Atnaujinkite slapukų nuostatas

El. knyga: Security and Resilience in Intelligent Data-Centric Systems and Communication Networks

Edited by (Department of Computer Science, University of Salerno, Italy), Edited by (Department of Industrial and Information Engineering, Second University of Naples, Italy)
Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Security and Resilience in Intelligent Data-Centric Systems and Communication Networks presents current, state-of-the-art work on novel research in theoretical and practical resilience and security aspects of intelligent data-centric critical systems and networks. The book analyzes concepts and technologies that are successfully used in the implementation of intelligent data-centric critical systems and communication networks, also touching on future developments. In addition, readers will find in-demand information for domain experts and developers who want to understand and realize the aspects (opportunities and challenges) of using emerging technologies for designing and developing more secure and resilient intelligent data-centric critical systems and communication networks.

Topics covered include airports, seaports, rail transport systems, plants for the provision of water and energy, and business transactional systems. The book is well suited for researchers and PhD interested in the use of security and resilient computing technologies.

  • Includes tools and techniques to prevent and avoid both accidental and malicious behaviors
  • Explains the state-of-the-art technological solutions for main issues hindering the development of monitoring and reaction solutions
  • Describes new methods and technologies, advanced prototypes, systems, tools and techniques of future direction

Daugiau informacijos

Presents current advances in the field of intelligence data-centric systems and communication networks, providing both theoretical and practical results
Contributors xiii
Intelligent Data-Centric Critical Systems: Security and Resilience Key Challenges 1(1)
1 Motivation
1(2)
2 Contents
3
Acknowledgments and Thanks
5(1)
References
5
Chapter 1 Dependability of Container-Based Data-Centric Systems
1(28)
1 Introduction
7(1)
2 Component-Based Software Engineering
8(7)
2.1 Life-Cycle
9(1)
2.2 Architectural Approaches for Data Management
10(4)
2.3 Emerging Container Interoperability Architectures
14(1)
3 Key Concepts and Relations in Dependability
15(6)
3.1 Dependability Attributes
15(4)
3.2 Dependability Means
19(1)
3.3 Dependability Threats
20(1)
4 Entice Case Study: Serving Virtual Machine and Container Images to Applications
21(2)
5 SWITCH Case Study: Managing QoS in the Software Engineering Process
23(1)
6 Conclusions
24(5)
Acknowledgments
25(1)
References
25(4)
Chapter 2 Risk Assessment and Monitoring in Intelligent Data-Centric Systems
29(24)
1 Introduction
29(3)
1.1 Current Architectural Solutions
30(1)
1.2 Future Architectural Solutions
31(1)
2 Risk Factors in DCS Management
32(2)
2.1 In the Large
32(1)
2.2 In the Small
33(1)
3 Traditional Information Risk Assessment
34(3)
4 A Risk Assessment Approach for CPS
37(1)
5 The Proposed Approach
38(4)
5.1 On the Structure of the Models
39(1)
5.2 On the Iterative Solution Process
40(2)
6 Enabling Formalisms
42(3)
6.1 The Action Model
42(1)
6.2 The Counteraction Model
42(2)
6.3 Combining and Analyzing the BN Models
44(1)
7 Related Works
45(2)
8 Conclusions
47(6)
Acronyms
47(1)
Glossary
48(1)
References
48(5)
Chapter 3 The Cyber Security Challenges in the IoT Era
53(24)
1 Introduction
53(1)
2 The Cyber Security Scenario
54(3)
2.1 Where Attacks Happen, Attacks Targets and Patterns
54(1)
2.2 Attack Costs
54(3)
3 How IoT Will Affect the Cyber Security Scenario
57(5)
3.1 IoT Development Areas, Where IoT is Expected to Grow
57(1)
3.2 IoT's Impact on Digitalization
58(3)
3.3 IoT Digitalization Strategies
61(1)
4 The Promising World of Industrial Control Systems (ICS)
62(3)
5 A Different Approach in the Automotive Sector
65(6)
5.1 Jeep Cherokee
66(2)
5.2 Tesla S Model
68(3)
6 Artificial Intelligence
71(2)
7 Conclusions
73(4)
References
75(1)
Further Reading
76(1)
Chapter 4 IoT and Sensor Networks Security
77(26)
1 Introduction
77(1)
2 IoT Elements and Architecture
78(4)
2.1 IoT Elements
78(2)
2.2 IoT Architecture
80(2)
3 IoT Application Domains
82(2)
4 Security, Safety, and Privacy Aspects
84(3)
5 Enabling Technologies
87(2)
6 Device Constraints
89(2)
7 Attacks
91(5)
7.1 Physical Layer Attacks
92(1)
7.2 Link Layer Attacks
93(1)
7.3 Network Layer Attacks
94(1)
7.4 Transport Layer Attacks
95(1)
7.5 Application Layer Attacks
96(1)
8 Conclusion
96(7)
Acknowledgment
96(1)
Acronyms
97(1)
Glossary
98(1)
References
99(4)
Chapter 5 Smart Access Control Models in Sensor Network
103(20)
1 Introduction
103(1)
2 Background and Related Work
104(4)
3 Problem Statement
108(2)
4 Approach
110(7)
5 Prototype
117(3)
6 Final Remarks
120(3)
References
120(3)
Chapter 6 Smart Sensor and Big Data Security and Resilience
123(20)
1 Introduction
123(1)
2 The IoT System Architecture
124(4)
2.4 Sensor Network
125(2)
2.2 Integration
127(1)
2.3 Backbone Networking
127(1)
2.4 Big Data Storages and Services
128(1)
2.5 Smart Applications and Services
128(1)
3 (Big) Data Driven Management and Risks of the Value Loop
128(3)
4 Application Domains
131(4)
4.1 Smart Cities
131(1)
4.2 Smart Grids
132(1)
4.3 Smart Buildings
133(1)
4.4 Disaster Management, Emergency, and Recovery
133(1)
4.5 Smart Transportation and Logistics
134(1)
4.6 Other Application Domains
134(1)
5 Discussion and Analysis
135(4)
5.1 Security Concerns and Recommendations
135(2)
5.2 Resilience Concerns and Guidelines
137(2)
6 Conclusion
139(4)
Acronyms
139(1)
Glossary
140(1)
References
140(3)
Chapter 7 Load Balancing Algorithms and Protocols to Enhance Quality of Service and Performance in Data of WSN
143(36)
1 Introduction
143(3)
2 Load Balancing
146(1)
3 Load Balancing Techniques in a WSN
147(4)
3.1 Load Balancing Protocols in a WSN
147(2)
3.2 Load Balancing Algorithms in WSN
149(2)
4 Quality of Service
151(1)
5 Performance Issues in WSN
152(1)
6 Security in WSN
152(27)
6.1 Vulnerabilities in the WSN
153(1)
6.2 Security Requirements in the WSN
153(1)
6.3 Attacks and Countermeasures in WSN
153(17)
References
170(8)
Further Reading
178(1)
Chapter 8 Machine Learning Techniques for Threat Modeling and Detection
179(14)
1 Introduction
179(1)
2 Cybersecurity: A Challenge
179(1)
3 Bio-Inspired Methods for Cyber Security Practical Examples and Implementations
180(11)
3.1 Practical Realizations of the Bio-Inspired Optimization Techniques Applied to Cyber Security in the Application Layer
181(6)
3.2 Practical Realizations of the Techniques Mimicking Behavior of Living Organisms
187(1)
3.3 Ensemble of Classifiers
188(1)
3.4 Practical Realization of the Collective Intelligence and Distributed Computation
189(2)
4 Conclusions
191(2)
References
191(2)
Chapter 9 Cognitive Distributed Application Area Networks
193(22)
1 Introduction
193(2)
2 Theory and Background
195(4)
3 The Social Media Technologies as Global Brain
199(6)
3.1 Web Evolution
199(1)
3.2 The Web as a Global Brain
200(5)
4 A distributed perspective of a trust-based architecture
205(4)
4.1 Pervasive Computing and Trust
205(1)
4.2 The Trust Model
206(1)
4.3 Results and Discussion
207(2)
5 Conclusion
209(6)
Acronyms
210(1)
Glossary
211(1)
References
211(4)
Chapter 10 A Novel Cloud-Based IoT Architecture for Smart Building Automation
215(20)
1 Introduction to the Internet of Things
215(1)
2 Main Enabling Technologies and Protocols
216(5)
2.1 Wireless Infrastructure Protocols
217(3)
2.2 Application Layer Protocols
220(1)
3 Evolution of IoT Architectures
221(3)
3.1 Initial Models
221(1)
3.2 The Appearance of a Middleware
222(2)
3.3 Toward Intelligent IoT Systems
224(1)
4 Cloud-Based IoT Architecture Presentation
224(4)
4.1 Perception Layer
226(1)
4.2 Network Layer
226(1)
4.3 Data Aggregator Layer
227(1)
4.4 Middleware
227(1)
4.5 Application Layer
228(1)
5 Use Case: Smart Building Automation
228(4)
5.1 Data Generation
229(1)
5.2 Data Transformation and Storage
230(1)
5.3 Data Consumption
231(1)
6 Conclusions
232(3)
References
232(3)
Chapter 11 Monitoring Data Security in the Cloud: a Security Sla-Based Approach
235(26)
1 Introduction
235(1)
2 Cloud Security Monitoring
236(3)
3 SLA-Based Security Monitoring
239(3)
4 The Specs Framework and the SLA-Based Monitoring Architecture
242(6)
4.1 The SPECS Monitoring Architecture
245(3)
5 A Complex Monitoring System for DoS Detection and Vulnerability Assessment
248(7)
5.1 DoS Detection and Mitigation
248(4)
5.2 Vulnerability Scanning and Management
252(1)
5.3 The Refined Monitoring Architecture: Integrating the Security Mechanisms
253(2)
6 Case Study
255(2)
7 Conclusions
257(4)
References
257(4)
Chapter 12 Hardening iOS Devices Against Remote Forensic Investigation
261(24)
Chapter Points
261(1)
1 Introduction
261(1)
2 Security and Trust in the iOS Environment
262(5)
2.1 Remote Access via Device Trust Relationship
263(1)
2.2 Sensitive iOS Device Services
263(2)
2.3 Forensic Acquisition Approaches
265(2)
3 Mitigation Strategies
267(1)
3.1 Delete Existing Pairing Records
267(1)
3.2 Limit Sensitive Services to USB (Disable Over Wireless)
267(1)
3.3 Disable Some Services
267(1)
3.4 Lock Pairing With New Devices
268(1)
4 Lockup: iOS Hardening and Antiforensics
268(7)
4.1 Tool Capabilities
270(1)
4.2 Service Profiles
271(3)
4.3 Implementation Details
274(1)
5 Discussion
275(5)
5.1 The Jailbreak Process
275(1)
5.2 Effects of Jailbreak on the Security Model
276(1)
5.3 Antiforensic Implications
277(1)
5.4 Countermeasures: Anti-Antiforensics
278(2)
6 Conclusions and Future Work
280(5)
Acknowledgment
280(1)
Glossary
281(1)
References
281(4)
Chapter 13 Path Loss Algorithms for Data Resilience in Wireless Body Area Networks for Healthcare Framework
285(30)
1 Introduction
285(1)
2 Overview of WBAN Framework
285(7)
2.1 Characteristics of Wireless Channel in WBANs
286(1)
2.2 WBAN and WSN Network Topology
287(1)
2.3 Existing WBAN Applications
288(3)
2.4 Typical WBAN Sensor Specifications
291(1)
3 Message Integrity in Wireless Communication
292(7)
3.1 Encryption Algorithm in WBAN
293(2)
3.2 Hash Function Technique
295(1)
3.3 Elliptic Curve Cryptography Technique (ECC)
296(3)
4 Wireless Standards for WBANs
299(8)
4.1 IEEE 802.15.6---WBAN
300(2)
4.2 Medical Implant Communication Service (MICS)
302(1)
4.3 Path Loss (PL)
303(2)
4.4 Performance Parameters
305(2)
4.5 Receiver Designs
307(1)
5 Conclusion
307(8)
References
308(7)
Chapter 14 Designing Resilient and Secure Large-Scale Crisis Information Systems
315(28)
1 Introduction
315(2)
2 Reliability and Confidentiality Requirements
317(3)
3 State of the Art for Reliability and Confidentiality Approaches
320(2)
4 A Platform for Crisis Information Sharing
322(3)
5 Proposed Solution
325(10)
5.1 Replication Scheme in Crisis Information Systems
327(5)
5.2 Resilient Multicasting in Crisis Information Systems
332(2)
5.3 Confidential Communications in the CISP Platform
334(1)
6 Empirical Evaluation
335(4)
7 Final Remarks
339(4)
Acknowledgments
339(1)
References
340(3)
Index 343
Massimo Ficco is Assistant Professor at the Department of Industrial and Information Engineering of Universitą degli Studi della Campania Luigi Vanvitelli”. He received the degree in Computer Engineering in 2000 from the University of Naples Federico II, and his PhD in Information Engineering from the University of Parthenope in 2010. From 2000 to 2010, he was senior researcher at the Italian Interuniversity Consortium for Computer Science (CINI). Form 2004, he taught master courses in Software Reliability and Security”, Software Engineering”, Data Base”, and Object Oriented Programming”. His current research interests include security and reliability of critical infrastructure, cloud computing, and mobile computing. Massimo Ficco is author of more than one hundred over publications in international journals, books, and conferences. He is Editorial Board Member of different international journal and Editor in Chief of Journal of Cloud Computing Research (JCCR). He has covered different positions of responsibility in research projects. He has been involved in national and EU funded research projects in the area of security and reliability of critical infrastructures. Finally, he has been scientific coordinator of NET-UNO project (Misura 3.17 of the POR Campania 2000/2006), as well as scientific coordinator of ITINERE (POFESR Campania 2007/2013, Asse 2.00 2.1, Bando Sportello dellInnovazione, Progetti di trasferimento Tecnologico Cooperativi e di Prima Industrializzazione per le Imprese Innovative ad Alto Potenziale). Francesco Palmieri is currently an associate professor of computer science at the University of Salerno, Italy. He received an M.S. Laurea” Degree in Information Sciences, an M.S. Laurea” Degree in Computer Science and a Ph.D in Computer Science from the University of Salerno, Italy. He also achieved his National Professional Engineer Certification from University of Naples Federico II. His major research interests concern high performance networking protocols and architectures, routing algorithms and network security. Previously he has been an assistant professor at the Second University of Naples, and the Director of the telecommunication and networking division of the Federico II University, in Naples, Italy. At the start of his career, he also worked for several international companies on sveral networking-related projects concerned with nation-wide communication systems, network management, transport protocols, and IP networking. He has been closely involved with the development of the Internet in Italy as a senior member of the Technical-Scientific Advisory Committee and of the CSIRT of the Italian NREN GARR. He also participated to the scientific coordination committee of the national PoReR” networking project, to the Security Audit Committee of the Italian Academic and Research Network GARR, and leaded the IV working group of the Universitą digitali” technical committee, fostering the diffusion of VoIP and IP Telephony technologies among the Italian Universities. In addition, he coordinated the design/architecture study team of the RIMIC regional university and research network in Campania. He has been involved in several national and international research and network development projects and worked as a network and security consultant for many large and important academic, government and public organizations in the south of Italy. He has published a significant number of papers (more that 150) in leading technical journals, books and conferences and currently serves as the editor-in-chief of an international journal and is part of the editorial board of several other ones.