This page has only limited features, please log in for full access.
Dr Gregory Epiphaniou holds a position as an Associate Professor of security engineering at the University of Warwick. His role involves bid support, applied research and publications. Part of Gregory’s current research activities is formalised around a research group in wireless communications with the main focus on crypto-key generation, exploiting the time-domain physical attributes of V-V channels. He also led and contributed to several research projects funded by EPSRC, IUK and local authorities totalling over £3M.
Wireless, sensor and actuator technologies are often central to sensing or communication critical systems
Mohammad Hammoudeh; Paul Watters; Gregory Epiphaniou; A. Kayes; Pedro Pinto. Special Issue “Security Threats and Countermeasures in Cyber-Physical Systems”. Journal of Sensor and Actuator Networks 2021, 10, 54 .
AMA StyleMohammad Hammoudeh, Paul Watters, Gregory Epiphaniou, A. Kayes, Pedro Pinto. Special Issue “Security Threats and Countermeasures in Cyber-Physical Systems”. Journal of Sensor and Actuator Networks. 2021; 10 (3):54.
Chicago/Turabian StyleMohammad Hammoudeh; Paul Watters; Gregory Epiphaniou; A. Kayes; Pedro Pinto. 2021. "Special Issue “Security Threats and Countermeasures in Cyber-Physical Systems”." Journal of Sensor and Actuator Networks 10, no. 3: 54.
Drones, also known as Unmanned Aerial Vehicles (UAVs), are one of the highly emerging technologies of the modern day. Due to their small size, flying capabilities, and complex machinery, drones can be deployed in diverse fields, including agriculture, sports, entertainment, parcel delivery, disaster management, search and rescue, emergency medicine, and healthcare. In case of medical emergency, timely delivery of the required emergency kit is very important. This is often not possible in many underdeveloped countries due to lack of resources, traffic jams, congestion or challenging routes. Also, in times like today’s when the world is hit with COVID-19 pandemic, the movement is very limited due to lockdowns and emergency. In such case, drones can be deployed to deliver the emergency kits and collect samples for tests. This may save someones life as well as time and financial resources. In third world countries, the COVID-19 has spread chaos because of very limited hospitals, resources and staff. Therefore, it is difficult for the government and health officials to accommodate every patient or give him/her the care that he/she needs. Amidst the fear of pandemic, everyone is trying to undergo tests for COVID-19 which is difficult to handle In our research, we have proposed a solution that comprises smartphone application with the help of a patient sending a call to a healthcare centre for delivering emergency kit. The kit contains equipment with the help of which a person can collect swab. The drone takes the swab samples back to the healthcare centre for tests. We have introduced an optimization factor as a baseline for future studies of this kind. We have further conducted field experiments to test our proposed scheme. The results have shown that drones can be quite efficient in collecting samples and delivering emergency kits.
Fahad Saeed; Amjad Mehmood; Muhammad Faran Majeed; Carsten Maple; Khalid Saeed; Muhammad Kashif Khattak; Huihui Wang; Gregory Epiphaniou. Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles. Physical Communication 2021, 48, 101373 .
AMA StyleFahad Saeed, Amjad Mehmood, Muhammad Faran Majeed, Carsten Maple, Khalid Saeed, Muhammad Kashif Khattak, Huihui Wang, Gregory Epiphaniou. Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles. Physical Communication. 2021; 48 ():101373.
Chicago/Turabian StyleFahad Saeed; Amjad Mehmood; Muhammad Faran Majeed; Carsten Maple; Khalid Saeed; Muhammad Kashif Khattak; Huihui Wang; Gregory Epiphaniou. 2021. "Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles." Physical Communication 48, no. : 101373.
The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cyber-crime related circumstances which also affected society and business. The increased anxiety caused by the pandemic heightened the likelihood of cyber-attacks succeeding corresponding with an increase in the number and range of cyber-attacks. This paper analyses the COVID-19 pandemic from a cyber-crime perspective and highlights the range of cyber-attacks experienced globally during the pandemic. Cyber-attacks are analysed and considered within the context of key global events to reveal the modus-operandi of cyber-attack campaigns. The analysis shows how following what appeared to be large gaps between the initial outbreak of the pandemic in China and the first COVID-19 related cyber-attack, attacks steadily became much more prevalent to the point that on some days, three or four unique cyber-attacks were being reported. The analysis proceeds to utilise the UK as a case study to demonstrate how cyber-criminals leveraged salient events and governmental announcements to carefully craft and execute cyber-crime campaigns.
Harjinder Singh Lallie; Lynsay A. Shepherd; Jason R.C. Nurse; Arnau Erola; Gregory Epiphaniou; Carsten Maple; Xavier Bellekens. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security 2021, 105, 102248 .
AMA StyleHarjinder Singh Lallie, Lynsay A. Shepherd, Jason R.C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier Bellekens. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security. 2021; 105 ():102248.
Chicago/Turabian StyleHarjinder Singh Lallie; Lynsay A. Shepherd; Jason R.C. Nurse; Arnau Erola; Gregory Epiphaniou; Carsten Maple; Xavier Bellekens. 2021. "Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic." Computers & Security 105, no. : 102248.
By law, schools are required to protect the well-being of students against problems such as on-campus bullying and physical abuse. In the UK, a report by the Office for Education (OfE) showed 17% of young people had been bullied during 2017–2018. This problem continues to prevail with consequences including depression, anxiety, suicidal thoughts, and eating disorders. Additionally, recent evidence suggests this type of victimisation could intensify existing health complications. This study investigates the opportunities provided by Internet of Medical Things (IoMT) data towards next-generation safeguarding. A new model is developed based on blockchain technology to enable real-time intervention triggered by IoMT data that can be used to detect stressful events, e.g., when bullying takes place. The model utilises private permissioned blockchain to manage IoMT data to achieve quicker and better decision-making while revolutionising aspects related to compliance, double-entry, confidentiality, and privacy. The feasibility of the model and the interaction between the sensors and the blockchain was simulated. To facilitate a close approximation of an actual IoMT environment, we clustered and decomposed existing medical sensors to their attributes, including their function, for a variety of scenarios. Then, we demonstrated the performance and capabilities of the emulator under different loads of sensor-generated data. We argue to the suitability of this emulator for schools and medical centres to conduct feasibility studies to address sensor data with disruptive data processing and management technologies.
Nikolaos Ersotelos; Mirko Bottarelli; Haider Al-Khateeb; Gregory Epiphaniou; Zhraa Alhaboby; Prashant Pillai; Amar Aggoun. Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. Journal of Sensor and Actuator Networks 2020, 10, 1 .
AMA StyleNikolaos Ersotelos, Mirko Bottarelli, Haider Al-Khateeb, Gregory Epiphaniou, Zhraa Alhaboby, Prashant Pillai, Amar Aggoun. Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. Journal of Sensor and Actuator Networks. 2020; 10 (1):1.
Chicago/Turabian StyleNikolaos Ersotelos; Mirko Bottarelli; Haider Al-Khateeb; Gregory Epiphaniou; Zhraa Alhaboby; Prashant Pillai; Amar Aggoun. 2020. "Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study." Journal of Sensor and Actuator Networks 10, no. 1: 1.
IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked. IoT systems inherently present different fail-safe capabilities than traditional computing environments while their threat landscapes constantly evolve. Further, IoT devices have limited collective security measures in place. Therefore, there is a need for different approaches in threat assessments to incorporate the interdependencies between different IoT devices. In this paper, we run through the design cycle to provide a security-focused approach to the design of IoT systems using a use case, namely, an intelligent solar-panel project called Daedalus. We utilise STRIDE/DREAD approaches to identify vulnerabilities using a thin secure element that is an embedded, tamper proof microprocessor chip that allows the storage and processing of sensitive data. It benefits from low power demand and small footprint as a crypto processor as well as is compatible with IoT requirements. Subsequently, a key agreement based on an asymmetric cryptographic scheme, namely B-SPEKE was used to validate and authenticate the source. We find that end-to-end and independent stand-alone procedures used for validation and encryption of the source data originating from the solar panel are cost-effective in that the validation is carried out once and not several times in the chain as is often the case. The threat model proved useful not so much as a panacea for all threats but provided the framework for the consideration of known threats, and therefore appropriate mitigation plans to be deployed.
Soodamani Ramalingam; Hock Gan; Gregory Epiphaniou; Emilio Mistretta. A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments. Sensors 2020, 20, 5252 .
AMA StyleSoodamani Ramalingam, Hock Gan, Gregory Epiphaniou, Emilio Mistretta. A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments. Sensors. 2020; 20 (18):5252.
Chicago/Turabian StyleSoodamani Ramalingam; Hock Gan; Gregory Epiphaniou; Emilio Mistretta. 2020. "A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments." Sensors 20, no. 18: 5252.
The world is experiencing a rapid growth of smart cities accelerated by Industry 4.0, including the Internet of Things (IoT), and enhanced by the application of emerging innovative technologies which in turn create highly fragile and complex cyber–physical–natural ecosystems. This paper systematically identifies peer-reviewed literature and explicitly investigates empirical primary studies that address cyber resilience and digital forensic incident response (DFIR) aspects of cyber–physical systems (CPSs) in smart cities. Our findings show that CPSs addressing cyber resilience and support for modern DFIR are a recent paradigm. Most of the primary studies are focused on a subset of the incident response process, the “detection and analysis” phase whilst attempts to address other parts of the DFIR process remain limited. Further analysis shows that research focused on smart healthcare and smart citizen were addressed only by a small number of primary studies. Additionally, our findings identify a lack of available real CPS-generated datasets limiting the experiments to mostly testbed type environments or in some cases authors relied on simulation software. Therefore, contributing this systematic literature review (SLR), we used a search protocol providing an evidence-based summary of the key themes and main focus domains investigating cyber resilience and DFIR addressed by CPS frameworks and systems. This SLR also provides scientific evidence of the gaps in the literature for possible future directions for research within the CPS cybersecurity realm. In total, 600 papers were surveyed from which 52 primary studies were included and analysed.
Gabriela Ahmadi-Assalemi; Haider Al-Khateeb; Gregory Epiphaniou; Carsten Maple. Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities 2020, 3, 894 -927.
AMA StyleGabriela Ahmadi-Assalemi, Haider Al-Khateeb, Gregory Epiphaniou, Carsten Maple. Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities. 2020; 3 (3):894-927.
Chicago/Turabian StyleGabriela Ahmadi-Assalemi; Haider Al-Khateeb; Gregory Epiphaniou; Carsten Maple. 2020. "Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review." Smart Cities 3, no. 3: 894-927.