ebook img

Cyber Security Applications for Industry 4.0 PDF

258 Pages·2023·13.439 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cyber Security Applications for Industry 4.0

Cyber Security Applications for Industry 4.0 Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering defined as Smart systems. It is eminent that Cyber-P hysical Systems (CPS) provide accurate, real-t ime monitoring and control for smart applications and services. With better access to information from real-t ime manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve effi- ciency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulner- abilities in an organization’s technology, including limited security mecha- nisms and logs, make a move to smart systems particularly challenging. Features: • Proposes a conceptual framework for Industry 4.0-b ased Cyber Security Applications concerning the implementation aspect • Creates new business models for Industrialists on Control Systems and provides productive workforce transformation • Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and plan- ning to work in the new area of Industry 4.0 • Addresses the protection of plants from frost and insects, automatic hydroponic irrigation techniques, smart industrial farming, and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0- enabled connected systems and their limitations. Chapman & Hall/CRC Cyber-Physical Systems Series Editors: Jyotir Moy Chatterjee Lord Buddha Education Foundation, Kathmandu, Nepal Vishal Jain Sharda University, Greater Noida, India Cyber-Physical Systems: A Comprehensive Guide By: Nonita Sharma, L K Awasthi, Monika Mangla, K P Sharma, and Rohit Kumar Introduction to the Cyber Ranges By: Bishwajeet Pandey and Shabeer Ahmad Security Analytics: A Data Centric Approach to Information Security By: Mehak Khurana and Shilpa Mahajan Security and Resilience of Cyber Physical Systems By: Krishan Kumar, Sunny Behal, Abhinav Bhandari, and Sajal Bhatia Cyber Security Applications for Industry 4.0 By: R Sujatha, G Prakash, and Noor Zaman Jhanjhi For more information on this series please visit: https://www.routledge.com/ Chapman--HallCRC-Cyber-Physical-Systems/book-series/CHCPS?pd=published,f orthcoming&pg=1&pp=12&so=pub&view=list?pd=published,forthcoming&pg=1 &pp=12&so=pub&view=list Cyber Security Applications for Industry 4.0 Edited by R Sujatha G Prakash Noor Zaman Jhanjhi Cover image: Akash Sain/Shutterstock First edition published 2023 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2023 selection and editorial matter, R Sujatha, G Prakash, Noor Zaman Jhanjhi; individual chapters, the contributors Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www. copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. ISBN: 978-1-032-06620-2 (hbk) ISBN: 978-1-032-06621-9 (pbk) ISBN: 978-1-003-20308-7 (ebk) DOI: 10.1201/9781003203087 Typeset in Palatino by SPi Technologies India Pvt Ltd (Straive) Contents Preface .....................................................................................................................vii About the Editors ......................................................................................................ix Contributors ...........................................................................................................xiii 1. A Detailed Investigation of Popular Attacks on Cyber Physical Systems .............................................................................................1 Vatsal Vatsyayan, Agnim Chakraborty, G. Rajarajan, and A. Leo Fernandez 2. Applying Agile Practices in the Development of Industry 4.0 Applications ............................................................................43 Carlos Ankora and D. Aju 3. A Review of Security Vulnerabilities in Industry 4.0 Application and the Possible Solutions Using Blockchain ..................63 Mangayarkarasi Ramaiah, Vasavi Chithanuru, Adla Padma, and Vinayakumar Ravi 4. The Role of Cutting-Edge Technologies in Industry 4.0 .......................97 Imdad Ali Shah, Noor Zaman Jhanjhi, Fathi Amsaad, and Abdul Razaque 5. Secure IoT Protocol for Implementing Classified Electroencephalogram (EEG) Signals in the Field of Smart Healthcare .........................................................................................111 S. Saravanan, M. Lavanya, Chandra Mouli Venkata Srinivas, M. Arunadevi, and N. Arulkumar 6. Cybersecurity for Critical Energy Protection in Smart Cities ............131 S. Karthi, N. Narmatha, and M. Nandhini 7. Emerging Industry Revolution IR 4.0 Issues and Challenges ...........151 Azeem Khan, Noor Zaman Jhanjhi, and R. Sujatha 8. IIoT-Based Secure Smart Manufacturing Systems in SMEs ..............171 S. Karthi, N. Narmatha, and M. Kalaiyarasi v vi Contents 9. The Role of Cybersecurity in Smart Cities ............................................195 Azeem Khan, Noor Zaman Jhanjhi, and Mamoona Humayun 10. A Theoretical Framework on Enhancing Cloud Storage Security through Customized ECC Key Management Technique ....................209 G. Prakash, and M. Kiruthigga Index ......................................................................................................................233 Preface “I really think that if we change our own approach and thinking about what we have available to us, that is what will unlock our ability to truly excel in security. It’s a perspective exercise. What would it look like if abundance were the reality and not resource constraint?” -Greg York, VP, Information Security, Tribune Media, at SecureWorld Chicago The Fourth Industrial Revolution (Industry 4.0) explores the digitization of Conventional Manufacturing and Control Systems. Industry 4.0 is considered the dawn of “Cyber-P hysical Systems (CPS)” which entirely involves innova- tive competencies for the researchers and people involved. Today, the CPS and IoT devices deployed in the Industrial Control Systems are the blended machines that operate in conjunction with the legacy instruments, which lack sufficient security controls over data manipulation. The risks and threats asso- ciated with the Industry 4.0 systems will create an avenue for potential attack surfaces and vectors. This book series aims to provide a detailed review, anal- ysis, and investigation of CPS and the security vulnerabilities that lead to the new path for both academic and professional researchers. The Editors of Cyber Security Applications for Industry 4.0 (CSAI 4.0) intended to publish this book for the integrated engineering disciplines of Computer Science, Mechanical, Electrical, and Electronics Engineering. It cov- ers the conceptual view of CPS, including current technological revolutions, challenges, and the fusion of CPS with IoT and Energy systems. This book’s chapters will bring together the various sectors of industry. The amalgam- ating structure of CPS contributes to the academia and education sector to open up seamless practical solutions for Healthcare, Agriculture, and Power Grid applications. We received 20 chapters from different authors creating an enduring techno- platform between academia, industry, and research groups. After meticulously scrutinizing all the submissions, ten chapters have been selected and considered for publishing. The book is structured into ten chapters, with the following primary features: • Coverage of principles of the Cyber- Physical Systems • Discussions on recent developments in Industry 4.0 • Deliberation of technological advancements in diversified domains • Adequate content for Undergraduate, Postgraduate, and Ph.D. stu- dents who aim for comprehensive knowledge in CPS. vii viii Preface The Publication Partner for CSAI 4.0 is an eminent American publishing group – CRC Press – that specializes in producing technical books. CRC Press is now under the aegis of renowned Routledge Taylor and Francis Group. We want to express our heartfelt gratitude to the Publishing team for their invaluable assistance and guidance throughout the process of getting our book chapters published swiftly. We thank all the authors for submitting the good- quality book chapters and express our humble gratefulness to vari- ous experts who helped us in the review process with valuable suggestions. Lastly, we appreciate the great teamwork put forward to host this book on CSAI 4.0. R Sujatha G Prakash Noor Zamam Jhanjhi About the Editors Prof. Dr. R. Sujatha completed her Ph.D. degree at Vellore Institute of Technology, Vellore, India, in 2017, in the area of data mining. She received her M.E. degree in Computer Science from Anna University, India, in 2009 with university ninth rank and did a Master of Financial Management from Pondicherry University, India, in 2005. She received her B.E. degree in Computer Science from Madras University, India, in 2001. She has 17 years of teaching experience and has been serving as an associate professor in the School of Information Technology and Engineering in Vellore Institute of Technology, Vellore. She has organized and attended a number of workshops and faculty development programs. She actively involves herself in the growth of the institute by contributing to various committees at both academic and admin- istrative levels. She used to guide projects for undergraduate and postgradu- ate students and currently guides doctoral students. She gives technical talks in colleges for symposiums and various sessions. She acts as an advisory, editorial member, and technical committee member in conferences con- ducted in other educational institutions and in- house too. She has published a book titled Software Project Management for College Students. She has also published research articles in reputed high- impact journals. The Institution of Green Engineers awarded her IGEN Women Achiever 2021 award in the Future Computing category. She is interested in exploring different places and visiting them to know about the culture and people of various areas. She is interested in learning upcoming things and gets herself acquainted with the student’s level. Her areas of research interest include Information Management and Data Analytics, Artificial Intelligence, Soft Computing, Medical AI, Big Data, Deep Learning, and Blockchain Software Engineering Dr. G. Prakash is working as an Assistant Professor (Selection Grade) in the Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham University, Bengaluru campus, India. He is currently guiding six Ph.D. scholars and two postgraduate scholars specifically in the domain area of Cyber Security. He served as the Session Chair for the Special sessions of ISIC 2021 and ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.