
Dr Neetesh Saxena
Lecturer
School of Computer Science and Informatics
- saxenan4@cardiff.ac.uk
- Abacws, Senghennydd Road, Cathays, Cardiff, CF24 4AG
- Available for postgraduate supervision
Overview
I am a Senior Lecturer with the School of Computer Science and Informatics at Cardiff University, UK having 16+ years of professional experience. Previosuly, he had affiliations with the Bournemouth University (UK), Georgia Institute of Technology (USA), Stony Brook University (USA) and SUNY Korea. I earned my PhD in Security from the Indian Institute of Technology (IIT), Indore, India. I was a DAAD Scholar at Bonn-Aachen International Center for Information Technology (B-IT), Rheinische-Friedrich-Wilhelms Universität, Bonn (Germany) and was also a TCS Research Scholar. My current research interests include cyber security and critical infrastructure security, including cyber-physical system security: smart grid, V2G and cellular communication networks.
Biography
Neetesh Saxena is working at the School of Computer Science and Informatics at Cardiff University, UK with more than 16 years of professional experience. Previosuly, he had affiliations with the Bournemouth University (UK), Georgia Institute of Technology (USA), Stony Brook University (USA) and SUNY Korea. He was a DAAD Scholar at Bonn-Aachen International Center for Information Technology (B-IT), Rheinische-Friedrich-Wilhelms Universität, Bonn (Germany) and was also a TCS Research Scholar. His current research interests include cyber security and critical infrastructure security, including cyber-physical system security: smart grid, V2G and cellular communication networks. He has published a number of high-quality publications in top-tier international journals and conferences, including IEEE/ACM Transactions. He is a recipient of two Best Paper Awards at IEEE ICC (ComSoc YP and WICE) and ICOIN. He has organised several conferences and workshops including an IEEE SMC Society sponsored summer school “Human Factors in System Safety and Security”. He has also served as a reviewer for international journals, such as IEEE - TIFS, TDSC, TVT, TSG, TII, TSC, TMC, and ACM - TOIT, TIOT, TOPS. He has also been a TPC member for international conferences such as IEEE ICC, IEEE MILCOM, IEEE TrustCom, IEEE SmartGridCom, ACM CCS, IEEE WiMob, IEEE PIMRC and IEEE ICCC, and a reviewer for ESORICS, ECIS, IEEE VTC, HICSS, and IEEE ICUFN. He is a Senior Member of IEEE and a member of ACM and Eta Kappa Nu.
Publications
2022
- Mohammed, A. S., Saxena, N. and Rana, O. 2022. Wheels on the modbus - attacking ModbusTCP communications. Presented at: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2022), San Antonio, TX, United States, 16-19 May 2022WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York: ACM pp. 288-289., (10.1145/3507657.3529654)
- Verma, G., Gope, P., Saxena, N. and Kumar, N. 2022. CB-DA: Lightweight and escrow-free certificate-based data aggregation for smart grid. IEEE Transactions on Dependable and Secure Computing (10.1109/TDSC.2022.3169952)
- Li, S., Iqbal, M. and Saxena, N. 2022. Future industry internet of things with aero-trust security. Information Systems Frontiers (10.1007/s10796-021-10199-5)
- Merlino, J. C., Asiri, M. and Saxena, N. 2022. DDoS cyber-incident detection in smart grids. Sustainability 14(5), article number: 2730. (10.3390/su14052730)
- Ali, S. S., Ganapathi, I. I., Vu, N., Ali, S. D., Saxena, N. and Werghi, . 2022. Image forgery detection using deeplearning by recompressing the images. Electronics 11(3), article number: 403. (10.3390/electronics11030403)
- Aljohani, R., Saxena, N. and Bhadoria, R. S. 2022. Security issues and challenges in cloud computing. In: Alharahsheh, H. H. and Mazumdar, A. eds. Handbook of Research on Cloud Computing Applications in SMES. IGI Global
- Khan, R., Saxena, N., Rana, O. and Gope, P. 2022. ATVSA: vehicle driver profiling for situational awareness. Presented at: IEEE European Symposium on Security and Privacy, ACSW, Genoa, Italy, 06-10 June 2022. IEEE
2021
- Kumar, A., Saxena, N., Souhwan, J. and Choi, B. J. 2021. Improving detection of false data injection attacks using machine learning with feature selection and oversampling. Electronics 15(1), article number: 212. (10.3390/en15010212)
- Nafees, M. N., Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, 14-19 November 2021CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM pp. 2450-2452., (10.1145/3460120.3485358)
- Orr, F., Nafees, M. N., Saxena, N. and Choi, B. J. 2021. Securing publisher-subscriber in smart grid infrastructure. Electronics 10(19), article number: 2355. (10.3390/electronics10192355)
- Liu, C., Alrowaili, Y., Saxena, N. and Konstantinou, C. 2021. Cyber risks to critical smart grid assets of industrial control systems. Energies 14(17), article number: 5501. (10.3390/en14175501)
- Burke, G. and Saxena, N. 2021. Cyber risks prediction and analysis in medical emergency equipment for situational awareness. Sensors 21(16), article number: 5325. (10.3390/s21165325)
- Karunarathne, S. M., Saxena, N. and Khan, M. K. 2021. Security and privacy in IoT smart healthcare. IEEE Internet Computing 25(4), pp. 37-48. (10.1109/MIC.2021.3051675)
- Chugh, N., Tomar, G. S., Bhadoria, R. S. and Saxena, N. 2021. A novel anomaly behavior detection scheme for mobile ad hoc networks. Electronics 10(14), article number: 1635. (10.3390/electronics10141635)
- Saxena, N., Xiong, L., Chukwuka, V. and Grijalva, S. 2021. Impact evaluation of malicious control commands in cyber-physical smart grids. IEEE Transactions on Sustainable Computing 6(2), pp. 208-220. (10.1109/TSUSC.2018.2879670)
- Nafees, M. N., Saxena, N. and Burnap, P. 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021, Virtual, 23-27 May 2021.
- Sharma, U., Tomer, P., Ali, S. S., Saxena, N. and Bhadoria, R. S. 2021. Optimized authentication system with high security and privacy. Electronics 10(4), article number: 458. (10.3390/electronics10040458)
- Gope, P., Millwood, O. and Saxena, N. 2021. A provably secure authentication scheme for RFID-enabled UAV applications. Computer Communications 166, pp. 19-25. (10.1016/j.comcom.2020.11.009)
- Kumar, A., Saxena, N. and Choi, B. J. 2021. Machine learning algorithm for detection of false data injection attack in power system. Presented at: 35th International Conference on Information Networking (ICOIN 2021), Jeju Island, Korea, 13-16 January 2021.
- Asiri, M., Saxena, N. and Burnap, P. 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021), Virtual, 08-10 August 2021.
- Kumar, A., Saxena, N. and Choi, B. J. 2021. FedTLG: federated learning using trusted local groups. Presented at: 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021), Virtual, 07-11 June 2021.
- Alrowaili, Y., Saxena, N. and Burnap, P. 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021), Virtual, 04-08 October 2021.
2020
- Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. R. and Burnap, P. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9(9), article number: 1460. (10.3390/electronics9091460)
- Tung, Y., Wei, H., Ti, Y., Tsou, Y., Saxena, N. and Yu, C. 2020. Counteracting UDP flooding attacks in SDN. Electronics 9(8), article number: 1239. (10.3390/electronics9081239)
- Saxena, N., Thomas, I., Gope, P., Burnap, P. and Kumar, N. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53(7), pp. 29-44. (10.1109/MC.2020.2989238)
- Saxena, N., Shen, H., Komninos, N., Choo, K. R. and Chaudhari, N. S. 2020. BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users. IEEE Transactions on Dependable and Secure Computing 17(3), pp. 550-565. (10.1109/TDSC.2018.2799223)
- Saxena, N., Cardenas, A. A., Beyah, R. and Lu, R. 2020. Introduction to the special issue on user-centric security and safety for CPS [Editorial]. ACM Transactions on Cyber-Physical Systems 4(3), article number: 29. (10.1145/3392715)
- Bhadoria, R. S., Nimbalkar, A. and Saxena, N. 2020. On the role of Blockchain technology in the Internet of Things. In: Kim, S. and Deka, G. C. eds. Advanced Applications of Blockchain Technology. Springer, pp. 129-140.
- Singh, V., Saxena, N., Pathak, D., Saini, G. and Bhatnagar, D. 2020. Improving smart healthcare safety & security using Kinect. Presented at: International Conference on Cybersecurity in Emerging Digital Era (ICCEDE 2020), Greater Noida, India, 9-10 October 2020.
- Asad, B., Saxena, N. and Katos, V. 2020. Analysis of the security and privacy risks and challenges in smart cities’ traffic light system. Presented at: 3rd Smart Cities Symposium (SCS 2020), Virtual, 21-23 September 2020.
- Asad, B. and Saxena, N. 2020. On the feasibility of DoS attack on smart door lock IoT network. Presented at: 8th International Symposium on Security in Computing and Communications (SSCC 2020), Virtual, 14-17 October 2020.
- Nafees, M. N., Saxena, N., Burnap, P. and Choi, B. J. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020), Virtual, 9-13 November 2020.
- Nafees, M. N., Saxena, N., Khan, R. and Burnap, P. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020), Virtual, 7-11 December 2020.
2019
- Adewole, K., Saxena, N. and Bhadauria, S. 2019. Application of cryptocurrencies using Blockchain for e-commerce online payment. In: Maleh, Y. et al. eds. Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications. C&C Press, Taylor & Francis Group, pp. 263-306.
- Saxena, N., Conti, M., Choo, K. R. and Chaudhari, N. S. 2019. BAS-VAS: A novel secure protocol for value added service delivery to mobile devices. IEEE Transactions on Information Forensics and Security 15, pp. 1470-1485. (10.1109/TIFS.2019.2940908)
2018
- Saxena, N. and Grijalva, S. 2018. Efficient signature scheme for delivering authentic control commands in the smart grid. IEEE Transactions on Smart Grid 9(5), pp. 4323-4334. (10.1109/TSG.2017.2655014)
- Saxena, N. and Choi, B. J. 2018. Integrated distributed authentication protocol for smart grid communications. IEEE Systems Journal 12(3), pp. 2545-2556. (10.1109/JSYST.2016.2574699)
- Chaudhary, R., Jindal, A., Aujla, G. S., Kumar, N., Das, A. K. and Saxena, N. 2018. LSCSH: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE COMMUNICATIONS MAGAZINE 56(4), pp. 24-32. (10.1109/MCOM.2018.1700787)
- Saxena, N., Grijalva, S. and Choi, B. J. 2018. Securing restricted publisher-subscriber communications in smart grid substations. Presented at: International Conference on COMmunication Systems and NETworkS (COMSNETS), Bengaluru, India, 3-7 Jan. 20182018 10th International Conference on Communication Systems & Networks (COMSNETS). IEEE pp. 364-371., (10.1109/COMSNETS.2018.8328220)
- Stone, J. A., Saxena, N. and Dogan, H. 2018. Systematic analysis: Resistance to traffic analysis attacks in Tor System for critical infrastructures. Presented at: IEEE International Conference on System, Man, and Cybernetics (SMC), Miyazaki, Japan, 7-10 Oct. 20182018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE pp. 2832-2837., (10.1109/SMC.2018.00482)
- Saxena, N. and Chaudhari, N. S. 2018. Secure algorithms for SAKA protocol in the GSM network. Presented at: 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain, 25-27 Sep. 20172017 10th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE pp. 1-8., (10.1109/WMNC.2017.8248853)
2017
- Saxena, N., Chukwuka, V., Xiong, L. and Grijalva, S. 2017. CPSA: A cyber-physical security assessment tool for situational awareness in smart grid. Presented at: ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in Conjunction with ACM CCS, Dallas, USA, 3 Nov. 2017CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. ACM pp. 69-79., (10.1145/3140241.3140246)
- Saxena, N., Grijalva, S., Chukwuka, V. and Vasilakos, A. V. 2017. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wireless Communications 24(4), pp. 88-98. (10.1109/MWC.2016.1600039WC)
- Saxena, N. and Grijalva, S. 2017. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication. IEEE Transactions on Industrial Informatics 13(3), pp. 1482-1491. (10.1109/TII.2016.2610950)
- Saxena, N., Choi, B. J. and Grijalva, S. 2017. Secure and privacy-preserving concentration of meeting data in AMI networks. Presented at: IEEE International Conference on Communications (ICC), Paris, France, 21-25 May 20172017 IEEE International Conference on Communications (ICC). IEEE pp. 1-7., (10.1109/ICC.2017.7996874)
2016
- Saxena, N., Grijalva, S. and Chaudhari, N. S. 2016. Authentication Protocol for an IoT-Enabled LTE Network. ACM Transactions on Internet Technology 16(4), pp. -., article number: 25. (10.1145/2981547)
- Saxena, N. and Choi, B. J. 2016. Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks. IEEE Transactions on Information Forensics and Security 11(7), pp. 1438-1452. (10.1109/TIFS.2016.2532840)
- Saxena, N., Choi, B. J. and Lu, R. 2016. Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Transactions on Information Forensics and Security 11(5), pp. 907-921. (10.1109/TIFS.2015.2512525)
2014
- Saxena, N. and Chaudhari, N. S. 2014. EasySMS: a protocol for end to end secure transmission of SMS. IEEE Transactions on Information Forensics and Security 9(7), pp. 1157-1168. (10.1109/TIFS.2014.2320579)
My current research interest is cybersecurity, cyber-physical system security, and IoT security.
Industrial Control System Security (Particularly, Smart Grid and Electric Vehicle Security): Secure smart grid infrastructure, securing smart grid network with plugged-in devices, decision support secure control centres in smart grid, cyber incident-response smart grid tool, developing techniques for monitoring the current health of the cyber-physical system in real-time, building cyber range capabilities under a virtual simulated environment.
5G and SMS Security: Security analysis of SMS-based applications, and real-time authentication and authorization among several new actors in the system.
IoT and Smart Cities' Security: Develop automated tools for identifying security vulnerabilities and interdependencies in devices and services, and developing IoT configuration and monitoring capable tools.
Human-Centric Security: Safety and security
For more information, please visit here.
Supervision
Ttopics for Potential Candidates:
Monitoring Critical Infrastructure Situational Awareness
Monitoring Safety Critical Systems’ Situational Awareness
Cyber-Physical Smart Grid Resilience
EV Infrastricture Security and Resilience
Autonomous Vehicle Security and Resilience
5G Communication Network Security
Improving the IoT security infrastructure of Smart Cities