- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Anomaly Detection Techniques and Applications
- Electrostatic Discharge in Electronics
- Information and Cyber Security
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Advanced MIMO Systems Optimization
- Advanced Wireless Network Optimization
- IoT and Edge/Fog Computing
- Cooperative Communication and Network Coding
- Adversarial Robustness in Machine Learning
- Privacy-Preserving Technologies in Data
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Cryptographic Implementations and Security
- Water Systems and Optimization
- Maritime Navigation and Safety
- Ferroelectric and Negative Capacitance Devices
- Privacy, Security, and Data Protection
- Industrial Vision Systems and Defect Detection
- Mobile Crowdsensing and Crowdsourcing
- Cryptography and Data Security
Newcastle University
2023-2025
Jamia Millia Islamia
2024
University of Strathclyde
2021-2023
Singapore University of Technology and Design
2015-2021
University Ucinf
2021
Delft University of Technology
2020
HITEC University
2014
Seoul National University
2013
The architecture of a water distribution testbed (WADI), and on-going research in the design secure system is presented. WADI consists three stages controlled by Programmable Logic Controllers (PLCs) two via Remote Terminal Units (RTUs). Each PLC RTU uses sensors to estimate state actuators effect control. currently used (a) conduct security analysis for networks, (b) experimentally assess detection mechanisms potential cyber physical attacks, (c) understand how impact an attack on one CPS...
A novel scheme is proposed to authenticate sensors and detect data integrity attacks in a Cyber Physical System (CPS). The technique uses the hardware characteristics of sensor physics process create unique patterns (herein termed as fingerprints) for each sensor. fingerprint function noise embedded measurements. Uniqueness appears due manufacturing imperfections features physical process. To sensor's system-model based approach used. noise-based created during normal operation system. It...
In this manuscript, we present a detailed case study about model-based attack detection procedures for Cyber-Physical Systems (CPSs). particular, using EPANET (a simulation tool water distribution systems), simulate Water Distribution Network (WDN). Using data and sub-space identification techniques, an input-output Linear Time Invariant (LTI) model the network is obtained. This used to derive Kalman filter estimate evolution of system dynamics. Then, residual variables are constructed by...
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical Systems (CPSs). A combined fingerprint for sensor and process noise created during the normal operation of system. Under spoofing attack, pattern deviates from fingerprinted enabling attacks. To extract (difference between expected observed value) a representative model system derived. Kalman filter used purpose state estimation. By subtracting estimates real states, residual vector obtained....
Data-centric approaches are becoming increasingly common in the creation of defense mechanisms for critical infrastructure such as electric power grid and water treatment plants. Such often use well-known methods from machine learning system identification, i.e., Multi-Layer Perceptron, Convolutional Neural Network, Deep Auto Encoders to create process anomaly detectors. detectors then evaluated using data generated an operational plant or a simulator; rarely is assessment conducted real...
Abstract Gradual increase in the number of successful attacks against Industrial Control Systems (ICS) has led to an urgent need create defense mechanisms for accurate and timely detection resulting process anomalies. Towards this end, a class anomaly detectors, created using data-centric approaches, are gaining attention. Using machine learning algorithms such approaches can automatically learn dynamics control strategies deployed ICS. The use these leads relatively easier faster creation...
An experiment was conducted on a water treatment plant to investigate the effectiveness of using Kalman filter based attack detection schemes in Cyber Physical System (CPS). implemented with Chi-Square detector. Random, stealthy bias, and replay attacks were launched results analysed. Analysis indicates that false data injection cannot be detected by legacy failure methods.
Cyberphysical systems (CPSs) are part of the critical infrastructure. CPS security is challenging because system can be attacked from both cyber and physical domains. In this article, a comprehensive study taken to summarize challenges proposed solutions for securing physics-based perspective.
Massive volumes of malware spread incidents continue to occur frequently across the Internet Things (IoT). Owing its self-learning and adaptive capability, artificial intelligence (AI) can provide assistance for automatically converging an optimal strategy. By merging AI into edge computing, we consider intelligence-enabled IoT (EIIoT) environment a stochastic learning strategy suppressing malware. In particular, introduce game theory symbolise whole process confrontation between nodes....
Fingerprinting of various physical and logical devices has been proposed for uniquely identifying users or mainstream IT systems such as PCs, laptops, smart phones. However, the application techniques in Industrial Control Systems (ICS) is less explored reasons a lack direct access to cost faithfully reproducing realistic threat scenarios. This work addresses feasibility using fingerprinting context ICS related water treatment distribution systems. A model-free sensor scheme ( NoiSense )...
A lot of research in security cyber physical systems focus on threat models where an attacker can spoof sensor readings by compromising the communication channel. little is given to attacks components. In this paper a method detect potential components Cyber Physical System (CPS) proposed. are detected through comparison noise pattern from measurements reference pattern. If adversary has physically modified or replaced sensor, proposed issues alert indicating that probably compromised...
To ensure the proper functioning of critical systems, it is important to design secure Cyber Physical Systems (CPS). Since CPS are connected most studies consider external adversaries as a threat model, which might not be able cater for an insider with physical access system. In this article, we proposed attack detection mechanism who has CPS. The method exploits dynamics system and detects based on laws Physics. Based mass flow equations, analyze rate change in plant's process create...
Adversarial learning is used to test the robustness of machine algorithms under attack and create attacks that deceive anomaly detection methods in Industrial Control System (ICS). Given security assessment an ICS demands exhaustive set possible patterns studied, this work, we propose association rule mining-based generation technique. The technique has been implemented using data from a Secure Water Treatment plant. proposed was able generate more than 110,000 constituting vast majority new...
Critical infrastructures across many industries, such as smart water treatment and distribution networks (SWTDNs) power generation public transport networks, depend on the supervisory control data acquisition (SCADA) system. However, being core component of critical infrastructures, it has made SCADA-based SWTDN system an attractive target for cyberattacks. A successful attack SCADA will have a devastating impact in terms proper operations; therefore, safeguarding from cyberattacks is...