Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable.
Key features:
- Focuses on the computational intelligence techniques of security system design
- Covers applications and algorithms of discussed computational intelligence techniques
- Includes convergence-based and enterprise integrated security systems with their applications
- Explains emerging laws, policies, and tools affecting the landscape of cyber security
- Discusses application of sensors toward the design of security systems
This book will be useful for graduate students and researchers in electrical, computer
engineering, security system design and engineering.
Author(s): Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan
Series: Computational Intelligence Techniques
Publisher: CRC Press
Year: 2022
Language: English
Pages: 182
City: Boca Raton
Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
Chapter 1 Analysis of Various Security Defense Frameworks in Different Application Areas of Cyber-Physical Systems
1.1 Introduction
1.2 History And Interpretation
1.3 CPS Architecture
1.3.1 Application Layer
1.3.2 Transmission Layer
1.3.3 Perception Layer
1.4 Cyber-Physical System Characteristics
1.5 Applications of CPS:
1.6 Security
1.7 Challenges and Issues Faced By CPS
1.7.1 Implementation of the Task in CPS
1.8 Risk Assessment
1.8.1 Asset Identification
1.8.2 Threat Identification
1.8.3 Vulnerability Identification
1.9 Cyber-Physical System Security
1.9.1 CPS Security Requirements
1.9.2 Cyber-Physical Systems Security Challenges
1.10 Cyber-Physical Systems Security Solutions
1.10.1 Solutions Based on Cryptography
1.10.1.1 Security Goals of Cyber-Physical Systems
1.10.2 Solutions Based on Non-Cryptography
References
Chapter 2 Role and Development of Security Architecture and Models in Software Systems
2.1 Introduction
2.2 Concepts in Secured System Architecture
2.3 Security Models
2.3.1 Categories of Security Models
2.3.1.1 State Machine Models
2.3.1.2 Information Flow Models
2.3.1.3 Non-Interference Models
2.3.2 Overview of Some Security Models
2.3.2.1 Bell-LaPadula Model
2.3.2.2 Biba Model
2.3.2.3 Clark-Wilson Model
2.3.2.4 Brewer and Nash Model (Chinese Wall Model)
2.3.2.5 Graham-Denning Model
2.3.2.6 Harrison-Ruzzo-Ullman Model
2.3.3 Cloud Computing Security Models
2.3.3.1 Cloud Multiple-Tenancy Model
2.3.3.2 Cloud Risk Accumulation Model of CSA
2.3.3.3 Jerico Forum’s Cloud Cube Model
2.3.3.4 Mapping Model of Cloud, Security, and Compliance
2.4 Security Challenges and Security Requirements in Internet of Things (IoT) Architecture
2.5 Addressing Security Challenges in IoT with Artificial Intelligence (AI)
2.6 Study of Research Works on Security Architecture and Models
2.7 Conclusion
2.8 Future Scope
References
Chapter 3 The Role of IoT in the Design of a Security System
3.1 The Rise of Cyber Threats in IoT
3.2 Enterprise View of IoT for Security Systems
3.3 Future of IoT in Cyberspace
3.4 Fundamentals of Security Systems
3.5 Security Assessment of IoT Solutions
References
Chapter 4 IoT-Tangle Enhanced Security Systems
4.1 Introduction
4.2 Security Systems
4.3 Artificial Intelligence
4.3.1 Robotics
4.3.2 Health Care
4.3.3 Finance
4.3.4 Travel and Transportation
4.3.5 Social Media
4.3.6 E-Commerce
4.3.7 Marketing
4.4 Internet of Things
4.5 Blockchain
4.5.1 Cryptography
4.5.2 Public and Private Keys
4.5.3 Hash Functions
4.5.4 Consensus and Proof-of-Work
4.5.5 Solidity & Smart Contracts
4.5.6 Crypto Coins and DAPPS
4.6 IoT and Blockchain
4.6.1 Features of IoT
4.7 The Solution
4.8 Tangle
4.8.1 What Do We Get Out of Tangle in Place of Blockchain?
4.8.2 Tangle Transaction Issuance
4.9 Conclusion
References
Chapter 5 Recent Trends in 5G and Machine Learning, Challenges, and Opportunities
5.1 Introduction
5.2 Machine Learning
5.3 Neural Network
5.4 Applications of Machine Learning and 5G
5.5 Challenges in Machine Learning
5.6 Conclusion
References
Chapter 6 Hardware Trojans in Microfluidic Biochips: Principles and Practice
6.1 Introduction
6.2 Hardware Trojan
6.2.1 Overview
6.2.2 Characterization
6.2.3 Detection Mechanisms
6.3 Microfluidic Biochips
6.3.1 Background
6.3.2 Flow-Based Microfluidic Biochip
6.3.3 Droplet-Based Microfluidic Biochip
6.4 Hardware Trojans In Microfluidic Biochips
6.4.1 Overview
6.4.2 Threat Scenario
6.4.3 Trojan Activation
6.4.4 Trojan Effects
6.4.5 Trojan in DMFB
6.4.6 Trojan in FMFB
6.4.7 Defense Mechanisms
6.5 Conclusion And Future Scope
References
Chapter 7 Benefits and Risks of Cloud Computing
7.1 Cloud Computing
7.2 Desired Features of Cloud Computing
7.2.1 On-Demand Self-Service
7.2.2 Broad Network Access
7.2.3 Resource Pooling
7.2.4 Measured Service
7.2.5 Rapid Elasticity
7.3 Service Models of Cloud Computing
7.3.1 Software as a Service (SaaS)
7.3.2 Platform-as-a-Service (PaaS)
7.3.3 Infrastructure as a Service (IaaS)
7.4 Deployment Models of Cloud Computing
7.4.1 Public Cloud
7.4.2 Private Cloud
7.4.3 Hybrid Cloud
7.4.4 Community Cloud
7.5 Architecture of Cloud Computing
7.6 Benefits of Cloud Computing
7.6.1 Cost Reduction
7.6.2 Uninterrupted Services
7.6.3 Easy Implementation
7.6.4 Scalability
7.6.5 Green Computing
7.7 Challenges in Cloud Computing
7.8 Real-Time Example: Pitfalls in Amazon’s Cloud Security System
7.9 Security Issues and Challenges in Cloud Computing
7.9.1 Data Storage and Computing Security Issues
7.9.1.1 Data Storage
7.9.1.2 Data and Service Reliability and Availability
7.9.1.3 Cryptography
7.9.1.4 Cloud Data Recycling
7.9.1.5 Data Backup and Recovery
7.9.1.6 Security and Privacy
7.9.2 Internet and Services Related Security Issues
7.9.2.1 Advanced Repeated Threats and Venomous Outsiders
7.9.2.2 Internet Protocols
7.9.2.3 Web Services
7.9.2.4 Web Technologies
7.9.2.5 Service Availability
7.9.3 Network Security Issues
7.9.3.1 Mobile Networks
7.9.3.2 Circumference Security
7.9.3.3 XML Signature Element Wrapping
7.9.3.4 Browser Security
7.9.3.5 SQL (Structured Query Language) Injection Attack
7.9.4 Access Control Issues
7.9.4.1 Physical Access
7.9.4.2 User Credentials
7.9.4.3 Entity Authentication
7.9.5 Software Security Issues
7.9.5.1 Platforms and Frameworks
7.9.5.2 User Front-End
References
Chapter 8 Intrusion Detection Systems for Trending Cyberattacks
8.1 Introduction
8.2 Classification of Intrusion Detection Systems
8.2.1 Host Intrusion Detection Systems
8.2.2 Network-Based Intrusion Detection Systems
8.2.3 Protocol-Based Intrusion Detection Systems
8.2.4 Application Protocol-Based Intrusion Detection Systems
8.3 Hybrid Intrusion Detection Systems or Mixed Intrusion Detection Systems
8.4 Firewalls
8.4.1 Classification of Firewalls
8.4.2 Introduction to the Cyberattacks
8.4.2.1 Integrated
8.4.2.2 Structured
8.4.2.3 Massive
8.4.2.4 Reinforced
8.4.2.5 Not Spontaneous or Ad Hoc Attacks
8.4.2.6 Time and Resources are Limited
8.5 Trending Cyberattacks
8.6 Future Scope and Conclusion
References
Chapter 9 War of Control Hijacking: Attacks and Defenses
9.1 Introduction
9.1.1 Control Flow
9.1.2 Security Concerns
9.2 Control Hijacking
9.2.1 Buffer-Overflow Attacks
9.2.2 Stack-Based Buffer Overflows
9.2.3 Heap-Based Buffer Overflows
9.2.4 Return to libc
9.3 Return-Oriented Programming
9.4 Heap Spray Attacks
9.5 Integer Overflow Attacks
9.6 Format String Vulnerabilities
9.7 Defenses Against Control Hijacking
9.7.1 Platform Defenses
9.7.2 Fix Bugs
9.7.3 Rewriting Software
9.7.4 Non-Executable Memory (NEP)
9.7.5 Address Space Layout Randomization (ASLR)
9.7.6 Syscall Randomization
9.7.7 Instruction Set Randomization (ISR)
9.8 Runtime Defenses
9.8.1 Stackguard
9.8.2 Pointguard
9.8.3 Libsafe
9.8.4 Control-Flow Integrity
9.8.5 Control Point Integrity
9.9 Conclusion
References
Chapter 10 IoT Based Lightweight Cryptographic Schemes in Smart Healthcare
10.1 Introduction
10.2 What is IoT?
10.2.1 Some of the Most Common IoT Workplace Applications
10.2.2 What is IoT Security
10.2.3 Managed Internet of Things Devices
10.2.4 Security Issues With IoT
10.2.5 Threats to IoT Security Are Present in Businesses.
10.3 Lightweight Cryptography
10.4 Symmetric Key Cryptography
10.5 Public-Key Cryptography
10.6 Lightweight Cryptography with High Security
10.7 Lightweight Cryptography’s Power and Energy
10.7.1 Power Consumption Issues at an Algorithmic Level
10.7.2 Factors Related to Power Consumption at the Architecture Level
10.8 Identifying the Benefits and Demerits of Lightweight Ciphers
10.9 Conclusion
References
Index