Cyber-Physical Systems -  - E-Book

Cyber-Physical Systems E-Book

0,0
173,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

CYBER-PHYSICAL SYSTEMS The 13 chapters in this book cover the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement of existing technology such as machine learning, big data and robotics. Cyber-Physical Systems (CPS) is the interconnection of the virtual or cyber and the physical system. It is realized by combining three well-known technologies, namely "Embedded Systems," "Sensors and Actuators," and "Network and Communication Systems." These technologies combine to form a system known as CPS. In CPS, the physical process and information processing are so tightly connected that it is hard to distinguish the individual contribution of each process from the output. Some exciting innovations such as autonomous cars, quadcopter, spaceships, sophisticated medical devices fall under CPS. The scope of CPS is tremendous. In CPS, one sees the applications of various emerging technologies such as artificial intelligence (AI), Internet of Things (IoT), machine learning (ML), deep learning (DL), big data (BD), robotics, quantum technology, etc. In almost all sectors, whether it is education, health, human resource development, skill improvement, startup strategy, etc., one sees an enhancement in the quality of output because of the emergence of CPS into the field. Audience Researchers in Information technology, artificial intelligence, robotics, electronics and electrical engineering.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 458

Veröffentlichungsjahr: 2022

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Title Page

Copyright

Preface

Acknowledgement

1 A Systematic Literature Review on Cyber Security Threats of Industrial Internet of Things

1.1 Introduction

1.2 Background of Industrial Internet of Things

1.3 Literature Review

1.4 The Proposed Methodology

1.5 Experimental Requirements

1.6 Conclusion

References

2 Integration of Big Data Analytics Into Cyber-Physical Systems

2.1 Introduction

2.2 Big Data Model for Cyber-Physical System

2.3 Big Data and Cyber-Physical System Integration

2.4 Storage and Communication of Big Data for Cyber-Physical System

2.5 Big Data Processing in Cyber-Physical System

2.6 Applications of Big Data for Cyber-Physical System

2.7 Security and Privacy

2.8 Conclusion

References

3 Machine Learning: A Key Towards Smart Cyber-Physical Systems

3.1 Introduction

3.2 Different Machine Learning Algorithms

3.3 ML Use-Case in MATLAB

3.4 ML Use-Case in Python

3.5 Conclusion

References

4 Precise Risk Assessment and Management

4.1 Introduction

4.2 Need for Security

4.3 Different Kinds of Attacks

4.4 Literature Survey

4.5 Proposed Work

4.6 Conclusion

References

5 A Detailed Review on Security Issues in Layered Architectures and Distributed Denial Service of Attacks Over IoT Environment

5.1 Introduction

5.2 IoT Components, Layered Architectures, Security Threats

5.3 Taxonomy of DDoS Attacks and Its Working Mechanism in IoT

5.4 Existing Solution Mechanisms Against DDoS Over IoT

5.5 Challenges and Research Directions

5.6 Conclusion

References

6 Machine Learning and Deep Learning Techniques for Phishing Threats and Challenges

6.1 Introduction

6.2 Phishing Threats

6.3 Deep Learning Architectures

6.4 Related Work

6.5 Analysis Report

6.6 Current Challenges

6.7 Conclusions

References

7 Novel Defending and Prevention Technique for Man-in-the-Middle Attacks in Cyber-Physical Networks

7.1 Introduction

7.2 Literature Review

7.3 Classification of Attacks

7.4 Proposed Algorithm of Detection and Prevention

7.5 Results and Discussion

7.6 Conclusion and Future Scope

References

8 Fourth Order Interleaved Boost Converter With PID, Type II and Type III Controllers for Smart Grid Applications

8.1 Introduction

8.2 Modeling of Fourth Order Interleaved Boost Converter

8.3 Controller Design for FIBC

8.4 Computational Results

8.5 Conclusion

References

9 Industry 4.0 in Healthcare IoT for Inventory and Supply Chain Management

9.1 Introduction

9.2 Benefits and Barriers in Implementation of RFID

9.3 IoT-Based Inventory Management—Case Studies

9.4 Proposed Model for RFID-Based Hospital Management

9.5 Conclusion and Future Scope

References

10 A Systematic Study of Security of Industrial IoT

10.1 Introduction

10.2 Overview of Industrial Internet of Things (Smart Manufacturing)

10.3 Industrial Reference Architecture

10.4 FIWARE Generic Enabler (FIWARE GE)

10.5 Discussion

10.6 Conclusion

References

11 Investigation of Holistic Approaches for Privacy Aware Design of Cyber-Physical Systems

11.1 Introduction

11.2 Popular Privacy Design Recommendations

11.3 Current Privacy Challenges in CPS

11.4 Privacy Aware Design for CPS

11.5 Limitations

11.6 Converting Risks of Applying AI Into Advantages

11.7 Conclusion and Future Scope

References

12 Exposing Security and Privacy Issues on Cyber-Physical Systems

12.1 Introduction to Cyber-Physical Systems (CPS)

12.2 Cyber-Attacks and Security in CPS

12.3 Privacy in CPS

12.4 Conclusion & Future Trends in CPS Security

References

13 Applications of Cyber-Physical Systems

13.1 Introduction

13.2 Applications of Cyber-Physical Systems

13.3 Conclusion

References

Index

End User License Agreement

List of Illustrations

Chapter 1

Figure 1.1 Challenges in artificial intelligence-based IIoT security model.

Figure 1.2 The industrial revolutions.

Figure 1.3 Deep incremental learning-based IIoT security model.

Chapter 3

Figure 3.1 (a) Structure of basic artificial neuron, (b) sigmoidal activation fu...

Figure 3.2 (a) SVM Classifier and (b) structure of confusion matrix.

Figure 3.3 Classification learner app in Matlab.

Chapter 4

Figure 4.1 Cyber threats area-wise.

Figure 4.2 Malware infections year-wise.

Figure 4.3 Simulated results.

Chapter 5

Figure 5.1 Applications of IoT.

Figure 5.2 Growth of IoT devices in billions.

Figure 5.3 DDoS capable IoT malware growth.

Figure 5.4 IoT components.

Figure 5.5 3-Layer architecture.

Figure 5.6 4-Layer architecture.

Figure 5.7 5-Layer architecture.

Figure 5.8 Phases of DDoS attack.

Figure 5.9 (a) Agent-Handler Model; (b) Reflector Model; (c) IRC based model; (d...

Figure 5.10 Working mechanism of DDoS attacks.

Chapter 6

Figure 6.1 Phishing fraud [22]. (a) Gender wise phishing victims. (b) Age wise p...

Figure 6.2 Analysis report on phishing fraud. (a) Total no. of phishing articles...

Chapter 7

Figure 7.1 Different layers in a cyber-physical network.

Figure 7.2 Attacker creating a rogue access point with the same SSID and forcing...

Figure 7.3 Diagram showing a typical network with two different devices connecte...

Figure 7.4 Diagram showing attacker spoofing the access point as the victim and ...

Figure 7.5 A spoofed network with attacker as man in the middle hijacking every ...

Figure 7.6 A typical DNS server with records stored to resolve domain names to t...

Figure 7.7 Diagram showing how every request made by any user is first redirecte...

Figure 7.8 DNS server responding with a redirection request to the user for the ...

Figure 7.9 Attacker using DNS spoofing to redirect any request by the user to it...

Figure 7.10 mDNS spoofing attack by capturing every broadcast request and spoofi...

Figure 7.11 ARP table of a typical network with 192.168.0.1 as the gateway and o...

Figure 7.12 ARP table of a spoofed network with two different IP 192.168.0.1 and...

Figure 7.13 The ARP detection script explained using a detailed algorithm with a...

Figure 7.14 A test web page was developed, when the attacker tries to become man...

Figure 7.15 Script asking the user if he/she wants to disconnect from the networ...

Figure 7.16 User disconnected from the attacked network on choosing to disconnec...

Figure 7.17 No action taken even under ARP attack as the user decided to continu...

Figure 7.18 Algorithm for creation of SSL Certificates and its validation to pre...

Figure 7.19 A spoofed login page of Facebook.com but the domain contains three o...

Figure 7.20 Steps implemented in detection of DNS spoofing script and testing th...

Chapter 8

Figure 8.1 General configuration of fourth order interleaved boost converter.

Figure 8.2 General configuration of fourth order boost converter.

Figure 8.3 Mode 1 operation of FIBC.

Figure 8.4 Mode 2 operation of FIBC.

Figure 8.5 Mode 3 operation of FIBC.

Figure 8.6 Mode 4 operation of FIBC.

Figure 8.7 Root locus of G

vd

.

Figure 8.8 Root locus of G

vg

.

Figure 8.9 Comparison of Bode plots of the two transfer function of FIBC.

Figure 8.10 Response of FIBC with Type II controller.

Figure 8.11 Bode diagram of FIBC with Type II controller.

Figure 8.12 Root locus of FIBC with Type II controller.

Figure 8.13 Response of FIBC with PID controller.

Figure 8.14 FIBC with Type III controller.

Figure 8.15 FIBC with Type III controller-magnitude and phase plot.

Figure 8.16 Root locus of FIBC with Type III controller.

Figure 8.17 Comparison of the different controllers in closed loop operation.

Figure 8.18 Comparison of the bode response of different controllers in closed l...

Figure 8.19 Comparison of the three different controllers when 50% of reference ...

Figure 8.20 Comparison of the three different controllers when 50% of reference ...

Figure 8.21 Comparison of the changes in 10% of input voltage for different cont...

Figure 8.22 Comparison of the load regulation by adding additional load voltage ...

Figure 8.23 Ripple in the output of FIBC.

Chapter 9

Figure 9.1 Basic components of RFID based system.

Figure 9.2 IoT and RFID for hospital inventory control.

Figure 9.3 Working principle of RFID enabled tracking.

Figure 9.4 Automation of drug-supply.

Figure 9.5 Automated employee attendance.

Figure 9.6 Automation of SCM in Healthcare 4.0.

Figure 9.7 Working of automated theft detection system.

Figure 9.8 Tracking patients using RFIDs.

Figure 9.9 Automated complete solution to manage hospital.

Figure 9.10 Architecture of proposed model.

Figure 9.11 Working principle of proposed model.

Figure 9.12 Automation of inventory and pharmacy management.

Figure 9.13 Tracking of Patients and Localization using RFIDs.

Figure 9.14 Tracking of all entities in the hospital.

Figure 9.15 Modules in proposed system.

Chapter 10

Figure 10.1 Components model showing a unified perspective of IoT and CPS.

Figure 10.2 The traditional automation hierarchy of ISA-95.

Figure 10.3 OPC UA stack overview.

Figure 10.4 OPC UA information modeling framework.

Figure 10.5 The FIWARE principle components.

Figure 10.6 NGSIv2 data model conceptual diagram.

Figure 10.7 UML representation of NGSI-LD information model.

Figure 10.8 FIWARE IoT stack (Inspired by FIWARE Tour Guide).

Figure 10.9 Device to NGSI mapping interactions.

Figure 10.10 MQTT binding interactions of IoT Agent-JSON.

Figure 10.11 Request forwarding diagram of context provider.

Figure 10.12 A reference architecture for smart industry powered by FIWARE.

Chapter 12

Figure 12.1 Essential elements of CPS.

Figure 12.2 Cyber-attacks of CPS.

Figure 12.3 Future scope for CPS.

Chapter 13

Figure 13.1 Building blocks of cyber-physical systems.

List of Tables

Chapter 1

Table 1-1 Comparison charts.

Chapter 3

Table 3.1 Sample data set for power system fault classification.

Table 3.2 Code for data normalization in Matlab.

Table 3.3 A sample regression implementation through Matlab m-file.

Table 3.4 A sample Classification implementation through Matlab m-file.

Table 3.5 Calling the libraries in python.

Table 3.6 Logistic regression and K nearest neighbor algorithm in python.

Table 3.7 Regression algorithm in python.

Chapter 4

Table 4.1 Notations used in the contribution.

Table 4.2 Representation of sources and its priorities.

Table 4.3 Simulation parameters.

Chapter 5

Table 5.1 Attacks in every layer of IoT architecture.

Table 5.2 Summary of existing countermeasures against DDoS attacks.

Table 5.3 DDoS capable malwares.

Chapter 6

Table 6.1 Categories of electronic mail frauds.

Table 6.2 Categories of phishing extortion.

Table 6.3 Categories of extortion fraud.

Table 6.4 Categories of social media scam.

Table 6.5 Categories of tourism fraud.

Table 6.6 Categories of excise fraud.

Table 6.7 Deep learning architectures.

Table 6.8 CNN models.

Table 6.9 RNN variants.

Table 6.10 LSTM variants.

Table 6.11 Machine Learning approach.

Table 6.12 Neural network approach.

Table 6.13 Deep learning approach.

Chapter 8

Table 8.1 Converter parameters.

Table 8.2 Comparison of different controllers in closed loop performance.

Chapter 9

Table 9.1 Success results of implementing IoT inventory system at BJC healthcare...

Guide

Cover

Table of Contents

Title Page

Copyright

Preface

Acknowledgement

Begin Reading

Index

End User License Agreement

Pages

v

ii

iii

iv

xv

xvi

xvii

xix

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

Scrivener Publishing

100 Cummings Center, Suite 541J

Beverly, MA 01915-6106

Publishers at Scrivener

Martin Scrivener ([email protected])

Phillip Carmical ([email protected])

Cyber-Physical Systems

Foundations and Techniques

Edited by

Uzzal Sharma

Parma Nand

Jyotir Moy Chatterjee

Vishal Jain

Noor Zaman Jhanjhi

and

R. Sujatha

This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA

© 2022 Scrivener Publishing LLC

For more information about Scrivener publications please visit www.scrivenerpublishing.com.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

Wiley Global Headquarters

111 River Street, Hoboken, NJ 07030, USA

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Limit of Liability/Disclaimer of Warranty

While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.

Library of Congress Cataloging-in-Publication Data

ISBN 978-1-119-83619-3

Cover image: Pixabay.Com

Cover design by Russell Richardson

Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines

Printed in the USA

10 9 8 7 6 5 4 3 2 1

Preface

Cyber-Physical Systems (CPS) is the interconnection of the virtual or cyber and the physical system. It is realized by combining three well-known technologies namely “Embedded Systems”, “Sensors and Actuators” and “Network and Communication System”. These technologies combine to form a system known as CPS. In CPS the physical process and information processing are so tightly connected that it is hard to distinguish the individual contribution of each process from the output. Some of the exciting innovations such as autonomous cars, quadcopter, space ships, sophisticated medical devices fall under CPS. The scope of CPS is tremendous. In CPS, we can see the applications of various emerging technologies such as artificial intelligence, Internet of Things (IoT), machine learning (ML), deep learning (DL), big data (BD), robotics, quantum technology, etc. Almost in all the sectors whether it is education, health, human resource development, skill improvement, startup strategy, etc., we see an enhancement in the quality output, which is because of the emergence of CPS into the field. The CPS is considered the upcoming industry revolution.

This book is covering the different aspects associated with the CPS, such as algorithms, application areas, improvement of existing technology to name a few. The book has 13 quality chapters written by experts in their field. The details of each chapter are as follows:

Chapter 1 presents a systematic literature review on cyber security threats of the industrial Internet of Things (IIoT). In recent years, the IIoT has become one of the popular technologies among Internet users for transportation, business, education, and communication development.

Chapter 2 explains the integration of big data analytics into CPS. The evolving CPS technology advances BD analytics and processing. The control and management of BD are aided by the architecture of CPS with cyber layer, physical layer, and communication layer is designed which not only integrates but also helps CPS in decision-making.

Chapter 3 deals with the basics of machine learning techniques. Embedding these techniques in a CPS can make the system intelligent and user-friendly. ML aims to develop computer programs, that not only process the data to generate output, but also gain information from that data simultaneously, to improve its performance in every next run.

Chapter 4 presents a precise risk assessment and management strategy.

Chapter 5 presents a detailed review on security issues in layered architectures and distributed denial service of attacks over the IoT environment: As a part of evolution, the current trend is the IoT, which brings automation to the next level via connecting the devices through the Internet, and its benefits are tremendous. Meanwhile, the threats and attacks are also evolving and become an unstoppable menace to IoT users and applications. This chapter addresses critical challenges and future research directions concerning IoT security that gives insights to the new researchers in this domain.

Chapter 6 presents ML and DL (deep learning) techniques for phishing threats and challenges: Internet security threats keep on rising due to the vulnerabilities and numerous attacking techniques. The swindlers who take skills over the vulnerable online services and get admission to the information of genuine people through these virtual features continue to expand. Security should prevent phishing attacks and to offer availability and confidentiality. The phishing attack using AI is discussed in this chapter.

Chapter 7 presents a novel defending and prevention technique for the man in the middle of attacks in cyber-physical networks: Man in the Middle Attack is a type of cyber-attack in which an unauthorized person enters the online network between the two users, avoiding the sight of both users. The scripts developed successfully defended the deployed virtual machines from the Man in the Middle Attacks. The main purpose behind this topic is to make readers beware of cyber-attacks.

Chapter 8 presents the fourth-order interleaved Boost Converter with PID, Type II and Type III controller for smart grid applications: Switched-mode power converters are an important component in interfacing renewable energy sources to smart grids and microgrids. The voltage obtained from power conversion is usually full of ripples. To minimize the ripple in the output, certain topological developments are made. This is made possible by controlling the converters using Type II and Type III controllers and the results are compared with PID controller. The performance is analyzed and compared in the Simulink environment. The transient and steady-state analysis is done for a better understanding of the system.

Chapter 9 presents Industry 4.0 in HealthCare IoT for inventory and supply chain management. Industry 4.0 is a setup reality that fulfills various necessities of the clinical field with expansive assessment. Radio Frequency Identification (RFID) advancement does not simply offer the capacity to discover stuff, supplies, and people persistently, but it also gives capable and exact permission to clinical data for prosperity specialists.

Chapter 10 presents a systematic literature review on the security aspects of the Industrial IoT.

Chapter 11 acts as a readymade guide to researchers who want to know how to lay foundations towards a privacy-aware CPS architecture.

Chapter 12 explains the possible privacy and security issues of CPS.

Chapter 13 presents a review of the various application of the CPS.

Uzzal Sharma, Assam, IndiaParma Nand, Greater Noida, IndiaJyotir Moy Chatterjee, Kathmandu, NepalVishal Jain, Greater Noida, IndiaNoor Zaman Jhanjhi, Subang Jaya, MalaysiaR. Sujatha, Vellore, IndiaApril 2022

Acknowledgement

I would like to acknowledge the most important people in my life, i.e., my grandfather Late Shri. Gopal Chatterjee, grandmother Late Smt. Subhankori Chatterjee, my father Shri. Aloke Moy Chatterjee, my Late mother Ms. Nomita Chatterjee & my uncle Shri Moni Moy Chatterjee. The is book has been my long-cherished dream which would not have been turned into reality without the support and love of these amazing people. They have continuously encouraged me despite my failure to give them the proper time and attention. I am also grateful to my friends, who have encouraged and blessed this work with their unconditional love and patient.

Jyotir Moy ChatterjeeDepartment of ITLord Buddha Education Foundation(Asia Pacific University of Technology & Innovation)Kathmandu, Nepal-44600

2Integration of Big Data Analytics Into Cyber-Physical Systems

Nandhini R.S.*and Ramanathan L.

Computer Science and Engineering, Vellore Institute of Technology, Vellore, India

Abstract

The evolving Cyber-Physical Systems technology advances the big data analytics and processing. The chapter discusses the topics of Big Data which are required for Cyber-Physical Systems across all data streams including the heterogeneous data resource integration. The challenges such as integration of data generated from multiple sources into cyber-physical systems, big data for conventional databases and offline processing, scalability are further considered. The control and management of big data is aided by the architecture of cyber-physical system with cyber layer, physical layer and communication layer is designed which not only integrates but also helps cyber-physical system in decision making. The case study that aids big data processing and analytics in cyber-physical system is stated.

Keywords: Cyber-Physical systems, big data analytics and processing, Internet of Things, data mining

2.1 Introduction

The rapid growth in things or devices in particular sensors and actuators made the development to control the smart physical things, smart objects and digital technologies such as machines in smart manufacturing and structures in smart cities, etc. possible. The communication technologies and physical devices are merged to generate systems that are effective, productive, safe called intelligent systems, where the integrations and interactions are combined to create a global cyber-physical system. A cyber-physical system is the association of cyber and physical components that have been specifically engineered to monitor, coordinate and control based on computational algorithms. It is a 3C technology—communication, computation, and control. Cyber-physical systems capture the data from the wireless sensor devices and monitor them, the control of the physical devices is based on the physical data using actuators, thus interacting both with the physical and cyber world in the real environment. These systems are interconnected with each other on a universal scale using different network and communication resources. The physical control is efficient when the data collected from the sensors are processed for information with data mining techniques. The interaction among the users from context perspective, the physical device’s surroundings and the process in the cyber-physical systems are observed when the features of cyber-physical system are considered. However, the integration rules, interoperation among the devices, control of cyber-physical system are the functions that are globally distributed and networked in real-time [1]. This system is used extensively in many applications such as industries, transport and vehicular industry, medical and health management, smart grids, military applications, weather forecasting and many more.