Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It
- Presents high-quality contributions addressing related theoretical and practical aspects
- Improves the reader’s awareness of cybersecurity and privacy in CPSs
- Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies
- Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs
- Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs
- Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs
This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security.
Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.
Table of Contents
Part 1: Cyber-Physical Systems: Vulnerabilities, Attacks, and Threats. 1. Improving Security and Privacy in Cyber-Physical Systems. 2. Vulnerability Analysis for Cyber-Physical Systems. 3. State Estimation-Based Attack Detection in Cyber-Physical Systems: Limitations and Solutions. Part 2: Security and Privacy in Cloud and Embedded Systems for Cyber-Physical Systems. 4. Towards Secure Software-Defined Networking Integrated Cyber-Physical Systems: Attacks and Countermeasures. 5. DDoS Defense in SDN-Based Cyber-Physical Cloud. 6. Detecting Pilot Contamination Attacks in Wireless Cyber-Physical Systems. 7. Laboratory Exercises to Accompany Industrial Control and Embedded Systems Security Curriculum Modules. Part 3: Security and Privacy in Big Data Cyber-Physical Systems. 8. Security and Privacy in Big Data Cyber-Physical Systems. 9. Big Data Technologies–Supported Generic Visualization System in an Enterprise Cyber-Physical Environment. 10. Searching for IoT Resources in Intelligent Transportation Cyberspace (T-CPS): Requirements, Use-Cases and Security Aspects. 11. Evaluating the Reliability of Digital Forensics Tools for Cyber-Physical Systems. 12. Point-of-Sale Device Attacks and Mitigation Approaches for Cyber-Physical Systems. 13. Cyber Profiteering in the Cloud of Smart Things.
Yassine Maleh received a PhD in computer science from the University Hassan 1st, Morocco, in 2013. Since December 2012, he has been working as an IT senior analyst at the National Port Agency in Morocco. He is a senior researcher in the Faculty of Sciences and Techniques, Settat. He is a senior member of the Institute of Electrical and Electronics Engineers (IEEE), member of the International Association of Engineers (IAENG) and Machine Intelligence Research Labs. Dr. Maleh has made contributions in the fields of information security and privacy, Internet of Things security and wireless and constrained networks security. His research interests include information security and privacy, the Internet of Things, networks security, information systems, and IT governance. He has published more than 40 papers (book chapters, international journals, and conferences), two edited books and one authored book. He has served as an associate editor for the International Journal of Digital Crime and Forensics (IJDCF) and the International Journal of Information Security and Privacy (IJISP). He was also a guest editor of a special issue on recent advances in cybersecurity and privacy for cloud of things in International Journal of Digital Crime and Forensics (IJDCF), July–September 2019, Vol. 11, Issue. 3. He has served and continues to serve on executive and technical program committees and as a reviewer of numerous international conference and journals such as Elsevier Ad Hoc Networks, IEEE Sensor Journal, ICT Express, Springer Cluster Computing, International Journal of Computers and Applications, IEEE Transactions on Network Science and Engineering, Journal of Cases on Information Technology (JCIT) and the International Journal of Cyber Warfare and Terrorism (IJCWT). He is the General Chair of the MLBDACP 19 symposium. He received the Publon Top 1% Reviewer of the Year 2018 award.
Mohammad Shojafar received a PhD in information communication and telecommunications (advisor, Professor Enzo Baccarelli) from Sapienza University of Rome, Italy, the second-rank university in QS Ranking in Italy and top 100 in the world with an excellent degree in May 2016. He was a senior researcher participating in the European Horizon 2020 SUPERFLUIDITY project working with the Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT) partner under the supervision of Professors Nicola Blefari-Melazzi and Luca Chiaraviglio in the Department of Electronic Engineering at the University of Tor Vergata, Rome, Italy, for 14 months. From December 2015 to December 2016, he was a postdoctoral researcher (supervised by Dr. Riccardo Lancellotti and Dr. Claudia Canali) working on the SAMMClouds project at the University of Modena and Reggio Emilia, Italy. In January 2018, he joined the University of Padua, Italy (among the best Italian universities) as a senior researcher (Researcher Grant B). He has contributed to H2020 European projects such as SUPERFLUIDITY and TagSmartIt, and has been sponsored by the Italian Public Education Ministry (i.e., the Ministry of Education, Universities, and Research (MIUR)). In addition, he has worked as a researcher in scheduling/resource allocation in grid/cloud computing under the supervision of Professors Rajkumar Buyya, Jemal Abawajy, Ajith Abraham, and Mukesh Singhal since 2011. His research interests are mainly in the areas of security and privacy. In these fields, he has published more than 90 papers in the topmost international peer-reviewed journals and conferences, including IEEE TCC, IEEE TNSM, IEEE TSUSC, IEEE TGCN, IEEE ICC, IEEE GLOBECOM, IEEE ISCC, IEEE SMC, IEEE PIMRC, and IEEE Network. He is an associate editor for Springer—Cluster Computing and KSII—Transactions on Internet and Information Systems and International Journal of Computers and Applications (IJCA), and he served as a program committee member of several conferences, including IEEE ICCE, IEEE UCC, IEEE SC2, and IEEE SMC. He was the general chair for INCoS in 2018.
Ashraf Darwish received a PhD in computer science in 2006 from the computer science department at Saint Petersburg State University (specialization in artificial intelligence) and joined as lecturer (assistant professor) in the computer science department, Faculty of Science, Helwan University, on June 25, 2006. He is a member of such notable computing associations as the IEEE, ACM, EMS (Egyptian Mathematical Society), QAAP (Quality Assurance and Accreditation Project, Egyptian Supreme Council), Quality Assurance and Accreditation Authority (Egypt), and the board of the Russian-Egyptian Association for graduates. Dr. Darwish is the author of many scientific publications, including papers, abstracts, and book chapters concerning computational intelligence. He keeps in touch with his mathematical background through his research. His consulting, research, and teaching mainly focuses on artificial intelligence, information security, data and web mining, intelligent computing, image processing (in particular image retrieval, medical imaging), modeling and simulation, intelligent environments, and body sensor networking. This has resulted in his articles appearing in journals by such publishers as IEEE and Springer, including IJCSN and Advances in Computer Science and Engineering. Dr. Darwish is one of the founders of Cyber Security Research Lab (CSRL), organized by Professor Aboul Ella Hassanein, Faculty of Computers and Information, Cairo University, Egypt, and he is a member of research projects in Egypt in the areas of bio-inspired HCV analysis, breast cancer, and e-learning. Dr. Darwish has been solicited as a reviewer and a speaker, organizer, and session chair for many international journals and conferences. He has worked in a wide variety of academic organizations and supervises many master and PhD theses in different areas of computer science. Dr. Darwish practices four languages on a daily basis.
Abdelkrim Haqiq has received a High Study Degree and a PhD, both in the field of modeling and performance evaluation of computer communication networks, from the University of Mohammed V, Agdal, Faculty of Sciences, Rabat, Morocco. Since September 1995, he has been working as a professor in the Department of Mathematics and Computer Science at the Faculty of Sciences and Techniques, Settat, Morocco. He is the director of the Computer, Networks, Mobility and Modeling Laboratory. He is also the general secretary of the electronic Next Generation Networks (e-NGN) Research Group, Moroccan section. He is an IEEE senior member and an IEEE Communications Society member. He was a co-director of a NATO multi-year project entitled "Cyber Security Analysis and Assurance Using Cloud-Based Security Measurement System," having the code SPS984425. Dr. Abdelkrim Haqiq’s interests are in the areas of modeling and performance evaluation of communication networks, mobile communications networks, cloud computing and security, queueing theory and game theory. He is the author and co-author of more than 150 papers for international journals and for conferences and workshops. He is an associate editor of International Journal of Computer International Systems and Industrial Management Applications (IJCISM) and an editorial board member of the International Journal of Intelligent Engineering Informatics (IJIEI). He was also a guest editor of a special issue on next-generation networks and services of the International Journal of Mobile Computing and Multimedia Communications (IJMCMC), July–September 2012, Vol. 4, No. 3, and a special issue of the Journal of Mobile Multimedia (JMM), Vol. 9, No.3(4), 2014.