Cybersecurity and Privacy in Cyber Physical System
Most critical infrastructures such as the power grid, rail or air traffic control, industrial automation in manufacturing, water/wastewater infrastructure, banking system, etc. are cyber physical systems (CPS). Given that the continued availability of their core functions is extremely important to people's normal and economic lives, there is widespread concern that they could be subject to intense cyber attacks. In fact, a number of these cases have occurred over the past decade. It is therefore extremely important to defend these systems against cyber threats. Due to the cyber-physical nature of most of these systems and the increasing use of networks, embedded computing and SCADA (Supervisory Control and Data Acquisition), attack surfaces have increased. In this tutorial, we will examine some of these cyber threats, discuss methodologies, tools and techniques for defending these systems and show how the design of secure cyberphysical systems differs from the previous design.
Traditional computer security technologies, previously designed to protect information exchange between cyber-components, are deployed to protect physical processes on CPS networks. Due to the size and complexity of many CPS networks, infiltration prevention is far from guaranteed. In addition, exploits have demonstrated that even so-called secure communication protocols can be compromised by zero-day exploits and implementation flaws. As a result, traditional cyber perimeter defenses are often seen as a response to newly discovered threats and cannot promise protection against unknown exploits.
The objective of this book is to collect and report on recent high-quality research that addresses different problems related to the cybersecurity and privacy in cyber-physical systems. High quality contributions addressing related theoretical and practical aspects are expected. The overall objectives are:
- To improve the awareness of readers about Cybersecurity and Privacy in Cyber Physical Systems.
- To analyze and present the state-of-the-art of Cyber Physical Systems cybersecurity and related technologies and methodologies.
- To highlight and discuss the recent development and emerging trends on Cybersecurity and Privacy in Cyber Physical Systems.
- To propose new models, practical solutions and technological advances related to Cybersecurity and Privacy in Cyber Physical Systems.
- To Discuss new Cybersecurity and Privacy models, prototypes and protocols for Cyber Physical Systems.
The target audience of this book will be composed of professionals and researchers working in the field of information security and privacy in various disciplines, e.g. library, information and communication sciences, administrative sciences and management, education, adult education, sociology, computer science, and information technology. Moreover, the book will provide insights and support executives concerned with the management of expertise, knowledge, information and organizational development in different types of work communities and environments.
Topics of Interest
This book targets a mixed audience of researchers, academics and investigators from different communities to share and exchange new ideas, approaches, theories and practice to resolve the challenging issues associated with the leveraging of Cybersecurity and Privacy in Cyber Physical Systems paradigm. Therefore, the suggested topics of interest for this book include, but are not limited to:
- Cybersecurity protocols for cyber-physical systems;
- Vulnerability analysis for Cyber-Physical System;
- Adaptive attack mitigation for Cyber-Physical System;
- Data security and privacy for Cyber-Physical System;
- Key management in Cyber-Physical System;
- Intrusion detection and resiliency for cyber-physical systems;
- Cybersecurity and Privacy in cyberspace;
- Sensor network security issues in mobile cloud computing;
- Ambient intelligence and intelligent service systems in secure IoT;
- Secure Geo-processing, Localization and Location Based Services;
- Secure spatial data techniques and tools for analytics;
- Secure Smart city services and applications platforms;
- Technology-enabled detection and prevention of cybercrime;
- Cyber-profiteering in cloud of smart things ;
- Cybercrime and digital forensics in IoT and cloud computing;
- Protecting SCADA systems;
- Cybersecurity and privacy in industrial control systems;
- Smart grid cybersecurity;
- Urban transportation system security;
- Wireless sensor network security and privacy.
Researchers and practitioners are invited to submit their chapter by September 20, 2018.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication. All manuscripts are accepted based on a double-blind peer review editorial process.
*Authors who are wishing to write chapter proposals are advised to contact Dr. Maleh as soon as possible for arrangement, initial approval, and further instructions.
Abstracting and Indexing
CRC Taylor & Francis takes pride in having publications indexed by major indices worldwide. So long as they meet the required criteria, all CRC publications are submitted for indexing to indices Thomson Reuters Book Citation Index and SCOPUS.
The authors will be invited to submit a full version of their proposed book chapter. All submitted chapters will be reviewed on a double-blind review basis. Based on the outcome of the review process, the authors may be requested to revise their book chapters and to submit the final version. If the editors are satisfied with the revision of the book chapter, the authors will be invited to submit a camera-ready version of the paper.
There is no template for the proposals. However, they should clearly describe the topic of the chapter, and list the tentative sections alongside a rough estimate of their lengths. Proposals should also include author names, affiliations, emails, and short bios.
CRC Press, Florida, USA, is a premier global publisher of science, technology, and medical resources. CRC Press is a member of Taylor & Francis Group, an informa business. For additional information regarding the publisher, please visit https://www.crcpress.com.
· September 20, 2018: Firm Deadline
· October 15, 2018: Review Results Returned
· November 15, 2018: Final Chapter Submission (camera ready)
· December 30, 2018: Publication
Abstracts should be submitted as plain Word (2007 or higher)
Full book chapters need to be formatted according to CRC instructions and submitted in Word. Each accepted chapter should have about 30 A4 double-spaced on A4 pages with 1” margins. We will deliver camera-ready chapters of the book to the publisher. The author’s guide and template can be found here.
- Yassine Maleh, University Hassan 1, Morocco, email@example.com
- Prof. Abdelkrim Haqiq, University Hassan 1, Morocco, firstname.lastname@example.org
- Dr. Mohammad Shojafar, University of Padua, Padua, Italy, email@example.com
- Ashraf Darwish, Helwan University, Cairo, Egypt, firstname.lastname@example.org