Cross-Layer Design for Secure and Resilient Cyber-Physical Systems Cross-Layer Design for Secure and Resilient Cyber-Physical Systems
Advances in Information Security

Cross-Layer Design for Secure and Resilient Cyber-Physical Systems

A Decision and Game Theoretic Approach

    • $209.99
    • $209.99

Publisher Description

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies.

With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network.

This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies.  These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges.

A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.

GENRE
Computing & Internet
RELEASED
2020
16 November
LANGUAGE
EN
English
LENGTH
229
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
24.8
MB

More Books Like This

Decision and Game Theory for Security Decision and Game Theory for Security
2020
Decision and Game Theory for Security Decision and Game Theory for Security
2021
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
2021
Information and Communications Security Information and Communications Security
2021
Security and Privacy Security and Privacy
2021
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2022

More Books by Quanyan Zhu & Zhiheng Xu

Cyber-Security in Critical Infrastructures Cyber-Security in Critical Infrastructures
2020
Cognitive Security Cognitive Security
2023
Cyber-Security Threats and Response Models in Nuclear Power Plants Cyber-Security Threats and Response Models in Nuclear Power Plants
2022
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
2022
Security and Resilience of Control Systems Security and Resilience of Control Systems
2022
Game Theory and Machine Learning for Cyber Security Game Theory and Machine Learning for Cyber Security
2021

Other Books in This Series

Fog/Edge Computing For Security, Privacy, and Applications Fog/Edge Computing For Security, Privacy, and Applications
2021
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
2020
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Evolution of Cyber Technologies and Operations to 2035 Evolution of Cyber Technologies and Operations to 2035
2015
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024