The first industrial revolution was powered by steam engines, the second by electricity, and the third by computers. The next industrial revolution is projected to happen through connectivity. In that, machines are expected to grow smarter to create smart cities comprising of smart grids that intelligently supply only the required electricity from power plants to homes, smart vehicles that avoid road congestion by intelligently planning the routes along with autonomous capability. How are we going to assure resiliency and reliability in such systems so as to protect human life, and finances? Logically speaking, what are the types and the moving parts of such Machine-to-Machine (M2M) communications? In order to secure these systems, we first need to understand them and answer questions such as these.
Following is the list of publications and projects by the lab in the ICS domain:
P. Dangal and G. Bloom, “Towards Industrial Security Through Real-time Analytics,” in 2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC), May 2020, pp. 156–157, doi: 10.1109/ISORC49007.2020.00036.
G. Bloom, G. Cena, I. C. Bertolotti, T. Hu, N. Navet, and A. Valenzano, “Event Notification in CAN-Based Sensor Networks,” IEEE Transactions on Industrial Informatics, vol. 15, no. 10, pp. 5613–5625, Oct. 2019, doi: 10.1109/TII.2019.2904082.
E. Nwafor, A. Campbell, and G. Bloom, “Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs,” Orlando, Florida, USA, Apr. 2018.
S. Mohan et al., “Special Session: The Future of IoT Security,” in 2018 International Conference on Embedded Software (EMSOFT), Sep. 2018, pp. 1–7, doi: 10.1109/EMSOFT.2018.8537206.
G. Bloom, B. Alsulami, E. Nwafor, and I. C. Bertolotti, “Design patterns for the industrial Internet of Things,” in 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), Jun. 2018, pp. 1–10, doi: 10.1109/WFCS.2018.8402353.
E. Nwafor, A. Campbell, D. Hill, and G. Bloom, “Towards a provenance collection framework for Internet of Things devices,” in 2017 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computed, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Aug. 2017, pp. 1–6, doi: 10.1109/UIC-ATC.2017.8397531.
G. Bloom, G. Cena, I. C. Bertolotti, T. Hu, and A. Valenzano, “Optimized event notification in CAN through in-frame replies and Bloom filters,” in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), May 2017, pp. 1–10, doi: 10.1109/WFCS.2017.7991963.
G. Bloom, G. Cena, I. C. Bertolotti, T. Hu, and A. Valenzano, “Supporting security protocols on CAN-based networks,” in 2017 IEEE International Conference on Industrial Technology (ICIT), Mar. 2017, pp. 1334–1339, doi: 10.1109/ICIT.2017.7915557.