Our research in the ENAS Lab focuses on addressing critical security challenges across various emerging network domains. We investigate vulnerabilities and develop robust security solutions in areas such as:
Internet of Things (IoT) Security
The Internet of Things (IoT) involves a vast network of interconnected devices and sensors. As IoT integrates into our lives and critical systems, ensuring security is vital.
IoT security challenges are significant due to device diversity, resource limitations, scalability issues, vulnerability to attacks, data privacy concerns, and a lack of standardization.
Our research in the ENaS Lab addresses these challenges by developing secure solutions for IoT. We focus on areas like secure authentication, lightweight encryption, intrusion and anomaly detection, secure firmware updates, and privacy-preserving data handling. We also leverage machine learning and blockchain technologies to enhance IoT security.
Cyber-Physical Systems (CPS) Security
Cyber-Physical Systems (CPS) integrate computation, networking, and physical processes. Examples include smart grids, autonomous vehicles, industrial control systems, and the Internet of Robotic Things (IoRT). The security of CPS is critical because cyberattacks can have significant real-world consequences.
Security challenges in CPS are unique and severe. Attacks can directly impact physical operations, posing risks to safety and potentially causing physical damage. Integrating security into legacy systems is difficult, and real-time operational demands limit security response times. The vulnerability of sensors and actuators also presents significant entry points for attackers.
Our research in the ENaS Lab focuses on securing these vital systems. We develop methods for secure control system design and anomaly detection to identify malicious interference. Our work enhances the resilience of CPS against attacks and analyzes the security of their communication protocols. We also explore formal methods for security verification and address security in specific CPS applications like the smart grid.
Mobile Health (mHealth) Technologies Security
Mobile Health (mHealth) involves using mobile devices and wireless communication for healthcare services, including wearable sensors, mobile health apps, and remote patient monitoring. The sensitive nature of health data makes security in mHealth critically important.
The main security challenges in mHealth include protecting highly sensitive patient health information (PHI), ensuring the integrity and authenticity of health data, securing wireless communication channels, vulnerabilities in mobile health applications, and complying with regulations like HIPAA.
Our research addresses mHealth security by developing secure data handling and transmission methods. We focus on privacy-preserving techniques for health data, conducting security analysis of mHealth devices and applications, and ensuring secure authentication for users and devices in mHealth ecosystems.
Internet of Robotic Things (IoRT) Security
The Internet of Robotic Things (IoRT) integrates robots with the internet and other connected devices, enabling new applications in areas like manufacturing, logistics, and healthcare. Securing IoRT requires addressing challenges from both robotics and IoT.
Security challenges in IoRT include securing communication between robots and the network, preventing physical harm or manipulation resulting from cyber attacks on robots, ensuring the integrity and trustworthiness of data from robot sensors, maintaining secure control and programming of robots, and addressing privacy concerns related to data collected by robots.
Our research in IoRT security primarily focuses on developing robust machine learning-based Intrusion Detection Systems (IDS) specifically designed for resource-constrained, heterogeneous IoRT systems. We aim to create intelligent security solutions that can effectively identify and mitigate cyber threats within the unique operational environment of connected robots, considering their diverse capabilities and limited resources.