I am carrying out research on cyber and physical security technologies, as well as in the area where the two overlap.
Summary of research
Cyber-Physical Security of semi-autonomous vehicles
A cyber-physical system is vulnerable in both the cyber and physical space and especially where the two overlap, as a cyber-attack may cause it to initiate the wrong physical action, inconsistent with system states and goals. Our current research aims to equip cyber-physical systems with early warning of cyber threats, analogous to the sensation of "something is wrong" that humans experience when they enter an environment with real or perceived threats that are not immediately identifiable.
Defence against Denial of Service Attacks
Motivated by an impressive variety of reasons and directed against an equally impressive variety of targets, DoS
attacks are more difficult to defend than to launch. Recognising the fact that the networks of the near future will
feature self-awareness and online interaction with the users, we have developed novel techniques to improve
the DoS resilience of such networks. These include impact prediction, detection based on the random neural network, and priority-based response.
Cyber threats in Law Enforcement and Emergency Management
Law enforcement agencies, emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Our research focuses on the cyber threats that can lead to critical situations by impeding the work of law enforcement and emergency services, including but not limited to their social network-based communication with the public.
Wireless Robotic Routers for Emergency Response
A significant burden for the job of first responders during a disaster is the lack of communication with the victims due
to impaired or missing communication
infrastructure. A group of wireless equipped robots can establish a network with trapped civilians and provide the rescuers with voice or video connection and vital sensor data. How does one maximise the number of civilians connected to the network, while maintaining (usually multi-hop) connectivity between the robots? We propose optimisation algorithms both for central control (based on characteristics typically found in assignment and network flow optimisation problems, solved with a standard mixed integer programming solver) and for autonomous distributed control, taking into account the uncertainty of the locations.
Simulation of Building Evacuation
The optimisation of the evacuation of a building plays a fundamental role in emergency situations. The behaviour of individuals, the directions that civilians receive, and the actions of the emergency personnel, affect the success of
the operation. We have developed an agent-oriented Distributed Building Evacuation Simulator (DBES) that represents the individual, intelligent, and interacting agents that cooperate and compete while evacuating the building. The system takes into account detailed information about the building and the sensory capabilities that it may contain. Since its level of detail leads to computational needs that grow at least as a polynomial function of the number of the simulated agents, it has been designed to operate in a distributed manner. It has also been integrated with a wireless sensor network which offers a closed loop representation of the evacuation procedure, including the sensed data and the emergency decision making.
C32 - William Oliff, Avgoustinos Filippoupolitis, George Loukas. Evaluating the Impact of Malicious Spoofing Attacks on Bluetooth Low Energy Based Occupancy Detection Systems, IEEE SERA, London, UK 7-9 June 2017.
C31 - Syed Sadiqur Rahman, Ryan Heartfield, William Oliff, George Loukas, Avgoustinos Filippoupolitis. Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices, IEEE SERA, London, UK 7-9 June 2017.
C30 - Ryan Heartfield. George Loukas, Diane Gan. An eye for deception: A case study in utilising the Human-As-A-Security-Sensor paradigm to detect zero-day semantic social engineering attacks, IEEE SERA, London, UK 7-9 June 2017.
J13 - Charalampos Z. Patrikakis and George Loukas. Wear it or share it? Wearables and Security. Cutter Executive Update, Cutter Information Corp., 2017.
ACM Transactions on Internet Technology, IEEE Transactions on Network and Service Management, IEEE Transactions on Parallel and Distributed Systems, IEEE transactions on Systems, Man and Cybernetics, Elsevier Ad Hoc Networks, Elsevier Performance Evaluation, Elsevier Simulation Modelling Practice and Theory, BCS Computer Journal, Springer Journal of Internet Services and Applications, MDPI Future Internet, MDPI Sensors, MDPI Information, Wiley International Journal of Network Management
IEEE International Conference on Pervasive Computing (PERCOM), IEEE International Conference on High Performance and Communications (HPCC), IEEE International Symposium on Computer and Information Sciences (ISCIS), IEEE International Conference on High Performance Computing (HIPC), IEEE / ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE Global Communications Conference (GLOBECOM), IEEE Consumer Communications & Networking Conference (CCNC), International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Next Generation Internet Networks (NGI), International Conference on Artificial Neural Networks (ICANN), IAES International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), International Conference on Telecommunications (ICT).
Contact me on g.loukasgre.ac.uk, +44 (0)20 8331 9612, Room QM365, University of Greenwich, Old Royal Naval College, SE10 9LS, UK