- Smart Grid Security and Resilience
- Water Systems and Optimization
- Network Security and Intrusion Detection
- Water Treatment and Disinfection
- Urban Stormwater Management Solutions
- Advanced Malware Detection Techniques
- Information and Cyber Security
- Fault Detection and Control Systems
- Infrastructure Resilience and Vulnerability Analysis
- Water Quality Monitoring Technologies
- Anomaly Detection Techniques and Applications
- Electrostatic Discharge in Electronics
- Underwater Vehicles and Communication Systems
- Membrane Separation Technologies
- Physical Unclonable Functions (PUFs) and Hardware Security
- Water-Energy-Food Nexus Studies
- Advanced Data Processing Techniques
- Security and Verification in Computing
Indian Institute of Petroleum
2019-2022
Indian Institute of Management Visakhapatnam
2022
Andhra University
2021
Singapore University of Technology and Design
2017-2020
Indian Institute of Technology Madras
2014-2017
The architecture of a water distribution testbed (WADI), and on-going research in the design secure system is presented. WADI consists three stages controlled by Programmable Logic Controllers (PLCs) two via Remote Terminal Units (RTUs). Each PLC RTU uses sensors to estimate state actuators effect control. currently used (a) conduct security analysis for networks, (b) experimentally assess detection mechanisms potential cyber physical attacks, (c) understand how impact an attack on one CPS...
Industrial Control Systems (ICS) consisting of integrated hardware and software components designed to monitor control a variety industrial processes, are typically deployed in critical infrastructures such as water treatment plants, power grids gas pipelines.Unlike conventional IT systems, the consequences deviations from normal operation ICS have potential cause significant physical damage equipment, environment even human life.The active monitoring invariant rules that define conditions...
Abstract Modern critical infrastructure, such as a water treatment plant, distribution system, and power grid, are representative of Cyber Physical Systems (CPSs) in which the physical processes monitored controlled real time. One source complexity systems is due to intra-system interactions inter-dependencies. Consequently, these potential target for attackers. When one or more infrastructure attacked, connected may also be affected cascading effects. In this paper, we report study...
The manageability and resilience of critical infrastructures, such as power water networks, is challenged by their increasing interdependence interconnectivity. Power networks often experience cascading failures, i.e. blackouts, that have unprecedented economic social impact. Al- though knowledge exists about how to control complex non-linear phenomena within a single network, little known failures can spread coevolve in the network when failing components energize distribution...
The use of <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">invariants</i> in developing security mechanisms has become an attractive research area because their potential to both prevent attacks and detect Cyber-Physical Systems (CPS). In general, invariant is a property that expressed using design parameters along with Boolean operators which always holds normal operation system, particular, CPS. Invariants can be derived by analysing...
Abstract Cyber-physical systems (CPSs) in critical infrastructure face serious threats of attack, motivating research into a wide variety defence mechanisms such as those that monitor for violations invariants , i.e. logical properties over sensor and actuator states should always be true. Many approaches identifying attempt to do so automatically, typically using data logs, but these can miss valid system if relevant behaviours are not well-represented the data. Furthermore, CPS is already...
Water distribution networks (WDNs) are critical to provide safe, clean drinking water around the globe. However, they susceptible accidental or deliberate contamination, potentially resulting in poisoned water, many fatalities and large economic consequences. In order protect against such intrusions, an efficient sensor network should be placed a WDN. Finding optimal placement for quality sensors is challenging problem. Several strategies have been proposed, but vast majority of these rely...
Industrial Control Systems (ICS) monitor and control physical processes. ICS are found in, among others, critical infrastructures such as water treatment plants, distribution systems, the electric power grid. While existence of cyber-components in an leads to ease operations maintenance, it renders system under vulnerable cyber attacks. An experimental study was conducted with replay attacks launched on operational (WADI) plant understand what conditions attacker/attack can remain undetected...
Water Distribution Networks (WDNs) are an important part of our society. Contaminant intrusion into WDNs could potentially affect a large cross-section the population. Deliberate is most serious threat to WDN and can result in chemical and/or biological substances spreading throughout causing consequences. A contamination warning system needs be installed through sensors detect presence contaminants as early possible order protect public from exposure. In this work, we develop algorithms for...
The threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated the development of different attack detection mechanisms, such as those that monitor for violations invariants, i.e. properties always hold normal operation. Given complexity CPSs, several existing approaches focus on deriving invariants automatically from data logs, but these can miss possible system behaviours if they are not represented data. Furthermore, resolving any design flaws identified this...
Water Distribution Networks (WDNs) are an integral part of society. Deliberate introduction chemical or biological agents through accessible sites a WDN can spread the entire system and cause widespread damage to public health. In order protect against such deliberate attacks on WDN, effective efficient online monitoring sensors is needed. It clear that located at different nodes respond times depending which vulnerable node attacked. present study, we design sensor networks for...