Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3507657.3528671acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
keynote
Public Access

Everything is Connected: Security and Reliability for Critical Infrastructure

Published: 16 May 2022 Publication History

Abstract

From smart cities to smart cars and smart manufacturing, we live in a fully connected world. Critical infrastructure connects cyber and physical layers, and different critical infrastructures are in turn connected and interdependent (e.g., smart grids rely on cellular networks). However, the benefit of using such intelligent systems depends on their security and reliability just as much as it depends on their functionality. I work on approaches that operate across all these dimensions. This includes automated methods to identify and monitor Internet of Things devices, cellular networks and methods to detect and diagnose anomalous cells, and secure manufacturing, with formal methods to verify security properties.

References

[1]
Gabriela F. Ciocarlie, Christopher Connolly, Chih-Chieh Cheng, Ulf Lindqvist, Szabolcs Novaczi, Henning Sanneck and Muhammad Naseer-ul-Islam, Anomaly Detection and Diagnosis for Automatic Radio Network Verification, 6th International Conference on Mobile Networks and Management (MONAMI), September 2014.
[2]
Prashant Anantharaman, Liwei Song, Ioannis Agadakos, Gabriela Ciocarlie, Bogdan Copos, Ulf Lindqvist and Michael Locasto, IoTHound: Environment-agnostic Device Identification and Monitoring, International Conference on IoT, 2020.
[3]
Matthew Jablonski, Bo Yu, Gabriela Ciocarlie, Paulo Costa, A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation, IEEE Special Issue on Formal Methods Applied to Cyber-Physical Systems, 2021.

Index Terms

  1. Everything is Connected: Security and Reliability for Critical Infrastructure

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
      May 2022
      314 pages
      ISBN:9781450392167
      DOI:10.1145/3507657
      • General Chair:
      • Murtuza Jadliwala,
      • Program Chairs:
      • Yongdae Kim,
      • Alexandra Dmitrienko
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 May 2022

      Check for updates

      Author Tags

      1. anomaly detection
      2. critical infrastructure
      3. formal models
      4. internet of things
      5. radio networks

      Qualifiers

      • Keynote

      Funding Sources

      • US Department of Homeland Security (DHS) Science and Technology (S&T)
      • Department of Energy

      Conference

      WiSec '22

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 90
        Total Downloads
      • Downloads (Last 12 months)40
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media