+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cyber Physical Systems - Advances and Applications

  • Book

  • May 2024
  • Bentham Science Publishers Ltd
  • ID: 5972702
The book gives a comprehensive overview of the evolving landscape of cyber-physical systems (CPS) with a primary focus on security challenges and innovative solutions. CPS, encompassing a wide array of applications from e-Health to smart grid and industry automation, is explored in depth through eight edited reviews.

The book starts with an exploration of various threat detection and prevention techniques in IoT environments, followed by discussions on security in smart grid cyber-physical systems, and the integration of cyber-physical systems with game theory. It also covers important topics such as cyber-physical systems in healthcare, augmented reality challenges, network and computer forensic frameworks, and a review of industrial critical infrastructure perspectives.

The journey from traditional data warehouses to data lakes is thoroughly examined, shedding light on the evolution of data storage methods. The final chapter explains intrusion detection in industrial critical infrastructure, reviewing feature selection and classification models. By navigating through these topics, the book equips readers with a comprehensive understanding of cybersecurity challenges and solutions in an era of automation and IoT technologies.

This book is intended for a diverse readership, including professionals, researchers, and technology enthusiasts keen on exploring the intricacies of CPS, IoT security, data storage evolution, and industrial infrastructure protection.

Key Features

  • Analytical insights into cyber-physical systems security.
  • Thorough exploration of threat detection and prevention techniques.
  • Application-focused chapters covering smart grid, healthcare, and more.
  • Integration of game theory and augmented reality in cyber-physical systems.
  • Comprehensive overview on network and computer forensic frameworks.

Readership

Computer science students; Cybersecurity graduates and trainees; academics, researchers and industry professionals interested in understanding and utilizing cyber-physical systems.

Table of Contents

Chapter 1 a Comprehensive Analysis of Various Threat Detection and Prevention Techniques in IoT Environment
  • P.S. Pavithra and P. Durgadevi
1. Introduction
2. Classification of IoT Layers
2.1. Application Layer
2.2. Middleware Layer
2.3. Network Layer
2.3.1. Low Power Wi-Fi
2.3.2. Zigbee
2.3.3. Near Field Communication (Nfc)
2.3.4. Ble
2.3.5. Low Power Wide-Area-Networks (Lpwan)
2.4. Sensor Layer
2.4.1. Mobile Phone Sensors
2.4.2. Healthcare Sensors
2.4.3. Neural Sensors
2.4.4. Environmental and Chemical Sensors
2.4.5. Rfid
3. Various Security Issues in IoT Layers
3.1. Phishing Attacks
3.2. Side-Channel Attack
3.3. Unauthorized Access
3.4. Remote to Local (User) Attacks (R2L)
3.5. Probing
3.6. User to Root Attacks (U2R)
3.7. Eavesdropping Attack
3.8. Node Capture Attacks
3.9. Replay Attack
3.10. Wormhole Attack
4. IoT Security
4.1. IoT Security Using Ids
4.2. IoT Security Using Machine Learning Techniques
4.3. IoT Security Issues Using Blockchain
4.3.1. Ethereum
4.3.2. Hyperledger Fabric
4.3.3. Hyperledger Sawtooth
4.3.4. Eosio
4.3.5. Corda
4.3.6. Quorum
4.3.7. Distributed Ledger
4.3.8. Peer to Peer Communication
  • Conclusion
  • References
Chapter 2 Security Concerns in Smart Grid Cyber-Physical System
  • S. Brindha and Anitha Kumari K.
1. Introduction
2. Smart Grids
2.1. Model for Smart Grid
3. Characteristics of Cps With Smart Grid
3.1. Connectivity
3.2. Mobility
3.3. Security & Privacy
3.4. Flexibility
3.5. Dynamics
3.6. Interoperability
4. Components of Smart Grid
5. Applications of Sg-Cps
6. Applications of Smart Grid Cyber Physical System (Sg-Cps)
6.1. Advanced Metering Infrastructure (Ami)
6.2. Demand Management
6.3. Electric Vehicles (Evs)
6.4. Wide-Area Situational Awareness
6.5. Distributed Energy Resources and Storage
6.6. Distributed Grid Management
6.7. Energy Management
6.8. Smart Home
6.9. Self-Healing Grid
6.10. Power Demand Forecasting
6.11. Power Generation Forecast of Renewable Energy
6.12. Fault Diagnosis and Protection
6.14. Smart Grid Security
7. Security Objectives in Sg-Cps
7.1. Confidentiality
7.2. Integrity
7.3. Availability
7.4. Accountability
8. Cyber-Attacks in Sg-Cps
8.1. Transmission System Attacks
8.2. Interdiction Attacks
8.3. Complex Network (Cn)-Based Attacks
8.4. Substation Attacks
8.5. Switching Attacks
8.6. Pmu Attacks
8.7. Smart Meter Attacks
9. Countermeasures
9.1. Counter-Acting Attacks Using Moving Target Defense
9.2. Counter-Acting False Data Attacks Using Anomaly Detection
  • Conclusion
  • References
Chapter 3 Cyber Physical Systems in Clinical Setting
  • T.P. Kamatchi, Anitha Kumari K. And D. Priya
1. Introduction
1.1. Cyber Physical Systems
1.2. Definition of Sensor
1.3. Classification of Sensors
1.4. Usage of Sensors
1.5. How Do the Sensors’ Function?
1.6. Diverse Variety of Sensors
1.6.1. Touch Sensor
1.6.2. Color Sensor
1.6.3. Humidity Sensor
1.6.4. Magnetic Sensor (Hall Effect Sensor)
1.6.5. Microphone (Sound Sensor)
1.6.6. Flow and Level Sensor
1.6.7. Strain and Weight Sensor
1.7. Key Difficulties in Cps
1.8. Security Challenges in Cps
1.8.1. High Assurance Software
1.8.2. Interoperability
1.8.3. Context Awareness
1.8.4. Autonomy
1.8.5. Security and Privacy
1.8.6. Certifiability
1.8.7. Executable Clinical Workflows
1.8.8. Model-Based Development
1.8.9. Physiological Close-Loop Control
1.8.10. Patient Modeling and Simulation
1.8.11. Smart Alarms and Adaptive Patients
1.8.12. User-Centered Design
1.8.13. Infrastructure for Medical-Device Integration and Interoperability
1.8.14. Compositionality
1.8.15. Security and Privacy
1.8.16. Verification, Validation and Certification
2. Sensor Networks and Transmission Technologies
2.1. Types of Networks
2.1.1. Body Area Network (Ban)
2.1.2. Personal Area Network (Pan)
2.1.3. Local Area Network (Lan)
2.1.4. Metropolitan Area Network (Man)
2.1.5. Wide Area Network (Wan)
2.2. Transmission Technologies
2.2.1. Wired Transmission
2.2.2. Wireless Transmission
3. Architecture of Cyber Physical System
3.1. Design Requirements of Cps Architecture
3.1.1. Reliability
3.1.2. Accuracy
3.1.3. Latency
3.1.4. Scalability
3.1.5. Interoperability
3.1.6. Autonomy
3.1.7. Protection and Confidentiality
3.1.8. Qos
3.2. Generic Architecture of Cps
3.3. Service Oriented Architecture (Soa) for Cps
3.3.1. Service Description
3.3.2. Service Composition
3.3.3. Service Registry
3.3.4. Service Discovery
3.3.5. Service Monitoring
3.4. Cps Layer Model
3.4.1. Physical Layer
3.4.2. Network Layer
3.4.3. Decision Layer
3.4.4. Application Layer
3.5. Cps Architecture for Clinical Setting
3.5.1. Physical / Sensor Layer
3.5.2. Network Layer
3.5.3. Decision Layer
3.5.4. Application Layer
3.6. Enabling Technologies for Healthcare Cyber Physical Systems
4. Implementation of Cps in Clinical Setting
4.1. Cyber Physical Systems in Clinical Settings
4.2. Mechanism Makes Up Cyber Physical Systems
4.3. How Does a Cyber-Physical System Operate?
4.4. Implementation of Cyber Physical Systems
4.4.1. Connection Level
4.4.2. Conversion Level
4.4.3. Cyber Level
4.4.4. Cognition Level
4.4.5. Configuration Level
5. Emerging Cyber-Physical Systems in Clinical Settings
5.1. Cps Based Hospital Asset and Patient Location Tracking System
5.1.1. Working of the Asset Tracking System
5.1.2. Advantages
5.1.3. Similar Cps Applications in Clinical Settings
5.2. Medical Cps (Mcps) and Big Data Platform
5.3. Livenet
5.4. Hipguard
5.5. Alarmnet
  • Conclusion
  • References
Chapter 4 Cyber Physical Systems in Autonomous and Unmanned
  • Aerial Vehicles
  • Sindhu Rajendran, Shreya S. Alaska Tengli and Ramavenkateswaran N.
1. Introduction
1.1. Evolution of Autonomous Vehicles
1.2. Introduction to Unmanned Aerial Vehicles (Uavs)
2. Importance of Cps
2.1. Advantages of Cyber Physical Systems
2.1.1. Smart-City Administration
2.1.2. Infrastructure
2.1.3. Automotive
2.1.4. Agriculture
2.1.5. Sustainability
2.1.6. Security and Privacy

Author

  • Anitha Kumari K.
  • Avinash Sharma