Vtome.ru - электронная библиотека

Access Control Models and Architectures For IoT and Cyber Physical Systems

  • Добавил: literator
  • Дата: 7-02-2022, 04:20
  • Комментариев: 0
Access Control Models and Architectures For IoT and Cyber Physical SystemsНазвание: Access Control Models and Architectures For IoT and Cyber Physical Systems
Автор: Maanak Gupta, Smriti Bhatt
Издательство: Springer
Год: 2022
Страниц: 182
Язык: английский
Формат: pdf (true), epub
Размер: 29.6 MB

This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS.

The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms.

Internet of Things (IoT) and Cyber Physical Systems (CPS) present the integration of the physical and digital worlds, offering a range of intelligent applications from manufacturing, transportation, energy, medical, buildings, and beyond. These promising paradigms, often used interchangeably, integrate multitude of heterogenous, mobile, and dispersed physical smart devices which gather data from the environment and react to the needs offering automated experience to the end user. These systems incorporate entities and components from variety of sources that specify communication protocols, network requirements, physical resources characteristics, and real-time sensing and control using the capabilities of cloud, edge, or hybrid third-party services. CPS entails a distributed and dynamic ecosystem built with the Internet of Things as its backbone. These systems are becoming increasingly data rich, enabling new, unforeseen, and greater degrees of automation and autonomy to make our lives smarter.

Security and privacy are critical aspects when it comes to the wider deployment and adoption of CPS and IoT systems. These systems are subject to increasing threats and attacks from adversaries including state-sponsored and foreign-based entities. Cybersecurity threats exploit the proliferated distributed nature, complexity, physical and digital resources, multi domain, and connectivity of critical infrastructure systems, which are important for a nation’s critical resources, putting them at serious risk. To cater these growing needs, it is important to identify and develop novel security mechanisms which are fundamentally different than the one usually used in single-domain enterprise like information computer systems.

Access control and authorization mechanisms have been widely used to limit and control unauthorized access to resources and assets of an organization to ensure confidentiality and integrity of the system. Conventional access control models including discretionary (DAC), mandatory (MAC), and role-based access control (RBAC) have been designed considering single-domain enterprise applications usually managed by a set of administrators and countable number of users in an organization. However, such models are difficult and expensive to adapt to distributed IoT and CPS systems, which are having thousands if not millions of smart connected devices that are managed across multiple domains within a single business unit. The dynamic and distributed behavior along with the introduction of multiple edge and cloud layers make it even harder to control resources and data which are gathered by them from the environment. We need to have a bigger picture of this connected ecosystem and develop a bottom-up approach with underlying fundamental technologies and frameworks to have a holistic solution to this cyber-elephant IoT and CPS security problem.

This book is designed to serve the computer science and the cybersecurity community including researchers, academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.

Скачать Access Control Models and Architectures For IoT and Cyber Physical Systems



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.