Security-aware design for cyber-physical systems : a platform-based approach

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with...

Full description

Saved in:
Bibliographic Details
Main Author: Lin, Chung-Wei.
Other Authors: Sangiovanni-Vincentelli, Alberto.
Format: eBook
Language: English
Published: Cham : Springer, 2017.
Subjects:
ISBN: 9783319513287
9783319513270
Physical Description: 1 online resource (106 pages)

Cover

Table of contents

LEADER 04996cam a2200445Mi 4500
001 99705
003 CZ-ZlUTB
005 20240914112140.0
006 m o d
007 cr cnu---unuuu
008 170107s2017 sz ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d N$T  |d YDX  |d IDEBK  |d GW5XE  |d CNCGM  |d UAB  |d OCLCQ  |d NJR  |d MERUC  |d UPM  |d OCLCF  |d IOG  |d ESU  |d Z5A  |d JBG  |d IAD  |d ICW  |d ICN  |d OTZ  |d OCLCQ  |d VT2  |d U3W  |d CAUOI  |d OCLCQ  |d KSU  |d EZ9  |d AU@  |d OCLCQ  |d WYU  |d UWO  |d OCLCQ  |d DKU  |d OCLCQ  |d ERF  |d ADU  |d UKBTH  |d LEATE  |d UKAHL  |d OCLCQ 
020 |a 9783319513287  |q (electronic bk.) 
020 |z 9783319513270 
024 7 |a 10.1007/978-3-319-51328-7  |2 doi 
035 |a (OCoLC)967877981  |z (OCoLC)967866156  |z (OCoLC)968184056  |z (OCoLC)974650298  |z (OCoLC)981873604  |z (OCoLC)988825936  |z (OCoLC)1005780171  |z (OCoLC)1012074005  |z (OCoLC)1048136131  |z (OCoLC)1058271316  |z (OCoLC)1066568732  |z (OCoLC)1066614635  |z (OCoLC)1086448976  |z (OCoLC)1112567041  |z (OCoLC)1113139586  |z (OCoLC)1113497051  |z (OCoLC)1116770829  |z (OCoLC)1122816570  |z (OCoLC)1127166224 
100 1 |a Lin, Chung-Wei. 
245 1 0 |a Security-aware design for cyber-physical systems :  |b a platform-based approach /  |c Chung-Wei Lin, Alberto Sangiovanni-Vincentelli. 
260 |a Cham :  |b Springer,  |c 2017. 
300 |a 1 online resource (106 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
505 0 |a Acronyms; 1 Introduction; 2 Security Threats in Cyber-Physical Systems; 3 Security-Aware Design Methodology; 3.1 Security-Aware Mapping; 3.2 Security Mechanism Selection; 3.3 Architecture Selection; 3.4 Examples of Security-Aware Design; 3.5 Summary; 4 Security Mechanisms for CAN Protocol; 4.1 System Model and Attacker Model; 4.2 Security Mechanisms; 4.2.1 Basic Authentication; 4.2.2 Advanced Mechanism; 4.3 Counter Implementation; 4.4 Counter Reset Mechanisms; 4.4.1 Self-healing Reset Mechanism; 4.4.2 Network-Wide Reset Mechanisms; 4.5 Analysis; 4.6 Summary. 
505 8 |a 5 Security-Aware Mapping for CAN-Based Systems5.1 System Model and Formulation; 5.1.1 System Model; 5.1.2 Security Constraints and Key Distribution; 5.1.3 Safety Constraints; 5.2 Mapping Algorithm; 5.2.1 Constraints; 5.2.2 Objective Function; 5.2.3 MILP-Based Algorithm; 5.3 Extension; 5.3.1 Path-Based Security Constraints; 5.3.2 Objective Function; 5.3.3 Algorithm; 5.4 Experimental Results; 5.4.1 Comparison with a Greedy Heuristic; 5.4.2 Comparison with Non-integrated Approaches; 5.4.3 Extension; 5.5 Summary; 6 Security-Aware Mapping for TDMA-Based Systems; 6.1 System Model and Formulation. 
505 8 |a 6.2 Time-Delayed Release of Keys6.3 Mapping Algorithm; 6.3.1 Overview; 6.3.2 Task Allocation and Priority Assignment; 6.3.3 Signal Mapping; 6.3.4 Network Scheduling; 6.3.5 Worst-Case Transmission Delay Analysis; 6.3.6 Interval Length Exploration; 6.3.7 Network Scheduling Refinement; 6.4 Experimental Results; 6.5 Summary; 7 Security-Aware Design for V2V Communication; 7.1 Formulation and Formulation; 7.2 Algorithm; 7.3 Experimental Results; 7.4 Summary; 8 FSM-Based Security-Aware Design; 9 Graph-Based Security-Aware Design; 9.1 Multiple Paths for Security; 9.2 Network Partitioning for Security. 
505 8 |a 9.3 Summary10 Conclusions; References. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. 
504 |a Includes bibliographical references. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Cooperating objects (Computer systems)  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Sangiovanni-Vincentelli, Alberto. 
776 0 8 |i Print version:  |a Lin, Chung-Wei.  |t Security-Aware Design for Cyber-Physical Systems : A Platform-Based Approach.  |d Cham : Springer International Publishing, ©2017  |z 9783319513270 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-51328-7  |y Plný text 
992 |c NTK-SpringerENG 
999 |c 99705  |d 99705 
993 |x NEPOSILAT  |y EIZ