Browse Results

Showing 14,826 through 14,850 of 18,474 results

Secrets of Victory

by Michael S. Sweeney

During World War II, the civilian Office of Censorship supervised a huge and surprisingly successful program of news management: the voluntary self-censorship of the American press. In January 1942, censorship codebooks were distributed to all American newspapers, magazines, and radio stations with the request that journalists adhere to the guidelines within. Remarkably, over the course of the war no print journalist, and only one radio journalist, ever deliberately violated the censorship code after having been made aware of it and understanding its intent.Secrets of Victory examines the World War II censorship program and analyzes the reasons for its success. Using archival sources, including the Office of Censorship's own records, Michael Sweeney traces the development of news media censorship from a pressing necessity after the attack on Pearl Harbor to the centralized yet efficient bureaucracy that persuaded thousands of journalists to censor themselves for the sake of national security. At the heart of this often dramatic story is the Office of Censorship's director Byron Price. A former reporter himself, Price relied on cooperation with--rather than coercion of--American journalists in his fight to safeguard the nation's secrets.

El secuestro de la justicia: Virtudes y problemas del sistema judicial

by Ignacio Escolar Joaquim Bosch Grau

¿Está la justicia española secuestrada por los políticos? Joaquim Bosch (ex portavoz de Juezas y Jueces para la Democracia) e Ignacio Escolar (director de eldiario.es) han unido fuerzas para escribir un libro necesario, incisivo y pedagógico sobre la Justicia. El sistema judicial está en crisis. Así lo denuncia esta reflexión crítica sobre un deterioro que afecta profundamente a nuestra democracia. En una escalada sin precedentes, las injerencias políticas son muy visibles, se concentran en la cúpula judicial y son especialmente peligrosas en los casos de corrupción. Por otro lado, la ciudadanía percibe que las leyes no siempre son iguales para todos. Las maniobras que tratan de capturar las instituciones judiciales están relacionadas con un fenómeno más amplio: los intentos de secuestro de la Justicia como valor. Por eso los autores también estudian: las injusticias que padecen las víctimas de violencia machista, y los que padecen abusos bancarios; los problemas en la aplicación de la prisión provisional o los excesos en los límites de la política de penas de privación de libertad; el drama de los refugiados y la criminalización de los inmigrantes; la falta de reparación de las víctimas del franquismo; la actuación de la justicia en el conflicto catalán; y los crecientes recortes de libertades. Pero El secuestro de la Justicia es también una defensa de la magnífica base del sistema judicial, esa inmensa mayoría de magistrados que no se ha dejado contaminar. Como los que llevaron los abusos bancarios a la jurisdicción europea y vencieron. O los que, sin medios suficientes, investigan la corrupción y ponen contra las cuerdas a políticos y a empresarios. La crítica ha dicho...«Relato pedagógico sobre separación de poderes.»EFE «Un texto ensayístico, pero escrito con estilo periodístico, orientado a plantear una larga serie de reflexiones y dudas sobre el llamado tercer poder.»Juan Bolea, El Periódico de Aragón «Un libro fundamentalpara entender nuestro país. No solo recomendable, sino imprescindible.»Carlos Ávila, Andamios (y la vida sigue)

Secure Automatic Dependent Surveillance-Broadcast Systems (Wireless Networks)

by Haomiao Yang Hongwei Li Xuemin Sherman Shen

This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security.Proposes several secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B);Provides extensive experiments and evaluates the proposed schemes using real-world data;Shows how ADS-B data links can greatly enhance safety without sacrificing data security

Secure Communication for 5G and IoT Networks (EAI/Springer Innovations in Communication and Computing)

by S. Velliangiri M. Gunasekaran P. Karthikeyan

This book highlights research on secure communication of 5G and the Internet of Things (IoT) Networks, along with related areas to ensure secure and Internet-compatible IoT systems. The authors not only discuss 5G and IoT security and privacy challenges, but also energy efficient approaches to improving the ecosystems through communication. The book addresses the secure communication and privacy of the 5G and IoT technologies, while also revealing the impact of IoT technologies on several scenarios in smart city design. Intended as a comprehensive introduction, the book offers in-depth analysis and provides scientists, engineers and professionals the latest techniques, frameworks and strategies used in 5G and IoT technologies.

Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation

by T. Kavitha M. K. Sandhya V. J. Subashini Prasidh Srikanth

The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security. Features:● Explores the new Internet of Things security challenges, threats, and future regulations to end-users.● Presents authentication, authorization, and anonymization techniques in the Internet of Things.● Illustrates security management through emerging technologies such as blockchain and artificial intelligence.● Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework.● Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things.It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in fields such as electrical engineering, electronics and communications engineering, computer engineering, and information technology.

Secure Control of Networked Control Systems and Its Applications

by Dong Yue Songlin Hu Zihao Cheng

This book shows some secure control methods of networked control systems related to linear control system, nonlinear control system, multi-agent system and its applications in power systems. The proposed secure control methods provide some useful results about modeling of network attacks, resilient analysis and synthesis methods, active defense control method.The contents of this book are lists as followings. (1) Modeling of DoS attacks, deception attacks and replay attacks; (2)Secure control methods are proposed by combing delay system method, switched system method and event-based control method. (3) Active control methods are proposed by using model-predictive control and redundant control. (4) The proposed control methods are applied to the security problem of power system.The methods of this book include DoS attacks modeling such as, periodic jamming attack model,model-based average dwell time model, deception attack modeling and relay attack modeling; piece-wise Lyapunov-Krasoviskiifunctional method, stochastic control method; the results including resilient conditions of networked control system and related resilient control design method with linear matrix inequalities(LMIs).From this book, readers can learn about the general network attack modeling methods, resilient analysis and synthesis methods, active control methods from viewpoint of redundancy control, and secure conditions of power systems.Some fundamental knowledge prepared to read this book includes delay system theory, event triggered mechanism, T-S fuzzy system theory and frequency/voltage control of power system.

Secure Data Sensing, Computing, and Dissemination in Vehicular Ad Hoc Networks (Advanced Topics in Science and Technology in China #1)

by Yingjie Xia Xuejiao Liu Huihui Wu Qichang Li

This book focuses on the fields of security of vehicular ad hoc networks (VANETs). Building upon previous research findings, it conducts research on three modules: secure data sensing, computing, and dissemination in VANETs. The book adopts a combination of security analysis, theoretical analysis, and simulation analysis to comprehensively evaluate and demonstrate the effectiveness and performance of proposed solutions. It aims to assist other researchers in conducting studies on the data security issues of vehicular ad hoc networks, while designing secure and efficient schemes.

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing)

by Ahmed A. Abd El-Latif Lo’ai Tawalbeh Yassine Maleh Brij B. Gupta

This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).

Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks

by Bo Chen Tongxiang Li Wen-An Zhang Li Yu

The book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks. The comprehensive and systematic treatment of security protection in cyber-physical systems is one of the main features of the book, which is particularly suitable for readers interested in learning practical solutions for the security of cyber-physical systems. The book can benefit researchers, engineers and graduate students in the fields of control science and engineering, computer science, communication engineering, etc.

Secure IP Mobility Management for VANET

by Sanaa Taha Xuemin Shen

This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs including an anonymous and location privacy-preserving scheme for the MIPv6 protocol, a mutual authentication scheme that thwarts authentication attacks, and a fake point-cluster based scheme to prevent attackers from localizing users inside NEMO-based VANET hotspots. The brief concludes with future research directions. Professionals and researchers will find the analysis and new privacy schemes outlined in this brief a valuable addition to the literature on VANET management.

Secure, Low-Power IoT Communication Using Edge-Coded Signaling

by Shahzad Muzaffar Ibrahim (Abe) Elfadel

This book discusses single-channel, device-to-device communication in the Internet of Things (IoT) at the signal encoding level and introduces a new family of encoding techniques that result in significant simplifications of the communication circuitry. These simplifications translate into lower power consumption, smaller form factors, and dynamic data rates that are tolerant to clock discrepancies between transmitter and receiver. Readers will be introduced to signal encoding that uses edge-coded signaling, based on the coding of binary data as counts of transmitted pulses. The authors fully explore the far-reaching implications of these novel signal-encoding techniques and illustrate how their usage can help minimize the need for complex circuitries for either clock and data recovery or duty-cycle correction. They also provide a detailed description of a complete ecosystem of hardware and firmware built around edge-code signaling. The ecosystem comprises an application-specific processor, automatic protocol configuration, power and data rate management, cryptographic primitives, and automatic failure recovery modes. The innovative IoT communication link and its associated ecosystem are fully in line with the standard IoT requirements on power, footprint, security, robustness, and reliability.

Secure Networked Inference with Unreliable Data Sources

by Pramod K. Varshney Bhavya Kailkhura Aditya Vempaty

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Secure Quantum Network Coding Theory

by Tao Shang Jianwei Liu

This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the book subsequently provides a series of quantum network coding schemes based on the integration of quantum cryptography into quantum communication. Furthermore, it describes the general security analysis method for quantum cryptographic protocols. Accordingly, the book equips readers with effective tools for researching and applying quantum network coding.

Securing an Enterprise: Maximizing Digital Experiences through Enhanced Security Measures

by Anirudh Khanna

Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing. Part of author Saurav Bhattacharya’s trilogy that covers the essential pillars of digital ecosystems—security, reliability, and usability—this book sheds light on the dynamic challenges posed by cyber threats, advocating for innovative security solutions that safeguard users while upholding their digital freedoms. Against the backdrop of rapid technological advancement and escalating cyber threats, this book addresses pressing security concerns at the forefront of our digital era. You’ll learn that trust plays a pivotal role in fostering a secure digital environment, enabling individuals and organizations to flourish without fear of malicious exploits. With transformative technologies like AI, blockchain, and quantum computing on the horizon, understanding and addressing cybersecurity fundamentals is essential for traversing the evolving digital landscape. Securing an Enterprise is your roadmap towards a future where technology aligns with humanity, fostering a more equitable, secure, and interconnected world. What You will Learn Explore advanced methodologies and innovative approaches to bolster cybersecurity Understand the potential impacts of the advancements on security Provide strategic guidance on adapting to security changes to ensure sustainability Take a holistic approach in reviewing security Who This Book Is For Cybersecurity Professionals, Technology Developers and Engineers

Securing Delay-Tolerant Networks with BPSec

by Edward J. Birrane III Sarah Heiner Ken McKeever

Securing Delay-Tolerant Networks with BPSec One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders Securing Delay-Tolerant Networks with BPSec answers the question, “How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?” The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments. The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included. Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches. Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks (DTNs) with BPSec includes information on: The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls Securing the terrestrial internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security, including software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure

by Margot P. Weijnen Zofia Lukszo Geert Deconinck

The electricity infrastructure is one of society's most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of market-based power exchanges between electricity systems, the associated market restructuring and an increasing share of decentralized generation. As a consequence, the organizational complexity of power systems has exploded. At the same time, there is a shift in public and societal goals towards low-carbon and sustainable power generation. This will eventually require a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation and for facilitating markets. A recent example is demand-side management, based on detailed metering of consumption and decentralized electricity generation. The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for. To address the above mentioned problems an advanced research workshop: "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT" was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. The book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.

Securing Social Networks in Cyberspace

by Al-Sakib Khan Pathan

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Securing the Digital World: A Comprehensive Guide to Multimedia Security

by Subhrajyoti Deb Aditya Kumar Sahu

Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in today's digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more imperative. This book provides comprehensive research on multimedia information security and bridges the gap between theoretical bases and practical applications.Authored by leading experts in the area, the book focusses on cryptography, watermarking, steganography and its advanced security solution while keeping a clear and engaging description and sets this book apart in its capability to make complex concepts accessible and practical, making it an incalculable resource for beginners and seasoned professionals alike.Key Features: Detailed study of encryption techniques, including encryption and decryption methods adapted to multimedia data A comprehensive discussion of techniques for embedding and detecting hidden information in digital media A survey of the latest advances in multimedia security, including quantum cryptography and blockchain applications Real-world case studies and illustrations that demonstrate the application of multimedia information security techniques in various initiatives Contributions from computer science and information technology experts offer a comprehensive perspective on multimedia security This book is an invaluable help for cybersecurity professionals, IT professionals, and computer and information technology students. Securing the Digital World equips readers with the information and tools required to safeguard multimedia content in a cyber-spatiality full of security challenges.

Securing Unmanned Aerial Vehicle Networks: Models and Algorithms (SpringerBriefs in Computer Science)

by Bin Duo Xiaojun Yuan Yifan Liu

This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.

The Securitisation of News in Turkey: Journalists as Terrorists? (The Palgrave Macmillan Series in International Political Communication)

by Natalie Martin

This book examines why Turkey has become infamous as a repressor of news media freedom. For the past decade or so it has stood alongside China as a notorious jailer of journalists – at the same time as being a candidate state of the EU. The author argues that the reasons for this conundrum are complex and whilst the AKP is responsible for the most recent illiberality, its actions should be taken in the wider context of Turkish politics – and the three way battle for power which has been raging between Kemalists, Kurds and Islamists since the republic was founded in 1923. The AKP are the current winners of this tripartite power struggle and the securitisation of journalists as terrorists is part of that quest. Moreover, whilst securitisation is not new, it has intensified recently as the number of the AKP’s political opponents has proliferated. Securitisation is also a means of delegitimising journalism – and neutralizing any threat to the AKP’s electoral prospects – whilst maintaining a democratic façade on the world stage. Lastly, the book argues that whilst the AKP’s securitisation of news began as a means of quashing the reporting of illiberality against wider political targets, since 2016 it has become a target in its own right. In the battle for power in Turkey, journalism is now one of the many losers.

Security and Data Storage Aspect in Cloud Computing (Studies in Big Data #52)

by Prachi S. Deshpande Subhash C. Sharma Sateesh K. Peddoju

This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.

Security and Privacy for 6G Massive IoT

by Georgios Mantas Firooz B. Saghezchi Jonathan Rodriguez Victor Sucasas

Anticipate the security and privacy threats of the future with this groundbreaking text The development of the next generation of mobile networks (6G), which is expected to be widely deployed by 2030, promises to revolutionize the Internet of Things (IoT), interconnecting a massive number of IoT devices (massive IoT) on a scale never before envisioned. These devices will enable the operation of a wide spectrum of massive IoT applications such as immersive smart cities, autonomous supply chain, flexible manufacturing and more. However, the vast number of interconnected IoT devices in the emerging massive IoT applications will make them vulnerable to an unprecedented variety of security and privacy threats, which must be anticipated in order to harness the transformative potential of these technologies. Security and Privacy for 6G Massive IoT addresses this new and expanding threat landscape and the challenges it poses for network security companies and professionals. It offers a unique and comprehensive understanding of these threats, their likely manifestations, and the solutions available to counter them. The result creates a foundation for future efforts to research and develop further solutions based on essential 6G technologies. Readers will also find: Analysis based on the four-tier network architecture of 6G, enhanced by Edge Computing and Edge Intelligence Detailed coverage of 6G enabling technologies including blockchain, distributed machine learning, and many more Scenarios, use cases, and security and privacy requirements for 6G Massive IoT applications Security and Privacy for 6G Massive IoT is ideal for research engineers working in the area of IoT security and designers working on new 6G security products, among many others.

Security and Privacy for Next-Generation Wireless Networks (Wireless Networks)

by Sheng Zhong Hong Zhong Xinyi Huang Panlong Yang Jin Shi Lei Xie Kun Wang

This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.

Security and Privacy in Cyber-Physical Systems and Smart Vehicles: First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #552)

by Yu Chen Chung-Wei Lin Bo Chen Qi Zhu

This book constitutes the refereed proceedings of the First EAI International Conference, SmartSP 2023, held in Chicago, USA, during October 12-13, 2023. The 11 revised full papers were carefully reviewed and selected from 24 submissions. The papers focus on all details all technological aspects that are relevant to Security and privacy in cyber-physical systems.

Security and Privacy in Smart Grid (SpringerBriefs in Electrical and Computer Engineering)

by Asmaa Abdallah Xuemin Shen

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

Refine Search

Showing 14,826 through 14,850 of 18,474 results