Secure Consensus-based Time Synchronization in WSNs

Abstract Time synchronization is a fundamental service for various applications in wireless sensor networks. The recent consensus-based time synchronization protocols have provided fast convergence rate and high synchronization precision, but are still vulnerable to different malicious attacks. In this talk, we focus on how to defend the consensus-based time synchronization in wireless sensor networks under message manipulation attacks. We propose novel defense mechanisms to achieve secure distributed time synchronization. Furthermore, we prove… Read More

Indian Institutes of Technology (IIT) Guest Lectures

Part I: Cyber Security of Critical Infrastructures, A Case for a Schizoid Design Approach Abstract Sandeep K. Shukla Faculty, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur In the past, the design of cyber physical systems required a model based engineering approach, where as a first step of the design process — a physics based mathematical model of the physical system, and a control theoretic model of the control… Read More

Big Data: Threat Landscape and Protection Gap Analysis


  Abstract The advent of IoT and cloud services has resulted in collecting and sharing massive amounts of data. From a security perspective, these data represents a valuable target for attackers. As data-driven processes become integrated in the fabric of business, the entire society is becoming increasingly vulnerable to threats to data reliability and availability. Finally, the increase in redundancy of data available for collection, analysis and dissemination have strained traditional rules… Read More

Regional Security Day – 2015

The goal of this roundtable is to explore cyber security research, focusing on problems most relevant to the region.  How can we develop relevant and impactful research collaborations engaging to the MENA region?  What are the roadblocks we face to effectively collaborate, how do we problem solve and discover ways to overcome them?  In addition, related topics such as data sharing, test-bed development, and the recruitment of cyber security talent will also… Read More