Preface |
|
xi | |
|
|
xv | |
|
|
xvii | |
|
|
xix | |
|
|
xxi | |
|
1 Cyber Security-The Essence of CONASENSE |
|
|
1 | (10) |
|
|
|
|
1 | (2) |
|
1.2 Known Cyber Attacks Related to CONASENSE |
|
|
3 | (2) |
|
1.3 Cyber Threats to CONASENSE |
|
|
5 | (1) |
|
1.4 Cyber Security Standards Related to CONASENSE |
|
|
6 | (1) |
|
1.5 CONASENSE Cyber Security Framework |
|
|
7 | (1) |
|
1.6 Conclusions and Future Scope |
|
|
8 | (3) |
|
|
9 | (2) |
|
2 Layered Network Security for Efficient Data Aggregation in CONASENSE |
|
|
11 | (24) |
|
|
|
|
12 | (2) |
|
2.2 Essential Requirements of Layered Network Security |
|
|
14 | (6) |
|
2.2.1 Protocol Stack used by Sensor Network |
|
|
15 | (3) |
|
2.2.2 Secure Network Design Issues in CONASENSE |
|
|
18 | (2) |
|
2.3 Secure Data Aggregations in CONASENSE |
|
|
20 | (7) |
|
2.3.1 Data Aggregation Model |
|
|
21 | (1) |
|
2.3.2 Open Issues and Performance Metrics in Data Aggregation |
|
|
22 | (2) |
|
2.3.3 Data Aggregation Methods |
|
|
24 | (3) |
|
2.4 Security Models in CONASENSE |
|
|
27 | (4) |
|
2.4.1 Layered Network Model |
|
|
28 | (1) |
|
2.4.2 Threats in Layered Network Security (LNS) |
|
|
29 | (1) |
|
2.4.3 Layered Security Controls |
|
|
29 | (1) |
|
2.4.4 Security, Attack and Aggregation Model |
|
|
30 | (1) |
|
|
31 | (4) |
|
|
32 | (3) |
|
3 Reliable and Secure LPWAN Communication in Interference Environments |
|
|
35 | (24) |
|
|
|
|
|
|
|
35 | (1) |
|
3.2 LPWAN Applications and Unresolved Challenges |
|
|
36 | (8) |
|
3.3 Unintentional Interference Management in LPWANs |
|
|
44 | (3) |
|
3.4 Physical Layer Security Methods for Jamming Suppression |
|
|
47 | (7) |
|
3.4.1 Spread Spectrum Techniques |
|
|
47 | (2) |
|
3.4.2 Non-adaptive Jamming Filtering |
|
|
49 | (1) |
|
3.4.3 Adaptive Jamming Filtering |
|
|
50 | (2) |
|
3.4.4 Comparison of the Physical Layer Methods for Jamming Suppression |
|
|
52 | (2) |
|
|
54 | (5) |
|
|
54 | (5) |
|
4 Data Analytics for Securing the Smart Grid |
|
|
59 | (16) |
|
|
|
|
59 | (2) |
|
4.2 Smart Grid and Cyber Attacks on Energy Sector |
|
|
61 | (6) |
|
4.3 Data Analytics Platforms for the Smart Grid |
|
|
67 | (3) |
|
|
69 | (1) |
|
4.4 Security Analytics for the Smart Grid |
|
|
70 | (4) |
|
4.5 Cloud Computing and Security Analytics for Smart Grid 71 References |
|
|
74 | (1) |
|
5 EM-Based Drone-Detection/Identification for Safety Purposes |
|
|
75 | (10) |
|
|
|
|
|
5.1 Drone Detection Approaches |
|
|
76 | (9) |
|
|
82 | (3) |
|
6 UAV Communication Networks: Problems and Possible Solutions |
|
|
85 | (10) |
|
|
|
85 | (2) |
|
6.1.1 UAV Communication Networks |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
6.3.1 Aircraft Altitude and Mobility |
|
|
87 | (1) |
|
|
87 | (1) |
|
6.3.3 Clock Synchronization |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (3) |
|
6.4.1 Aircraft Altitude and Mobility |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
6.4.2.2 Dynamic source protocol |
|
|
90 | (1) |
|
6.4.3 Clock Synchronization |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
6.5.1 Aircraft Altitude and Mobility |
|
|
91 | (1) |
|
|
92 | (1) |
|
6.5.3 Clock Synchronization |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
93 | (2) |
|
7 Moving Object Detection: Deep Learning Approach with Security Challenges |
|
|
95 | (10) |
|
|
|
|
96 | (1) |
|
7.2 Background Subtraction |
|
|
97 | (1) |
|
|
98 | (3) |
|
|
99 | (1) |
|
7.3.2 DL and Object Detection |
|
|
99 | (2) |
|
7.4 Security Aspects of Deep Learning |
|
|
101 | (2) |
|
7.4.1 Adversarial Attacks |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
|
103 | (2) |
|
8 The Network Neutrality in Service Innovation Era |
|
|
105 | (20) |
|
|
|
|
105 | (3) |
|
|
106 | (1) |
|
8.1.2 Innovative Services |
|
|
106 | (1) |
|
|
107 | (1) |
|
8.2 The Network Neutrality |
|
|
108 | (6) |
|
|
108 | (1) |
|
8.2.2 The Principles of NN |
|
|
109 | (1) |
|
8.2.3 The State of the Art of NN |
|
|
109 | (1) |
|
|
110 | (1) |
|
8.2.5 The Analysis of Abolition of NN |
|
|
111 | (1) |
|
8.2.6 Current Discussion of NN |
|
|
112 | (1) |
|
8.2.6.1 Service innovation |
|
|
112 | (1) |
|
8.2.6.2 The investment on the network infrastructure |
|
|
113 | (1) |
|
8.2.6.3 The management of internet traffic by internet service providers and what constitutes reasonable traffic management |
|
|
113 | (1) |
|
|
114 | (1) |
|
8.4 Network Neutrality Impact on CONASENSE Service Innovation |
|
|
115 | (6) |
|
8.4.1 From Social and Economic Aspect |
|
|
118 | (1) |
|
8.4.2 The Influence of NN Abolition |
|
|
118 | (1) |
|
|
119 | (1) |
|
8.4.4 Impact on CONASENSE Services |
|
|
120 | (1) |
|
|
121 | (4) |
|
|
122 | (3) |
|
9 Enabling Security through Digitalization and Business Model Innovation |
|
|
125 | (20) |
|
|
|
|
|
125 | (6) |
|
9.1.1 Enabling Technologies for Digitalization |
|
|
126 | (3) |
|
9.1.2 Digitalization and Impact on Business Models |
|
|
129 | (1) |
|
9.1.3 Security Challenges in the Digital Economy Era |
|
|
130 | (1) |
|
9.2 Case Studies for Value Co-Creation Through Digitalization |
|
|
131 | (8) |
|
|
131 | (1) |
|
9.2.1.1 Monitoring of patients |
|
|
132 | (2) |
|
9.2.1.2 Digitalizing TOKS |
|
|
134 | (1) |
|
9.2.1.3 ICT-based rehabilitation |
|
|
135 | (2) |
|
9.2.2 Smart Metering Solutions |
|
|
137 | (1) |
|
|
138 | (1) |
|
9.3 Digitialization, Cybersecurity and Business Model Innovation |
|
|
139 | (1) |
|
|
140 | (5) |
|
|
141 | (4) |
|
10 Secure Positioning and Navigation with GNSS |
|
|
145 | (22) |
|
|
|
10.1 Basics of GNSS Positioning and Navigation |
|
|
145 | (2) |
|
10.2 Threats and Attack Scenarios |
|
|
147 | (6) |
|
10.2.1 Application Contexts for Secure GNSS Positioning |
|
|
147 | (1) |
|
10.2.2 Location Based Services |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
10.3 Navigation Message Authentication |
|
|
153 | (2) |
|
10.4 Cryptographic Integrity of the Navigation Signal |
|
|
155 | (2) |
|
10.4.1 Signal Watermarking |
|
|
155 | (1) |
|
10.4.2 Partial Spreading Code Encryption |
|
|
155 | (2) |
|
10.5 Integrity Verification with Side Information |
|
|
157 | (10) |
|
10.5.1 Binary Hypothesis Testing |
|
|
159 | (1) |
|
10.5.2 Use of Inertial Measurement Systems |
|
|
160 | (1) |
|
10.5.3 Use of Visual Data |
|
|
161 | (2) |
|
|
163 | (4) |
|
11 Conasense Towards Future Technologies for Business Ecosystem Innovation |
|
|
167 | (14) |
|
|
|
169 | (3) |
|
11.2 Vertical and Horizontal BMES with Future Conasense |
|
|
172 | (9) |
References |
|
181 | (4) |
Index |
|
185 | (2) |
About the Authors |
|
187 | (16) |
About the Editors |
|
203 | |