Shahid Raza

About

Home page: https://shahidraza.net Shahid Raza is a Full Professor and the Chair of Cybersecurity at the University of Glasgow, Scotland, UK, and the Research Director of the Cybersecurity Unit at RISE Research Institutes of Sweden, where he has worked since 2008. He is also affiliated with Mälardalen University, Sweden, as a Professor of Cybersecurity, and is the co-founder and Research Director of Cybercampus Sweden. Shahid's work focuses on cybersecurity, with a particular emphasis on the security of the Internet of Things (IoT). His research interests include, but are not limited to, security and privacy in IPv6-connected IoT, the interconnection of computing clouds and IoT, AI and cybersecurity, the smart grid, and storage security in constrained environments. Shahid's research has been published in renowned international journals and conferences. He has received grants for both basic and applied research from the EU and Sweden, including a 2-year and subsequently a 3-year strategic grant from the Swedish VINNOVA’s SIP-IoT program; a 3-year grant from EU Eurostars; Horizon Europe CUSTODES; Horizon Europe HARPOCRATES; H2020 ARCADIAN-IoT; H2020 nIoVe; H2020 VEDLIoT; H2020 ESCEL SESREDAS; a strategic 4-year grant from VR Sweden and H2020 CONCORDIA; and two highly competitive 5-year grants from SSF Sweden. Shahid completed his industrial PhD at RISE Stockholm and Mälardalen University, Sweden, received a docentship from Uppsala University, Sweden, and also holds a Master of Science degree from KTH Royal Institute of Technology, Stockholm.

Work

University of Glasgow

United Kingdom of Great Britain and Northern Ireland

University of Glasgow
|

Chair Professor of Cybersecurity

United Kingdom of Great Britain and Northern Ireland

RISE Research Institutes of Sweden
|

Research Director

Sweden

Mälardalen University
|

Professor of Cybersecurity

Sweden

RISE Research Institutes of Sweden
|

Director of Cybersecurity Unit

Sweden

Uppsala University
|

Associate Professor

Sweden

RISE Research Institutes of Sweden
|

Senior Researcher

Sweden

RISE Research Institutes of Sweden AB
|

Researcher

Sweden

Swedish Institute of Computer Science
|

Internship/Master Thesis

Sweden

ABB Corporate Research Center Sweden
|

Industrial Internship/Master thesis

Sweden

COMSATS Institute of Information Technology - Abbottabad
|

Lecturer

Pakistan

Education

Swedish Institute of Computer Science
Sweden

Industrial Doctorate of Philosophy of Science (PhD)

Malardalens Hogskola
Sweden

Doctorate of Philosophy of Science (PhD)

Malardalens Hogskola
Sweden

Technology of Licentiate

KTH The Royal Institute of Technology
Sweden

Master of Science in Information and Communication Systems Security

Barani Institute of Information Technology
Pakistan

Bachelors of Science in Information Technology

Publications

6LoWPAN Compressed DTLS for CoAP

Summary

conference-paper

Demo abstract: Accurate power profiling of sensornets with the COOJA/MSPsim simulator

Summary

conference-paper

Securing communication in 6LoWPAN with compressed IPsec

Summary

conference-paper

Demo abstract: Securing communication in 6LoWPAN with compressed IPsec

Summary

conference-paper

Interconnecting WirelessHART and legacy HART networks

Summary

conference-paper

Design and implementation of a Security Manager for WirelessHART networks

Summary

conference-paper

More than malware: unmasking the hidden risk of cybersecurity regulations

Published by

International Cybersecurity Law Review

Summary

journal-article

AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance

Published by

Computers and Security

Summary

journal-article

Lightweight certificate revocation for low-power IoT with end-to-end security

Published by

Journal of Information Security and Applications

Summary

journal-article

Lightweight certificate revocation for low-power IoT with end-to-end security

Published by

Journal of Information Security and Applications

Summary

journal-article

FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning

Published by

ACM Transactions on Internet of Things

Summary

journal-article

Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems

Published by

IEEE Internet of Things Journal

Summary

journal-article

BLEND: Efficient and blended IoT data storage and communication with application layer security

Published by

Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022

Summary

conference-paper

Being Hacked: Understanding Victims' Experiences of IoT Hacking

Published by

Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022

Summary

conference-paper

EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme

Published by

IEEE Access

Summary

journal-article

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers

Published by

Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022

Summary

conference-paper

Experimental Analysis of Trustworthy In-Vehicle Intrusion Detection System Using eXplainable Artificial Intelligence (XAI)

Published by

IEEE Access

Summary

journal-article

ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack

Published by

IEEE Transactions on Dependable and Secure Computing

Summary

journal-article

Towards Automated PKI Trust Transfer for IoT

Published by

2022 IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022

Summary

conference-paper

Attestation Mechanisms for Trusted Execution Environments Demystified

Summary

book-chapter

Attestation Mechanisms for Trusted Execution Environments Demystified

Published by

arXiv

Summary

other

ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

A Look-ahead Towards 6G Security (Abstract)

Published by

Proceedings - 2022 International Conference on Cyberworlds, CW 2022

Summary

conference-paper

TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices

Published by

Security and Communication Networks

Summary

journal-article

LICE: Lightweight certificate enrollment for IoT using application layer security

Published by

2021 IEEE Conference on Communications and Network Security, CNS 2021

Summary

conference-paper

Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility

Published by

Journal of Advanced Transportation

Summary

journal-article

Security and trust preserving inter‐ and intra‐cloud VM migrations

Published by

International Journal of Network Management

Summary

journal-article

Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network

Published by

International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS - Proceedings

Summary

conference-paper

Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection

Published by

WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks

Summary

conference-paper

Quantitative system-level security verification of the IoV infrastructure

Published by

arXiv

Summary

other

PKI4IoT: Towards public key infrastructure for the Internet of Things

Published by

Computers & Security

Summary

journal-article

Group rekeying based on member join history

Published by

International Journal of Information Security

Summary

journal-article

FoNAC - An automated Fog Node Audit and Certification scheme

Published by

Computers & Security

Summary

journal-article

Application Layer Key Establishment for End-to-End Security in IoT

Published by

IEEE Internet of Things Journal

Summary

journal-article

Towards supporting IoT device storage and network security using DTLs

Published by

MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services

Summary

conference-paper

Indraj: Digital certificate enrollment for battery-powered wireless devices

Published by

WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks

Summary

conference-paper

Machine Learning for Security at the IoT Edge-A Feasibility Study

Published by

Proceedings - 2019 IEEE 16th International Conference on Mobile Ad Hoc and Smart Systems Workshops, MASSW 2019

Summary

conference-paper

Group-IKEv2 for multicast IPsec in the internet of things

Published by

International Journal of Security and Networks

Summary

journal-article

FDTLS: Supporting DTLS-based combined storage and communication security for IoT devices

Published by

Proceedings - 2019 IEEE 16th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2019

Summary

conference-paper

TinyIKE: Lightweight IKEv2 for Internet of Things

Published by

IEEE Internet of Things Journal

Summary

journal-article

ACE of spades in the IoT security game: A flexible IPsec security profile for access control

Published by

arXiv

Summary

other

Blockchain and IoT: Mind the Gap

Published by

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

Summary

book

Lightweight X.509 Digital Certificates for the Internet of Things

Published by

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

Summary

book

POSTER: On compressing pki certificates for resource limited internet of things devices

Published by

ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security

Summary

conference-paper

Towards formal verification of contiki: Analysis of the aes–ccm* Modules with frama-c

Published by

International Conference on Embedded Wireless Systems and Networks

Summary

conference-paper

Axiom: DTLS-based secure IoT group communication

Published by

ACM Transactions on Embedded Computing Systems

Summary

journal-article

Building the Internet of Things with bluetooth smart

Published by

Ad Hoc Networks

Summary

journal-article

Intrusion detection in the RPL-connected 6LoWPAN Networks

Published by

IoTPTS 2017 - Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, co-located with ASIA CCS 2017

Summary

conference-paper

Protecting Glossy-Based Wireless Networks from Packet Injection Attacks

Published by

Proceedings - 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2017

Summary

conference-paper

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things

Published by

Future Generation Computer Systems

Summary

journal-article

S3K: Scalable Security with Symmetric Keys - DTLS Key Establishment for the Internet of Things

Published by

IEEE Transactions on Automation Science and Engineering

Summary

journal-article

Security in Visible Light Communication: Novel Challenges and Opportunities

Published by

Sensors & Transducers Journal

Summary

journal-article

BSD-based Elliptic Curve Cryptography for the Open Internet of Things

Published by

The 7th IFIP International Conference on New Technologies, Mobility and Security (NTMS'15)

Summary

conference-paper

BSD-based ECC for the Contiki OS

Published by

The 12th European Conference on Wireless Sensor Networks (EWSN 2015))

Summary

conference-paper

Poster Abstract: Security Challenges in Indoor Location Sensing using Bluetooth LE Broadcast

Published by

The 12th European Conference on Wireless Sensor Networks (EWSN 2015))

Summary

conference-paper

An experimental study of attacks on the availability of Glossy

Published by

Computers & Electrical Engineering

Summary

journal-article

Bluetooth Smart: An Enabling Technology for the Internet of Things

Published by

In the Eight IEEE International Workshop on Selected Topics in Wireless and Mobile computing (STWiMob 2015) - Selected Topics in WiMob'15

Summary

conference-paper

Fusion: coalesced confidential storage and communication framework for the IoT

Published by

Security and Communication Networks

Summary

journal-article

Secure Communication for the Internet of Things - A Comparison of Link-Layer Security and IPsec for 6LoWPAN

Published by

Security and Communication Networks, Wiley

Summary

journal-article

Delegation-based Authentication and Authorization for the IP-based Internet of Things

Published by

11th IEEE International Conference on Sensing, Communication, and Networking (SECON'14)

Summary

conference-paper

SVELTE: Real-time intrusion detection in the Internet of Things

Summary

journal-article

Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services

Published by

Journal of the Indian Institute of Science

Summary

journal-article

Towards Viable Certificate-based Authentication for the Web of Things

Published by

ACM Workshop on Hot Topics on Wireless Network Security and Privacy, co-located with ACM WiSec 2013)

Summary

conference-paper

Routing Attacks and Countermeasures in the RPL-Based Internet of Things

Published by

International Journal of Distributed Sensor Networks

Summary

journal-article

Lithe: Lightweight Secure CoAP for the Internet of Things

Published by

Sensors Journal, IEEE

Summary

journal-article

INDIGO: Secure CoAP for Smartphones- Enabling E2E Secure Communication in the 6IoT

Published by

International Conference on Wireless Sensor Networks for Developing Countries (WSN4DC'13)

Summary

conference-paper

Combined Secure Storage and Communication for the Internet of Things

Published by

10th IEEE International Conference on Sensing, Communication, and Networking (SECON'13)

Summary

conference-paper

Land-use Change Analysis of District Abbottabad using GIS and Remote Sensing

Published by

Science Vision

Summary

journal-article

Secure communication for the Internet of Things

Summary

journal-article

6LoWPAN compressed DTLS for CoAP

Published by

Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2012

Summary

conference-paper

Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security

Published by

Proceedings of the IETF International Workshop on Smart Object Security

Summary

journal-article

Demo abstract: Securing communication in 6LoWPAN with compressed IPsec

Published by

2011 International Conference on Distributed Computing in Sensor Systems and Workshops, DCOSS'11

Summary

conference-paper

6LoWPAN Extension for IPsec

Published by

Proceedings of the IETF-IAB International Workshop on Interconnecting Smart Objects with the Internet

Summary

journal-article

Secure Key Renewal in WirelessHART

Published by

Proceedings of the Real-time Wireless for Industrial Applications (RealWin'11), CPS Week 2011

Summary

conference-paper

Securing communication in 6LoWPAN with compressed IPsec

Published by

2011 International Conference on Distributed Computing in Sensor Systems and Workshops, DCOSS'11

Summary

conference-paper

Securing Communication in 6LoWPAN with Compressed IPsec

Published by

Proceedings of the 7th IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS 2011)

Summary

conference-paper

Interconnecting WirelessHART and legacy HART networks

Published by

DCOSS '10 - International Conference on Distributed Computing in Sensor Systems, Adjunct Workshop Proceedings: IWSN, MobiSensors, Poster and Demo Sessions

Summary

conference-paper

Demo abstract: Accurate power profiling of sensornets with the COOJA/MSPSim simulator

Published by

2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09

Summary

conference-paper

Security considerations for the wirelessHART protocol

Published by

ETFA 2009 - 2009 IEEE Conference on Emerging Technologies and Factory Automation

Summary

conference-paper

Design and implementation of a security manager for wirelessHART networks

Published by

2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09

Summary

conference-paper