𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Collaborative Approaches for Cyber Security in Cyber-Physical Systems

✍ Scribed by Theo Dimitrakos, Javier Lopez, Fabio Martinelli


Publisher
Springer
Year
2023
Tongue
English
Leaves
234
Series
Advanced Sciences and Technologies for Security Applications
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information.

Β 

Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future.Β 

Β 

The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general.Β 

✦ Table of Contents


Preface
Contents
Acronyms
Cyber Range Technical Federation: Case Flagship 1 Exercise
1 Introduction
2 Cyber Range Federation
3 Case Flagship 1
3.1 Technical Requirements of the Flagship 1 Cyber Range Federation
3.2 Technical Implementation of the Flagship 1 Cyber Range Federation
4 Reliability Assessment
5 Conclusion
References
Collaborative Private Classifiers Construction
1 Introduction
2 Privacy Models
2.1 Anonymization
2.2 Differential Privacy
2.3 Encryption
3 Literature Review
3.1 On Anonymization
3.2 On Differential Privacy
3.3 On Encryption
4 Problem Statement
4.1 Classifiers Over Anonymized Data
4.2 Classifiers Over Differentially Private Data
4.3 Classifiers Over Encrypted Data
5 Comparing Private NaΓ―ve Bayes and SVM Classifiers
5.1 NaΓ―ve Bayes and SVM Classification Algorithms
5.2 NaΓ―ve Bayes and SVM Classifiers in Private Setting
5.3 Experimental Analysis
6 Discussion
6.1 Findings
6.2 Security Risks
7 Conclusion
References
Usable Identity and Access Management Schemes for Smart Cities
1 Introduction
2 Background
2.1 Drawbacks in Traditional Verification Schemes
2.2 Biometric-Based Identity and Access System
3 Problem Description
3.1 Smart Financial Solutions
3.2 Smart Transportation
3.3 Smart Buildings
4 IAM scheme for Smart Financial Solutions
5 IAM Scheme for Smart Transportation
6 IAM Scheme for Smart Buildings
7 Challenges and Limitations
8 Conclusions
References
Collaborative Security Patterns for Automotive Electrical/Electronic Architectures
1 Introduction
2 Patterns for Designing Collaborative Concepts to Secure Automotive Architectures
2.1 Security Event Reporting (SER)
2.2 Host-based Integrity Verification (HbIV)
2.3 Key Management (KM)
2.4 Network-based Intrusion Detection (NbID)
2.5 Challenge-based Intrusion Prevention (CbIP)
2.6 Secure CAN Communication (SCC)
2.7 Secure Service Discovery (SSD)
2.8 Secure Feature Activation (SFA)
3 Design Principles for Cyber Resilience
4 Collaborative Patterns Applied in an Automotive Reference Architecture
5 Summary
6 Bibliographic Notes
References
Explainability of Model Checking for Mobile Malicious Behavior Between Collaborative Apps Detection and Localisation
1 Introduction
2 Background About Model Checking
3 Detecting Colluding Inter-App Communication
4 Experimental Analysis
4.1 Experimental Results
5 Related Work
6 Conclusion and Future Work
References
Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem
1 Introduction
2 An Overview of Digital Sovereignty
2.1 Laws and Strategy Towards Data Sovereignty
2.2 The Digital Sovereignty Ecosystem
3 Pillars of Sovereignty
3.1 Identity (Self-)Sovereignty
3.2 Sovereign Data Exchange Fabric
3.3 Compliance
3.4 Federated Catalogues
4 Technical Roadmap
5 Use Case: Sovereign Cyber-intelligence Dataspace
6 Conclusion
References
POM: A Trust-Based AHP-Like Methodology to Solve Conflict Requirements for the IoT
1 Introduction
2 Related Work
2.1 IoT and Trust
2.2 K-Model
2.3 Analytic Hierarchy Process (AHP)
3 Pairwise Ordination Method (POM)
3.1 Procedure
3.2 POM Versus AHP
4 Use Case Scenario: Smart Hearth-Monitor
4.1 Criteria
4.2 Alternatives
5 Results and Discussion
5.1 Goal
5.2 Context
5.3 Traceability
5.4 TrUStAPIS
5.5 Final Priority
6 Conclusion and Future Work
References
Trust Negotiation and Its Applications
1 Introduction
2 Related Work
3 Trust Negotiation
3.1 Concept
3.2 Criteria
3.3 Strategy
3.4 Access Control and Policies
4 Trust Negotiation Scenarios
4.1 A Simple Scenario
4.2 A More Advanced Scenario
4.3 An Online Scenario
5 Trust Negotiation Model
6 Conclusion
References
Usage Control for Industrial Control System
1 Introduction
2 Background
2.1 Industrial Control Systems Security
2.2 Access and Usage Control
3 Framework Description
3.1 The OPC-UCON Model
3.2 The Envisioned Scenario
3.3 Introducing UCON in the Scenario
4 Implementation and Results
5 Related Work
6 Conclusions
References
UCON+: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization
1 Introduction
2 The UCON+ Model
2.1 Model Components
2.2 Authorization Session
2.3 Policy Language
2.4 Administration and Delegation
3 Architecture
3.1 Requirements and Components Classification
3.2 Components Description
4 Implementation
4.1 ADP Reduction Algorithm
4.2 Performance
5 Use-Cases
5.1 Smart Home
5.2 Smart Vehicle
6 Conclusions and Future Work
References


πŸ“œ SIMILAR VOLUMES


Collaborative Approaches for Cyber Secur
✍ Theo Dimitrakos; Javier Lopez; Fabio Martinelli πŸ“‚ Library πŸ“… 2023 πŸ› Springer Nature 🌐 English

This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technolog

Cyber Security for Cyber Physical System
✍ Saqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.) πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

<p><p>This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students i

Cyber-Physical Systems Security
✍ Γ‡etin Kaya KoΓ§ πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

<p><p>The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems,

Security-Aware Design for Cyber-Physical
✍ Chung-Wei Lin, Alberto Sangiovanni Vincentelli πŸ“‚ Library πŸ“… 2017 πŸ› Springer 🌐 English

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with