Contributors |
|
xiii | |
Intelligent Data-Centric Critical Systems: Security and Resilience Key Challenges |
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | |
|
Acknowledgments and Thanks |
|
|
5 | (1) |
|
|
5 | |
|
Chapter 1 Dependability of Container-Based Data-Centric Systems |
|
|
1 | (28) |
|
|
7 | (1) |
|
2 Component-Based Software Engineering |
|
|
8 | (7) |
|
|
9 | (1) |
|
2.2 Architectural Approaches for Data Management |
|
|
10 | (4) |
|
2.3 Emerging Container Interoperability Architectures |
|
|
14 | (1) |
|
3 Key Concepts and Relations in Dependability |
|
|
15 | (6) |
|
3.1 Dependability Attributes |
|
|
15 | (4) |
|
|
19 | (1) |
|
3.3 Dependability Threats |
|
|
20 | (1) |
|
4 Entice Case Study: Serving Virtual Machine and Container Images to Applications |
|
|
21 | (2) |
|
5 SWITCH Case Study: Managing QoS in the Software Engineering Process |
|
|
23 | (1) |
|
|
24 | (5) |
|
|
25 | (1) |
|
|
25 | (4) |
|
Chapter 2 Risk Assessment and Monitoring in Intelligent Data-Centric Systems |
|
|
29 | (24) |
|
|
29 | (3) |
|
1.1 Current Architectural Solutions |
|
|
30 | (1) |
|
1.2 Future Architectural Solutions |
|
|
31 | (1) |
|
2 Risk Factors in DCS Management |
|
|
32 | (2) |
|
|
32 | (1) |
|
|
33 | (1) |
|
3 Traditional Information Risk Assessment |
|
|
34 | (3) |
|
4 A Risk Assessment Approach for CPS |
|
|
37 | (1) |
|
|
38 | (4) |
|
5.1 On the Structure of the Models |
|
|
39 | (1) |
|
5.2 On the Iterative Solution Process |
|
|
40 | (2) |
|
|
42 | (3) |
|
|
42 | (1) |
|
6.2 The Counteraction Model |
|
|
42 | (2) |
|
6.3 Combining and Analyzing the BN Models |
|
|
44 | (1) |
|
|
45 | (2) |
|
|
47 | (6) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (5) |
|
Chapter 3 The Cyber Security Challenges in the IoT Era |
|
|
53 | (24) |
|
|
53 | (1) |
|
2 The Cyber Security Scenario |
|
|
54 | (3) |
|
2.1 Where Attacks Happen, Attacks Targets and Patterns |
|
|
54 | (1) |
|
|
54 | (3) |
|
3 How IoT Will Affect the Cyber Security Scenario |
|
|
57 | (5) |
|
3.1 IoT Development Areas, Where IoT is Expected to Grow |
|
|
57 | (1) |
|
3.2 IoT's Impact on Digitalization |
|
|
58 | (3) |
|
3.3 IoT Digitalization Strategies |
|
|
61 | (1) |
|
4 The Promising World of Industrial Control Systems (ICS) |
|
|
62 | (3) |
|
5 A Different Approach in the Automotive Sector |
|
|
65 | (6) |
|
|
66 | (2) |
|
|
68 | (3) |
|
6 Artificial Intelligence |
|
|
71 | (2) |
|
|
73 | (4) |
|
|
75 | (1) |
|
|
76 | (1) |
|
Chapter 4 IoT and Sensor Networks Security |
|
|
77 | (26) |
|
|
77 | (1) |
|
2 IoT Elements and Architecture |
|
|
78 | (4) |
|
|
78 | (2) |
|
|
80 | (2) |
|
3 IoT Application Domains |
|
|
82 | (2) |
|
4 Security, Safety, and Privacy Aspects |
|
|
84 | (3) |
|
|
87 | (2) |
|
|
89 | (2) |
|
|
91 | (5) |
|
7.1 Physical Layer Attacks |
|
|
92 | (1) |
|
|
93 | (1) |
|
7.3 Network Layer Attacks |
|
|
94 | (1) |
|
7.4 Transport Layer Attacks |
|
|
95 | (1) |
|
7.5 Application Layer Attacks |
|
|
96 | (1) |
|
|
96 | (7) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (4) |
|
Chapter 5 Smart Access Control Models in Sensor Network |
|
|
103 | (20) |
|
|
103 | (1) |
|
2 Background and Related Work |
|
|
104 | (4) |
|
|
108 | (2) |
|
|
110 | (7) |
|
|
117 | (3) |
|
|
120 | (3) |
|
|
120 | (3) |
|
Chapter 6 Smart Sensor and Big Data Security and Resilience |
|
|
123 | (20) |
|
|
123 | (1) |
|
2 The IoT System Architecture |
|
|
124 | (4) |
|
|
125 | (2) |
|
|
127 | (1) |
|
|
127 | (1) |
|
2.4 Big Data Storages and Services |
|
|
128 | (1) |
|
2.5 Smart Applications and Services |
|
|
128 | (1) |
|
3 (Big) Data Driven Management and Risks of the Value Loop |
|
|
128 | (3) |
|
|
131 | (4) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
4.4 Disaster Management, Emergency, and Recovery |
|
|
133 | (1) |
|
4.5 Smart Transportation and Logistics |
|
|
134 | (1) |
|
4.6 Other Application Domains |
|
|
134 | (1) |
|
5 Discussion and Analysis |
|
|
135 | (4) |
|
5.1 Security Concerns and Recommendations |
|
|
135 | (2) |
|
5.2 Resilience Concerns and Guidelines |
|
|
137 | (2) |
|
|
139 | (4) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (3) |
|
Chapter 7 Load Balancing Algorithms and Protocols to Enhance Quality of Service and Performance in Data of WSN |
|
|
143 | (36) |
|
|
143 | (3) |
|
|
146 | (1) |
|
3 Load Balancing Techniques in a WSN |
|
|
147 | (4) |
|
3.1 Load Balancing Protocols in a WSN |
|
|
147 | (2) |
|
3.2 Load Balancing Algorithms in WSN |
|
|
149 | (2) |
|
|
151 | (1) |
|
5 Performance Issues in WSN |
|
|
152 | (1) |
|
|
152 | (27) |
|
6.1 Vulnerabilities in the WSN |
|
|
153 | (1) |
|
6.2 Security Requirements in the WSN |
|
|
153 | (1) |
|
6.3 Attacks and Countermeasures in WSN |
|
|
153 | (17) |
|
|
170 | (8) |
|
|
178 | (1) |
|
Chapter 8 Machine Learning Techniques for Threat Modeling and Detection |
|
|
179 | (14) |
|
|
179 | (1) |
|
2 Cybersecurity: A Challenge |
|
|
179 | (1) |
|
3 Bio-Inspired Methods for Cyber Security Practical Examples and Implementations |
|
|
180 | (11) |
|
3.1 Practical Realizations of the Bio-Inspired Optimization Techniques Applied to Cyber Security in the Application Layer |
|
|
181 | (6) |
|
3.2 Practical Realizations of the Techniques Mimicking Behavior of Living Organisms |
|
|
187 | (1) |
|
3.3 Ensemble of Classifiers |
|
|
188 | (1) |
|
3.4 Practical Realization of the Collective Intelligence and Distributed Computation |
|
|
189 | (2) |
|
|
191 | (2) |
|
|
191 | (2) |
|
Chapter 9 Cognitive Distributed Application Area Networks |
|
|
193 | (22) |
|
|
193 | (2) |
|
|
195 | (4) |
|
3 The Social Media Technologies as Global Brain |
|
|
199 | (6) |
|
|
199 | (1) |
|
3.2 The Web as a Global Brain |
|
|
200 | (5) |
|
4 A distributed perspective of a trust-based architecture |
|
|
205 | (4) |
|
4.1 Pervasive Computing and Trust |
|
|
205 | (1) |
|
|
206 | (1) |
|
4.3 Results and Discussion |
|
|
207 | (2) |
|
|
209 | (6) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (4) |
|
Chapter 10 A Novel Cloud-Based IoT Architecture for Smart Building Automation |
|
|
215 | (20) |
|
1 Introduction to the Internet of Things |
|
|
215 | (1) |
|
2 Main Enabling Technologies and Protocols |
|
|
216 | (5) |
|
2.1 Wireless Infrastructure Protocols |
|
|
217 | (3) |
|
2.2 Application Layer Protocols |
|
|
220 | (1) |
|
3 Evolution of IoT Architectures |
|
|
221 | (3) |
|
|
221 | (1) |
|
3.2 The Appearance of a Middleware |
|
|
222 | (2) |
|
3.3 Toward Intelligent IoT Systems |
|
|
224 | (1) |
|
4 Cloud-Based IoT Architecture Presentation |
|
|
224 | (4) |
|
|
226 | (1) |
|
|
226 | (1) |
|
4.3 Data Aggregator Layer |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
5 Use Case: Smart Building Automation |
|
|
228 | (4) |
|
|
229 | (1) |
|
5.2 Data Transformation and Storage |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (3) |
|
|
232 | (3) |
|
Chapter 11 Monitoring Data Security in the Cloud: a Security Sla-Based Approach |
|
|
235 | (26) |
|
|
235 | (1) |
|
2 Cloud Security Monitoring |
|
|
236 | (3) |
|
3 SLA-Based Security Monitoring |
|
|
239 | (3) |
|
4 The Specs Framework and the SLA-Based Monitoring Architecture |
|
|
242 | (6) |
|
4.1 The SPECS Monitoring Architecture |
|
|
245 | (3) |
|
5 A Complex Monitoring System for DoS Detection and Vulnerability Assessment |
|
|
248 | (7) |
|
5.1 DoS Detection and Mitigation |
|
|
248 | (4) |
|
5.2 Vulnerability Scanning and Management |
|
|
252 | (1) |
|
5.3 The Refined Monitoring Architecture: Integrating the Security Mechanisms |
|
|
253 | (2) |
|
|
255 | (2) |
|
|
257 | (4) |
|
|
257 | (4) |
|
Chapter 12 Hardening iOS Devices Against Remote Forensic Investigation |
|
|
261 | (24) |
|
|
261 | (1) |
|
|
261 | (1) |
|
2 Security and Trust in the iOS Environment |
|
|
262 | (5) |
|
2.1 Remote Access via Device Trust Relationship |
|
|
263 | (1) |
|
2.2 Sensitive iOS Device Services |
|
|
263 | (2) |
|
2.3 Forensic Acquisition Approaches |
|
|
265 | (2) |
|
|
267 | (1) |
|
3.1 Delete Existing Pairing Records |
|
|
267 | (1) |
|
3.2 Limit Sensitive Services to USB (Disable Over Wireless) |
|
|
267 | (1) |
|
3.3 Disable Some Services |
|
|
267 | (1) |
|
3.4 Lock Pairing With New Devices |
|
|
268 | (1) |
|
4 Lockup: iOS Hardening and Antiforensics |
|
|
268 | (7) |
|
|
270 | (1) |
|
|
271 | (3) |
|
4.3 Implementation Details |
|
|
274 | (1) |
|
|
275 | (5) |
|
5.1 The Jailbreak Process |
|
|
275 | (1) |
|
5.2 Effects of Jailbreak on the Security Model |
|
|
276 | (1) |
|
5.3 Antiforensic Implications |
|
|
277 | (1) |
|
5.4 Countermeasures: Anti-Antiforensics |
|
|
278 | (2) |
|
6 Conclusions and Future Work |
|
|
280 | (5) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (4) |
|
Chapter 13 Path Loss Algorithms for Data Resilience in Wireless Body Area Networks for Healthcare Framework |
|
|
285 | (30) |
|
|
285 | (1) |
|
2 Overview of WBAN Framework |
|
|
285 | (7) |
|
2.1 Characteristics of Wireless Channel in WBANs |
|
|
286 | (1) |
|
2.2 WBAN and WSN Network Topology |
|
|
287 | (1) |
|
2.3 Existing WBAN Applications |
|
|
288 | (3) |
|
2.4 Typical WBAN Sensor Specifications |
|
|
291 | (1) |
|
3 Message Integrity in Wireless Communication |
|
|
292 | (7) |
|
3.1 Encryption Algorithm in WBAN |
|
|
293 | (2) |
|
3.2 Hash Function Technique |
|
|
295 | (1) |
|
3.3 Elliptic Curve Cryptography Technique (ECC) |
|
|
296 | (3) |
|
4 Wireless Standards for WBANs |
|
|
299 | (8) |
|
|
300 | (2) |
|
4.2 Medical Implant Communication Service (MICS) |
|
|
302 | (1) |
|
|
303 | (2) |
|
4.4 Performance Parameters |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
307 | (8) |
|
|
308 | (7) |
|
Chapter 14 Designing Resilient and Secure Large-Scale Crisis Information Systems |
|
|
315 | (28) |
|
|
315 | (2) |
|
2 Reliability and Confidentiality Requirements |
|
|
317 | (3) |
|
3 State of the Art for Reliability and Confidentiality Approaches |
|
|
320 | (2) |
|
4 A Platform for Crisis Information Sharing |
|
|
322 | (3) |
|
|
325 | (10) |
|
5.1 Replication Scheme in Crisis Information Systems |
|
|
327 | (5) |
|
5.2 Resilient Multicasting in Crisis Information Systems |
|
|
332 | (2) |
|
5.3 Confidential Communications in the CISP Platform |
|
|
334 | (1) |
|
|
335 | (4) |
|
|
339 | (4) |
|
|
339 | (1) |
|
|
340 | (3) |
Index |
|
343 | |