A practical roadmap to protecting against cyberattacks in industrial environments In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security author Charles J. Brooks and electrical grid cybersecurity expert Philip Craig deliver an authoritative a
Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications
β Scribed by Gautam Kumar (editor), Om Prakash Singh (editor), Hemraj Saini (editor)
- Publisher
- CRC Press
- Year
- 2021
- Tongue
- English
- Leaves
- 238
- Series
- Artificial Intelligence AI: Elementary to Advanced Practices
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics.
Along with exploring security and privacy issues through the IoT ecosystem and examining its implications to the real-world, this book addresses cryptographic tools and techniques and presents the basic and high-level concepts that can serve as guidance for those in the industry as well as help beginners get a handle on both the basic and advanced aspects of security related issues. The book goes on to cover major challenges, issues, and advances in IoT and discusses data processing as well as applications for solutions, and assists in developing self-adaptive cyberphysical security systems that will help with issues brought about by new technologies within IoT and Industry 4.0.
This edited book discusses the evolution of IoT and Industry 4.0 and brings security and privacy related technological tools and techniques onto a single platform so that researchers, industry professionals, graduate, postgraduate students, and academicians can easily understand the security, privacy, challenges and opportunity concepts and make then ready to use for applications in IoT and Industry 4.0.
β¦ Table of Contents
Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Editors
Contributors
Chapter 1: General and Specific Security Services, Risks, and Their Modeling
1.1 Introduction
1.2 Literature Survey in Security Modeling
1.3 General Security Services
1.3.1 Confidentiality
1.3.2 Data Integrity
1.3.3 Authenticity
1.3.4 Authorization
1.3.5 Non-Repudiation
1.3.6 Support Services
1.3.7 Combinatorial Service
1.3.8 Key Management
1.4 Security Modeling
1.4.1 Bell-LaPadula Model (GeeksforGeeks)
1.4.2 Biba Model (GeeksforGeeks)
1.4.3 ClarkeβWilson Security Model
1.4.4 Graham-Denning Model
1.4.5 Harrison-Ruzzo-Ullman Model
1.4.6 Brewer-Nash Model
1.5 Risks
1.5.1 Improper Platform Usage
1.5.2 Insecure Data Storage
1.5.3 Insecure Communication
1.5.4 Insecure Authentication
1.5.5 Insufficient Cryptography
1.5.6 Insecure Authorization
1.5.7 Client Code Quality
1.5.8 Code Tampering
1.5.9 Reverse Engineering
1.5.10 Extraneous Functionality
1.6 Use Case: Virtual Reality
1.7 Summary
References
Chapter 2: Vulnerability and Attack Detection Techniques: Intrusion Detection System
2.1 Introduction
2.2 Cybersecurity Services
2.3 Intrusion Detection System (IDS) Software Architecture
2.3.1 IDS
2.3.2 Detection Approach
2.3.2.1 Anomaly Detection Approaches
2.3.2.2 Misuse Detection Approaches
2.3.3 Methodology Approach
2.3.3.1 Signature-Base Detection (SBD)
2.3.3.2 Anomaly-Based Detection (ABD)
2.3.3.3 Stateful Protocol Analysis (SPA)
2.4 Classification of Computer and Network Attacks
2.4.1 Attack Type
2.4.1.1 DoS Attack
2.4.1.2 Probing Attacks
2.4.1.2.1 Compromise
2.4.1.2.2 Worms, Viruses, and Trojans
2.4.1.3 Number of Network Connections Required by the Attacks
2.5 Source of the Attack
2.5.1 Environment
2.5.1.1 Intrusion on Local Host Machine
2.5.1.2 Network Intrusion
2.5.1.3 Intrusion in Wireless Network
2.6 Automated Level
2.6.1 Automation Attacks
2.6.2 Semiautomated
2.6.3 Manual Attacks
2.7 Intrusion Detection System Component
2.7.1 Data Gathering Component
2.7.2 Knowledge-Based Component
2.7.3 Configuration Component
2.7.4 Response Component
2.8 Conclusion
2.9 Future Work
References
Chapter 3: Digital Rights Management in a Computing Environment
3.1 Introduction to Ethics and Technoethics
3.1.1 Definition of Ethics
3.1.2 Definition of Technoethics
3.1.3 Ethical Challenges in Technology
3.1.4 Current Technoethics Issues
3.2 Cybersecurity and Its Applications
3.2.1 Concepts of Cybersecurity
3.2.2 Threats and Challenges of Cybersecurity
3.2.3 Elements of Cybersecurity
3.2.4 Cybersecurity Applications
3.3 Ethics for Cybersecurity Applications
3.3.1 Privacy
3.3.2 Freedom of Speech
3.3.3 Intellectual Property Rights
3.3.4 Legal Protections and Responsibility for Crimes
3.4 The Ethical Use of Machine Learning in Cybersecurity
3.5 Summary
References
Chapter 4: Trade-Offs and Vulnerabilities in IoT and Secure Cloud Computing
4.1 Introduction
4.2 History of IoT and Cloud Vulnerabilities
4.3 Literature Survey
4.3.1 Recent Works in Cloud Computing
4.3.2 Recent Works in Internet-of-Things
4.4 IoT and Similar Advancements
4.5 Risks and Breaches of IoT devices
4.5.1 Verification
4.5.2 Cryptography
4.5.3 Modifying Techniques
4.5.4 Physical Permit
4.5.5 System Control
4.6 Cloud Computing
4.7 Vulnerabilities with Cloud Offerings
4.7.1 Lesser Clarity with Control
4.7.2 On-Demand Self-Service
4.7.3 Worldwide Controlling APIs
4.7.4 Multi-Tenant Feature
4.7.5 Information Removal
4.7.6 Stolen User Details
4.7.7 Supplier Commitment
4.7.8 Higher Complexity
4.7.9 Insider Abuse
4.7.10 Lost Information
4.7.11 Provider Supply Chain
4.7.12 Inadequate Due Perseverance
4.8 Secure Cloud Computing Techniques
4.8.1 Infrastructure Security
4.8.1.1 Physical Security
4.8.1.2 Network Security
4.8.2 Remote Security
4.8.3 Host Security
4.8.4 Security for Middlewares
4.8.4.1 Containers
4.8.4.2 Application Programming Interfaces (APIs)
4.8.4.3 Databases
4.8.4.4 Resource Management Platform
4.8.5 Application System Security
4.8.6 Data Security
4.9 Summary
References
Chapter 5: Location and Availability Protections in Smart Mobility
5.1 Introduction
5.1.1 Key Principles of Smart Mobility
5.1.2 How Does Smart Mobility Connect to Smart City
5.1.3 Smart Mobility and the Role of Data
5.2 Definition of Smart City
5.2.1 Smart Cities: A Futuristic Vision
5.2.2 Need for Smart City
5.2.3 Successful Smart City
5.3 Technology for Smart Mobility
5.3.1 Technical Characteristics of Smart City Services
5.3.2 IoT Device Characteristics
5.3.3 IoT Technology
5.3.4 IoT for Smart City
5.3.5 Examples of IoT Mobility Solutions
5.3.6 Wireless Technology for Smart Cities
5.3.7 Impact of Artificial Intelligence
5.4 Transportation and the Traffic Problem
5.4.1 Services Using Mobility
5.5 Regulatory Characteristics for Smart City
5.5.1 Government Policy and Legal Issues
5.5.2 Common Legal Framework
5.5.3 Government Policy across the Developed Nations
5.5.4 Regulatory Characteristics of Smart City Services
5.6 Ecosystem of Smart City Services
5.7 Mobility as a Service (MaaS)
5.8 Security and Privacy of Data
5.8.1 Four Core Security Objectives
5.8.2 Five Types of Privacy
5.8.3 Building Blocks for Privacy Protection
5.8.4 Privacy Techniques
5.8.4.1 Process-Oriented Privacy Protection
5.8.4.2 Data-Oriented Privacy Protection
5.9 Conclusion
References
Chapter 6: Digital Forensics Cryptography with Smart Intelligence
6.1 Introduction
6.2 History of Forensics
6.3 Need for Digital Forensics
6.4 Sequence of Steps in Digital Forensics
6.5 Types of Digital Forensics
6.6 The Previous Decade (2001β2011)
6.7 Recent Years (2011β2021)
6.8 Models of Digital Forensics
6.8.1 The Digital Forensic Research Workshop (DFRWS) 2001
6.8.2 Forensic Process Model (2001)
6.8.3 Abstract Digital Forensic Model (2002)
6.8.4 Integrated Digital Investigation Process Model (IDIP) 2003
6.8.5 Enhanced Digital Investigation Process (2004)
6.8.6 Extended Model of Cybercrime Investigation
6.8.7 Case-Relevance Information Investigation (2005)
6.8.8 Digital Forensic Model Based on Malaysian Investigation Process (2009)
6.8.9 Systematic Digital Forensic Investigation Model SRDFIM (2011)
6.9 Real-Time Use Cases of Digital Forensics Application
6.10 Summary of Open Source Tools and Techniques Used in Digital Forensics
6.10.1 San SIFT
6.10.2 ProDiscover Forensic
6.10.3 Volatility Framework
6.10.4 The Sleuth Kit (Autopsy)
6.10.5 Caine
6.10.6 Xplico
6.10.7 X-Ways Forensics
6.11 Short Summary of a Few Other Digital Forensic Tools
6.12 Cryptographic Algorithms in Digital Forensics
6.12.1 File Carving Technique
6.12.2 Reconstructing Compressed Data
6.12.3 Recovering Files
6.12.4 Reverse Engineering
6.12.5 Image Integrity
6.13 Conclusion
References
Chapter 7: Transmission Modeling on Malware Attack through IoTs
7.1 Introduction
7.1.1 Basic Terminology
7.2 Hypothesis and Mathematical Model Formulation
7.2.1 Mathematical Model Formulation
7.2.2 Mathematical Model Analysis
7.3 Equilibrium Points and Basic Reproduction Number
7.3.1 Existence of Stability of the Equilibrium Points
7.3.2 Local Stability of the Malware-Free Equilibrium Point
7.3.3 Local Stability of the Endemic Equilibrium
7.4 Global Stability of the Equilibrium Points
7.4.1 Global Stability for Endemic Equilibrium Point
7.5 Numerical Simulation and Results
7.6 Conclusion
References
Chapter 8: Rice Plant Disease Detection Using IoT
8.1 Introduction
8.2 Related Work
8.3 Proposed System Model
8.3.1 Flowchart of the Following System
8.4 Circuit Diagram
8.5 Result
8.6 Conclusion
References
Chapter 9: Secure Protocols for Biomedical Smart Devices
9.1 Introduction
9.2 Communication Architecture in Smart Devices
9.3 Overview of Biomedical Smart Devices
9.3.1 Health-Oriented Smart Watch
9.3.2 Blood Pressure Monitor
9.3.3 Wireless Smart Glucometer
9.3.4 Brain-Sensing Headband
9.3.5 Smart Temporal Thermometer
9.3.6 Wearable ECG Monitors
9.3.7 Heart Rate Sensors
9.3.8 Pulse Oximeter Sensors
9.3.9 Motion Sensors
9.4 Security Requirements for Communication in Biomedical Smart Devices
9.4.1 Data Confidentiality
9.4.2 Scalability
9.4.3 Data Integrity
9.4.4 Data Authenticity
9.4.5 Data Availability
9.4.6 Data Security
9.4.7 Data Confidentiality
9.4.8 Data Privacy
9.4.9 Data Freshness
9.4.10 Secure Management
9.4.11 Dependability
9.4.12 Secure Localization
9.4.13 Accountability
9.4.14 Flexibility
9.5 Threats and Attacks
9.5.1 Replayed/Spoofed Routing Information
9.5.2 Selective Forwarding
9.5.3 Sinkhole Attacks
9.5.4 Sybil Attacks
9.5.5 Wormholes
9.5.6 HELLO Flood Attacks
9.5.7 Replay Attack
9.5.8 Denial of Service Attack
9.5.9 Man-in-the-Middle Attack
9.5.10 Flooding
9.5.11 Jamming
9.5.12 Tampering
9.6 Application Area for Smart Devices in Medical Health Care System
9.7 Security Protocols for Smart Devices
9.7.1 Robust and Efficient Energy Harvested Aware Routing Protocol [ 11 ]
9.7.2 Lightweight Information Encryption Protocol [ 12 ]
9.7.3 A Secure Protocol for User Authentication and Key Agreement [ 13 ]
9.7.4 Node-to-Node Authentication Protocol by Eliminating the Man-in-Middle Attack [ 14 ]
9.7.5 Lightweight Anonymous Authentication Protocol [ 15 ]
9.7.6 Lightweight Data Confidentiality and Authentication Protocols (2012) [ 16 ]
9.7.7 A Trust Key Management Protocol [ 17 ]
9.7.8 Physiological-Signal-Based Key Agreement Protocol [ 18 ]
9.7.9 Localized Encryption and Authentication Protocol (LEAP) [ 19 ]
9.7.10 Random Key Predistribution Schemes [ 22 ]
9.8 Other Security Mechanisms for Smart Devices
9.9 Conclusion
References
Chapter 10: Access Control Mechanism in Health Care Information System
10.1 Introduction
10.2 Access Control Mechanism
10.2.1 Discretionary Access Control (DAC)
10.2.2 Mandatory Access Control (MAC)
10.2.3 Role-Based Access Control (RBAC)
10.3 Access Control Solutions Associated with Health Care System
10.3.1 Privacy-Aware Role-Based Access Control (P-RBAC)β[ 14 ]
10.3.2 Personalized Access Control
10.3.3 Context-Related Access Control
10.3.4 Audit-Based Access Control
10.3.5 Behavior-Based Access Control
10.3.6 Rule-Based Access Control Approach
10.3.7 OASIS Role-Based Access Control
10.3.8 XACML-Based Access Control
10.3.9 Cryptography-Based Access Control [ 14 ]
10.4 Directions of Access Control Mechanism for Health Care Systems
10.4.1 Process-Based Access Control
10.4.2 Access Control for Patient-Controlled Electronic Health Records
10.5 Evaluation Criteria
10.6 Conclusion
References
Chapter 11: Privacy Preservation Tools and Techniques in Artificial Intelligence
11.1 Introduction
11.2 Related Work
11.3 Particle Swarm Optimization (PSO)
11.4 Datasets
11.5 Evaluation Measures
11.6 Machine Learning Techniques with PSO
11.6.1 Support Vector Machine (SVM)
11.6.2 Random Forest (RF)
11.6.3 Neural Network (NN)
11.6.4 k-Nearest Neighbor (k-NN)
11.6.5 Other Related Techniques Available
11.6.6 Discussion and Recommendations
11.7 Conclusion and Future Work
References
Chapter 12: Web Security Vulnerabilities: Identification, Exploitation, and Mitigation
12.1 Introduction
12.2 Introduction to Important Web Vulnerabilities
12.3 Injection
12.3.1 Types of Injections and Their Working Details
12.4 Identification of SQL Injection Vulnerabilities
12.5 Mitigation of Injection Vulnerabilities
12.6 Broken Authentication and Session Management
12.6.1 Exploitation of Broken Authentication Vulnerability
12.6.2 Mitigation of Broken Authentication and Session Management
12.7 Sensitive Data Exposure
12.7.1 Identification of Sensitive Data Exposure Vulnerability
12.7.2 Mitigation of Sensitive Data Exposure Vulnerability
12.8 External Entities of XML (XXE)
12.8.1 Identification of XML External Entities Vulnerability
12.8.2 Mitigation of XML External Entities
12.9 Broken Access Control
12.9.1 Identification of Broken Access Control Vulnerability
12.9.2 Prevent and Mitigate Broken Access Control
12.10 Misconfiguration of Security Options
12.10.1 Identification of Security Misconfiguration Vulnerabilities
12.10.2 Identification and Mitigation of Cross-Site Scripting (XSS)
12.10.3 Mitigation and Prevention of XSS Vulnerability
12.10.4 Identification and Mitigation of Insecure Deserialization
12.11 Identification of Insecure deserialization
12.11.1 Prevention of Insecure Deserialization
12.11.2 Identification and Mitigation of Using Components with Known Vulnerabilities
12.11.3 Identification of Components with Known Vulnerabilities
12.11.4 Mitigation of Components with Known Vulnerabilities
12.12 Insufficient Logging and Monitoring Vulnerabilities
12.12.1 Identification of Insufficient Logging and Monitoring Vulnerabilities
12.12.2 Insufficient Logging and Monitoring Vulnerabilities
12.13 Web Security Standards
12.14 Conclusion
References
Index
π SIMILAR VOLUMES
<b>A practical roadmap to protecting against cyberattacks in industrial environments</b> In <i>Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT</i>, veteran electronics and computer security author Charles J. Brooks and electrical grid cybersecurity expert Philip Craig deliver an aut
<p><span>This book presents Industry 4.0 enabler technologies and tools. It also highlights some of the existing empirical applications in the context of manufacturing. The book elucidates innovative thematic concepts of Industry 4.0 and its perspectives. It establishes routes to empirically utilize
<p>This book includes chapters related to the analysis of cultural differences as a tool to enrich tacit knowledge and make processes more efficient, the factors that influence job satisfaction and the value of social capital as a competitive strategy to achieve productivity and competitiveness of o
The transformative digital technologies developed for Industry 4.0 are proving to be disruptive change drivers in higher education. Industry 4.0 technologies are forming the basis of Education 4.0. Industry 4.0 Technologies for Education: Transformative Technologies and Applications examines state-o
<p><p>This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as s