Preface

Cyber-Physical Systems (CPS) is the interconnection of the virtual or cyber and the physical system. It is realized by combining three well-known technologies namely “Embedded Systems”, “Sensors and Actuators” and “Network and Communication System”. These technologies combine to form a system known as CPS. In CPS the physical process and information processing are so tightly connected that it is hard to distinguish the individual contribution of each process from the output. Some of the exciting innovations such as autonomous cars, quadcopter, space ships, sophisticated medical devices fall under CPS. The scope of CPS is tremendous. In CPS, we can see the applications of various emerging technologies such as artificial intelligence, Internet of Things (IoT), machine learning (ML), deep learning (DL), big data (BD), robotics, quantum technology, etc. Almost in all the sectors whether it is education, health, human resource development, skill improvement, startup strategy, etc., we see an enhancement in the quality output, which is because of the emergence of CPS into the field. The CPS is considered the upcoming industry revolution.

This book is covering the different aspects associated with the CPS, such as algorithms, application areas, improvement of existing technology to name a few. The book has 13 quality chapters written by experts in their field. The details of each chapter are as follows:

Chapter 1 presents a systematic literature review on cyber security threats of the industrial Internet of Things (IIoT). In recent years, the IIoT has become one of the popular technologies among Internet users for transportation, business, education, and communication development.

Chapter 2 explains the integration of big data analytics into CPS. The evolving CPS technology advances BD analytics and processing. The control and management of BD are aided by the architecture of CPS with cyber layer, physical layer, and communication layer is designed which not only integrates but also helps CPS in decision-making.

Chapter 3 deals with the basics of machine learning techniques. Embedding these techniques in a CPS can make the system intelligent and user-friendly. ML aims to develop computer programs, that not only process the data to generate output, but also gain information from that data simultaneously, to improve its performance in every next run.

Chapter 4 presents a precise risk assessment and management strategy.

Chapter 5 presents a detailed review on security issues in layered architectures and distributed denial service of attacks over the IoT environment: As a part of evolution, the current trend is the IoT, which brings automation to the next level via connecting the devices through the Internet, and its benefits are tremendous. Meanwhile, the threats and attacks are also evolving and become an unstoppable menace to IoT users and applications. This chapter addresses critical challenges and future research directions concerning IoT security that gives insights to the new researchers in this domain.

Chapter 6 presents ML and DL (deep learning) techniques for phishing threats and challenges: Internet security threats keep on rising due to the vulnerabilities and numerous attacking techniques. The swindlers who take skills over the vulnerable online services and get admission to the information of genuine people through these virtual features continue to expand. Security should prevent phishing attacks and to offer availability and confidentiality. The phishing attack using AI is discussed in this chapter.

Chapter 7 presents a novel defending and prevention technique for the man in the middle of attacks in cyber-physical networks: Man in the Middle Attack is a type of cyber-attack in which an unauthorized person enters the online network between the two users, avoiding the sight of both users. The scripts developed successfully defended the deployed virtual machines from the Man in the Middle Attacks. The main purpose behind this topic is to make readers beware of cyber-attacks.

Chapter 8 presents the fourth-order interleaved Boost Converter with PID, Type II and Type III controller for smart grid applications: Switched-mode power converters are an important component in interfacing renewable energy sources to smart grids and microgrids. The voltage obtained from power conversion is usually full of ripples. To minimize the ripple in the output, certain topological developments are made. This is made possible by controlling the converters using Type II and Type III controllers and the results are compared with PID controller. The performance is analyzed and compared in the Simulink environment. The transient and steady-state analysis is done for a better understanding of the system.

Chapter 9 presents Industry 4.0 in HealthCare IoT for inventory and supply chain management. Industry 4.0 is a setup reality that fulfills various necessities of the clinical field with expansive assessment. Radio Frequency Identification (RFID) advancement does not simply offer the capacity to discover stuff, supplies, and people persistently, but it also gives capable and exact permission to clinical data for prosperity specialists.

Chapter 10 presents a systematic literature review on the security aspects of the Industrial IoT.

Chapter 11 acts as a readymade guide to researchers who want to know how to lay foundations towards a privacy-aware CPS architecture.

Chapter 12 explains the possible privacy and security issues of CPS.

Chapter 13 presents a review of the various application of the CPS.

Uzzal Sharma, Assam, India
Parma Nand, Greater Noida, India
Jyotir Moy Chatterjee, Kathmandu, Nepal
Vishal Jain, Greater Noida, India
Noor Zaman Jhanjhi, Subang Jaya, Malaysia
R. Sujatha, Vellore, India

April 2022

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset