Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management
β Scribed by Jyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh
- Publisher
- CRC Press/Chapman & Hall
- Year
- 2022
- Tongue
- English
- Leaves
- 284
- Series
- Chapman & Hall/CRC Computational Intelligence and Its Applications
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management presents new cyber-physical security findings for Industry 4.0 using emerging technologies like artificial intelligence (with machine/deep learning), data mining, applied mathematics. All these are the essential components for processing data, recognizing patterns, modeling new techniques, and improving the advantages of data science.
Features
β’ Presents an integrated approach with Cyber-Physical Systems, CPS security, and Industry 4.0 in one place
β’ Exposes the necessity of security initiatives, standards, security policies, and procedures in the context of industry 4.0
β’ Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security
β’ Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4.0
This book is primarily aimed at graduates, researchers and professionals working in the field of security. Executives concerned with security management, knowledge dissemination, information, and policy development for data and network security in different educational, government, and non-government organizations will also find this book useful.
β¦ Table of Contents
Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Editors
Contributors
Chapter 1: Intelligent Cyber-Physical Systems Security for Industry 4.0: An Introduction
1.1 Introduction
1.1.1 Smart Home Security
1.1.2 Cyberattacks of the Smart Home
1.2 Literature Review
1.3 CPS 5C Level Architecture
1.4 CPS Security Issues and Challenges
1.4.1 Security Framework
1.4.1.1 Perception Issues and Challenges
1.4.1.2 Challenges and Issues in the Application Layer
1.4.1.3 Communication Issues and Challenges
1.5 CPS Security Attacks and Possible Measures
1.6 CPS Security Issues Remedies
1.7 Conclusion
References
Chapter 2: Issues in Authentication in Augmented Reality Systems
2.1 Introduction
2.2 Background and Motivation
2.3 History of AR
2.4 Comparison with VR
2.5 Applications
2.5.1 Medical
2.5.2 Military
2.5.3 Robotics
2.5.4 Visualization
2.5.5 Education
2.5.6 Tourism
2.5.7 Marketing
2.5.8 Manufacturing
2.5.9 Entertainment and Games
2.6 Integration of AR with CPS
2.7 Authentication in AR
2.7.1 ZeTAβZero Trust Authentication
2.8 Multimodal Biometric Authentication
2.8.1 Looks Good To Me
2.8.2 Doodle-based Authentication
2.8.3 Nod-to-Auth
2.8.4 MoveAR
2.9 Comparison of Various Authentication Techniques
2.10 Conclusion
References
Chapter 3: An Automated Cover Text Selection System for Text Steganography Algorithms
3.1 Introduction
3.2 Related Literature Study
3.2.1 Format-Based Methods
3.2.2 Random and Statistical Generation-Based Methods
3.2.3 Linguistic Steganography
3.2.4 Existing Text Steganography Methods
3.2.4.1 Line Shift
3.2.4.2 Word Shift
3.2.4.3 Syntactic Method
3.2.4.4 White Steg
3.2.4.5 Feature Coding
3.2.4.6 Word Mapping
3.2.4.7 Microsoft Word Document
3.2.4.8 Text Steganography Using AITSTEG
3.2.4.9 Coverless Plain Text Steganography Based on Character Features
3.2.4.10 Steganography via e-Books by Rearranging CSS Files
3.2.5 Motivation Derived from Literature Survey
3.3 Proposed Automated Cover Text Selection System
3.3.1 Cover Text Data Set Preparation
3.3.2 Secret Text Analysis and Secret Vector Generation
3.3.2.1 Capacity
3.3.2.2 Frequency Count
3.3.2.3 Percentage Score of β0β
3.3.2.4 Hamming Weight
3.3.2.5 Chi-Square Test of Independence for Presence of β0β
3.3.2.6 Chi-Square Test of Independence for Presence of β1β
3.3.2.7 Probability of Occurrence of β0β after β1β
3.3.2.8 Probability of Occurrence of β1β after β0β
3.3.3 Stego-Algorithm Requirement Analysis
3.3.4 Cover Text Data Set Preprocessing
3.3.5 Cover Matrix and Cover Vector Generation with NLP
3.3.6 Choice of the Most Accurate Cover Text with Application of Fuzzy Clustering
3.4 Experimental Results and Analysis
3.4.1 Experimental Results
3.4.2 Comparative Analysis of Experimental Data
3.4.3 Time Complexity of the Proposed Method
3.5 Conclusion and Future Research
References
Chapter 4: Cyberattacks and Countermeasures in RPL-based Industrial Internet of Things
4.1 Introduction
4.2 Related Work
4.3 Background
4.3.1 RPL Routing Protocol
4.3.2 Trickle Algorithm
4.3.3 System and Adversary Models
4.4 RPL-Specific Attacks and Countermeasures
4.4.1 Sybil Attack
4.4.2 Packet-Dropping Attack
4.4.3 DAO Divergence Attack
4.4.4 Hatchetman Attack
4.4.5 Energy Abusing Attack
4.5 Conclusion and Future Research Directions
References
Chapter 5: Cyber-physical Attacks and IoT
5.1 Introduction
5.2 Cybercrimes and Cyber-physical Attacks
5.2.1 Common Types of Cyber-attacks
5.2.1.1 Malware
5.2.1.2 Phishing
5.2.1.3 Man-in-the-middle Attack
5.2.1.4 Denial-of-service Attack
5.2.1.5 Structured Query Language Injection
5.2.1.6 Zero-day Exploit
5.2.1.7 DNS Tunneling
5.2.2 Cyber-Attack Trends
5.2.2.1 Attacks Are on the Rise on Software Supply Chain
5.2.2.2 Ransomware Attacks Are There to Stay
5.2.2.3 Clouds Systems Are Also Under Attack
5.2.2.4 Cryptominers Waste Corporate Resources
5.2.2.5 Attacks on Mobile Device
5.2.3 Cyber-Physical Attacks: A Growing Global Peril
5.2.4 Types of Cyber-Physical Attacks
5.2.4.1 Zero-day Attacks
5.2.4.2 Eavesdropping Attacks (MitM)
5.2.4.3 Denial-of-Service Attacks
5.2.4.4 Data Injection Attacks (SQL Injection)
5.2.4.5 Replay Attacks
5.2.4.6 Side-Channel Attacks
5.2.5 Cybersecurity
5.2.5.1 Security of the Network
5.2.5.2 Security of the Application
5.2.5.3 Information Security
5.2.5.4 Operational Security
5.2.5.5 Disaster Recovery and Business Continuity
5.2.5.6 End-user Education
5.2.6 Types of Cyber-threats
5.3 IoT
5.3.1 How Does IoT Work?
5.3.2 Importance of IoT
5.3.3 Advantages of IoT
5.3.4 Pros and Cons of IoT
5.3.5 Some IoT Standards
5.3.5.1 IPv6
5.3.5.2 ZigBee
5.3.5.3 LiteOS
5.3.5.4 OneM2M
5.3.5.5 Data Distribution Service for Real-Time Systems (DDS)
5.3.5.6 Advanced Message Queuing Protocol (AMQP)
5.3.5.7 Constrained Application Protocol (CoAP)
5.3.5.8 Long Range Wide Area Network (LoRaWAN)
5.3.6 IoT Frameworks
5.3.6.1 Amazon Web Services (AWS) IoT
5.3.6.2 Arm Mbed IoT
5.3.6.3 Microsoftβs Azure IoT Suite
5.3.6.4 Googleβs Brillo/Weave
5.3.6.5 Calvin
5.3.7 Consumer and Enterprise IoT Applications
5.3.8 IoT Security and Privacy Issues
5.4 Cyber-physical Attacks on IoT
5.4.1 Attacks on IoT Devices Have a Domino Effect
5.4.2 Cyber-Physical Attacks on IoT
5.4.2.1 Wireless Exploitation
5.4.2.2 Jamming
5.4.2.3 Reconnaissance
5.4.2.4 Remote Access
5.4.2.5 Disclosure of Information
5.4.2.6 Interception
5.4.2.7 GPS Exploitation
5.4.2.8 Information Gathering
5.5 Avoiding CPA on IoT
5.5.1 How to Protect Against Cyber-physical Attacks
5.5.2 A Cyber-attack is Preventable
5.5.3 Protection for the End User
5.5.4 Cyber Safety TipsβProtect Oneself Against Cyber-attacks
5.5.4.1 Update Software and Operating System Regularly
5.5.4.2 Use Anti-virus Suite
5.5.4.3 Use Strong Passwords
5.5.4.4 Email Attachments from Unknown Senders Should Not Be Entertained
5.5.4.5 Links in Emails from Unknown Senders or Unfamiliar Websites Should Not Be Clicked
5.5.4.6 Unsecure Wi-Fi Networks in Public Places Should Be Avoided
5.6 Conclusion
References
Chapter 6: Chaos-Based Advanced Encryption Algorithm Using Affine Transformation in S-Box and Its Implementation in FPGA
6.1 Overview
6.2 Introduction
6.3 Related Works
6.4 System Model
6.4.1 Encryption Process
6.4.2 Construction of S-Box
6.4.3 Bernoulli Process
6.4.4 Block Cipher
6.5 Performance Analysis
6.6 Summary
References
Chapter 7: Cyber-Physical Systems Attacks and Countermeasures
7.1 Introduction
7.2 CPS Requirements
7.3 CPS as a Critical Infrastructure
7.4 CPS Architecture
7.5 An Overview of Security Challenges in Cyber-Physical Systems
7.6 Security Challenges in CPS
7.7 Security Threats and Vulnerabilities in Cyber-Physical System
Cyber-Physical Threat
Causes of Vulnerabilities in CPS
7.8 Mitigation Schemes and Control Mechanisms for CPS Attack
A. Cryptographic Solutions
B. Non-cryptographic Solutions
Intrusion Detection Systems
Intrusion Detection Schemes
7.9 Challenges and Open Issues
7.10 Conclusion
References
Chapter 8: Deep Learning Methods to Resolve Cyber Security Issues
8.1 Introduction
8.2 Cyber-Physical Systems and Different Kinds of Attacks
8.2.1 Cyber-physical Systems (CPS)
8.3 Malware-related Attacks and Prevention Models
8.4 Difference between Malware Detection Systems and Intrusion Detection Systems
8.5 Phishing Attacks and Prevention Systems Using Machine Learning
8.6 Critical Comparison of the AI Methodologies with the Traditional Systems
8.7 Conclusion
References
Chapter 9: Application of Temporal Logic for Construction of Threat Models for Intelligent Cyber-Physical Systems
9.1 Introduction
9.2 Motivation and Contributions
9.3 Related Work
9.4 Role of Temporal Logic to Develop Threat Models
9.4.1 Mathematical Concepts Used in Our Proposed Threat Model
9.5 Experimental Results
9.6 Future Directions
9.7 Conclusion
References
Chapter 10: Software-Defined Network Security
10.1 Introduction
10.1.1 SDN Evolution
10.2 Software-Defined Networking Concepts
10.2.1 Definition
10.2.2 OpenFlow for SDN
10.2.3 Architectural Model
10.2.3.1 Data Plane
10.2.3.2 Control Plane
10.2.3.3 Application Plane
10.3 Security Analysis of SDN
10.3.1 SDN for Improving Security
10.3.2 Need of SDN Security
10.4 SDN Challenges
10.4.1 Scalability
10.4.2 Interoperability
10.4.3 Performance
10.4.4 Reliability
10.4.5 Security
10.5 Security Issues to the SDN Architecture
10.6 Security Solutions of SDN Planes
10.6.1 Application Plane Security Solutions
10.6.2 Control Plane Security Solutions
10.6.3 Data-Plane Security Solutions
10.7 Software-Defined Networking in Cyber-Physical Systems (CPS)
10.7.1 Software-Defined Cyber-Physical Networks: Challenges and Benefits
10.7.1.1 Manageability
10.7.1.2 Resource Allocation
10.7.1.3 Time-sensitive SDN
10.7.1.4 Industrial-grade Reliability
10.7.1.5 Network Security
10.7.1.6 Interoperability and Standardization of SDN
10.8 Conclusions and Future Work
References
Chapter 11: A Review on AI-ML Based Cyber-Physical Systems Security for Industry 4.0
11.1 Introduction
11.2 Motivation and Contribution
11.3 Features of AI-ML Based Cyber-Physical Systems Security for Industry 4.0
11.3.1 Industry 4.0
11.3.2 Cyber-Physical System
11.3.3 Machine Learning and Artificial Intelligence
11.3.4 Deep Learning
11.4 Literature Survey
11.5 Advantages, Limitation Application Area
11.5.1 Advantages of AI-ML Based Industry 4.0
11.5.2 Limitation of AI-ML Based Industry 4.0
11.5.3 Application of AI-ML Based Industry 4.0
11.6 Conclusion and Future Scope
References
Chapter 12: Triangulation-Augmented AI-Algorithm for Achieving Intelligent Flight Stabilizing Performance Capabilities
12.1 List of Symbols
12.2 Background
12.3 Triangulation-Augmented Artificial Intelligence (AI)-Algorithm
12.3.1 The Founding Concept
12.3.2 The Inception
12.4 AI-Algorithm Schema
12.5 Attitude Identification
12.6 Time Stamping
12.7 Orientation Modeling
12.8 Angular Deflection and Moment Estimation
12.9 Advanced Mathematical Data Processing Computers
12.10 Behavior Learning Algorithm (BLA)
12.11 Time Convolution
12.12 Restoration Moment Estimation
12.13 Experimental Results
12.14 Conclusion
References
Chapter 13: Forecasting-based Authentication Schemes for Network Resource Management in Vehicular Communication Network
13.1 Introduction
13.2 Literature Review
13.3 Importance of Vehicular Communication Network
13.4 Benefits of Network Resource Management in Vehicular Communication Network
13.5 Requirements of Security in Resource Management
13.6 Network Resource Management Authentication Scheme
13.7 Conclusion and Future Scope
References
Chapter 14: Intelligent Cyber-Physical Systems Security for Industry 4.0: Concluding Remarks
14.1 Introduction
14.2 Requisite Attributes
14.3 Role of Computational Intelligence in Cyber-Physical Security Systems
References
Index
π SIMILAR VOLUMES
<p><span>Cyber Security Applications for Industry 4.0 (CSAI 4.0)</span><span> provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide
<p>This book presents new findings in industrial cyber-physical system design and control for various domains, as well as their social and economic impacts on society. Industry 4.0 requires new approaches in the context of secure connections, control, and maintenance of cyber-physical systems as wel
<p><span>Cyber Security Applications for Industry 4.0 (CSAI 4.0)</span><span> provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide
"Cyber Security and Operations Management for Industry 4.0 covers cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common