Securing Cyber-Physical Systems

Securing Cyber-Physical Systems

4.11 - 1251 ratings - Source

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-criticala€”their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing qtrojan-resilientq integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.MTD. Techniques. for. Network. Security. Confidentiality, integrity, and availability (CIA) are three basic requirements in ... 3.5.1 Denial of Service Denial of service, or distributed denial of service (DDoS), is an attack that makes the service oranbsp;...

Title:Securing Cyber-Physical Systems
Author:Al-Sakib Khan Pathan
Publisher:CRC Press - 2015-10-22


You Must CONTINUE and create a free account to access unlimited downloads & streaming