- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Information and Cyber Security
- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Vehicle Dynamics and Control Systems
- Advanced Malware Detection Techniques
- Soil Mechanics and Vehicle Dynamics
- Vehicular Ad Hoc Networks (VANETs)
- Space exploration and regulation
- Hydraulic and Pneumatic Systems
- Simulation Techniques and Applications
- Autonomous Vehicle Technology and Safety
- Distributed systems and fault tolerance
- Cryptography and Data Security
- IoT and GPS-based Vehicle Safety Systems
- Electric and Hybrid Vehicle Technologies
- Space Satellite Systems and Control
- Cybersecurity and Cyber Warfare Studies
- Water Systems and Optimization
- Transport Systems and Technology
- Economic and Technological Developments in Russia
- Vibration and Dynamic Analysis
- Space Science and Extraterrestrial Life
- Privacy-Preserving Technologies in Data
University of Warwick
2019-2025
Ton Duc Thang University
2016-2024
Queen Mary University of London
2016-2018
Can Tho University
2018
Lancaster University
2017
Dayeh University
2015-2016
Middlesex University
2011-2013
Naval Air Warfare Center Weapons Division
2012
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the performance significantly by disrupting optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained semi-auto profiling technique that constructs high-level abstract of operations through simulation traces, to use as reference verifying node behaviors. This specification, including all legitimate states transitions with corresponding statistics, will be implemented set...
Routing protocol for low power and lossy networks (RPL) is the underlying routing of 6LoWPAN, a core communication standard Internet Things. RPL outperforms other wireless sensor ad hoc protocols in quality service (QoS), device management, energy saving performance. The Rank concept serves multiple purposes, including route optimization, prevention loops, managing control overhead. In this paper, we analyze several different types internal threats that are aimed at property study their...
SUMMARY Fuelled to bring the Internet of Things concept real life, Engineering Task Force is working on 6LoWPAN, in which standard allows a vast number smart objects be deployed local wireless sensor networks (WSNs) using huge address space IPv6 for data and information harvesting through Internet. From security point view, 6LoWPAN/WSN will open threats from network itself Cryptography techniques applied as front line defence or deterrent can easily broken because weak secure nature LoWPAN...
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) by introducing a new type threat - topology attack, which changes node operation breaking optimised network topology, designing specification-based IDS detecting it. We present two novel attacks this type: rank attack local repair attack. also propose an architecture using monitor backbone, describe its monitoring mechanisms through finite state machine implemented in each node. show that our...
Routing Protocol for Low Power and Lossy network (RPL) is the underlying routing protocol of 6LoWPAN standard to enable integration Wireless Sensor Network on Internet. Security an essential requirement protocol/standard be public accepted. One major security issue RPL non-tamper resistant nature wireless sensor device, which can make it easy compromised leads cryptography keys exposed. If this happens, attackers join as internal legitimate users manipulate operation based controlling nodes....
Connected autonomous vehicles (CAVs) will be deployed over the next decade with functionalities supported by new sensing and communication capabilities. Such functionality exposes CAVs to attacks that current not face. To ensure safety security of CAVs, it is important able identify ways in which system could attacked build defences against these attacks. One possible approach use reference architectures perform an attack surface analysis. Existing research has developed a variety but none...
In an era characterised by evolving cyber threats and sophisticated adversar-ial behaviour, the field of cyber-security faces a continuous formidablechallenge. The development dynamic adaptive security control mea-sures is imperative in order to safeguard critical assets information.This article delves into realm Moving Target Defence (MTD), astrategic approach that seeks outmanoeuvre adversaries constantlyshifting landscape. Our research specifically focuses on ap-plication Reinforcement...
This paper presents a machine learning approach to detect and classify misbehaviour in Vehicular Ad- hoc Networks. We describe three novel features obtained from analysis of n consecutive locations vehicle form judgement about its behaviour. These are used two algorithms (K-Nearest Neighbour Support Vector Machine) for detecting attacks the VeReMi dataset. show that overall precision rates can be as high 99.7%, whilst recall consistently higher than 99%. The we propose also help reduce...
One of the sectors which contributes importantly to development Vietnam economy is fishery industry. However, during recent year, it has been witnessed many difficulties on managing performance supply chain operations as a whole. In this paper, framework for risk management (SCRM) proposed. Initially, all activities are mapped by using Supply Chain Operations Reference (SCOR) model. Next, ranking analyzed in House Risk. Furthermore, interpretive structural modeling (ISM) used identify...
In today's cyber world, assessing security threats before implementing smart grids is essential to identify and mitigate the risks. Loss Event Frequency (LEF) a concept provided by well-known Factor Analysis of Information Risk (FAIR) framework assess categorize into five classes, based on their severity. As number increasing, it possible that many might fall under same LEF category, but FAIR cannot provide any further mechanism rank them. this paper, we propose method incorporate FAIR's...
This paper presents a vehicle stability controller based on an adaptive sliding mode algorithm for yielding the yaw rate and side-slip angle to track their target values. The control law is derived using dynamics of seven-degrees-of-freedom model, allowing smallest error be achieved while maintaining reasonable limits angle. effectiveness system tested under different driving conditions through computer simulation by CarSim model. results showed high performance designed even critical...
Abstract Self-sovereign identity (SSI) is an emerging and promising concept that enables users to control their while enhancing security privacy compared other management (IDM) approaches. Despite the recent advancements in SSI technologies, federated (FIDM) systems continue dominate IDM market. Selecting implement for a specific application complex task requires thorough understanding of potential external cyber risks. However, existing research scarcely compares FIDM from perspective these...
A canonical problem for autonomy is search and discovery. Often, searching needs to be unpredictable in order effective. In this paper, we investigate compare the effectiveness of traditional predictable lawnmower strategy that a random search. Specifically family searches with paths determined by heavy tailed distributions called Lévy stable investigated. These are characterized long flight paths, followed new direction, path lengths distribution parameter α. Two basic scenarios considered...