@incollection {1590, title = {Cyber-Physical Systems for Wide-Area Situational Awareness}, booktitle = {Cyber-Physical Systems: Foundations, Principles and Applications}, number = {Intelligent Data-Centric Systems}, year = {2017}, month = {2017}, pages = {305 - 317}, publisher = {Academic Press}, organization = {Academic Press}, chapter = {20}, address = {Boston}, abstract = {

Abstract Cyber-physical systems (CPSs), integrated in critical infrastructures, could provide the minimal services that traditional situational awareness (SA) systems demand. However, their application in SA\ solutions for the protection of large control distributions against unforeseen faults may be insufficient. Dynamic protection measures have to be provided not only to locally detect unplanned deviations but also to prevent, respond, and restore from these deviations. The provision of these services as an integral part of the SA\ brings about a new research field known as wide-area situational awareness (WASA), highly dependent on CPSs\ for control from anywhere across multiple interconnections, and at any time. Thus, we review the state-of-the art of this new paradigm, exploring the different preventive and corrective measures considering the heterogeneity of CPSs, resulting in a guideline for the construction of automated WASA\ systems.

}, keywords = {Control systems, Critical Infrastructure Protection, cyber-physical systems, Detection, Response, restoration, Wide-Area Situational Awareness}, isbn = {978-0-12-803801-7}, doi = {http://dx.doi.org/10.1016/B978-0-12-803801-7.00020-1}, author = {Cristina Alcaraz and Lorena Cazorla and Javier Lopez} } @incollection {ruben2014a, title = {Location Privacy in WSNs: Solutions, Challenges, and Future Trends}, booktitle = {Foundations of Security Analysis and Design VII}, volume = {8604}, number = {LNCS}, year = {2014}, pages = {244-282}, publisher = {Springer}, organization = {Springer}, abstract = {

Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its adoption in everyday scenarios. There are a number of research papers in this area many of which concentrate on the location privacy problem. In this paper we review and categorise these solutions based on the information available to the adversary and his capabilities. But first we analyse whether traditional anonymous communication systems conform to the original requirements of location privacy in sensor networks. Finally, we present and discuss a number of challenges and future trends that demand further attention from the research community.

}, keywords = {Location Privacy, survey, traffic analysis, wireless sensor networks}, isbn = {978-3-319-10081-4}, issn = {0302-9743}, doi = {10.1007/978-3-319-10082-1_9}, author = {Ruben Rios and Javier Lopez and Jorge Cuellar} } @incollection {BC2011Alcaraz, title = {Security Aspects of SCADA and DCS Environments}, booktitle = {Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense}, series = {Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. LNCS 7130.}, volume = {7130}, year = {2012}, month = {September 2012}, pages = {120-149}, publisher = {Springer-Verlag}, organization = {Springer-Verlag}, address = {Heidelberger (Berlin, Alemania)}, abstract = {

SCADA Systems can be seen as a fundamental component in Critical Infrastructures, having an impact in the overall performance of other Critical Infrastructures interconnected. Currently, these systems include in their network designs different types of Information and Communication Technology systems (such as the Internet and wireless technologies), not only to modernize operational processes but also to ensure automation and real-time control. Nonetheless, the use of these new technologies will bring new security challenges, which will have a significant impact on both the business process and home users. Therefore, the main purpose of this Chapter is to address these issues and to analyze the interdependencies of Process Control Systems with ICT systems, to discuss some security aspects and to offer some possible solutions and recommendations.

}, keywords = {Critical Information Infrastructure Protection, SCADA Systems}, isbn = {ISBN:978-3-642-28919-4}, issn = {0302-9743}, author = {Cristina Alcaraz and Gerardo Fernandez and Fernando Carvajal}, editor = {Javier Lopez and Stephen. Wolthunsen and Roberto Setola} } @incollection {Alcaraz2011_ChapterBook, title = {Digital Home Networking: Standards}, booktitle = {Digital Home Networking}, number = {7130}, year = {2011}, pages = {60-96}, publisher = {John Wiley \& Sons Inc.}, organization = {John Wiley \& Sons Inc.}, address = {Reino Unido}, keywords = {Standards, ZigBee}, issn = {978-1-84821-321-0}, author = {Remi Bars and Jorge Gomez and Mohamed Mahdi and Cristina Alcaraz and Rodrigo Roman}, editor = {Romain Carbou and Ernesto Exposito and Rodrigo Roman and Michel Diaz} } @incollection {Najera_DHNChapter, title = {Network Technologies}, booktitle = {Digital Home Networking}, year = {2011}, pages = {17 - 58}, publisher = {Wiley-ISTE}, organization = {Wiley-ISTE}, isbn = {978-1848213210}, author = {Pablo Najera and Ana Nieto}, editor = {Romain Carbou and Ernesto Exposito and Rodrigo Roman} } @incollection {Moyano_DHNChapter, title = {Security}, booktitle = {Digital Home Networking}, year = {2011}, pages = {139-202}, chapter = {Security}, issn = {9781848213210}, author = {Francisco Moyano and Rodrigo Roman and Anas Abou El Kalam and Marc Lacoste and Mohamed Maachaoui}, editor = {Romain Carbou and Michel Diaz and Ernesto Exposito and Rodrigo Roman} } @incollection {Roman2009b, title = {Trust and Reputation Systems for Wireless Sensor Networks}, booktitle = {Security and Privacy in Mobile and Wireless Networking}, year = {2009}, pages = {105-128}, publisher = {Troubador Publishing Ltd}, organization = {Troubador Publishing Ltd}, abstract = {

The concept of trust has become very relevant in the late years as a consequence of the growth of fields such as internet transactions or electronic commerce. In general, trust has become of paramount importance for any kind of distributed networks, such as wireless sensor networks (WSN in the following). In this chapter of the book, we try to give a general overview of the state of the art on trust management systems for WSN and also try to identify the main features of the architectures of these trust management systems.

}, isbn = {978-1905886-906}, author = {Rodrigo Roman and Carmen Fernandez-Gago and Javier Lopez and Hsiao Hwa Chen}, editor = {Stefanos Gritzalis and Tom Karygiannis and Charalabos Skianis} }