RESEARCH
Home Short Bio Research Publications Services Teaching Supervision
My research interest is thecyber-physical system security, particularly, security and privacy in Smart Grids, EVs, CAVs, IoTs and Cellular Networks, and Secure SMS based mobile applications.
Primarily, my research interests include cybersecurity critical infrastructure protection and industrial control system security -- including smart grid, vehicle-to-grid, and cellular communications security. My research work involves computer science and engineering (cyber security of IoTs and cyber-physical system security), power and transportation system (smart grid and vehicle-to-grid), cellular communication networks and SMS security, and human factors, hence it is multidisciplinary.
My research work has emerging impact on industrial control systems for making them more resilient and secure against advanced cyber-attacks, have better understanding of situational awareness and possibly detect future vulnerable states, and make them a safe place to work and deliver critical services.
My extended work on the safety and security of electric vehicle’s situational awareness include help drivers better understand the driving conditions (especially in remote areas), such as road infrastructure, position of EV, weather, destination route and battery level, in a secure manner and keep the privacy of the vehicle data collected and processed within the system (inline with GDPR).
My other work has a massive impact on people, such as public living in the rural and remote parts, through communications and SMS security, including secure SMS-based value-added services, mobile-banking services, emergency services, and confidential services delivery.
RESEARCH AREAS
Security and Privacy in Cellular Networks: GSM, UMTS, LTE
Cyber Security - Blockchain, Cyber Kill Chain, Threats and Vulnerabilities
Cyber-Physical System Security - Smart Grid, Smart Transportation, Healthcare
Smart grid Security, Vehicle-to-Grid Security and Privacy
Secure SMS Based Authentication Protocols and Applications
Cloud Data Storage and Password-Based System Security
Smart Home Devices/System Security and Smart Home Monitoring System Security
IoT Security and Privacy
provenance analysis
Research Grants/Awards
CyCIS - Cyber-Physical Critical Infrastructure Security - CyberASAP
UK-India Future Networks Pilot Project - AI-ENABLED SECURE FEDERATED DEEP REINFORCEMENT LEARNING FOR OPEN RAN
PETRAS - Integrity Checking at the Edge (ICE) for Operational Decision Support (ICE-ODS)
DPI (USA) - Net Zero Transportation Infrastructure
NSF-UKRI - Global Center for clean energy, equitable transportation solutions, team members
Cyber Security and Recommendations for Financial Institutions, Funded by EPIC – European Pacific Partnership for ICT - Expert Visitor (Coordinated by EUTEMA GMBH, Austria)
Top Venues Information: here
Computer Security and Cryptography: here
Computer Networks and Wireless Communication: here
Computing Systems: here
Engineering and Computer Science: here
Sustainable Energy: here
Data Sets
Dataset large-scale attacks in IoT environment here
Modbus Dataset 2023 here
The UNSW-NB15 Dataset Description: here
The BoT-IoT Dataset: here
Smart meter data from London area: here
Energy dataset: here
ICS cyber attack dataset: here
Network Security Dataset: here
Car-Hacking Dataset: here
In-Vehicle Network Intrusion Detection: here
Intrusion Detection Evaluation Dataset: here
AWID Intrusion Detection Dataset: here
Security Related Dataset: here
Cybersecurity Dataset: here
Other dataset: here
PhD/research fellowships:
Faraday Institution: here
THIS institute: here
Dataset: here
Autonomous Driving Datasets
Robotics
Other - Webots RoboDK Gazebo Open-RMF
Other topics:
Cellular Network Security:
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE (here)
IMP4GT: Impersonation Attacks in 4G Networks (here)
Exploring User Perceptions of Deletion in Mobile Instant Messaging Applications (here)
Blockchain and IoT:
Design of Blockchain-Based Authentication and Access Control Protocols in the Internet of Vehicles and Internet of Things Deployment
Practical and theoretical security assessments of devices Internet of Things Automatic Security Testbed
Blockchain and SG:
Secure P2P energy trading with energy Blockchain - Prosumers are able to sell any surplus energy they may have to peers connected to the same microgrid on a pay-per-use basis. Blockchain technology facilitates this peer-to-peer energy trading by providing members of a microgrid with a secure and transparent distributed ledger. This makes for an extremely reliable and cost-effective approach to creating, validating, recording, and reconciling peer-to-peer energy transactions in real-time.
Expanding Access to Energy - individuals or other small investors pool their resources to underwrite enough photovoltaic cells to build the requisite number of solar panels for a particular unelectrified community.
These micro-investors retain partial ownership of the solar panels and earn revenue as the community pays marginal monthly sums for the electricity generated by the panels.
Streamlining the Regulatory Process - Energy companies are required to submit massive volumes of data to regulators to prove their compliance with various regulations. Gathering and cleaning all this data using current technologies is not only incredibly tedious but can create serious issues related to improper data access. Also, more likely that sensitive corporate information can accidentally be exposed.
EV Security:
EV - Blockchain technology can be used to create a system capable of monitoring electricity prices, making pricing decisions in specific markets, and enabling owners of charging stations to conduct secure transactions.
Standards for ICS:
https://www.isa.org/intech/201810standards/
Cyber Security related Standards:
ISO 27001, SOC2, FedRAMP