Preface |
|
xv | |
Acknowledgement |
|
xix | |
|
1 A Systematic Literature Review on Cyber Security Threats of Industrial Internet of Things |
|
|
1 | (18) |
|
|
|
|
2 | (1) |
|
1.2 Background of Industrial Internet of Things |
|
|
3 | (3) |
|
|
6 | (7) |
|
1.4 The Proposed Methodology |
|
|
13 | (1) |
|
1.5 Experimental Requirements |
|
|
14 | (1) |
|
|
15 | (4) |
|
|
16 | (3) |
|
2 Integration of Big Data Analytics Into Cyber-Physical Systems |
|
|
19 | (24) |
|
|
|
|
19 | (2) |
|
2.2 Big Data Model for Cyber-Physical System |
|
|
21 | (2) |
|
2.2.1 Cyber-Physical System Architecture |
|
|
22 | (1) |
|
2.2.2 Big Data Analytics Model |
|
|
22 | (1) |
|
2.3 Big Data and Cyber-Physical System Integration |
|
|
23 | (3) |
|
2.3.1 Big Data Analytics and Cyber-Physical System |
|
|
23 | (1) |
|
2.3.1.1 Integration of CPS With BDA |
|
|
24 | (1) |
|
2.3.1.2 Control and Management of Cyber-Physical System With Big Data Analytics |
|
|
24 | (1) |
|
2.3.2 Issues and Challenges for Big Data-Enabled Cyber-Physical System |
|
|
25 | (1) |
|
2.4 Storage and Communication of Big Data for Cyber-Physical System |
|
|
26 | (3) |
|
2.4.1 Big Data Storage for Cyber-Physical System |
|
|
27 | (1) |
|
2.4.2 Big Data Communication for Cyber-Physical System |
|
|
28 | (1) |
|
2.5 Big Data Processing in Cyber-Physical System |
|
|
29 | (4) |
|
|
29 | (1) |
|
2.5.1.1 Data Processing in the Cloud and Multi-Cloud Computing |
|
|
29 | (2) |
|
2.5.1.2 Clustering in Big Data |
|
|
31 | (1) |
|
2.5.1.3 Clustering in Cyber-Physical System |
|
|
32 | (1) |
|
|
32 | (1) |
|
2.6 Applications of Big Data for Cyber-Physical System |
|
|
33 | (3) |
|
|
33 | (1) |
|
2.6.2 Smart Grids and Smart Cities |
|
|
34 | (1) |
|
|
35 | (1) |
|
2.6.4 Smart Transportation |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (6) |
|
|
38 | (5) |
|
3 Machine Learning: A Key Towards Smart Cyber-Physical Systems |
|
|
43 | (20) |
|
|
|
|
|
44 | (2) |
|
3.2 Different Machine Learning Algorithms |
|
|
46 | (5) |
|
3.2.1 Performance Measures for Machine Learning Algorithms |
|
|
48 | (1) |
|
3.2.2 Steps to Implement ML Algorithms |
|
|
49 | (1) |
|
3.2.3 Various Platforms Available for Implementation |
|
|
50 | (1) |
|
3.2.4 Applications of Machine Learning in Electrical Engineering |
|
|
50 | (1) |
|
3.3 ML Use-Case in MATLAB |
|
|
51 | (5) |
|
3.4 ML Use-Case in Python |
|
|
56 | (4) |
|
3.4.1 ML Model Deployment |
|
|
59 | (1) |
|
|
60 | (3) |
|
|
60 | (3) |
|
4 Precise Risk Assessment and Management |
|
|
63 | (22) |
|
|
|
64 | (1) |
|
|
65 | (2) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
4.3 Different Kinds of Attacks |
|
|
67 | (3) |
|
|
67 | (2) |
|
4.3.2 Man-in-the Middle Assault |
|
|
69 | (1) |
|
4.3.3 Brute Force Assault |
|
|
69 | (1) |
|
4.3.4 Distributed Denial of Service |
|
|
69 | (1) |
|
|
70 | (5) |
|
|
75 | (5) |
|
|
75 | (1) |
|
4.5.2 Notations Used in the Contribution |
|
|
76 | (1) |
|
|
76 | (2) |
|
4.5.4 Simulation and Analysis |
|
|
78 | (2) |
|
|
80 | (5) |
|
|
80 | (5) |
|
5 A Detailed Review on Security Issues in Layered Architectures and Distributed Denial Service of Attacks Over IoT Environment |
|
|
85 | (38) |
|
|
|
|
|
86 | (3) |
|
5.2 IoT Components, Layered Architectures, Security Threats |
|
|
89 | (8) |
|
|
89 | (1) |
|
5.2.2 IoT Layered Architectures |
|
|
90 | (1) |
|
5.2.2.1 3-Layer Architecture |
|
|
91 | (1) |
|
5.2.2.2 4-Layer Architecture |
|
|
91 | (2) |
|
5.2.2.3 5-Layer Architecture |
|
|
93 | (1) |
|
5.2.3 Associated Threats in the Layers |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
5.2.3.3 Fake Node Augmentation |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
5.2.3.7 Kill Command Attack |
|
|
94 | (1) |
|
5.2.3.8 Denial-of-Service (DoS) Attack |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
5.2.3.11 Man-In-The-Middle (MITM) Attack |
|
|
95 | (1) |
|
|
95 | (1) |
|
5.2.3.13 Malicious Insider Attack |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (2) |
|
5.3 Taxonomy of DDoS Attacks and Its Working Mechanism in IoT |
|
|
97 | (8) |
|
5.3.1 Taxonomy of DDoS Attacks |
|
|
99 | (1) |
|
5.3.1.1 Architectural Model |
|
|
99 | (1) |
|
5.3.1.2 Exploited Vulnerability |
|
|
100 | (1) |
|
|
101 | (1) |
|
5.3.1.4 Degree of Automation |
|
|
101 | (1) |
|
5.3.1.5 Scanning Techniques |
|
|
101 | (1) |
|
5.3.1.6 Propagation Mechanism |
|
|
102 | (1) |
|
5.3.1.7 Impact Over the Victim |
|
|
102 | (1) |
|
|
103 | (1) |
|
5.3.1.9 Persistence of Agents |
|
|
103 | (1) |
|
5.3.1.10 Validity of Source Address |
|
|
103 | (1) |
|
|
103 | (1) |
|
5.3.1.12 Attack Traffic Distribution |
|
|
103 | (1) |
|
5.3.2 Working Mechanism of DDoS Attack |
|
|
104 | (1) |
|
5.4 Existing Solution Mechanisms Against DDoS Over IoT |
|
|
105 | (8) |
|
5.4.1 Detection Techniques |
|
|
105 | (3) |
|
5.4.2 Prevention Mechanisms |
|
|
108 | (5) |
|
5.5 Challenges and Research Directions |
|
|
113 | (2) |
|
|
115 | (8) |
|
|
115 | (8) |
|
6 Machine Learning and Deep Learning Techniques for Phishing Threats and Challenges |
|
|
123 | (24) |
|
|
|
124 | (1) |
|
|
124 | (7) |
|
|
124 | (1) |
|
6.2.1.1 Electronic-Mail Fraud |
|
|
125 | (1) |
|
6.2.1.2 Phishing Extortion |
|
|
126 | (1) |
|
|
127 | (1) |
|
6.2.1.4 Social Media Fraud |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (2) |
|
6.3 Deep Learning Architectures |
|
|
131 | (4) |
|
6.3.1 Convolution Neural Network (CNN) Models |
|
|
131 | (1) |
|
6.3.1.1 Recurrent Neural Network |
|
|
131 | (3) |
|
6.3.1.2 Long Short-Term Memory (LSTM) |
|
|
134 | (1) |
|
|
135 | (4) |
|
6.4.1 Machine Learning Approach |
|
|
135 | (1) |
|
6.4.2 Neural Network Approach |
|
|
136 | (2) |
|
6.4.3 Deep Learning Approach |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (7) |
|
|
141 | (6) |
|
7 Novel Defending and Prevention Technique for Man-in-the-Middle Attacks in Cyber-Physical Networks |
|
|
147 | (32) |
|
|
|
|
|
|
148 | (2) |
|
|
150 | (2) |
|
7.3 Classification of Attacks |
|
|
152 | (10) |
|
7.3.1 The Perception Layer Network Attacks |
|
|
152 | (1) |
|
7.3.2 Network Attacks on the Application Control Layer |
|
|
153 | (1) |
|
7.3.3 Data Transmission Layer Network Attacks |
|
|
153 | (1) |
|
7.3.3.1 Rogue Access Point |
|
|
154 | (1) |
|
|
155 | (2) |
|
|
157 | (3) |
|
|
160 | (1) |
|
|
161 | (1) |
|
7.4 Proposed Algorithm of Detection and Prevention |
|
|
162 | (11) |
|
|
162 | (6) |
|
7.4.2 Rogue Access Point and SSL Stripping |
|
|
168 | (1) |
|
|
169 | (4) |
|
7.5 Results and Discussion |
|
|
173 | (1) |
|
7.6 Conclusion and Future Scope |
|
|
173 | (6) |
|
|
174 | (5) |
|
8 Fourth Order Interleaved Boost Converter With PID, Type II and Type III Controllers for Smart Grid Applications |
|
|
179 | (30) |
|
|
|
|
179 | (2) |
|
8.2 Modeling of Fourth Order Interleaved Boost Converter |
|
|
181 | (12) |
|
8.2.1 Introduction to the Topology |
|
|
181 | (1) |
|
|
182 | (1) |
|
8.2.2.1 Mode 1 Operation (0 to d1 Ts) |
|
|
182 | (2) |
|
8.2.2.2 Mode 2 Operation (d1 Ts to d2 Ts) |
|
|
184 | (2) |
|
8.2.2.3 Mode 3 Operation (d2 Ts to d3 Ts) |
|
|
186 | (2) |
|
8.2.2.4 Mode 4 Operation (d3 Ts to Ts) |
|
|
188 | (2) |
|
8.2.3 Averaging of the Model |
|
|
190 | (1) |
|
8.2.4 Small Signal Analysis |
|
|
190 | (3) |
|
8.3 Controller Design for FIBC |
|
|
193 | (4) |
|
|
193 | (1) |
|
|
194 | (1) |
|
8.3.3 Type III Controller |
|
|
195 | (2) |
|
8.4 Computational Results |
|
|
197 | (7) |
|
|
204 | (5) |
|
|
205 | (4) |
|
9 Industry 4.0 in Healthcare IoT for Inventory and Supply Chain Management |
|
|
209 | (20) |
|
|
|
210 | (2) |
|
9.1.1 RFID and IoT for Smart Inventory Management |
|
|
210 | (2) |
|
9.2 Benefits and Barriers in Implementation of RFID |
|
|
212 | (6) |
|
|
213 | (1) |
|
9.2.1.1 Routine Automation |
|
|
213 | (2) |
|
9.2.1.2 Improvement in the Visibility of Assets and Quick Availability |
|
|
215 | (1) |
|
9.2.1.3 SCM-Business Benefits |
|
|
215 | (1) |
|
9.2.1.4 Automated Lost and Found |
|
|
216 | (1) |
|
9.2.1.5 Smart Investment on Inventory |
|
|
217 | (1) |
|
9.2.1.6 Automated Patient Tracking |
|
|
217 | (1) |
|
|
218 | (1) |
|
9.2.2.1 RFID May Interfere With Medical Activities |
|
|
218 | (1) |
|
9.2.2.2 Extra Maintenance for RFID Tags |
|
|
218 | (1) |
|
|
218 | (1) |
|
9.2.2.4 Interoperability Issues |
|
|
218 | (1) |
|
|
218 | (1) |
|
9.3 IoT-Based Inventory Management--Case Studies |
|
|
218 | (2) |
|
9.4 Proposed Model for RFID-Based Hospital Management |
|
|
220 | (5) |
|
9.5 Conclusion and Future Scope |
|
|
225 | (4) |
|
|
226 | (3) |
|
10 A Systematic Study of Security of Industrial IoT |
|
|
229 | (28) |
|
|
|
|
230 | (1) |
|
10.2 Overview of Industrial Internet of Things (Smart Manufacturing) |
|
|
231 | (5) |
|
10.2.1 Key Enablers in Industry 4.0 |
|
|
233 | (1) |
|
10.2.2 OPC Unified Architecture (OPC UA) |
|
|
234 | (2) |
|
10.3 Industrial Reference Architecture |
|
|
236 | (5) |
|
|
237 | (1) |
|
|
237 | (1) |
|
10.3.3 Industrial Internet Reference Architecture (IIRA) |
|
|
238 | (1) |
|
|
238 | (1) |
|
10.3.5 Open Connectivity Foundation (OCF) |
|
|
239 | (1) |
|
10.3.6 Reference Architecture Model Industrie 4.0 (RAMI 4.0) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
10.4 FIWARE Generic Enabler (FIWARE GE) |
|
|
241 | (8) |
|
10.4.1 Core Context Management GE |
|
|
241 | (1) |
|
10.4.2 NGSI Context Data Model |
|
|
242 | (2) |
|
|
244 | (2) |
|
|
246 | (1) |
|
10.4.3.2 IoT Agent-OPC UA |
|
|
247 | (1) |
|
10.4.3.3 Context Provider |
|
|
247 | (1) |
|
10.4.4 FIWARE for Smart Industry |
|
|
248 | (1) |
|
|
249 | (3) |
|
10.5.1 Solutions Adopting FIWARE |
|
|
250 | (1) |
|
10.5.2 IoT Interoperability Testing |
|
|
251 | (1) |
|
|
252 | (5) |
|
|
253 | (4) |
|
11 Investigation of Holistic Approaches for Privacy Aware Design of Cyber-Physical Systems |
|
|
257 | (16) |
|
|
|
|
|
258 | (1) |
|
11.2 Popular Privacy Design Recommendations |
|
|
258 | (4) |
|
11.2.1 Dynamic Authorization |
|
|
258 | (1) |
|
11.2.2 End to End Security |
|
|
259 | (1) |
|
11.2.3 Enrollment and Authentication APIs |
|
|
259 | (1) |
|
11.2.4 Distributed Authorization |
|
|
260 | (1) |
|
11.2.5 Decentralization Authentication |
|
|
261 | (1) |
|
11.2.6 Interoperable Privacy Profiles |
|
|
261 | (1) |
|
11.3 Current Privacy Challenges in CPS |
|
|
262 | (1) |
|
11.4 Privacy Aware Design for CPS |
|
|
263 | (2) |
|
|
265 | (1) |
|
11.6 Converting Risks of Applying AI Into Advantages |
|
|
266 | (3) |
|
11.6.1 Proof of Recognition and De-Anonymization |
|
|
267 | (1) |
|
11.6.2 Segregation, Shamefulness, Mistakes |
|
|
267 | (1) |
|
11.6.3 Haziness and Bias of Profiling |
|
|
267 | (1) |
|
11.6.4 Abuse Arising From Information |
|
|
267 | (1) |
|
11.6.5 Tips for CPS Designers Including AI in the CPS Ecosystem |
|
|
268 | (1) |
|
11.7 Conclusion and Future Scope |
|
|
269 | (4) |
|
|
270 | (3) |
|
12 Exposing Security and Privacy Issues on Cyber-Physical Systems |
|
|
273 | (16) |
|
|
12.1 Introduction to Cyber-Physical Systems (CPS) |
|
|
273 | (4) |
|
12.2 Cyber-Attacks and Security in CPS |
|
|
277 | (4) |
|
|
281 | (3) |
|
12.4 Conclusion & Future Trends in CPS Security |
|
|
284 | (5) |
|
|
285 | (4) |
|
13 Applications of Cyber-Physical Systems |
|
|
289 | (16) |
|
|
|
|
289 | (2) |
|
13.2 Applications of Cyber-Physical Systems |
|
|
291 | (13) |
|
|
291 | (2) |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
13.2.5 Smart Transportation |
|
|
300 | (1) |
|
|
301 | (1) |
|
13.2.6 Smart Manufacturing |
|
|
301 | (2) |
|
|
303 | (1) |
|
13.2.7 Smart Buildings: Smart Cities and Smart Houses |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
References |
|
305 | (6) |
Index |
|
311 | |