skip to content
Security and privacy trends in the industrial internet of things Preview this item
ClosePreview this item
Checking...

Security and privacy trends in the industrial internet of things

Author: Cristina Alcatraz
Publisher: Cham, Switzerland : Springer, 2019.
Series: Advanced sciences and technologies for security applications.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT). The incorporation of the new embedded technologies and the interconnected networking  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Software
Additional Physical Format: Print version:
Alcaraz, Cristina
Security and Privacy Trends in the Industrial Internet of Things
Cham : Springer,c2019
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Cristina Alcatraz
ISBN: 9783030123307 3030123308 9783030123314 3030123316 9783030123321 3030123324
OCLC Number: 1102469382
Notes: 3.2 Capability-Based Access Control
Description: 1 online resource (xii, 310 pages).
Contents: Intro; Preface; Contents; List of Abbreviations; Part I Security Analysis and Advanced Threats; Securing Industrial Control Systems; 1 Introduction; 2 Urban Myths; 3 Information Technology; 3.1 Operational Technology; 4 ICS Security Properties; 4.1 Controllability, Observability and Operability; 4.2 Ensuring ICS Security; 5 IT Defenses; 5.1 Cryptography; 5.2 Intrusion Detection; 5.3 Trusted Computing; 6 Safety vs. Security; 6.1 Information Technology in an OT Environment; 6.1.1 Security Updates; 6.1.2 System Shutdown; 6.1.3 Software Security; 6.2 Independence Assumptions 7 Information Channels Beyond IT7.1 Zones and Conduits; 7.2 Delivering Attack Payloads via Process Physics; 7.3 Information Flow via Process Physics; 8 Security Architecture; 8.1 Multiple Independent Levels of Security Architecture; 8.2 Role of the Vendor; 8.3 Example: Smart Meters; 9 Conclusion; References; Towards a Secure Industrial Internet of Things; 1 Introduction; 2 Identify; 2.1 Security Requirements; 2.2 Integration Approaches; 2.3 Industrial IoT Security Parameters; 3 Protect; 3.1 Hardware Security Measures; 3.2 Communication Channels Security; 3.3 General Protection Approaches 4 Detect5 Respond and Recover; 6 Conclusions; References; Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things; 1 Introduction; 2 SCADA Related Protocols and Architectures; 3 Zero-Day Exploits on Human-Machine Interface Applications; 3.1 Memory Corruption; 3.2 Credential Harvesting; 3.3 Insecure Installation, Authentication and Authorization Procedures; 3.4 Code Injection; 4 APT Attack Scenarios on Industrial IoT Field Devices; 4.1 Stuxnet; 4.2 Dragonfly; 4.3 Attacking Internet Facing PLCs: PLC-Blaster; 4.4 Attacking Industrial Robots 4.5 PLC Ransomware: LogicLocker5 APT Attacks on Smart Grid SCADA Networks and Field Devices; 5.1 Attacks on Generation Systems: The Aurora Attack; 5.2 Attack on the Ukraine's Smart Grid Distribution Network (2015); 5.3 Attack on the Ukraine's Kiev Transmission Station (2016); 6 Conclusions; References; Part II Secure Interconnection Mechanisms; A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT; 1 Introduction; 2 Key IoT Applications in Industries; 3 Target Devices; 4 Lightweight Cryptography Standards; 5 Evaluation Metrics; 5.1 Performance Metrics 5.2 Hardware-Specific Metrics5.3 Software-Specific Metrics; 6 Design Classification; 6.1 Underlying Constructions; 6.2 Underlying Modes; 6.3 Functional Characteristics; 7 Security; 8 Overview of LWAE Candidates; 8.1 Stream-Cipher Based AE Candidates; 8.2 Hybrid Candidates; 8.3 Sponge Based Candidates; 8.4 Block Cipher Based Candidates; 9 Comparisons; 10 Open Challenges; 11 Conclusion; References; Access Control in the Industrial Internet of Things; 1 Introduction; 2 Background; 2.1 IIoT Architecture; 2.2 Access Control Requirements; 3 Access Control Approaches; 3.1 Role-Based Access Control
Series Title: Advanced sciences and technologies for security applications.
Responsibility: editor Cristina Alcatraz.

Abstract:

This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1102469382> # Security and privacy trends in the industrial internet of things
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "1102469382" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9358315250#Topic/data_protection> ; # Data protection
    schema:about <http://experiment.worldcat.org/entity/work/data/9358315250#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/9358315250#Topic/computer_security> ; # Computer security
    schema:bookFormat schema:EBook ;
    schema:datePublished "2019" ;
    schema:description "This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT). The incorporation of the new embedded technologies and the interconnected networking advances in the automation and monitoring processes, certainly multiplies the functional complexities of the underlying control system, whilst increasing security and privacy risks. The critical nature of the application context and its relevance for the well-being of citizens and their economy, attracts the attention of multiple, advanced attackers, with stealthy abilities to evade security policies, ex-filter information or exploit vulnerabilities. Some real-life events and registers in CERTs have already clearly demonstrated how the control industry can become vulnerable to multiple types of advanced threats whose focus consists in hitting the safety and security of the control processes. This book, therefore, comprises a detailed spectrum of research papers with highly analytical content and actuation procedures to cover the relevant security and privacy issues such as data protection, awareness, response and resilience, all of them working at optimal times. Readers will be able to comprehend the construction problems of the fourth industrial revolution and are introduced to effective, lightweight protection solutions which can be integrated as part of the new IIoT-based monitoring ecosystem."@en ;
    schema:description "Intro; Preface; Contents; List of Abbreviations; Part I Security Analysis and Advanced Threats; Securing Industrial Control Systems; 1 Introduction; 2 Urban Myths; 3 Information Technology; 3.1 Operational Technology; 4 ICS Security Properties; 4.1 Controllability, Observability and Operability; 4.2 Ensuring ICS Security; 5 IT Defenses; 5.1 Cryptography; 5.2 Intrusion Detection; 5.3 Trusted Computing; 6 Safety vs. Security; 6.1 Information Technology in an OT Environment; 6.1.1 Security Updates; 6.1.2 System Shutdown; 6.1.3 Software Security; 6.2 Independence Assumptions"@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/9358315250#Person/alcatraz_cristina> ; # Cristina Alcatraz
    schema:exampleOfWork <http://worldcat.org/entity/work/id/9358315250> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Software"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/9358315250#Series/advanced_sciences_and_technologies_for_security_applications> ; # Advanced sciences and technologies for security applications.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/9358315250#CreativeWork/security_and_privacy_trends_in_the_industrial_internet_of_things> ;
    schema:name "Security and privacy trends in the industrial internet of things"@en ;
    schema:productID "1102469382" ;
    schema:url <http://ezsecureaccess.balamand.edu.lb/login?url=https://doi.org/10.1007/978-3-030-12330-7> ;
    schema:url <https://link.springer.com/10.1007/978-3-030-12330-7> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=5776085> ;
    schema:url <https://doi.org/10.1007/978-3-030-12330-7> ;
    schema:url <https://ezproxy.lau.edu.lb:2443/login?url=https://doi.org/10.1007/978-3-030-12330-7> ;
    schema:url <https://ezproxy.library.dal.ca/login?url=https://doi.org/10.1007/978-3-030-12330-7> ;
    schema:url <http://ezaccess.libraries.psu.edu/login?url=https://doi.org/10.1007/978-3-030-12330-7> ;
    schema:workExample <http://worldcat.org/isbn/9783030123321> ;
    schema:workExample <http://worldcat.org/isbn/9783030123307> ;
    schema:workExample <http://worldcat.org/isbn/9783030123314> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-030-12330-7> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB9B4647> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1102469382> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/9358315250#Person/alcatraz_cristina> # Cristina Alcatraz
    a schema:Person ;
    schema:familyName "Alcatraz" ;
    schema:givenName "Cristina" ;
    schema:name "Cristina Alcatraz" ;
    .

<http://experiment.worldcat.org/entity/work/data/9358315250#Series/advanced_sciences_and_technologies_for_security_applications> # Advanced sciences and technologies for security applications.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1102469382> ; # Security and privacy trends in the industrial internet of things
    schema:name "Advanced sciences and technologies for security applications." ;
    schema:name "Advanced Sciences and Technologies for Security Applications" ;
    .

<http://experiment.worldcat.org/entity/work/data/9358315250#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9358315250#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://worldcat.org/entity/work/data/9358315250#CreativeWork/security_and_privacy_trends_in_the_industrial_internet_of_things>
    a schema:CreativeWork ;
    rdfs:label "Security and Privacy Trends in the Industrial Internet of Things" ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1102469382> ; # Security and privacy trends in the industrial internet of things
    .

<http://worldcat.org/isbn/9783030123307>
    a schema:ProductModel ;
    schema:isbn "3030123308" ;
    schema:isbn "9783030123307" ;
    .

<http://worldcat.org/isbn/9783030123314>
    a schema:ProductModel ;
    schema:isbn "3030123316" ;
    schema:isbn "9783030123314" ;
    .

<http://worldcat.org/isbn/9783030123321>
    a schema:ProductModel ;
    schema:isbn "3030123324" ;
    schema:isbn "9783030123321" ;
    .

<https://ezproxy.library.dal.ca/login?url=https://doi.org/10.1007/978-3-030-12330-7>
    rdfs:comment "Unlimited access available" ;
    rdfs:comment "Access restricted: DAL users only" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.