Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, Selcuk Uluagac, Hossain Shahriar, Mohammad Ashiqur Rahman
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems Conference Paper
In the Proceedings of 46th Annual Computers, Software and Applications Conference (COMPSAC), 2022.
Abstract | Links | BibTeX | Tags: Blockchain Security, CPS Security
@conference{9842711,
title = {A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems},
author = {Alvi Ataur Khalil and Javier Franco and Imtiaz Parvez and Selcuk Uluagac and Hossain Shahriar and Mohammad Ashiqur Rahman},
url = {https://ui.adsabs.harvard.edu/abs/2021arXiv210707916A/abstract},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {In the Proceedings of 46th Annual Computers, Software and Applications Conference (COMPSAC)},
abstract = {Blockchain has become a key technology in a plethora of application domains owing to its decentralized public nature. The cyber-physical systems (CPS) is one of the prominent application domains that leverage blockchain for myriad operations, where the Internet of Things (IoT) is utilized for data collection. Although some of the CPS problems can be solved by simply adopting blockchain for its secure and distributed nature, others require complex considerations for overcoming blockchain-imposed limitations while maintaining the core aspect of CPS. Even though a number of studies focus on either the utilization of blockchains for different CPS applications or the blockchain-enabled security of CPS, there is no comprehensive survey including both perspectives together. To fill this gap, we present a comprehensive overview of contemporary advancement in using blockchain for enhancing different CPS.},
keywords = {Blockchain Security, CPS Security},
pubstate = {published},
tppubtype = {conference}
}
Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice Journal Article
IEEE Transactions on Information Forensics and Security (TIFS) Journal, 2021.
Abstract | Links | BibTeX | Tags: CPS Security
@article{BabunCPS,
title = {CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice},
author = {Leonardo Babun and Hidayet Aksu and A. Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/9340269/},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {IEEE Transactions on Information Forensics and Security (TIFS) Journal},
abstract = {Cyber-Physical Systems (CPS) utilize different devices to collect sensitive data, communicate with other systems, and monitor essential processes in critical infrastructure applications. However, in the ecosystem of CPS, unauthorized or spoofed devices may danger or compromise the performance and security of the critical infrastructure. The unauthorized and spoofed devices may include tampered pieces of software or hardware components that can negatively impact CPS operations or collect vital CPS metrics from the network. Such devices can be outsider or insider threats trying to impersonate other real CPS devices via spoofing their legitimate identifications to gain access to systems, steal information, or spread malware. Device fingerprinting techniques are promising approaches to identify unauthorized or illegitimate devices. However, current fingerprinting solutions are not suitable as they disrupt critical},
keywords = {CPS Security},
pubstate = {published},
tppubtype = {article}
}
Javier Franco, Ahmet Aris, Berk Canberk, A Selcuk Uluagac
A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems Journal Article
IEEE Communications Surveys & Tutorials, 2021.
Abstract | BibTeX | Tags: CPS Security, IoT Security
@article{franco2021survey,
title = {A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems},
author = {Javier Franco and Ahmet Aris and Berk Canberk and A Selcuk Uluagac},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {IEEE Communications Surveys & Tutorials},
publisher = {IEEE},
abstract = {The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health, transportation, manufacturing, infrastructure, and agriculture. However, they have become popular targets of attacks, due to their inherent limitations which create vulnerabilities. Honeypots and honeynets can prove essential to understand and defend against attacks on IoT, IIoT, and CPS environments by attracting attackers and deceiving them into thinking that they have gained access to the real systems. Honeypots and honeynets can complement other security solutions (i.e., firewalls, Intrusion Detection Systems - IDS) to form a strong defense against malicious entities. This paper provides a comprehensive survey of the research that has been carried out on honeypots and honeynets for IoT, IIoT, and CPS. },
keywords = {CPS Security, IoT Security},
pubstate = {published},
tppubtype = {article}
}
Amit Kumar Sikder, Leonardo Babun, A Selcuk Uluagac
Aegis+ a context-aware platform-independent security framework for smart home systems Journal Article
Digital Threats: Research and Practice Journal, 2021.
Abstract | Links | BibTeX | Tags: CPS Security, IoT Security
@article{sikder2021aegis+,
title = {Aegis+ a context-aware platform-independent security framework for smart home systems},
author = {Amit Kumar Sikder and Leonardo Babun and A Selcuk Uluagac},
url = {https://dl.acm.org/doi/pdf/10.1145/3359789.3359840},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {Digital Threats: Research and Practice Journal},
publisher = {ACM New York, NY, USA},
abstract = {The introduction of modern Smart Home Systems (SHSs) is redefining the way we perform everyday activities. Today, myriad SHS applications and the devices they control are widely available to users. Specifically, users can easily download and install the apps from vendor-specific app markets, or develop their own, to effectively implement their SHS solutions. However, despite their benefits, app-based SHSs unfold diverse security risks. Several attacks have already been reported to SHSs and current security solutions only consider smart home devices and apps individually to detect malicious actions, rather than the context of the SHS as a whole. Thus, the current security solutions applied to SHSs cannot capture user activities and sensor-device-user interactions in a holistic fashion. To address these limitations, in this article, we introduce Aegis+, a novel context-aware platform-independent security framework.},
keywords = {CPS Security, IoT Security},
pubstate = {published},
tppubtype = {article}
}
Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A Selcuk Uluagac
HDMI-watch: Smart intrusion detection system against HDMI attacks Journal Article
IEEE Transactions on Network Science and Engineering Journal, 2020.
Abstract | BibTeX | Tags: CPS Security, IoT Security, Smart Home Security
@article{rondon2020hdmi,
title = {HDMI-watch: Smart intrusion detection system against HDMI attacks},
author = {Luis Puche Rondon and Leonardo Babun and Kemal Akkaya and A Selcuk Uluagac},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
journal = {IEEE Transactions on Network Science and Engineering Journal},
publisher = {IEEE},
abstract = {The High Definition Multimedia Interface (HDMI) is the backbone and the de-facto standard for Audio/Video connections between video-enabled devices. Today, nearly ten billion HDMI devices are used to distribute A/V signals in homes, offices, concert halls, and sporting events. An important component in HDMI is the Consumer Electronics Control (CEC) protocol, which allows HDMI devices to share an HDMI distribution to communicate and interact with each other. In this work, we identify security and privacy issues in HDMI networks by taping into CEC protocol vulnerabilities, using them to implement realistic proof-of-work attacks on HDMI distribution networks. We study how current insecure CEC protocol practices and carelessly implemented HDMI distributions may grant an adversary a novel attack surface for HDMI devices, otherwise thought to be unreachable through traditional network means.},
keywords = {CPS Security, IoT Security, Smart Home Security},
pubstate = {published},
tppubtype = {article}
}
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A Selcuk Uluagac
PoisonIvy: (In) secure Practices of Enterprise IoT Systems in Smart Buildings Conference Paper
In the Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 2020.
Abstract | Links | BibTeX | Tags: CPS Security, IoT Security, Smart Home Security
@conference{rondon2020poisonivy,
title = {PoisonIvy: (In) secure Practices of Enterprise IoT Systems in Smart Buildings},
author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A Selcuk Uluagac},
url = {https://dl.acm.org/doi/abs/10.1145/3408308.3427606},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
booktitle = {In the Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation},
pages = {130–139},
abstract = {The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes worldwide. Although commodity IoT devices are employed by ordinary end-users, complex environments such as smart buildings, government, or private smart offices, conference rooms, or hospitality require customized and highly reliable solutions. Those systems called Enterprise Internet of Things (EIoT) connect such environments to the Internet and are professionally managed solutions usually offered by dedicated vendors (e.g., Control4, Crestron, Lutron, etc.). As EIoT systems require specialized training, software, and equipment to deploy, many of these systems are closed-source and proprietary in nature. This has led to very little research investigating the security of EIoT systems and their components. },
keywords = {CPS Security, IoT Security, Smart Home Security},
pubstate = {published},
tppubtype = {conference}
}
Kyle Denney, Leonardo Babun, A Selcuk Uluagac
USB-watch: A generalized hardware-assisted insider threat detection framework Journal Article
Journal of Hardware and Systems Security, 2020.
Abstract | Links | BibTeX | Tags: CPS Security, IoT Security
@article{denney2020usb,
title = {USB-watch: A generalized hardware-assisted insider threat detection framework},
author = {Kyle Denney and Leonardo Babun and A Selcuk Uluagac},
url = {https://link.springer.com/article/10.1007/s41635-020-00092-z},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
journal = {Journal of Hardware and Systems Security},
publisher = {Springer},
abstract = {Today, the USB protocol is among the most widely used protocolsmostly due to its plug-and-play nature and number of supported devices. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices are able to disguise themselves as benign devices to insert malicious commands to connected end devices. Currently, a rogue device appears as a normal USB device to the average OS, requiring advanced detection schemes (i.e., classification) to identify malicious behaviors from the devices. However, using system-level hooks, an advanced threat may subvert OS-reliant detection schemes. This paper showcases USB-Watch, a hardware-based USB threat detection framework. },
keywords = {CPS Security, IoT Security},
pubstate = {published},
tppubtype = {article}
}
Oscar Bautista, Kemal Akkaya, A Selcuk Uluagac
Customized novel routing metrics for wireless mesh-based swarm-of-drones applications Journal Article
Internet of Things Journal, 2020.
Abstract | Links | BibTeX | Tags: CPS Security, IoT Security
@article{bautista2020customized,
title = {Customized novel routing metrics for wireless mesh-based swarm-of-drones applications},
author = {Oscar Bautista and Kemal Akkaya and A Selcuk Uluagac},
url = {https://www.sciencedirect.com/science/article/pii/S2542660520300998},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
journal = {Internet of Things Journal},
publisher = {Elsevier},
abstract = {With the proliferation of drones, there is an increasing interest on utilizing swarm-of-drones in numerous applications from surveillance to search and rescue. While a swarm-of-drones (a.k.a flying ad hoc networks (FANETs)) is essentially a special form of mobile ad-hoc networks (MANETs) which has been studied for many years, there are unique requirements of drone applications that necessitate re-visiting MANET protocols. These challenges stem from 3-D environments the drones are deployed in, and their specific way of mobility which adds to the wireless link management challenges among the drones. To tackle these challenges, in this paper, we propose adopting the current mesh standard, namely IEEE 802.11s, in its routing capabilities to provide improved performance. Specifically, we propose two new link quality routing metrics called SrFTime and CRP as an alternative to the IEEE 802.11s default Airtime.},
keywords = {CPS Security, IoT Security},
pubstate = {published},
tppubtype = {article}
}
Amit Kumar Sikder, Hidayet Aksu, A Selcuk Uluagac
Context-aware intrusion detection method for smart devices with sensors Patent
US Patent, 2019, (US Patent 10,417,413).
Abstract | Links | BibTeX | Tags: CPS Security, IoT Security
@patent{sikder2019context,
title = {Context-aware intrusion detection method for smart devices with sensors},
author = {Amit Kumar Sikder and Hidayet Aksu and A Selcuk Uluagac},
url = {https://patents.google.com/patent/US10417413B2/en},
year = {2019},
date = {2019-09-01},
urldate = {2019-09-01},
publisher = {Google Patents},
abstract = {A smart device can include a data oriented sensor providing a numerical value, a logic oriented sensor providing a state, a sensor value collector connected to the data oriented sensor, a sensor logic state detector connected to the logic oriented sensor, a data processor connected to the sensor value collector and the sensor logic state detector, and a data analyzer connected to the data processor. The data processor can take the numerical value received from the sensor value collector, calculate an average value from the numerical value, sample the state receiving from the sensor logic state detector, and create an input matrix by using the average value and the sampled state. The data analyzer can receive the input matrix, train an analytical model, and check a data to indicate whether a state of the smart device is malicious or not.},
howpublished = {US Patent},
note = {US Patent 10,417,413},
keywords = {CPS Security, IoT Security},
pubstate = {published},
tppubtype = {patent}
}
Z Berkay Celik, Patrick McDaniel, Gang Tan, Leonardo Babun, A Selcuk Uluagac
Verifying internet of things safety and security in physical spaces Journal Article
IEEE Security & Privacy Journal, 2019.
Abstract | BibTeX | Tags: CPS Security, IoT Security
@article{celik2019verifying,
title = {Verifying internet of things safety and security in physical spaces},
author = {Z Berkay Celik and Patrick McDaniel and Gang Tan and Leonardo Babun and A Selcuk Uluagac},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
journal = {IEEE Security & Privacy Journal},
publisher = {IEEE},
abstract = {Concerns about safety and security have led to questions about the risk of embracing the Internet of Things (IoT). We consider the needs and techniques for verifying the correct operation of IoT devices and environments within the physical spaces they inhabit.},
keywords = {CPS Security, IoT Security},
pubstate = {published},
tppubtype = {article}
}
Leonardo Babun, Hidayet Aksu, A Selcuk Uluagac
A system-level behavioral detection framework for compromised CPS devices: Smart-grid case Journal Article
ACM Transactions on Cyber-Physical Systems Journal, 2019.
Abstract | Links | BibTeX | Tags: CPS Security, IoT Security
@article{babun2019system,
title = {A system-level behavioral detection framework for compromised CPS devices: Smart-grid case},
author = {Leonardo Babun and Hidayet Aksu and A Selcuk Uluagac},
url = {https://dl.acm.org/doi/fullHtml/10.1145/3355300},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
journal = {ACM Transactions on Cyber-Physical Systems Journal},
publisher = {ACM New York, NY, USA},
abstract = {Cyber-Physical Systems (CPS) play a significant role in our critical infrastructure networks from power-distribution to utility networks. The emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communications between smart devices to increase efficiency, enhance reliability, and reduce costs. However, compromised devices in the smart grid poses several security challenges. Consequences of propagating fake data or stealing sensitive smart grid information via compromised devices are costly. Hence, early behavioral detection of compromised devices is critical for protecting the smart grids components and data. To address these concerns, in this article, we introduce a novel and configurable system-level framework to identify compromised smart grid devices. },
keywords = {CPS Security, IoT Security},
pubstate = {published},
tppubtype = {article}
}
Faraz Naseem, Leonardo Babun, Cengiz Kaygusuz, S. J. Moquin, Chris Farnell, Alan Mantooth, A. Selcuk Uluagac
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System Conference Paper
In the proceedings of the International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2019.
Abstract | Links | BibTeX | Tags: CPS Security
@conference{Naseem2019CSPoweR,
title = {CSPoweR-Watch: A Cyber-Resilient Residential Power Management System},
author = {Faraz Naseem and Leonardo Babun and Cengiz Kaygusuz and S. J. Moquin and Chris Farnell and Alan Mantooth and A. Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/8875295/},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
publisher = {In the proceedings of the International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
abstract = {Modern Energy Management Systems (EMS) are becoming increasingly complex in order to address the urgent issue of global energy consumption. These systems retrieve vital information from various Internet-connected resources in a smart grid to function effectively. However, relying on such resources results in them being susceptible to cyber attacks. Malicious actors can exploit the interconnections between the resources to perform nefarious tasks such as modifying critical firmware, sending bogus sensor data, or stealing sensitive information. To address this issue, we propose a novel framework that integrates PowerWatch, a solution that detects compromised devices in the smart grid with Cyber-secure Power Router (CSPR), a smart energy management system. The goal is to ascertain whether or not such a device has operated maliciously. To achieve this, PowerWatch utilizes a machine learning model that analyzes information from system and library call lists extracted from CSPR in order to detect malicious activity in the EMS. To test the efficacy of our framework, a number of unique attack scenarios were performed on a realistic testbed that comprises functional versions of CSPR and PowerWatch to monitor the electrical environment for suspicious activity. Our performance evaluation investigates the effectiveness of this first-of-its-kind merger and provides insight into the feasibility of developing future cybersecure EMS. The results of our experimental procedures yielded 100% accuracy for each of the attack scenarios. Finally, our implementation demonstrates that the integration of PowerWatch and CSPR is effective and yields minimal overhead to the EMS.},
keywords = {CPS Security},
pubstate = {published},
tppubtype = {conference}
}
Kemal Akkaya, A Selcuk Uluagac, Abdullah Aydeger, Apurva Mohan
Secure Software Defined Networking Architectures for The Smart Grid Journal Article
Smart Grid-Networking, Data Management, and Business Models Book, 2017.
Abstract | Links | BibTeX | Tags: CPS Security, SDN Security, Smart Home Security
@article{AkkayaSecureSmart,
title = {Secure Software Defined Networking Architectures for The Smart Grid},
author = {Kemal Akkaya and A Selcuk Uluagac and Abdullah Aydeger and Apurva Mohan},
url = {https://www.taylorfrancis.com/chapters/edit/10.1201/b19664-3/secure-software-defined-networking-architectures-smart-grid-kemal-akkaya-selcuk-uluagac-abdullah-aydeger-apurva-mohan},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
journal = {Smart Grid-Networking, Data Management, and Business Models Book},
abstract = {This chapter summarizes the use of software-defined networking (SDN) for various applications in the smart grid. It explains how SDN can be utilized in the applications, describes potential security threats that can arise as a result of deploying SDN in these applications, and suggests solutions to alleviate the threats. The chapter explores the ample unique research challenges within an SDN-enabled smart grid infrastructure and provides some background on SDN. It examines how several smart grid applications can exploit SDN by summarizing the existing efforts and discusses the security issues with SDN and potential security threats related to smart grid-enabled SDN. The SDN-enabled networks become more flexible and accessible networks with software interfaces making it very convenient for network management. SDN can provide more fine-grained control on traffic compared to traditional networks. SDN enables innovation on the network and each transmission control protocol/Internet protocol layer might have an independent innovation.},
keywords = {CPS Security, SDN Security, Smart Home Security},
pubstate = {published},
tppubtype = {article}
}
Mehmet Hazar Cintuglu, Osama A. Mohammed, Kemal Akkaya, A. Selcuk Uluagac
A Survey on Smart Grid Cyber-Physical System Testbeds Journal Article
IEEE Communications Surveys & Tutorials Journal, 2017.
Abstract | Links | BibTeX | Tags: CPS Security
@article{CintugluSurveyIEEE,
title = {A Survey on Smart Grid Cyber-Physical System Testbeds},
author = {Mehmet Hazar Cintuglu and Osama A. Mohammed and Kemal Akkaya and A. Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/document/7740849},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
journal = {IEEE Communications Surveys & Tutorials Journal},
abstract = {An increasing interest is emerging on the development of smart grid cyber-physical system testbeds. As new communication and information technologies emerge, innovative cyber-physical system testbeds need to leverage realistic and scalable platforms. Indeed, the interdisciplinary structure of the smart grid concept compels heterogeneous testbeds with different capabilities. There is a significant need to evaluate new concepts and vulnerabilities as opposed to counting on solely simulation studies especially using hardware-in-the-loop test platforms. In this paper, we present a comprehensive survey on cyber-physical smart grid testbeds aiming to provide a taxonomy and insightful guidelines for the development as well as to identify the key features and design decisions while developing future smart grid testbeds. First, this survey provides a four step taxonomy based on smart grid domains, research goals, test platforms, and communication infrastructure. Then, we introduce an overview with a detailed discussion and an evaluation on existing testbeds from the literature. Finally, we conclude this paper with a look on future trends and developments in cyber-physical smart grid testbed research.},
keywords = {CPS Security},
pubstate = {published},
tppubtype = {article}
}
Edwin Vattapparamban, Ismail Güvenç, Ali I Yurekli, Kemal Akkaya, Selçuk Uluağaç
Drones for smart cities: Issues in cybersecurity, privacy, and public safety Conference Paper
In the Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC), 2016.
Abstract | Links | BibTeX | Tags: CPS Security, UAV Security
@conference{VattapparambanDronesIWCMC,
title = {Drones for smart cities: Issues in cybersecurity, privacy, and public safety},
author = {Edwin Vattapparamban and Ismail Güvenç and Ali I Yurekli and Kemal Akkaya and Selçuk Uluağaç},
url = {https://ieeexplore.ieee.org/document/7577060},
year = {2016},
date = {2016-01-01},
urldate = {2016-01-01},
booktitle = {In the Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC)},
abstract = {It is expected that drones will take a major role in the connected smart cities of the future. They will be delivering goods and merchandise, serving as mobile hot spots for broadband wireless access, and maintaining surveillance and security of smart cities. However, pervasive use of drones for future smart cities also brings together several technical and societal concerns and challenges that needs to be addressed, including in the areas of cybersecurity, privacy, and public safety. Drones, while can be used for the betterment of the society, can also be used by malicious entities to conduct physical and cyber attacks, and threaten the society. The goal of this survey paper is to review various aspects of drones in future smart cities, relating to cybersecurity, privacy, and public safety. We will also provide representative results on cyber attacks using drones.},
keywords = {CPS Security, UAV Security},
pubstate = {published},
tppubtype = {conference}
}
Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac
A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks Conference Paper
In the Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2016.
Abstract | Links | BibTeX | Tags: CPS Security
@conference{TonyaliHomomorphiCCNC,
title = {A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks},
author = {Samet Tonyali and Kemal Akkaya and Nico Saputro and A. Selcuk Uluagac},
url = {https://csl.fiu.edu/wp-content/uploads/2023/05/reliable_data_tonyali.pdf},
year = {2016},
date = {2016-01-01},
urldate = {2016-01-01},
booktitle = {In the Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)},
abstract = {One of the most common methods to preserve consumers' private data is using secure in-network data aggregation. The security can be provided through the emerging fully (FHE) or partial (PHE) homomorphic encryption techniques. However, an FHE aggregation scheme generates significantly big-size data when compared to traditional encryption methods. The overhead is compounded in hierarchical networks such as Smart Grid Advanced Metering Infrastructure (AMI) as data packets are routed towards the core of the AMI networking infrastructure from the smart meters. In this paper, we first investigate the feasibility and performance of FHE aggregation in AMI networks utilizing the reliable data transport protocol, TCP. Then, we introduce the packet reassembly problem. To address this challenge, we propose a novel packet reassembly mechanism for TCP. We evaluated the effectiveness of our proposed mechanism using both PHE and FHE-based aggregation approaches in AMI in terms throughput and end-to-end delay on an 802.11s-based wireless mesh network by using the ns-3 network simulator. The results indicate significant gains in terms of delay and bandwidth usage with the proposed mechanism.},
keywords = {CPS Security},
pubstate = {published},
tppubtype = {conference}
}
Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
A framework for counterfeit smart grid device detection Conference Paper
In the Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2016.
Abstract | Links | BibTeX | Tags: CPS Security, Fingerprinting
@conference{BabunSmartGridIEEECNS,
title = {A framework for counterfeit smart grid device detection},
author = {Leonardo Babun and Hidayet Aksu and A. Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/document/7860522},
year = {2016},
date = {2016-01-01},
urldate = {2016-01-01},
booktitle = {In the Proceedings of the IEEE Conference on Communications and Network Security (CNS)},
abstract = {The core vision of the smart grid concept is the realization of reliable two-way communications between smart devices (e.g., IEDs, PLCs, PMUs). The benefits of the smart grid also come with tremendous security risks and new challenges in protecting the smart grid systems from cyber threats. Particularly, the use of untrusted counterfeit smart grid devices represents a real problem. Consequences of propagating false or malicious data, as well as stealing valuable user or smart grid state information from counterfeit devices are costly. Hence, early detection of counterfeit devices is critical for protecting smart grid's components and users. To address these concerns, in this poster, we introduce our initial design of a configurable framework that utilize system call tracing, library interposition, and statistical techniques for monitoring and detection of counterfeit smart grid devices. In our framework, we consider realistic counterfeit device scenarios with different smart grid devices and adversarial settings. Our initial results on a realistic testbed utilizing actual smart-grid GOOSE messages with IEC-61850 communication protocol are very promising. Our framework is showing excellent rates on detection of smart grid counterfeit devices from impostors.},
keywords = {CPS Security, Fingerprinting},
pubstate = {published},
tppubtype = {conference}
}
Selcuk Uluagac, Kemal Akkaya, Apurva Mohan, Mehmet H Cintuglu, Tarek Youssef, Osama Mohammed, Daniel Sullivan
Wireless Infrastructure in Industrial Control Systems Journal Article
Cyber-security of SCADA and Other Industrial Control Systems, 2016.
Links | BibTeX | Tags: CPS Security, Network Security
@article{UluagacWirelessSpringer,
title = {Wireless Infrastructure in Industrial Control Systems},
author = {Selcuk Uluagac and Kemal Akkaya and Apurva Mohan and Mehmet H Cintuglu and Tarek Youssef and Osama Mohammed and Daniel Sullivan},
url = {https://csl.fiu.edu/wp-content/uploads/2023/05/wireless_book.pdf},
year = {2016},
date = {2016-01-01},
urldate = {2016-01-01},
journal = {Cyber-security of SCADA and Other Industrial Control Systems},
publisher = {Springer},
keywords = {CPS Security, Network Security},
pubstate = {published},
tppubtype = {article}
}
A. Selcuk Uluagac, Venkatachalam Subramanian, Raheem Beyah
Sensory channel threats to Cyber Physical Systems: A wake-up call Conference Paper
In the Proceedings of the IEEE Conference on Communications and Network Security, 2014.
Abstract | Links | BibTeX | Tags: CPS Security
@conference{UluagacSensoryIEEE,
title = {Sensory channel threats to Cyber Physical Systems: A wake-up call},
author = {A. Selcuk Uluagac and Venkatachalam Subramanian and Raheem Beyah},
url = {https://ieeexplore.ieee.org/document/6997498},
year = {2014},
date = {2014-01-01},
urldate = {2014-01-01},
booktitle = {In the Proceedings of the IEEE Conference on Communications and Network Security},
abstract = {Cyber-Physical Systems (CPS) is a relatively novel computing paradigm where there is a tight integration of communications, computation, and the physical environment. An important component of the CPS devices is the sensors they use to interact with each other and the physical world around them. With CPS applications, engineers monitor the structural health of highways and bridges, farmers check the health of their crops, and ecologists observe wildlife in their natural habitat. Nonetheless, current security models consider protecting only networking components of the CPS devices utilizing traditional security mechanisms (e.g., an intrusion detection system for the data that traverse the network protocol stacks). The protection mechanisms are not sufficient to protect CPS devices from threats emanating from sensory channels. Using sensory channels (e.g., light, temperature, infrared), an adversary can successfully attack systems. Specifically, the adversary can (1) trigger existing malware, (2) transfer malware, or (3) combine malicious use of different sensory channels to increase the impact of the attack on CPS devices. In this work, we focus on these novel sensory channel threats to CPS devices and applications. We first note how sensory channel threats are an emerging area for the CPS world. Then, we analyze the performance various sensory channel threats. Moreover, using an iRobot Create as our CPS platform, we exploit simple vulnerable programs on iRobot through its infrared channel. Finally, we introduce the design of a novel sensory channel aware intrusion detection system as a protection mechanism against the sensory channel threats for CPS devices.},
keywords = {CPS Security},
pubstate = {published},
tppubtype = {conference}
}
Venkatachalam Subramanian, A. Selcuk Uluagac, Hasan Cam, Raheem Beyah
Examining the characteristics and implications of sensor side channels Conference Paper
In the proceedings of IEEE International Conference on Communications (ICC), 2013.
Abstract | Links | BibTeX | Tags: CPS Security, Network Security, Side Channel
@conference{SubramanianIEEE2013,
title = {Examining the characteristics and implications of sensor side channels},
author = {Venkatachalam Subramanian, A. Selcuk Uluagac and Hasan Cam and Raheem Beyah},
url = {https://ieeexplore.ieee.org/abstract/document/6654855/},
year = {2013},
date = {2013-01-01},
urldate = {2013-01-01},
booktitle = {In the proceedings of IEEE International Conference on Communications (ICC)},
abstract = {The nodes in wireless sensor networks (WSNs) utilize the radio frequency (RF) channel to communicate. Given that the RF channel is the primary communication channel, many researchers have developed techniques for securing that channel. However, the RF channel is not the only interface into a sensor. The sensing components, which are primarily designed to sense characteristics about the outside world, can also be used (or misused) as a communication (side) channel. In this paper, we characterize the side channels for various sensory components (i.e., light sensor, acoustic sensor, and accelerometer). While previous work has focused on the use of these side channels to improve the security and performance of a WSN, we seek to determine if the side channels have enough capacity to potentially be used for malicious activity. Specifically, we evaluate the feasibility and practicality of the side channels using today's sensor technology and illustrate that these channels have enough capacity to enable the transfer of common, well-known malware. The ultimate goal of this work is to illustrate the need for intrusion detection systems (IDSs) that not only monitor the RF channel, but also monitor the values returned by the sensory components.},
keywords = {CPS Security, Network Security, Side Channel},
pubstate = {published},
tppubtype = {conference}
}
Citations: 8413
h-index: 44
i10-index: 107