Security-aware design for cyber-physical systems : a platform-based approach
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
2017.
|
Subjects: | |
ISBN: | 9783319513287 9783319513270 |
Physical Description: | 1 online resource (106 pages) |
LEADER | 04996cam a2200445Mi 4500 | ||
---|---|---|---|
001 | 99705 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112140.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 170107s2017 sz ob 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d N$T |d YDX |d IDEBK |d GW5XE |d CNCGM |d UAB |d OCLCQ |d NJR |d MERUC |d UPM |d OCLCF |d IOG |d ESU |d Z5A |d JBG |d IAD |d ICW |d ICN |d OTZ |d OCLCQ |d VT2 |d U3W |d CAUOI |d OCLCQ |d KSU |d EZ9 |d AU@ |d OCLCQ |d WYU |d UWO |d OCLCQ |d DKU |d OCLCQ |d ERF |d ADU |d UKBTH |d LEATE |d UKAHL |d OCLCQ | ||
020 | |a 9783319513287 |q (electronic bk.) | ||
020 | |z 9783319513270 | ||
024 | 7 | |a 10.1007/978-3-319-51328-7 |2 doi | |
035 | |a (OCoLC)967877981 |z (OCoLC)967866156 |z (OCoLC)968184056 |z (OCoLC)974650298 |z (OCoLC)981873604 |z (OCoLC)988825936 |z (OCoLC)1005780171 |z (OCoLC)1012074005 |z (OCoLC)1048136131 |z (OCoLC)1058271316 |z (OCoLC)1066568732 |z (OCoLC)1066614635 |z (OCoLC)1086448976 |z (OCoLC)1112567041 |z (OCoLC)1113139586 |z (OCoLC)1113497051 |z (OCoLC)1116770829 |z (OCoLC)1122816570 |z (OCoLC)1127166224 | ||
100 | 1 | |a Lin, Chung-Wei. | |
245 | 1 | 0 | |a Security-aware design for cyber-physical systems : |b a platform-based approach / |c Chung-Wei Lin, Alberto Sangiovanni-Vincentelli. |
260 | |a Cham : |b Springer, |c 2017. | ||
300 | |a 1 online resource (106 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
505 | 0 | |a Acronyms; 1 Introduction; 2 Security Threats in Cyber-Physical Systems; 3 Security-Aware Design Methodology; 3.1 Security-Aware Mapping; 3.2 Security Mechanism Selection; 3.3 Architecture Selection; 3.4 Examples of Security-Aware Design; 3.5 Summary; 4 Security Mechanisms for CAN Protocol; 4.1 System Model and Attacker Model; 4.2 Security Mechanisms; 4.2.1 Basic Authentication; 4.2.2 Advanced Mechanism; 4.3 Counter Implementation; 4.4 Counter Reset Mechanisms; 4.4.1 Self-healing Reset Mechanism; 4.4.2 Network-Wide Reset Mechanisms; 4.5 Analysis; 4.6 Summary. | |
505 | 8 | |a 5 Security-Aware Mapping for CAN-Based Systems5.1 System Model and Formulation; 5.1.1 System Model; 5.1.2 Security Constraints and Key Distribution; 5.1.3 Safety Constraints; 5.2 Mapping Algorithm; 5.2.1 Constraints; 5.2.2 Objective Function; 5.2.3 MILP-Based Algorithm; 5.3 Extension; 5.3.1 Path-Based Security Constraints; 5.3.2 Objective Function; 5.3.3 Algorithm; 5.4 Experimental Results; 5.4.1 Comparison with a Greedy Heuristic; 5.4.2 Comparison with Non-integrated Approaches; 5.4.3 Extension; 5.5 Summary; 6 Security-Aware Mapping for TDMA-Based Systems; 6.1 System Model and Formulation. | |
505 | 8 | |a 6.2 Time-Delayed Release of Keys6.3 Mapping Algorithm; 6.3.1 Overview; 6.3.2 Task Allocation and Priority Assignment; 6.3.3 Signal Mapping; 6.3.4 Network Scheduling; 6.3.5 Worst-Case Transmission Delay Analysis; 6.3.6 Interval Length Exploration; 6.3.7 Network Scheduling Refinement; 6.4 Experimental Results; 6.5 Summary; 7 Security-Aware Design for V2V Communication; 7.1 Formulation and Formulation; 7.2 Algorithm; 7.3 Experimental Results; 7.4 Summary; 8 FSM-Based Security-Aware Design; 9 Graph-Based Security-Aware Design; 9.1 Multiple Paths for Security; 9.2 Network Partitioning for Security. | |
505 | 8 | |a 9.3 Summary10 Conclusions; References. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. | ||
504 | |a Includes bibliographical references. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Cooperating objects (Computer systems) |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Sangiovanni-Vincentelli, Alberto. | |
776 | 0 | 8 | |i Print version: |a Lin, Chung-Wei. |t Security-Aware Design for Cyber-Physical Systems : A Platform-Based Approach. |d Cham : Springer International Publishing, ©2017 |z 9783319513270 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-51328-7 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 99705 |d 99705 | ||
993 | |x NEPOSILAT |y EIZ |