Limit search to available items
Book Cover
E-book
Author IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (14th : 2020 : Arlington, Va.)

Title Critical infrastructure protection XIV : 14th IFIP WG 11. 10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised selected papers / Jason Staggs, Sujeet Shenoi (eds.)
Published Cham : Springer, 2020

Copies

Description 1 online resource (347 pages)
Series IFIP Advances in Information and Communication Technology ; 596
IFIP advances in information and communication technology ; 596.
Contents Intro -- Contents -- Contributing Authors -- Preface -- I AVIATION INFRASTRUCTURE SECURITY -- 1 CYBER-PHYSICAL SECURITY OF AIR TRAFFIC SURVEILLANCE SYSTEMS -- 1. Introduction -- 2. ADS-B System -- 3. Related Work -- 4. Threat Model -- 5. MSDND -- 6. Graph-Based Detection System -- 6.1 Finding Independent Paths -- 6.2 Eliminating Subpaths -- 7. MSDND Analysis -- 7.1 Altimeter Failure -- 7.2 GPS Satellite Failure -- 8. Conclusions -- Acknowledgement -- References -- 2 SIMULATION-BASED LOGIC BOMB IDENTIFICATION AND VERIFICATION FOR UNMANNED AERIAL VEHICLES -- 1. Introduction -- 2. Background
2.1 Critical Infrastructure Applications -- 2.2 Documented Vulnerabilities -- 2.3 Logic Bombs -- 2.4 Black Box Testing -- 3. Proposed Methodology -- 3.1 Goals -- 3.2 General Approach -- 3.3 Test Suite Overview -- 3.4 Logic Bomb Creation -- 3.5 Test Missions -- 4. Experimental Results and Analysis -- 4.1 Logic Bomb Effectiveness -- 4.2 Transit Mission -- 4.3 Circle Mission -- 4.4 Spline Circle Mission -- 4.5 Free Area Survey Mission -- 5. Conclusions -- References -- 3 ASSESSING THE CYBER RISK OF SMALL UNMANNED AERIAL VEHICLES -- 1. Introduction -- 2. Background and Related Work
3. Proposed Risk Assessment Framework -- 3.1 Base Metrics -- 3.2 Temporal Metrics -- 3.3 Environmental Metrics -- 4. Risk Scoring System -- 4.1 Base Score -- 4.2 Temporal Score -- 4.3 Environmental Score -- 5. Case Study -- 5.1 UAV Model 1 -- 5.2 UAV Model 2 -- 5.3 UAV Model 3 -- 5.4 Mission Scenario 1 -- 5.5 Mission Scenario 2 -- 5.6 Mission Scenario 3 -- 5.7 Risk Assessment Results -- 6. Analysis -- 6.1 Benefits -- 6.2 Drawbacks and Challenges -- 7. Conclusions -- References -- 4 CYBER STATE REQUIREMENTS FOR DESIGN AND VALIDATION OF TRUST IN THE CRITICAL TRANSPORTATION INFRASTRUCTURE
1. Introduction -- 2. Aviation Data Challenges -- 3. Data Trustworthiness -- 4. Data Protection -- 5. Data Collection and Analysis -- 6. Recommendations -- 7. Related Work -- 8. Conclusions -- Acknowledgements -- References -- II VEHICLE INFRASTRUCTURE SECURITY -- 5 AN EFFICIENT BLOCKCHAIN AUTHENTICATION SCHEME FOR VEHICULAR AD-HOC NETWORKS -- 1. Introduction -- 2. Background -- 2.1 Vehicular Ad-Hoc Networks -- 2.2 Blockchains -- 2.3 Digital Signatures -- 2.4 MSDND -- 3. Proposed Scheme -- 3.1 Vehicle Registration Protocol -- 3.2 Block Creation Protocol -- 3.3 Platoon Join Protocol
3.4 Intra-Platoon Communications Protocol -- 3.5 Platoon Leave Protocol -- 4. Security Proofs -- 5. Related Work -- 6. Conclusions -- Acknowledgement -- References -- 6 ENGAGING EMPIRICAL DYNAMIC MODELING TO DETECT INTRUSIONS IN CYBER-PHYSICAL SYSTEMS -- 1. Introduction -- 2. Background -- 2.1 Cyber-Physical Systems and Time Series -- 2.2 Empirical Dynamic Modeling -- 2.3 Related Work -- 3. Proposed Methodology -- 3.1 Datasets -- 3.2 Empirical Dynamic Modeling Techniques -- 4. Analysis Results -- 4.1 Linear Data -- 4.2 Nonlinear Data -- 5. Conclusions -- References
Summary CRITICAL INFRASTRUCTURE PROTECTION XIV Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security Vehicle Infrastructure Security Telecommunications Systems Security Industrial Control Systems Security Cyber-Physical Systems Security Infrastructure Modeling and Simulation This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jason Staggs is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA
Notes III TELECOMMUNICATIONS SYSTEMS SECURITY
Online resource; title from PDF title page (SpringerLink, viewed February 18, 2021)
Subject Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Application software
Computer networks
Computer security
Computers
Genre/Form Electronic books
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Staggs, Jason
Shenoi, Sujeet.
ISBN 9783030628406
303062840X
Other Titles Critical infrastructure protection 14
ICCIP 2020