Security and Resilience in Intelligent Data-Centric Systems and Communication Networks ( Intelligent Data-Centric Systems: Sensor Collected Intelligence )

Publication series :Intelligent Data-Centric Systems: Sensor Collected Intelligence

Author: Ficco   Massimo;Palmieri   Francesco  

Publisher: Elsevier Science‎

Publication year: 2017

E-ISBN: 9780128113745

P-ISBN(Paperback): 9780128113738

Subject: TP309 安全保密

Keyword: Energy technology & engineering,自然科学总论,一般工业技术

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Security and Resilience in Intelligent Data-Centric Systems and Communication Networks presents current, state-of-the-art work on novel research in theoretical and practical resilience and security aspects of intelligent data-centric critical systems and networks. The book analyzes concepts and technologies that are successfully used in the implementation of intelligent data-centric critical systems and communication networks, also touching on future developments. In addition, readers will find in-demand information for domain experts and developers who want to understand and realize the aspects (opportunities and challenges) of using emerging technologies for designing and developing more secure and resilient intelligent data-centric critical systems and communication networks.

Topics covered include airports, seaports, rail transport systems, plants for the provision of water and energy, and business transactional systems. The book is well suited for researchers and PhD interested in the use of security and resilient computing technologies.

  • Includes tools and techniques to prevent and avoid both accidental and malicious behaviors
  • Explains the state-of-the-art technological solutions for main issues hindering the development of monitoring and reaction solutions
  • Describes new methods and technologies, advanced prototypes, systems, tools and techniques of future direction

Chapter

Acknowledgments and Thanks

References

Chapter 1: Dependability of Container-Based Data-Centric Systems

1 Introduction

2 Component-Based Software Engineering

2.1 Life-Cycle

2.2 Architectural Approaches for Data Management

2.2.1 Functionality and data in a container

2.2.2 Clean separation between functionality and data in containers

2.2.3 Separate distributed data infrastructure and services

2.3 Emerging Container Interoperability Architectures

3 Key Concepts and Relations in Dependability

3.1 Dependability Attributes

3.1.1 Availability

3.1.2 Reliability

3.1.3 Safety

3.1.4 Security

3.1.5 Maintainability

3.1.6 Performability

3.2 Dependability Means

3.2.1 Fault prevention

3.2.2 Fault tolerance

3.2.3 Fault forecasting and removal

3.3 Dependability Threats

4 Serving Virtual Machine and Container Images

5 SWITCH Case Study: Managing QoS in the Software Engineering Process

6 Conclusions

Acknowledgments

References

Chapter 2: Risk Assessment and Monitoring in Intelligent Data-Centric Systems

1 Introduction

1.1 Current Architectural Solutions

1.2 Future Architectural Solutions

2 Risk Factors in DCS Management

2.1 In the Large

2.2 In the Small

3 Traditional Information Risk Assessment

4 A Risk Assessment Approach for CPS

5 The Proposed Approach

5.1 On the Structure of the Models

5.2 On the Iterative Solution Process

6 Enabling Formalisms

6.1 The Action Model

6.2 The Counteraction Model

6.3 Combining and Analyzing the BN Models

7 Related Works

8 Conclusions

Acronyms

Glossary

References

Chapter 3: The Cyber Security Challenges in the IoT Era

1 Introduction

2 The Cyber Security Scenario

2.1 Where Attacks Happen, Attacks Targets and Patterns

2.2 Attack Costs

3 How IOT Will Affect the Cyber Security Scenario

3.1 IoT Development Areas, Where IoT is Expected to Grow

3.2 IoT's Impact on Digitalization

3.3 IoT Digitalization Strategies

4 The Promising World of Industrial Control Systems (ICS)

5 A Different Approach in the Automotive Sector

5.1 Jeep Cherokee

5.2 Tesla S Model

6 Artificial Intelligence

7 Conclusions

References

Further Reading

Chapter 4: IoT and Sensor Networks Security

1 Introduction

2 IoT Elements and Architecture

2.1 IoT Elements

2.2 IoT Architecture

3 IoT Application Domains

4 Security, Safety, and Privacy Aspects

5 Enabling Technologies

6 Device Constraints

7 Attacks

7.1 Physical Layer Attacks

7.2 Link Layer Attacks

7.3 Network Layer Attacks

7.4 Transport Layer Attacks

7.5 Application Layer Attacks

8 Conclusion

Acknowledgment

Acronyms

Glossary

References

Chapter 5: Smart Access Control Models in Sensor Network

1 Introduction

2 Background and Related Work

3 Problem Statement

4 Approach

5 Prototype

6 Final Remarks

References

Chapter 6: Smart Sensor and Big Data Security and Resilience

1 Introduction

2 The IoT System Architecture

2.1 Sensor Network

2.2 Integration

2.3 Backbone Networking

2.4 Big Data Storages and Services

2.5 Smart Applications and Services

3 (Big) Data Driven Management and Risks of the Value Loop

4 Application Domains

4.1 Smart Cities

4.2 Smart Grids

4.3 Smart Buildings

4.4 Disaster Management, Emergency, and Recovery

4.5 Smart Transportation and Logistics

4.6 Other Application Domains

5 Discussion and Analysis

5.1 Security Concerns and Recommendations

5.2 Resilience Concerns and Guidelines

6 Conclusion

Acronyms

Glossary

References

Chapter 7: Load Balancing Algorithms and Protocols to Enhance Quality of Service and Performance in Data of WSN

1 Introduction

2 Load Balancing

3. Load Balancing Techniques in a WSN

3.1 Load Balancing Protocols in a WSN

3.2 Load Balancing Algorithms in WSN

4 Quality of Service

5 Performance Issues in WSN

6 Security in WSN

6.1 Vulnerabilities in the WSN

6.2 Security Requirements in the WSN

6.3 Attacks and Countermeasures in WSN

6.3.1 Types of attacks in the WSN

6.3.2 Existing defense mechanism in WSN

References

Further Reading

Chapter 8: Machine Learning Techniques for Threat Modeling and Detection

1 Introduction

2 Cybersecurity: A Challenge

3 Bio-Inspired Methods for Cyber Security Practical Examples and Implementations

3.1 Practical Realizations of the Bio-Inspired Optimization Techniques Applied to Cyber Security in the Application Layer

3.1.1 Genetic algorithm to generate regular expressions and to detect SQL injection attacks

3.1.2 Using genetic algorithm to identify structure in raw packets in order to detect anomalous HTTP requests

3.2 Practical Realizations of the Techniques Mimicking Behavior of Living Organisms

3.3 Ensemble of Classifiers

3.3.1 Heterogeneous data sources correlation

3.4 Practical Realization of the Collective Intelligence and Distributed Computation

4 Conclusions

References

Chapter 9: Cognitive Distributed Application Area Networks

1 Introduction

2 Theory and Background

3 The Social Media Technologies as Global Brain

3.1 Web Evolution

3.2 The Web as a Global Brain

3.2.1 Wikipedia

3.2.2 Bots as nonhuman agents in distributed cognition

4 A distributed perspective of a trust-based architecture

4.1 Pervasive Computing and Trust

4.2 The Trust Model

4.3 Results and Discussion

5 Conclusion

Acronyms

Glossary

References

Chapter 10: A Novel Cloud-Based IoT Architecture for Smart Building Automation

1 Introduction to the Internet of Things

2 Main Enabling Technologies and Protocols

2.1 Wireless Infrastructure Protocols

2.1.1 Bluetooth low energy (BLE)

2.1.2 ZigBee

2.1.3 6LoWPAN

2.1.4 Wi-Fi HaLow

2.1.5 LoRaWAN

2.2 Application Layer Protocols

2.2.1 Hypertext transfer protocol (HTTP)

2.2.2 Constrained application protocol (CoAP)

2.2.3 Message queue telemetry transport (MQTT)

3 Evolution of IoT Architectures

3.1 Initial Models

3.2 The Appearance of a Middleware

3.3 Toward Intelligent IoT Systems

4 Cloud-Based IoT Architecture Presentation

4.1 Perception Layer

4.2 Network Layer

4.3 Data Aggregator Layer

4.4 Middleware

4.5 Application Layer

5 Use Case: Smart Building Automation

5.1 Data Generation

5.2 Data Transformation and Storage

5.3 Data Consumption

6 Conclusions

References

Chapter 11: Monitoring Data Security in the Cloud: A Security Sla-Based Approach

1 Introduction

2 Cloud Security Monitoring

3 SLA-Based Security Monitoring

4 The SLA-Based Monitoring Architecture

4.1 The SPECS Monitoring Architecture

4.1.1 The enabling cloud automation technology: Chef

5 A Complex Monitoring System for DoS Detection

5.1 DoS Detection and Mitigation

5.1.1 OSSEC

5.1.2 The DoS protection mechanism

5.2 Vulnerability Scanning and Management

5.2.1 OpenVAS

5.2.2 The vulnerability scanning mechanism

5.3 The Refined Monitoring Architecture: Integrating the Security Mechanisms

6 Case Study

7 Conclusions

References

Chapter 12: Hardening iOS Devices Against Remote Forensic Investigation

1 Introduction

2 Security and Trust in the iOS Environment

2.1 Remote Access via Device Trust Relationship

2.2 Sensitive iOS Device Services

2.3 Forensic Acquisition Approaches

3 Mitigation Strategies

3.1 Delete Existing Pairing Records

3.2 Limit Sensitive Services to USB (Disable Over Wireless)

3.3 Disable Some Services

3.4 Lock Pairing With New Devices

4 Lockup: iOS Hardening and Antiforensics

4.1 Tool Capabilities

4.2 Service Profiles

4.2.1 Level 1: Suitable for MDM

4.2.2 Level 2: Suitable for syncing applications

4.2.3 Level 3: Suitable for backup

4.2.4 Level 4: Suitable for syncing media files

4.2.5 Level 5: Suitable for media sharing

4.2.6 Level 6: No sensitive services

4.2.7 Level 7: No lockdown services at all

4.2.8 Additional considerations

4.3 Implementation Details

5 Discussion

5.1 The Jailbreak Process

5.2 Effects of Jailbreak on the Security Model

5.3 Antiforensic Implications

5.4 Countermeasures: Anti-Antiforensics

6 Conclusions and Future Work

Acknowledgment

Glossary

References

Chapter 13: Path Loss Algorithms for Data Resilience in Wireless Body Area Networks for Healthcare Framework

1 Introduction

2 Overview of WBAN Framework

2.1 Characteristics of Wireless Channel in WBANs

2.2 WBAN and WSN Network Topology

2.3 Existing WBAN Applications

2.4 Typical WBAN Sensor Specifications

3 Message Integrity in Wireless Communication

3.1 Encryption Algorithm in WBAN

3.2 Hash Function Technique

3.3 Elliptic Curve Cryptography Technique (ECC)

4 Wireless Standards for WBANs

4.1 IEEE 802.15.6—WBAN

4.2 Medical Implant Communication Service (MICS)

4.3 Path Loss (PL)

4.4 Performance Parameters

4.5 Receiver Designs

5 Conclusion

References

Chapter 14: Designing Resilient and Secure Large-Scale Crisis Information Systems

1 Introduction

2 Reliability and Confidentiality Requirements

3 State of the Art for Reliability and Confidentiality Approaches

4 A Platform for Crisis Information Sharing

5 Proposed Solution

5.1 Replication Scheme in Crisis Information Systems

5.2 Resilient Multicasting in Crisis Information Systems

5.3 Confidential Communications in the CISP Platform

6 Empirical Evaluation

7 Final Remarks

Acknowledgments

References

Index

Back Cover

The users who browse this book also browse


No browse record.