Handbook on Securing Cyber-Physical Critical Infrastructure

Editor/Author Das, Sajal
Publication Year: 2012
Publisher: Elsevier Science & Technology

Single-User Purchase Price: $119.94
Unlimited-User Purchase Price: $179.91
ISBN: 978-0-12-415815-3
Category: Technology & Engineering - Technology
Image Count: 270
Book Status: Available
Table of Contents

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

Share this

Table of Contents

  • About the Authors
  • Contributors
  • Foreword
  • Securing Cyber-Physical Infrastructure
  • Theoretical Foundations
  • Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach, - Mengran Xue, Sandip Roy, Yan Wan, Sajal K. Das
  • Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models, - Xin Jin, Min Dan, Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das
  • An Analytical Framework for Cyber-Physical Networks, - Nageswara S. V. Rao, Y. Narahari, C. E. Veni Madhavan, David K. Y. Yau, Chris Y. T. Ma
  • Evolution of Widely Spreading Worms and Countermeasures: Epidemic Theory and Application, - Wei Yu, Nan Zhang, Xinwen Fu, Brian Rivera
  • Security for Wireless Mobile Networks
  • 5 Mobile Wireless Network Security, - Michel Barbeau
  • 6 Robust Wireless Infrastructure against Jamming Attacks, - Guevara Noubir
  • 7 Security for Mobile Ad Hoc Networks, - Raja Datta, Ningrinla Marchang
  • 8 Defending Against Identity-Based Attacks in Wireless Networks, - Yingying Chen, Jie Yang
  • Security for Sensor Networks
  • 9 Efficient and Distributed Access Control for Sensor Networks, - Donggang Liu
  • 10 Defending Against Physical Attacks in Wireless Sensor Networks, - Jin Teng, Wenjun Gu, Dong Xuan
  • 11 Node Compromise Detection in Wireless Sensor Networks, - Jun-Won Ho, Sajal K. Das
  • Platform Security
  • 12 Hardware and Security: Vulnerabilities and Solutions, - Gedare Bloom, Eugen Leontie, Bhagirath Narahari, Rahul Simha
  • 13 Languages and Security: Safer Software Through Language and Compiler Techniques, - Rahul Simha, Scotty Smith
  • Cloud Computing and Data Security
  • 14 Protecting Data in Outsourcing Scenarios, - Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
  • 15 Data Security in Cloud Computing, - Shucheng Yu, Wenjing Lou, Kui Ren
  • 16 Secure Mobile Cloud Computing, - Mayank Raj, Mario Di Francesco, Sajal K. Das
  • 17 Relation Privacy Preservation in Publishing Online Social Networks, - Na Li, Nan Zhang, Sajal K. Das
  • Event Monitoring and Situation Awareness
  • 18 Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure, - Yang Liu, Yong Guan
  • 19 Discovering and Tracking Patterns of Interest in Security Sensor Streams, - Parisa Rashidi, Narayanan Krishnan, Diane J. Cook
  • 20 Pervasive Sensing and Monitoring for Situational Awareness, - Sharad Mehrotra, Nalini Venkatasubramanian, Mark-Oliver Stehr, Carolyn Talcott
  • 21 Sense and Response Systems for Crisis Management, - J.J. Bunn, K.M. Chandy, M. Faulkner, A.H. Liu, M. Olson
  • Policy Issues in Security Management
  • 22 Managing and Securing Critical Infrastructure – A Semantic Policy-and Trust-Driven Approach, - Wenjia Li, Palanivel Kodeswaran, Pramod Jagtap, Anupam Joshi, Tim Finin
  • 23 Policies, Access Control, and Formal Methods, - Elisa Bertino
  • 24 Formal Analysis of Policy-Based Security Configurations in Enterprise Networks, - S.K. Ghosh, Ehab Al-Shaer, P. Bera
  • Security in Real-World Systems
  • 25 Security and Privacy in the Smart Grid, - Alvaro A. Cárdenas, Reihaneh Safavi-Naini
  • 26 Cyber-Physical Security of Automotive Information Technology, - Richard R. Brooks, Seok Bae Yun, Juan Deng
  • 27 Security and Privacy for Mobile Health-Care (m-Health) Systems, - Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
  • 28 Security and Robustness in the Internet Infrastructure, - Krishna Kant, Casey Deccio
  • 29 Emergency Vehicular Networks, - Mario Gerla, Eun Kyu Lee, Uichin Lee, Giovanni Pau
  • 30 Security Issues in VoIP Telecommunication Networks, - Xiaohui Yang, Ram Dantu, Duminda Wijesekera