Securing Cyber Physical Systems


To be Published by CRC Press, USA


Editor: Al-Sakib Khan Pathan



Call for Chapters in PDF


Cyber-Physical System (CPS) is a relatively new term coined in the field of interconnected devices and networks that enhances the notion of Cyberspace. It offers a kind of Cyberspace based on good number of interconnected physical devices each of which is run by sophisticated embedded systems and software. Checking the history, we find that the initial promoters of this idea had strong background in software engineering technologies for embedded software, working on standalone systems. Hence, from their perspective, they focused on a single embedded system. When the idea of CPS was being developed, it considered how to make it possible that multiple embedded control systems can interact among themselves through communications and physical environments (e.g., from one's actuators to other one's sensors). Apart from this, many other networking and software development issues were raised like how to model, design, implement, and test software, how to consider and reflect uncertainty and heterogeneity due to the integration within the development phase, how to provide reliability and dependability on such systems, how to maintain such systems, and so on. Recently, security topics in CPS have come forward. The question however is whether the CPS’s structure changes the security requirements of those present in the areas of Internet of Things (IoT), M2M (Machine to Machine), or such communications? With multiple definitions of CPS today, the security issue is still an open field and many are linking CPS security with their own field of research. Some from programming or software engineering point of view, some with middleware/OS (operative system) point of view, and some with IoT, M2M, or such technologies. In fact, the security techniques in other fields would also help CPS security. The term is indeed attractive but the skeleton behind the technology is kind of the same on which different other security technologies may work. General works on IoT for instance, would also be relevant to such an interconnected system. This book aims to address these issues covering different mechanisms related to CPS security. Different types of thoughts on these issues are welcome. The topics should cover the following and other related issues (but not limited to these, if related to CPS security):


- Security protocol development for CPS;

- Access control techniques for CPS;

- Secure CPS architectures;

- Key management in CPS;

- Intrusion detection for CPS;

- Security of embedded systems;

- Security of CPS in various engineering applications;

- Security of industrial control systems related to CPS;

- Security of Internet-of-Things;

- M2M security in the context of CPS;

- RFID Applications security in Cyber-Physical System;


Submission Instructions


Each manuscript should be written in a tutorial manner with enough details so that it can be easily accessible for the readers outside the specialty of the area. Expected manuscript length is between 9,500 to 12,500 words. Longer manuscripts may be allowed based on the topic and need. Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. The manuscript must be prepared with MS-Office (doc or docx). Kindly do not use any special formatting or macro for the submission version, doc or docx file. General guideline is: Use A4 page with 1 inch (or, 2.54 cm) margin on all sides, single column format, 1.5 line spacing with 11 point sized font, Times New Roman. An all-in-one PDF file may be submitted for the initial submission however, if the chapter is accepted, this formatting style must be followed and MS-Office file must be supplied.


A chapter proposal should be sent to the editor as soon as possible. Please email to both and


Important Dates


Chapter Proposal Submission:

15 July, 2014

Full Manuscript Submission:

15 September, 2014

Notification (Last Date):

January 05, 2015

Final/Revised Manuscript:

February 05, 2015

Publication Time:

2015 (2nd half) -Tentative


Editor Contact Information


Al-Sakib Khan Pathan

Department of Computer Science, KICT,

International Islamic University Malaysia (IIUM), Malaysia

Tel:  +603-61964000 Ext. 5653, Cell: +60163910754

E-Mails: ,