Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational…mehr
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area.
Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the yearsahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
HOUBING SONG, PhD is an assistant professor in the Department of Electrical, Computer, Software, and Systems Engineering at Embry-Riddle Aeronautical University, Daytona Beach, Florida, and the Director of the Security and Optimization for Networked Globe Laboratory (SONG Lab, www.SONGLab.us). GLENN A. FINK, PhD is a cyber security researcher with the National Security Directorate, Pacific Northwest National Laboratory. He was the lead inventor of PNNL's Digital Ants technology. SABINA JESCHKE, Dr. rer. nat. is a professor in the Department of Mechanical Engineering, RWTH Aachen University, Germany, and Head of the Cybernetics Lab IMA/ZLW & IfU.
Inhaltsangabe
List of Contributors xvii
Foreword xxiii
Preface xxv
Acknowledgments xxix
1 Overview of Security and Privacy in Cyber-Physical Systems 1 Glenn A. Fink, ThomasW. Edgar, Theora R. Rice, Douglas G. MacDonald and Cary E. Crawford
1.1 Introduction 1
1.2 Defining Security and Privacy 1
1.2.1 Cybersecurity and Privacy 2
1.2.2 Physical Security and Privacy 3
1.3 Defining Cyber-Physical Systems 4
1.3.1 Infrastructural CPSs 5
1.3.1.1 Example: Electric Power 5
1.3.2 Personal CPSs 5
1.3.2.1 Example: Smart Appliances 6
1.3.3 Security and Privacy in CPSs 6
1.4 Examples of Security and Privacy in Action 7
1.4.1 Security in Cyber-Physical Systems 7
1.4.1.1 Protecting Critical Infrastructure from Blended Threat 8
1.4.1.2 Cyber-Physical Terrorism 8
1.4.1.3 Smart Car Hacking 9
1.4.1.4 Port Attack 10
1.4.2 Privacy in Cyber-Physical Systems 11
1.4.2.1 Wearables 11
1.4.2.2 Appliances 12
1.4.2.3 Motivating Sharing 12
1.4.3 Blending Information and Physical Security and Privacy 12
1.5 Approaches to Secure Cyber-Physical Systems 14
1.5.1 Least Privilege 14
1.5.2 Need-to-Know 15
1.5.3 Segmentation 15
1.5.4 Defensive Dimensionality 16
1.5.4.1 Defense-in-Depth 16
1.5.4.2 Defense-in-Breadth 16
1.5.5 User-Configurable Data Collection/Logging 17
1.5.6 Pattern Obfuscation 17
1.5.7 End-to-End Security 17
1.5.8 Tamper Detection/Security 18
1.6 Ongoing Security and Privacy Challenges for CPSs 18
1.6.1 Complexity of Privacy Regulations 18
1.6.2 Managing and Incorporating Legacy Systems 19
1.6.3 Distributed Identity and Authentication Management 20
1.6.4 Modeling Distributed CPSs 20
1.7 Conclusion 21
References 21
2 Network Security and Privacy for Cyber-Physical Systems 25 Martin Henze, Jens Hiller, René Hummen, Roman Matzutt, KlausWehrle andJan H. Ziegeldorf
2.1 Introduction 25
2.2 Security and Privacy Issues in CPSs 26
2.2.1 CPS Reference Model 27
2.2.1.1 Device Level 27
2.2.1.2 Control/Enterprise Level 27
2.2.1.3 Cloud Level 28
2.2.2 CPS Evolution 28
2.2.3 Security and PrivacyThreats in CPSs 30
2.3 Local Network Security for CPSs 31
2.3.1 Secure Device Bootstrapping 32
2.3.1.1 Initial Key Exchange 33
2.3.1.2 Device Life Cycle 33
2.3.2 Secure Local Communication 34
2.3.2.1 Physical Layer 34
2.3.2.2 Medium Access 34
2.3.2.3 Network Layer 35
2.3.2.4 Secure Local Forwarding for Internet-Connected CPSs 35
2.4 Internet-Wide Secure Communication 36
2.4.1 Security Challenges for Internet-Connected CPS 37
2.4.2 Tailoring End-to-End Security to CPS 38
2.4.3 Handling Resource Heterogeneity 39
2.4.3.1 Reasonable Retransmission Mechanisms 39
2.4.3.2 Denial-of-Service Protection 40
2.5 Security and Privacy for Cloud-Interconnected CPSs 41
2.5.1 Securely Storing CPS Data in the Cloud 42
2.5.1.1 Protection of CPS Data 43
2.5.1.2 Access Control 43
2.5.2 Securely Processing CPS Data in the Cloud 44
2.5.3 Privacy for Cloud-Based CPSs 45
2.6 Summary 46
2.7 Conclusion and Outlook 47
Acknowledgments 48
References 48
3 Tutorial on Information Theoretic Metrics Quantifying Privacy i
1 Overview of Security and Privacy in Cyber-Physical Systems 1 Glenn A. Fink, ThomasW. Edgar, Theora R. Rice, Douglas G. MacDonald and Cary E. Crawford
1.1 Introduction 1
1.2 Defining Security and Privacy 1
1.2.1 Cybersecurity and Privacy 2
1.2.2 Physical Security and Privacy 3
1.3 Defining Cyber-Physical Systems 4
1.3.1 Infrastructural CPSs 5
1.3.1.1 Example: Electric Power 5
1.3.2 Personal CPSs 5
1.3.2.1 Example: Smart Appliances 6
1.3.3 Security and Privacy in CPSs 6
1.4 Examples of Security and Privacy in Action 7
1.4.1 Security in Cyber-Physical Systems 7
1.4.1.1 Protecting Critical Infrastructure from Blended Threat 8
1.4.1.2 Cyber-Physical Terrorism 8
1.4.1.3 Smart Car Hacking 9
1.4.1.4 Port Attack 10
1.4.2 Privacy in Cyber-Physical Systems 11
1.4.2.1 Wearables 11
1.4.2.2 Appliances 12
1.4.2.3 Motivating Sharing 12
1.4.3 Blending Information and Physical Security and Privacy 12
1.5 Approaches to Secure Cyber-Physical Systems 14
1.5.1 Least Privilege 14
1.5.2 Need-to-Know 15
1.5.3 Segmentation 15
1.5.4 Defensive Dimensionality 16
1.5.4.1 Defense-in-Depth 16
1.5.4.2 Defense-in-Breadth 16
1.5.5 User-Configurable Data Collection/Logging 17
1.5.6 Pattern Obfuscation 17
1.5.7 End-to-End Security 17
1.5.8 Tamper Detection/Security 18
1.6 Ongoing Security and Privacy Challenges for CPSs 18
1.6.1 Complexity of Privacy Regulations 18
1.6.2 Managing and Incorporating Legacy Systems 19
1.6.3 Distributed Identity and Authentication Management 20
1.6.4 Modeling Distributed CPSs 20
1.7 Conclusion 21
References 21
2 Network Security and Privacy for Cyber-Physical Systems 25 Martin Henze, Jens Hiller, René Hummen, Roman Matzutt, KlausWehrle andJan H. Ziegeldorf
2.1 Introduction 25
2.2 Security and Privacy Issues in CPSs 26
2.2.1 CPS Reference Model 27
2.2.1.1 Device Level 27
2.2.1.2 Control/Enterprise Level 27
2.2.1.3 Cloud Level 28
2.2.2 CPS Evolution 28
2.2.3 Security and PrivacyThreats in CPSs 30
2.3 Local Network Security for CPSs 31
2.3.1 Secure Device Bootstrapping 32
2.3.1.1 Initial Key Exchange 33
2.3.1.2 Device Life Cycle 33
2.3.2 Secure Local Communication 34
2.3.2.1 Physical Layer 34
2.3.2.2 Medium Access 34
2.3.2.3 Network Layer 35
2.3.2.4 Secure Local Forwarding for Internet-Connected CPSs 35
2.4 Internet-Wide Secure Communication 36
2.4.1 Security Challenges for Internet-Connected CPS 37
2.4.2 Tailoring End-to-End Security to CPS 38
2.4.3 Handling Resource Heterogeneity 39
2.4.3.1 Reasonable Retransmission Mechanisms 39
2.4.3.2 Denial-of-Service Protection 40
2.5 Security and Privacy for Cloud-Interconnected CPSs 41
2.5.1 Securely Storing CPS Data in the Cloud 42
2.5.1.1 Protection of CPS Data 43
2.5.1.2 Access Control 43
2.5.2 Securely Processing CPS Data in the Cloud 44
2.5.3 Privacy for Cloud-Based CPSs 45
2.6 Summary 46
2.7 Conclusion and Outlook 47
Acknowledgments 48
References 48
3 Tutorial on Information Theoretic Metrics Quantifying Privacy i
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826