keys6.3 Mapping Algorithm; 6.3.1 Overview; 6.3.2 Task Allocation and Priority Assignment; 6.3.3 Signal Mapping; 6.3.4 Network Scheduling; 6.3.5 Worst-Case Transmission Delay Analysis; 6.3.6 Interval Length Exploration; 6.3.7 Network Scheduling Refinement; 6.4 Experimental Results; 6.5 Summary; 7 Security-Aware Design for V2V Communication; 7.1 Formulation and Formulation; 7.2 Algorithm; 7.3 Experimental Results; 7.4 Summary; 8 FSM-Based Security-Aware Design; 9 Graph-Based Security-Aware Design; 9.1 Multiple Paths for Security; 9.2 Network Partitioning for Security. 000778886 5058_ $$a9.3 Summary10 Conclusions; References. 000778886 506__ $$aAccess limited to authorized users. 000778886 520__ $$aAddressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. . 000778886 588__ $$aDescription based on print version record. 000778886 650_0 $$aCooperating objects (Computer systems)$$xSecurity measures. 000778886 7001_ $$aSangiovanni-Vincentelli, Alberto. 000778886 77608 $$iPrint version:$$aLin, Chung-Wei.$$tSecurity-Aware Design for Cyber-Physical Systems : A Platform-Based Approach.$$dCham : Springer International Publishing, ©2017$$z9783319513270 000778886 852__ $$bebk 000778886 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-51328-7$$zOnline Access$$91397441.1 000778886 909CO $$ooai:library.usi.edu:778886$$pGLOBAL_SET 000778886 980__ $$aEBOOK 000778886 980__ $$aBIB 000778886 982__ $$aEbook 000778886 983__ $$aOnline 000778886 994__ $$a92$$bISE