My research is concerned with two closely related problems. Firstly, intrusion detection and response techniques in wired and wireless networks. Secondly, reliable authentication protocols for resource constrained systems such as RFID systems and wireless ad hoc networks.
Intrusion detection and response problem can be viewed as a decision making problem, where parts of the system gather network statistics and report suspicious behaviour, and a response mechanism decide how respond based on this information. Since we can never be sure if nodes that participate in the network are malicious or honest, our aim is to strike an optimal balance between reducing the cost of potential threats and maximising network performance.
Another important decision making problem is authentication whether we need to decide whether or not to accept the credentials of an identity-carrying entity. In the context of cryptographic authentication, we have extensively investigated the family of distance bounding protocols. These can be used as the main countermeasure against relay attacks. We analyse the security of existing such protocols, describe attacks that can be launched against them, propose new ones and formalise and analyse distance bounding protocols both in the context of provable security and in the context of cost minimisation.
I am also interested in privacy issues related to the authentication problem. This may relate to the location of a participating party, in the case of distance-bounding protocols, or to other personal information (e.g. identity, picture, fingerprint) in the case of biometric authentication.
Some of these research directions were the focus of my Marie Curie IEF Research project titled PPIDR: Privacy Preserving Intrusion Detection and Response in Wireless Communications.


Research Interests
- RFID Security & Privacy
- Distance bounding protocols
- Intrusion Detection & Response
- Privacy-Preserving Biometrics
- Security in Wireless Ad hoc Networks
- Machine Learning for Security
- Privacy-preservation