Cyber Physical System Security

"Smart Grid Antenna" flickr photo by Stephen Rees https://flickr.com/photos/stephen_rees/16247317941 shared under a Creative Commons (BY-NC-ND) license

“Smart Grid Antenna” flickr photo by Stephen Rees https://flickr.com/photos/stephen_rees/16247317941 shared under a Creative Commons (BY-NC-ND) license

 

Cyber Physical Systems are interconnections of software and hardware components.  Areas of interest to members of BUCSR include vehicular security, smart grids, smart cities, and smart transportation.

Contacts:  Vasilis KatosNeetesh Saxena

Projects: Efficient and Secure IoT-based Protocol for the Smart Grid

Related Publications

  • R. Chaudhary, G. S. Aujla, N. Kumar, A. K. Das, N. Saxena, and J. J. P. C. Rodrigues, “LaCSys: Lattice-based Cryptosystem for Secure Communication in Smart Grid Environment,” in 2018 IEEE International Conference on Communications (ICC), 2018.
    [Bibtex]
    @inproceedings{chau18,
    author = {Rajat Chaudhary and Gagangeet Singh Aujla and Neeraj Kumar and Ashok Kumar Das and Neetesh Saxena and Joel J.P.C. Rodrigues},
    booktitle = {{2018 IEEE International Conference on Communications (ICC)}},
    title = {{LaCSys: Lattice-based Cryptosystem for Secure Communication in Smart Grid Environment}},
    publisher = {IEEE},
    note = {To Appear},
    year = {2018}}
  • R. Chaudhary, A. Jindal, G. S. Aujla, N. Kumar, A. K. Das, and N. Saxena, “LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment,” IEEE Communications Magazine, vol. 56, iss. 4, pp. 24-32, 2018.
    [Bibtex]
    @ARTICLE{chji18,
    author={R. Chaudhary and A. Jindal and G. S. Aujla and N. Kumar and A. K. Das and N. Saxena},
    journal={{IEEE Communications Magazine}},
    title={{LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment}},
    year={2018},
    volume={56},
    number={4},
    pages={24-32},
    month={APRIL}}
  • N. Saxena, H. Shen, N. Komninos, K. K. R. Choo, and N. S. Chaudhari, “BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users,” IEEE Transactions on Dependable and Secure Computing, vol. PP, iss. 99, pp. 1-1, 2018.
    [Bibtex]
    @article{sskc18,
    author={N. Saxena and H. Shen and N. Komninos and K. K. R. Choo and N. S. Chaudhari},
    journal={{IEEE Transactions on Dependable and Secure Computing}},
    title={{BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users}},
    year={2018},
    volume={PP},
    number={99},
    pages={1-1},
    month={}}
  • N. Saxena, G. Santiago, and B. J. Choi, “Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations,” in Proceedings of the 10th International Conference on COMunicating Systems & NETworks, IEEE, 2018.
    [Bibtex]
    @incollection{sasc18,
    author = {N. Saxena and G. Santiago and B. J. Choi},
    booktitle = {{Proceedings of the 10th International Conference on COMunicating Systems \& NETworks}},
    title = {{Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations}},
    publisher = {IEEE},
    year = {2018}}
  • N. Saxena, V. Katos, and N. Kumar, “Cyber-Physical Smart Grid Security Tool for Education and Training Purposes,” in Proceedings of the International Workshop on Realigning Cyber Security Education, Australian Defence Force Academy, 2017.
    [Bibtex]
    @incollection{saka17,
    author = {Neetesh Saxena and Vasilis Katos and Neeraj Kumar},
    booktitle = {{Proceedings of the International Workshop on Realigning Cyber Security Education}},
    title = {{Cyber-Physical Smart Grid Security Tool for Education and Training Purposes}},
    publisher = {Australian Defence Force Academy},
    year = {2017}}
  • K. Fysarakis, I. Askoxylakis, V. Katos, S. Ioannidis, and L. Marinos, “Security Concerns in Cooperative Intelligent Transportation Systems,” in Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017, p. 487–522.
    [Bibtex]
    @incollection{faki17,
    author = {K. Fysarakis and I. Askoxylakis and V. Katos and S. Ioannidis and L. Marinos},
    booktitle = {{Intrusion Detection and Prevention for Mobile Ecosystems}},
    title = {{Security Concerns in Cooperative Intelligent Transportation Systems}},
    publisher = {CRC Press},
    pages = {487--522},
    year = {2017}}
  • N. Saxena, V. Chukwuka, L. Xiong, and S. Grijalva, “CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid,” in Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), 2017, p. 69–79.
    [Bibtex]
    @inproceedings{scxg17,
    author = {Neetesh Saxena and Victor Chukwuka and Leilei Xiong and Santiago Grijalva},
    booktitle = {{Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security \& Privacy (CPS-SPC)}},
    title = {{CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid}},
    publisher = {ACM},
    pages = {69--79},
    year = {2017}}
  • E. Apeh, “Analysis of the Security Implications of Wearable Technology using Socio-technical Perspective,” in Proceedings of 25th European Conference on Information Systems, 2017.
    [Bibtex]
    @inproceedings{apeh17,
    author = {Edward Apeh},
    booktitle = {{Proceedings of 25th European Conference on Information Systems}},
    title = {{Analysis of the Security Implications of Wearable Technology using Socio-technical Perspective}},
    publisher = {Association for Information Systems},
    note = {To Appear},
    year = {2017}}
  • N. Saxena and B. J. Choi, “Integrated Distributed Authentication Protocol for Smart Grid Communications,” IEEE Systems Journal, vol. PP, iss. 99, pp. 1-12, 2017.
    [Bibtex]
    @ARTICLE{sach171,
    author={N. Saxena and B. J. Choi},
    journal={{IEEE Systems Journal}},
    title={{Integrated Distributed Authentication Protocol for Smart Grid Communications}},
    year={2017},
    volume={PP},
    number={99},
    pages={1-12}}
  • N. Saxena, S. Grijalva, V. Chukwuka, and A. V. Vasilakos, “Network Security and Privacy Challenges in Smart Vehicle-to-Grid,” IEEE Wireless Communications, vol. PP, iss. 99, p. 2–12, 2017.
    [Bibtex]
    @ARTICLE{sagc17,
    author={N. Saxena and S. Grijalva and V. Chukwuka and A. V. Vasilakos},
    journal={{IEEE Wireless Communications}},
    title={{Network Security and Privacy Challenges in Smart Vehicle-to-Grid}},
    year={2017},
    volume={PP},
    number={99},
    pages={2--12}}
  • N. Saxena and S. Grijalva, “Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication,” IEEE Transactions on Industrial Informatics, vol. 13, iss. 3, p. 1482–1491, 2017.
    [Bibtex]
    @ARTICLE{sagr171,
    author={N. Saxena and S. Grijalva},
    journal={{IEEE Transactions on Industrial Informatics}},
    title={{Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication}},
    year={2017},
    volume={13},
    number={3},
    pages={1482--1491},
    month={June}}
  • N. Saxena, B. J. Choi, and G. S., “Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks,” in IEEE International Conference on Communications, 2017.
    [Bibtex]
    @inproceedings{sachgr17,
    Author = {N. Saxena and B. J. Choi and Grijava S.},
    Booktitle = {{IEEE International Conference on Communications}},
    Title = {{Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks}},
    Year = {2017}}
  • N. Saxena, S. Grijalva, and N. S. Chaudhari, “Authentication Protocol for an IoT-Enabled LTE Network,” ACM Transactions on Internet Technology, vol. 16, iss. 4, p. 25:1 – 25:20, 2016.
    [Bibtex]
    @article{sagc16,
    Author = {N. Saxena and S. Grijalva and N. S. Chaudhari},
    Journal = {{ACM Transactions on Internet Technology}},
    Number = {4},
    Pages = {25:1 -- 25:20},
    Title = {{Authentication Protocol for an IoT-Enabled LTE Network}},
    Volume = {16},
    Year = {2016}}
  • N. Saxena and S. Grijavla, “Efficient signature scheme for delivering authentic control commands in the smart grid,” IEEE Transactions on Smart Grid, 2017.
    [Bibtex]
    @article{sagr17,
    Author = {N Saxena and S. Grijavla},
    Journal = {{IEEE Transactions on Smart Grid}},
    Title = {Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid},
    Year = {2017}}
  • K. Fysarakis, I. Askoxylakis, C. Manifavas, O. Soultatos, I. Papaefstathiou, and V. Katos, “Which IoT Protocol? Comparing standardized approaches over acCommon M2M application,” in Proceedings of IEEE Global Communications Conference, 2016.
    [Bibtex]
    @inproceedings{fyas16,
    Author = {K. Fysarakis and I. Askoxylakis and C. Manifavas and O. Soultatos and I. Papaefstathiou and V. Katos},
    Booktitle = {{Proceedings of IEEE Global Communications Conference}},
    Title = {{Which IoT Protocol? Comparing standardized approaches over acCommon M2M application}},
    Year = {2016}}
  • T. Mahmoodi, V. Kulkarni, W. Kellerer, P. Mangan, F. Zeiger, S. Spirou, I. Askoxylakis, X. Vilajosana, H. J. H.J. Einsiedler, and J. Quittek, “VirtuWind: virtual and programmable industrial network prototype deployed in operational wind park,” Transactions on emerging telecommunications technologies, vol. 27, iss. 9, pp. 1281-1288, 2016.
    [Bibtex]
    @article{makk16,
    Author = {T. Mahmoodi and V. Kulkarni and W. Kellerer and P. Mangan and F. Zeiger and S. Spirou and I. Askoxylakis and X. Vilajosana and H.J. Einsiedler, H.J. and Quittek, J.},
    Journal = {Transactions on Emerging Telecommunications Technologies},
    Number = {9},
    Pages = {1281-1288},
    Title = {{VirtuWind: virtual and programmable industrial network prototype deployed in operational wind park}},
    Volume = {27},
    Year = {2016}}
  • N. E. Petroulakis, G. Spanoudakis, I. G. Askoxylakis, A. Miaoudakis, and A. Tragantis, “A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems,” in Proceedings of the 2015 IEEE Global Communications Conference, 2016, p. 1–6.
    [Bibtex]
    @inproceedings{pesa16,
    Author = {N. E. Petroulakis and G. Spanoudakis and I. G. Askoxylakis and A. Miaoudakis and A. Tragantis},
    Booktitle = {{Proceedings of the 2015 IEEE Global Communications Conference}},
    Pages = {1--6},
    Title = {{A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems}},
    Year = {2016}}
  • P. E. Fouliras and V. Katos, “A novel security protocol enhancement on distributed multicasting for video on demand,” in Proceedings of the 5th international network conference, 2005, p. 129–136.
    [Bibtex]
    @inproceedings{foka05,
    Author = {P. E. Fouliras and V. Katos},
    Booktitle = {Proceedings of the 5th International Network Conference},
    Pages = {129--136},
    Publisher = {Plymouth University},
    Title = {A novel security protocol enhancement on distributed multicasting for video on demand},
    Year = {2005}}
  • I. Psaroudakis, V. Katos, and P. S. Efraimidis, “A novel mechanism for anonymizing global system for mobile communications calls using a resource-based session initiation protocol community network,” Security and communication networks, vol. 8, iss. 3, p. 486–500, 2015.
    [Bibtex]
    @article{pske15,
    Author = {Psaroudakis, Ioannis and Katos, Vasilios and Efraimidis, Pavlos S.},
    Journal = {Security and Communication Networks},
    Number = {3},
    Pages = {486--500},
    Title = {A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network},
    Volume = {8},
    Year = {2015}}
  • G. Avoine, L. Calderoni, J. Delvaux, D. Maio, and P. Palmieri, “Passengers information in public transport and privacy: can anonymous tickets prevent tracking?,” Int j. information management, vol. 34, iss. 5, p. 682–688, 2014.
    [Bibtex]
    @article{acdp14,
    Author = {Gildas Avoine and Luca Calderoni and Jonathan Delvaux and Dario Maio and Paolo Palmieri},
    Journal = {Int J. Information Management},
    Number = {5},
    Pages = {682--688},
    Title = {Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?},
    Url = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.05.004},
    Volume = {34},
    Year = {2014},
    Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.05.004}}