Security in the Internet of Things: The Internet of Things (IoT) is the next technological leap that will introduce significant improvements to various aspects of the human environment, such as health, commerce, and transport. However, despite the fact that it may bring beneficial economic and social changes, the security and the privacy protection of objects and users remain a crucial challenge that has to be addressed. Specifically, now the security measures have to monitor and control the actions both of users and objects. However, the interconnected and independent nature of objects, as well as their constrained capabilities regarding the computing resources make impossible the applicability of the conventional security mechanisms. Moreover, the heterogeneity of various technologies which the IoT combines increases the complexity of the security processes, since each technology is characterized by different vulnerabilities. Furthermore, the tremendous amounts of data which is generated by the multiple interactions between the users and objects or among the objects make harder their management and the functionality of the access control systems. In this field, my research interests are devoted to developing appropriate countermeasures, such as effective access control mechanisms and Intrusion Detection and Prevention Systems (IDPS) based on statistical analysis and machine learning techniques.
Security in the Smart Grid: The Smart Grid (SG) paradigm constitutes the new technological evolution of the traditional electrical grid, providing remote monitoring and controlling capabilities among all its operations through computing services. These new capabilities offer a lot of benefits, such as better energy management, increased reliability and security, as well as more economical pricing. However, despite these advantages, it introduces significant security challenges, as the computing systems and the corresponding communications are characterized by several cybersecurity threats. In this field, my research interests include the development of efficient cybersecurity mechanisms, such as Intrusion Detection and Prevention Systems (IDPS), access controls systems, Security Information and Event Management (SIEM) systems and self-healing mechanisms.
Penetration Testing: Penetration testing is considered as the process involving authorized cyberattacks against a computing environment to discover possible cybersecurity breaches. Such a process does not only include procedures devoted to discovering vulnerabilities, but also exploiting them. According to the National Cyber Security Center (NIST), penetration testing is considered as “a method for gaining assurance in the security of an IT system by attempting to breach some or all of that system’s security, using the same tools and techniques as an adversary might.” Penetration testing usually includes many phases such as pre-engagement phase, information gathering, threat modelling, vulnerability analysis, exploitation, post-exploitation and reporting. In this area, my research interests include penetration testing processes concerning industrial environments utilizing legacy protocols such as Modbus, Distributed Network Protocol (DNP3), Profinet, IEC 60870-5-104 as well as IoT Protocols like Constrained Application Protocol (CoAP) and Message Queuing Telemetry Transport (MQTT).