We're sorry, but eCampus.com doesn't work properly without JavaScript.
Either your device does not support JavaScript or you do not have JavaScript enabled.
How to enable JavaScript in your browser.
Need help? Call 1-855-252-4222
What is included with this book?
The 13 chapters in this book cover the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement of existing technology such as machine learning, big data and robotics.
Cyber-Physical Systems (CPS) is the interconnection of the virtual or cyber and the physical system. It is realized by combining three well-known technologies, namely “Embedded Systems,” “Sensors and Actuators,” and “Network and Communication Systems.” These technologies combine to form a system known as CPS. In CPS, the physical process and information processing are so tightly connected that it is hard to distinguish the individual contribution of each process from the output. Some exciting innovations such as autonomous cars, quadcopter, spaceships, sophisticated medical devices fall under CPS.
The scope of CPS is tremendous. In CPS, one sees the applications of various emerging technologies such as artificial intelligence (AI), Internet of Things (IoT), machine learning (ML), deep learning (DL), big data (BD), robotics, quantum technology, etc. In almost all sectors, whether it is education, health, human resource development, skill improvement, startup strategy, etc., one sees an enhancement in the quality of output because of the emergence of CPS into the field.
Audience Researchers in Information technology, artificial intelligence, robotics, electronics and electrical engineering.
Dr. Uzzal Sharma, PhD is currently an Assistant Professor (senior), Department of Computer Applications, School of Technology, Assam Don Bosco University, Guwahati, India.
Dr. Parma Nand has PhD. in Computer Science & Engineering from IIT Roorkee, has more than 27 years of experience both in industry and academia.
Jyotir Moy Chatterjee is an Assistant Professor in the Information Technology department at Lord Buddha Education Foundation (LBEF), Kathmandu, Nepal.
Dr. Vishal Jain, PhD is an Associate Professor at the Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, U. P. India.
Dr. Noor Zaman Jhanjhi, PhD is an Associate Professor, Director Center for Smart society 5.0 [CSS5], and Cluster Head for Cybersecurity cluster, at School of Computer Science and Engineering, Faculty of Innovation and Technology, Taylor’s University, Malaysia.
Dr. R. Sujatha, PhD is serving as an associate professor in the School of Information Technology and Engineering in Vellore Institute of Technology, Vellore, India.
Preface xv
Acknowledgement xix
1 A Systematic Literature Review on Cyber Security Threats of Industrial Internet of Things 1Ravi Gedam and Surendra Rahamatkar
1.1 Introduction 2
1.2 Background of Industrial Internet of Things 3
1.3 Literature Review 6
1.4 The Proposed Methodology 13
1.5 Experimental Requirements 14
1.6 Conclusion 15
2 Integration of Big Data Analytics Into Cyber-Physical Systems 19Nandhini R.S. and Ramanathan L.
2.1 Introduction 19
2.2 Big Data Model for Cyber-Physical System 21
2.3 Big Data and Cyber-Physical System Integration 23
2.4 Storage and Communication of Big Data for Cyber-Physical System 26
2.5 Big Data Processing in Cyber-Physical System 29
2.6 Applications of Big Data for Cyber-Physical System 33
2.7 Security and Privacy 36
2.8 Conclusion 37
3 Machine Learning: A Key Towards Smart Cyber-Physical Systems 43Rashmi Kapoor, Chandragiri Radhacharan and Sung-ho Hur
3.1 Introduction 44
3.2 Different Machine Learning Algorithms 46
3.3 ML Use-Case in MATLAB 51
3.4 ML Use-Case in Python 56
3.5 Conclusion 60
4 Precise Risk Assessment and Management 63Ambika N.
4.1 Introduction 64
4.2 Need for Security 65
4.3 Different Kinds of Attacks 67
4.4 Literature Survey 70
4.5 Proposed Work 75
4.6 Conclusion 80
5 A Detailed Review on Security Issues in Layered Architectures and Distributed Denial Service of Attacks Over IoT Environment 85Rajarajan Ganesarathinam, Muthukumaran Singaraveluand K.N. Padma Pooja
5.1 Introduction 86
5.2 IoT Components, Layered Architectures, Security Threats 89
5.3 Taxonomy of DDoS Attacks and Its Working Mechanism in IoT 97
5.4 Existing Solution Mechanisms Against DDoS Over IoT 105
5.5 Challenges and Research Directions 113
5.6 Conclusion 115
6 Machine Learning and Deep Learning Techniques for Phishing Threats and Challenges 123Bhimavarapu Usharani
6.1 Introduction 124
6.2 Phishing Threats 124
6.3 Deep Learning Architectures 131
6.4 Related Work 135
6.5 Analysis Report 139
6.6 Current Challenges 140
6.7 Conclusions 140
7 Novel Defending and Prevention Technique for Man-in-the-Middle Attacks in Cyber-Physical Networks 147Gaurav Narula, Preeti Nagrath, Drishti Hans and Anand Nayyar
7.1 Introduction 148
7.2 Literature Review 150
7.3 Classification of Attacks 152
7.4 Proposed Algorithm of Detection and Prevention 162
7.5 Results and Discussion 173
7.6 Conclusion and Future Scope 173
8 Fourth Order Interleaved Boost Converter With PID, Type II and Type III Controllers for Smart Grid Applications 179Saurav S. and Arnab Ghosh
8.1 Introduction 179
8.2 Modeling of Fourth Order Interleaved Boost Converter 181
8.3 Controller Design for FIBC 193
8.4 Computational Results 197
8.5 Conclusion 204
9 Industry 4.0 in Healthcare IoT for Inventory and Supply Chain Management 209Somya Goyal
9.1 Introduction 210
9.2 Benefits and Barriers in Implementation of RFID 212
9.3 IoT-Based Inventory Management--Case Studies 218
9.4 Proposed Model for RFID-Based Hospital Management 220
9.5 Conclusion and Future Scope 225
10 A Systematic Study of Security of Industrial IoT 229Ravi Gedam and Surendra Rahamatkar
10.1 Introduction 230
10.2 Overview of Industrial Internet of Things (Smart Manufacturing) 231
10.3 Industrial Reference Architecture 236
10.4 FIWARE Generic Enabler (FIWARE GE) 241
10.5 Discussion 249
10.6 Conclusion 252
11 Investigation of Holistic Approaches for Privacy Aware Design of Cyber-Physical Systems 257Manas Kumar Yogi, A.S.N. Chakravarthy and Jyotir Moy Chatterjee
11.1 Introduction 258
11.2 Popular Privacy Design Recommendations 258
11.3 Current Privacy Challenges in CPS 262
11.4 Privacy Aware Design for CPS 263
11.5 Limitations 265
11.6 Converting Risks of Applying AI Into Advantages 266
11.7 Conclusion and Future Scope 269
12 Exposing Security and Privacy Issues on Cyber-Physical Systems 273Keshav Kaushik
12.1 Introduction to Cyber-Physical Systems (CPS) 273
12.2 Cyber-Attacks and Security in CPS 277
12.3 Privacy in CPS 281
12.4 Conclusion & Future Trends in CPS Security 284
13 Applications of Cyber-Physical Systems 289Amandeep Kaur and Jyotir Moy Chatterjee
13.1 Introduction 289
13.2 Applications of Cyber-Physical Systems 291
13.3 Conclusion 304
References 305
Index 311
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.