Handbook on Securing Cyber-Physical Critical Infrastructure

1st Edition

Authors: Sajal Das Krishna Kant Nan Zhang
Hardcover ISBN: 9780124158153
eBook ISBN: 9780124159105
Imprint: Morgan Kaufmann
Published Date: 31st January 2012
Page Count: 848
Tax/VAT will be calculated at check-out
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

Key Features

  • Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios
  • Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on
  • Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout


Researchers and security practitioners in relevant application areas such as smart power grid, transportation systems, communication networks, etc. The handbook is also intended to be suitable for advanced courses and seminars as well as graduate students working on various facets of security in cyber and physical systems

Table of Contents


About the Authors



Securing Cyber-Physical Infrastructure Perspectives and Overview of the Handbook

PART I. Theoretical Foundations


Chapter 1. Security and Vulnerability of Cyber-Physical Infrastructure Networks

1.1 Introduction

1.2 Definitions for Security and Vulnerability of Network Dynamics

1.3 Network Control Tools for Characterizing and Designing Security and Vulnerability

1.4 Conclusions and Future Work

Chapter 2. Game Theory for Infrastructure Security

2.1 Introduction

2.2 Preliminaries

2.3 Intent-based Adversary Model for Anomaly Detection

2.4 Intent-based Adversary Model for Anonymous Communication Systems

2.5 Conclusion

Chapter 3. An Analytical Framework for Cyber-Physical Networks

3.1 Introduction

3.2 Spatial Dispersion Models

3.3 CPN Design and Analysis

3.4 CPN Infrastructure Robustness

3.5 Conclusions


Chapter 4. Evolution of Widely Spreading Worms and Countermeasures

4.1 Introduction

4.2 Objectives and strategies of Worm propagator and defender

4.3 Worm Initial Attacks

4.4 Defense against initial attacks

4.5 Worm Evolution

4.6 Defense Evolution versus Worm Evolution

4.7 Final Remarks

PART II. Security for Wireless Mobile Networks


Chapter 5. Mobile Wireless Network Security

5.1 Introduction

5.2 Wireless Communications Security

5.3 Mobility Support Security

5.4 Conclusion and Future Research

Chapter 6. Robust Wireless Infrastructure against Jamming Attacks

6.1 Introduction

6.2 Design Vulnerabilities of Wireless Infrastructure

6.3 Resiliency to Outsider Cross-Layer Attacks

6.4 Resiliency to Insider Cross-Layer Attacks

6.5 Game-Theoretic Models and Mechanisms

6.6 C


No. of pages:
© Morgan Kaufmann 2012
Morgan Kaufmann
eBook ISBN:
Hardcover ISBN:

About the Author

Sajal Das

Sajal K. Das is a University Distinguished Scholar Professor of Computer Science and Engineering and the Founding Director of the Center for Research in Wireless Mobility and Networking (CReWMaN) at the University of Texas at Arlington (UTA).

Affiliations and Expertise

University of Texas at Arlington (UTA).

Krishna Kant

Krishna Kant is currently with George Mason University and on leave of absence from Intel Corporation where he has worked since 1997. His current areas of research include robustness in the Internet, cloud computing security, and sustainable computing.

Affiliations and Expertise

George Mason University

Nan Zhang

Nan Zhang is an Assistant Professor of Computer Science at the George Washington University, Washington, DC, USA. Prior to joining GWU, he was an assistant professor of Computer Science and Engineering at the University of Texas at Arlington from 2006 to 2008. His current research interests span security and privacy issues in databases, data mining, and computer networks.

Affiliations and Expertise

George Washington University


"This impressive collection presents different viewpoints on the security of cyber-physical infrastructure. With more than 40 different contributors and 30 chapters organized in eight parts, the authors provide a unique introduction to the current state of the art in this field. The recent rise in both security awareness and the criticality of cyber-physical systems justifies the publishing of such a comprehensive book." --ComputingReviews.com, March 2013