<p><span>Cyber Security Applications for Industry 4.0 (CSAI 4.0)</span><span> provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide
Cyber Security Applications for Industry 4.0
β Scribed by R Sujatha, G Prakash, Noor Zaman Jhanjhi
- Publisher
- CRC Press
- Year
- 2023
- Tongue
- English
- Leaves
- 258
- Series
- Chapman & Hall/CRC Cyber-Physical Systems
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
About the Editors
Contributors
Chapter 1: A Detailed Investigation of Popular Attacks on Cyber Physical Systems
1.1 Introduction: Background and Driving Forces
1.2 Literature Survey
1.3 Threats and Popular Attacks
1.3.1 Ransomware Attack
1.3.1.1 WannaCry Ransomware Attack
1.3.1.2 Maze Ransomware Attack at Bouygues Construction
1.3.1.3 LockerGoga Attack on Norsk Hydro
1.3.2 Social Engineering Attack
1.3.2.1 How a Possible Social Engineering Attack Occurs
1.3.2.2 Preventive Steps
1.3.2.3 FAAC Whaling Attack
1.3.2.4 The 2005 DuPont Insider Attack
1.3.2.5 Toyota Boshoku BEC Attack of 2019
1.3.3 DDoS Attack
1.3.3.1 Prevention Steps
1.3.3.2 MIRAI Botnet Attack
1.3.3.2.1 Replication Module
1.3.3.2.2 Attack Module
1.3.3.2.3 Prevention Methods
1.3.3.3 2020 AWS Reflection Attack
1.3.3.4 2018 GitHub DDoS Attack
1.3.4 Man in the Middle Attack
1.3.4.1 Man in the Middle Attack Types
1.3.4.2 2015 Lupton Couple Incident
1.3.4.3 2014 Samsung Smart Fridge Man in the Middle Exposure
1.3.4.4 2017 Equifax Man in the Middle Attack
1.4 Limitations
1.5 Security Measures
1.6 Future Direction
1.7 Conclusion
References
Chapter 2: Applying Agile Practices in the Development of Industry 4.0 Applications
2.1 Introduction
2.2 Industry 4.0 Technology
2.2.1 Internet of Things
2.2.2 Augmented Reality/Virtual Reality
2.2.3 Big Data and Analytics
2.2.4 Autonomous Robots
2.2.5 Cybersecurity
2.2.6 Cloud Computing
2.2.7 Additive Manufacturing
2.2.8 Simulation
2.2.9 System Integration
2.3 Challenges in Development
2.4 Agile Methodology
2.4.1 User Stories
2.4.2 Kanban
2.4.3 Sprint/Iteration
2.4.4 Daily Stand-Up
2.4.5 Sprint Review and Retrospective
2.5 Agile Practices in Industry 4.0
2.6 Discussion
2.7 Conclusion
References
Chapter 3: A Review of Security Vulnerabilities in Industry 4.0 Application and the Possible Solutions Using Blockchain
3.1 Introduction
3.2 Components of Industry 4.0
3.2.1 CPS and IoT
3.2.2 Big Data and Analytics
3.2.3 Cloud Computing
3.2.4 Edge Computing
3.2.5 Internet of Services
3.2.6 Autonomous Robot, Simulation, and Augmented Reality
3.2.7 Additive Manufacturing and Machine to Machine
3.3 Inherent Challenges for Industry 4.0 Components
3.3.1 Cyber-Physical System, IIoT, and Cyber Security
3.3.2 Cyber Security
3.3.3 Cloud Computing and Big Data Analytics
3.4 Impact of Industry 4.0 Applications and Projects
3.4.1 Impact of Industry 4.0 Applications
3.4.2 Smart Projects for Industry 4.0
3.5 Application of BCT to Industry 4.0
3.5.1 Blockchain Frameworks
3.5.2 Threats from Blockchain Components
3.6 Conclusion
References
Chapter 4: The Role of Cutting-Edge Technologies in Industry 4.0
4.1 Introduction
4.2 Literature Review
4.3 The Evolution of Industry 4.0
4.4 An Overview of Cutting-Edge Technologies and AI
4.4.1 Natural Language Processing
4.5 IoT and Cutting-Edge
4.6 Blockchain and Cutting-Edge
4.7 Challenges and Future Implementation
4.8 Discussion
4.9 Conclusion and Future Work
References
Chapter 5: Secure IoT Protocol for Implementing Classified Electroencephalogram (EEG) Signals in the Field of Smart Healthcare
5.1 Introduction
5.2 Existing Methods
5.3 EEG Signals in IoT Environment
5.3.1 Basics of EEG Signals
5.3.2 IoT Environment
5.4 Classification Method
5.5 Secure IoT Protocol
5.5.1 Basic MQTT Protocol
5.5.2 MQTT Protocol with Username and Password
5.5.3 MQTT Protocol in IoT Arduino Environment
5.5.4 MQTT Protocol with Mosquitto Broker
5.5.5 MQTT Protocol with SSL/TLS Configuration
5.5.6 MQTT Protocol with Cloud Environment
5.6 Conclusion
References
Chapter 6: Cybersecurity for Critical Energy Protection in Smart Cities
6.1 Introduction
6.2 Cybersecurity
6.2.1 Advantages of Overseeing Cybersecurity
6.3 Cybersecurity in Smart Cities
6.3.1 Resource, Information, and Identity Threat
6.3.2 Man-in-the-Middle Assaults
6.3.3 Hijacking Gadgets
6.3.4 Physical Disruption
6.3.5 Ransomware
6.3.6 Disseminated Denial of Service
6.4 Key Cybersecurity Steps
6.4.1 Give Cybersecurity Training to Staff
6.4.2 Focus on Resources and Make Access Control Arrangements
6.4.3 Create a Cyber Episode Reaction and Recuperation Plan
6.4.4 Put Resources into Calamity Recuperation,Β Reaction,Β andΒ Occasion the Executiveβs Innovation
6.4.5 Secure Basic Framework
6.5 Energy Production in Smart Cities
6.6 Microgrids
6.6.1 Physical Layer
6.6.2 Sensor and Actuator Layer
6.6.3 Communication Layer
6.6.4 Management and Control Layer
6.7 Cyberattacks on the Energy Sector
6.7.1 The Fast RateofTechnological Advancement
6.7.2 The Expanding Refinement of Cyber Assaults
6.7.3 The Areaβs Allure as a Cyber Target
6.8 Steps for Protecting Our Energy from Cyberattacks
6.9 Renewable Energy in Smart Cities and Cybersecurity
6.10 Challenges in Cybersecurity
6.10.1 Ransomware
6.10.2 IoT Attacks
6.10.3 Cloud Attacks
6.10.4 Phishing Attacks
6.10.5 Blockchain and Cryptocurrency Attacks
6.10.6 Software Vulnerabilities
6.10.7 Machine Learning and AI Attacks
6.10.8 BYOD Policies
6.10.9 Insider Attacks
6.10.10 Outdated Hardware
6.10.11 Malware Spreading
6.11 Challenges of Cybersecurity in Smart Cities
6.12 Challenges of Cybersecurity in Renewable Energy
6.13 Conclusion
References
Chapter 7: Emerging Industry Revolution IR 4.0 Issues and Challenges
7.1 Introduction
7.2 Literature Review
7.3 Industry 4.0 Concept and Its Significance
7.4 I4.0 Enabling Technologies
7.5 Industry 4.0 Issues and Challenges
7.6 Discussion
7.7 Conclusion
7.8 Future Work
References
Chapter 8: IIoT-Based Secure SmartΒ Manufacturing Systems in SMEs
8.1 Introduction
8.2 Internet of Things
8.3 Industrial Internet of Things
8.4 IIoT Architecture
8.4.1 Device Layer
8.4.2 Network Layer
8.4.3 Service Layer
8.4.4 Content Layer
8.5 Benefits of the IIoT
8.6 Challenges of Widespread IIoT Implementation
8.7 Industry 4.0
8.8 History of Industry 4.0
8.8.1 First Industrial Revolution (Industry 1.0)
8.8.2 Second Industrial Revolution (Industry 2.0)
8.8.3 Third Industrial Revolution (Industry 3.0)
8.8.4 Fourth Industrial Revolution (Industry 4.0)
8.9 Pros and Cons of Industry 4.0
8.9.1 Pros
8.9.2 Cons
8.10 IIoT in SMEs
8.11 Smart Energy Manufacturing Systems
8.12 Smart Grid
8.13 Microgrid
8.14 Impact of Industry 4.0 on Smart Manufacturing
8.15 Advantages and Disadvantages of Smart Manufacturing
8.15.1 Advantages
8.15.2 Disadvantages
8.16 Conclusion
References
Chapter 9: The Role of Cybersecurity in Smart Cities
9.1 Introduction
9.2 Emerging State-of-the-Art Technologies for Smart Cities
9.2.1 Cloud Computing
9.2.2 Big Data
9.2.3 IoT
9.2.4 RFID
9.2.5 WSN
9.2.6 4G and 5G
9.3 Applications for Smart Cities and Cybersecurity
9.4 Proposed Framework of Cybersecurity and Smart Cities
9.5 Open Issues and Challenges
9.6 Conclusion
9.7 Future Work
References
Chapter 10: A Theoretical Framework on Enhancing Cloud Storage Security through Customized ECC Key Management Technique
10.1 Introduction
10.2 IaaS Key Management Concerns
10.3 Related Work
10.4 Problems Identified
10.5 Case Study Analysis β Amazon Web Services Key Management Service
10.5.1 Centralized Key Management
10.6 Proposed Theoretical Framework
10.6.1 Static Key Usage in Symmetric and Asymmetric Encryptions
10.6.2 AWS Cryptographic Key Establishment
10.6.3 Customized Dynamic Key Management Service Using Blockchain-Based ECCDH Scheme
10.7 Conclusion and Future Work
References
Index
π SIMILAR VOLUMES
<p><span>Cyber Security Applications for Industry 4.0 (CSAI 4.0)</span><span> provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide
<p><span>Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management</span><span> presents new cyber-physical security findings for Industry 4.0 using emerging technologies like artificial intelligence (with machine/deep learning), data mining, applied mathe
"Cyber Security and Operations Management for Industry 4.0 covers cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common
<p><span>This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caus