Muutke küpsiste eelistusi

E-raamat: Security within CONASENSE Paragon

Edited by , Edited by
  • Formaat: 200 pages
  • Ilmumisaeg: 01-Sep-2022
  • Kirjastus: River Publishers
  • Keel: eng
  • ISBN-13: 9781000792195
  • Formaat - EPUB+DRM
  • Hind: 88,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 200 pages
  • Ilmumisaeg: 01-Sep-2022
  • Kirjastus: River Publishers
  • Keel: eng
  • ISBN-13: 9781000792195

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services within the broad platform of CTIF Global Capsule (CGC). This covers future technologies and its enablers, smart cities, crowd computing, reliable and secure communication interface, satellite unnamed air vehicles, wireless sensor networks, data analytics and deep learning, remotely piloted aircraft system and public safety, network neutrality, business ecosystem innovation and so on.
Preface xi
List of Contributors
xv
List of Figures
xvii
List of Tables
xix
List of Abbreviations
xxi
1 Cyber Security-The Essence of CONASENSE
1(10)
Vandana Milind Rohokale
Ramjee Prasad
1.1 Introduction
1(2)
1.2 Known Cyber Attacks Related to CONASENSE
3(2)
1.3 Cyber Threats to CONASENSE
5(1)
1.4 Cyber Security Standards Related to CONASENSE
6(1)
1.5 CONASENSE Cyber Security Framework
7(1)
1.6 Conclusions and Future Scope
8(3)
References
9(2)
2 Layered Network Security for Efficient Data Aggregation in CONASENSE
11(24)
Dnyaneshwar S. Mantri
Ramjee Prasad
2.1 Introduction
12(2)
2.2 Essential Requirements of Layered Network Security
14(6)
2.2.1 Protocol Stack used by Sensor Network
15(3)
2.2.2 Secure Network Design Issues in CONASENSE
18(2)
2.3 Secure Data Aggregations in CONASENSE
20(7)
2.3.1 Data Aggregation Model
21(1)
2.3.2 Open Issues and Performance Metrics in Data Aggregation
22(2)
2.3.3 Data Aggregation Methods
24(3)
2.4 Security Models in CONASENSE
27(4)
2.4.1 Layered Network Model
28(1)
2.4.2 Threats in Layered Network Security (LNS)
29(1)
2.4.3 Layered Security Controls
29(1)
2.4.4 Security, Attack and Aggregation Model
30(1)
2.5 Conclusions
31(4)
References
32(3)
3 Reliable and Secure LPWAN Communication in Interference Environments
35(24)
Viktor Stoynov
Dimitriya Mihaylova
Zlatka Valkova-Jarvis
Georgi Iliev
Vladimir Poulkov
3.1 Introduction
35(1)
3.2 LPWAN Applications and Unresolved Challenges
36(8)
3.3 Unintentional Interference Management in LPWANs
44(3)
3.4 Physical Layer Security Methods for Jamming Suppression
47(7)
3.4.1 Spread Spectrum Techniques
47(2)
3.4.2 Non-adaptive Jamming Filtering
49(1)
3.4.3 Adaptive Jamming Filtering
50(2)
3.4.4 Comparison of the Physical Layer Methods for Jamming Suppression
52(2)
3.5 Conclusion
54(5)
References
54(5)
4 Data Analytics for Securing the Smart Grid
59(16)
Sarmistha De Dutta
Ramjee Prasad
4.1 Introduction
59(2)
4.2 Smart Grid and Cyber Attacks on Energy Sector
61(6)
4.3 Data Analytics Platforms for the Smart Grid
67(3)
4.3.1 Consumer Analytics
69(1)
4.4 Security Analytics for the Smart Grid
70(4)
4.5 Cloud Computing and Security Analytics for Smart Grid 71 References
74(1)
5 EM-Based Drone-Detection/Identification for Safety Purposes
75(10)
Ernestina Cianca
Simone Di Domenico
Mauro De Sanctis
Tommaso Rossi
5.1 Drone Detection Approaches
76(9)
References
82(3)
6 UAV Communication Networks: Problems and Possible Solutions
85(10)
Homayoun Nikookar
6.1 Introduction
85(2)
6.1.1 UAV Communication Networks
85(1)
6.1.2 Research Questions
86(1)
6.2 Method
87(1)
6.3 Problems
87(1)
6.3.1 Aircraft Altitude and Mobility
87(1)
6.3.2 Changing Topology
87(1)
6.3.3 Clock Synchronization
88(1)
6.3.4 Security
88(1)
6.4 Technologies
88(3)
6.4.1 Aircraft Altitude and Mobility
88(1)
6.4.2 Changing Topology
89(1)
6.4.2.1 Cluster based
89(1)
6.4.2.2 Dynamic source protocol
90(1)
6.4.3 Clock Synchronization
90(1)
6.4.4 Security
91(1)
6.5 Discussion
91(2)
6.5.1 Aircraft Altitude and Mobility
91(1)
6.5.2 Changing Topology
92(1)
6.5.3 Clock Synchronization
92(1)
6.5.4 Security
92(1)
6.6 Conclusion
93(2)
References
93(2)
7 Moving Object Detection: Deep Learning Approach with Security Challenges
95(10)
Shivprasad P. Patil
Ramjee Prasad
7.1 Introduction
96(1)
7.2 Background Subtraction
97(1)
7.3 Deep Learning (DL)
98(3)
7.3.1 Background
99(1)
7.3.2 DL and Object Detection
99(2)
7.4 Security Aspects of Deep Learning
101(2)
7.4.1 Adversarial Attacks
101(1)
7.4.2 Data Poisoning
102(1)
7.4.3 Data Privacy
102(1)
7.5 Summary
103(2)
References
103(2)
8 The Network Neutrality in Service Innovation Era
105(20)
Yapeng Wang
Ramjee Prasad
8.1 Introduction
105(3)
8.1.1 NN
106(1)
8.1.2 Innovative Services
106(1)
8.1.3 CONASENSE
107(1)
8.2 The Network Neutrality
108(6)
8.2.1 The Concept NN
108(1)
8.2.2 The Principles of NN
109(1)
8.2.3 The State of the Art of NN
109(1)
8.2.4 History of NN
110(1)
8.2.5 The Analysis of Abolition of NN
111(1)
8.2.6 Current Discussion of NN
112(1)
8.2.6.1 Service innovation
112(1)
8.2.6.2 The investment on the network infrastructure
113(1)
8.2.6.3 The management of internet traffic by internet service providers and what constitutes reasonable traffic management
113(1)
8.3 CONASENSE
114(1)
8.4 Network Neutrality Impact on CONASENSE Service Innovation
115(6)
8.4.1 From Social and Economic Aspect
118(1)
8.4.2 The Influence of NN Abolition
118(1)
8.4.3 Impact on Industry
119(1)
8.4.4 Impact on CONASENSE Services
120(1)
8.5 Conclusions
121(4)
References
122(3)
9 Enabling Security through Digitalization and Business Model Innovation
125(20)
Albena Mihovska
Peter Lindgren
Sofoklis A. Kyriazakos
9.1 Introduction
125(6)
9.1.1 Enabling Technologies for Digitalization
126(3)
9.1.2 Digitalization and Impact on Business Models
129(1)
9.1.3 Security Challenges in the Digital Economy Era
130(1)
9.2 Case Studies for Value Co-Creation Through Digitalization
131(8)
9.2.1 Healthcare
131(1)
9.2.1.1 Monitoring of patients
132(2)
9.2.1.2 Digitalizing TOKS
134(1)
9.2.1.3 ICT-based rehabilitation
135(2)
9.2.2 Smart Metering Solutions
137(1)
9.2.3 Agriculture
138(1)
9.3 Digitialization, Cybersecurity and Business Model Innovation
139(1)
9.4 Conclusions
140(5)
References
141(4)
10 Secure Positioning and Navigation with GNSS
145(22)
Nicola Laurenti
Silvia Ceccato
10.1 Basics of GNSS Positioning and Navigation
145(2)
10.2 Threats and Attack Scenarios
147(6)
10.2.1 Application Contexts for Secure GNSS Positioning
147(1)
10.2.2 Location Based Services
148(2)
10.2.3 Jamming
150(1)
10.2.4 Spoofing
151(1)
10.2.5 Self-attacks
152(1)
10.3 Navigation Message Authentication
153(2)
10.4 Cryptographic Integrity of the Navigation Signal
155(2)
10.4.1 Signal Watermarking
155(1)
10.4.2 Partial Spreading Code Encryption
155(2)
10.5 Integrity Verification with Side Information
157(10)
10.5.1 Binary Hypothesis Testing
159(1)
10.5.2 Use of Inertial Measurement Systems
160(1)
10.5.3 Use of Visual Data
161(2)
References
163(4)
11 Conasense Towards Future Technologies for Business Ecosystem Innovation
167(14)
Peter Lindgren
11.1 Introduction
169(3)
11.2 Vertical and Horizontal BMES with Future Conasense
172(9)
References 181(4)
Index 185(2)
About the Authors 187(16)
About the Editors 203
Ramjee Prasad, CTIF Global Capsule (CGC), Aarhus University, Denmark, and Global ICT Standardization Forum for India (GISFI)

Leo P. Ligthart, CONASENSE, the Netherlands