Sachin Shetty

Sachin Shetty
Old Dominion University | ODU · Department of Modeling, Simulation and Visualization Engineering

Doctor of Philosophy

About

298
Publications
129,366
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,538
Citations
Citations since 2017
175 Research Items
4097 Citations
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
Introduction
Sachin Shetty currently works at the Department of Modeling, Simulation and Visualization Engineering, Old Dominion University. Sachin does research in Computer Communications (Networks), Data Mining and Computer Engineering. Their current project is 'Resilient Control algorithms for cyber-physical system'.
Additional affiliations
July 2016 - present
Old Dominion University
Position
  • Professor (Associate)
August 2015 - July 2016
Tennessee State University
Position
  • Professor
Description
  • Led Cybersecurity research group and conducted funded research in areas of cloud computing, energy delivery systems and cyber insurance for DOD, DHS and DOE. Supervised 8 PhD and 6 Master students and taught graduate courses in network security
July 2009 - July 2015
Tennessee State University
Position
  • Professor
Description
  • Established Cyber security research lab and secured funding over $10 million to support cyber security research in cloud computing, mobile computing, cyber physical systems and insurance.

Publications

Publications (298)
Article
Full-text available
Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts...
Article
The integration of blockchain with various business scenarios in cyber physical systems, where resilience is critical for the stability of system operation, can provide decentralized, constant validation and a consistent view of the system state. However, there are significant managerial and cybersecurity challenges in the integration process. The...
Article
Full-text available
Blockchain-based decentralized infrastructure is intended to achieve peer-to-peer transactions without relying on centralized/trusted third parties. However, most of the existing blockchain systems suffer from several weaknesses including a certain level of centralization, centralized authority (e.g., data miners), and continuous increase in data s...
Article
Full-text available
A prioritized cyber defense remediation plan is critical for effective risk management in Energy Delivery System (EDS). Due to the complexity of EDS in terms of heterogeneous nature blending Information Technology (IT) and Operation Technology (OT) and Industrial Control System (ICS), scale and critical processes tasks, prioritized remediations sho...
Conference Paper
Full-text available
Persistent threats are the most sophisticated type of cyber attacks that involves multi-step attack sequences. There is a need to develop timely, efficient and appropriate intrusion response to mitigate the risk from persistent threats. In this paper, we model an intrusion response system by considering the diverse strategy an attacker could employ...
Conference Paper
Full-text available
Recently, Energy Delivery Systems (EDS) has been the target of several sophisticated attacks with potentials for catastrophic damages. These attacks are diverse in techniques, attack progression, and impacts. System administrators require comprehensive analytics to assess their defense against these diverse adversarial strategies. To address this c...
Conference Paper
Full-text available
Prioritized cyber defense remediation plan is critical for effective risk management in Energy Delivery System (EDS). Due to the complexity of EDS in terms of heterogeneous nature blending Information Technology (IT) and Operation Technology (OT) and Industrial Control System (ICS), scale and critical processes tasks, prioritized remediations shoul...
Conference Paper
Full-text available
Cyber resiliency of Energy Delivery Systems (EDS) is critical for secure and resilient cyber infrastructure. Defense-in-depth architecture forces attackers to conduct lateral propagation until the target is compromised. Researchers developed techniques based on graph spectral matrices to model lateral propagation. However, these techniques ignore h...
Conference Paper
Full-text available
Cyber threats have increased extensively during the last decade, especially in smart grids. Cybercriminals have become more sophisticated. Current security controls are not enough to defend networks from the number of highly skilled cybercriminals. Cybercriminals have learned how to evade the most sophisticated tools, such as Intrusion Detection an...
Conference Paper
Full-text available
A prioritized cyber defense remediation plan is critical for effective risk management in cyber-physical systems (CPS). The increased integration of Information Technology (IT)/Operational Technology (OT) in CPS has to lead to the need to identify the critical assets which, when affected, will impact resilience and safety. In this work, we propose...
Conference Paper
An attack graph is a crucial tool for network security analysis. Traditionally, network administrators utilize attack graphs to generate possible attack paths and estimate the attack probability (risk) in a networked environment. However, the attack probability does not alone provide enough directions to take security measures. Furthermore, there i...
Conference Paper
Today cyber adversaries utilize advanced techniques to victimize target assets. To tackle the adversaries, it is of utmost importance to understand potential techniques they may use to exploit network vulnerabilities. Attack graph has always been a crucial tool for network vulnerability analysis. However, the current state-of-the-art attack graph c...
Article
The Internet of Things (IoT) is a network of interconnected, Internet-connected items (i.e., smart devices) that can collect and transmit data across a wireless network without the need for human intervention. IoT enables the systems to have higher efficiency and dependability in their day-to-day operations due to its strong focus on machine-to-mac...
Article
Over the past few years, online social networks (OSNs) have become an inseparable part of people's daily lives. Instead of being passive readers, people are now enjoying their role as content contributors. OSN has permitted its users to share their information including the multimedia content. OSN users can express themselves in virtual communities...
Chapter
Federated learning is a collaborative and distributed machine learning model that addresses the privacy issues in centralized machine learning models. It emerges as a promising technique that addresses the data sharing concerns for data-private multi-institutional collaborations. However, most existing federated learning systems deal with centraliz...
Chapter
Full-text available
Software-defined networking (SDN) provides flexibility in controlling, managing, and dynamically reconfiguring the distributed heterogeneous smart grid networks. Considerably less attention has been received to provide security in SDN-enabled smart grids. Centralized SDN controller protects smart grid networks against outside attacks only. Furtherm...
Article
Smart healthcare technologies transform the traditional healthcare system in all possible ways. Smart healthcare has enormous number of benefits over the traditional system. However, at the same time, it also suffers from some healthcare data security and privacy related issues as the potential Internet attackers may get access to the sensitive hea...
Article
Full-text available
The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary hospital visits and the burden on healthcare systems by connecting the patients to their health...
Article
Low-power wireless sensor networks (WSNs) and Internet of Things (IoT) have great impact for the real-time applications in future 5th generation (5G) mobile networks due to the wireless powered communication technologies. The age of information (AoI) plays a crucial performance metric in an IoT-enabled real-time smart warehouse application, where t...
Article
Ransomware is a type of malicious program or software that encrypts the contents on a hard disc and prevents the users from accessing them unless they pay an amount (called a ransom). Most of the organizations, such as financial institutes and healthcare sectors (i.e., smart healthcare) are targeted by ransomware attacks. Ransomware assaults are am...
Article
Fog computing-based Internet of Things (IoT) architecture is useful for various types of delay efficient network communications and services, like digital healthcare. However, there are privacy and security issues with the fog computing-based healthcare system, which can further increase the risk of leakage of sensitive healthcare data. Therefore,...
Article
Full-text available
Customer credential verification is an ongoing activity at financial institutions. Know Your Customer is one such periodic verification activity. Often, organizations store the collected customer credentials on centralized storage platforms (e.g., cloud storage and central servers) which could result in major privacy breaches. In addition, when a c...
Article
5G offers unprecedented bandwidth coupled with extremely low latency and an extraordinarily high density of connections as well as the increased efficiency and reliability. These are slated to support 5G-based IoT services such as basic safety, fuel-economy, entertainment, surveillance, etc., which are observed in many applications, like vehicular...
Article
A prioritized cyber defense remediation plan is critical for effective risk management in Energy DeliverySystem (EDS). Due to the complexity of EDS in terms of heterogeneous nature blending InformationTechnology (IT) and Operation Technology (OT) and Industrial Control System (ICS), scale and criticalprocesses tasks, prioritized remediations should...
Article
Full-text available
Enterprise-level energy delivery systems (EDSs) depend on different software or hardware vendors to achieve operational efficiency. Critical components of these systems are typically manufactured and integrated by overseas suppliers, which expands the attack surface to adversaries with additional opportunities to infiltrate into EDSs. Due to this r...
Article
Full-text available
The spread of the COVID-19 virus continues to increase fatality rates and exhaust the capacity of healthcare providers. Efforts to prevent transmission of the virus among humans remains a high priority. The current efforts to quarantine involve social distancing, monitoring and tracking the infected patients. However, the spread of the virus is too...
Chapter
Full-text available
Banks provide interactive money withdrawal/payment facilities, such as ATM, debit and credit card systems. With these systems, customers could withdraw money and make payments without visiting a bank. However, traditional ATM, debit and credit card systems inherit several weaknesses such as limited ATM facilities in rural areas, the high initial co...
Article
Full-text available
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders’ ability to place...
Book
Full-text available
https://sites.google.com/view/crc-drone/home
Article
Full-text available
The 5G wireless communication network is currently faced with the challenge of limited data speed exacerbated by the proliferation of billions of data-intensive applications. To address this problem, researchers are developing cutting-edge technologies for the envisioned 6G wireless communication standards to satisfy the escalating wireless service...
Chapter
Full-text available
Cyber-Physical Systems (CPSs) are complex systems that evolve from the integrations of components dealing with real-time computations and physical processes, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology syst...
Chapter
Full-text available
The COVID-19 pandemic in 2020 has resulted in increased fatality rates across the world and has stretched the resources in healthcare facilities. There have been several proposed efforts to contain the spread of the virus among humans. Some of these efforts involve appropriate social distancing in public places, monitoring and tracking temperature...
Article
Full-text available
In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts for cybersecurity; and (3) a proposed way forward on how simulations could broaden cybersecurity efforts. The overview of cybersecurity provides read...
Chapter
Full-text available
Existing blockchain smart contract platforms are designed as monolithic architectures. Even though there are multiple smart contracts with fully independent business logic, they run on a single monolithic container. This dependence on a monolithic container can be a performance bottleneck during the processing of a large number of transactions. To...
Article
Full-text available
Internet of Things (IoT) platforms have been deployed in several domains to enhance efficiency of business process and improve productivity. Most IoT platforms comprise of heterogeneous software and hardware components which can potentially introduce security and privacy challenges. Blockchain technology has been proposed as one of the solutions to...
Article
Full-text available
Blockchain-based decentralized infrastructure has been adapted in various industries to handle the sensitive data in a privacy-preserving manner without trusting third parties. However, integrating state-of-the-art blockchain platforms with the scalable, enterprise-level applications result in several challenges. Current blockchain platforms do not...
Article
Full-text available
5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and...
Conference Paper
Full-text available
Today energy delivery systems (EDS) face challenges in dealing with cyberattacks that originate by exploiting the communication network assets. Traditional power systems are highly complex and heterogeneous. These systems focus on reliability, availability, and continuous performance and, thus, not designed to handle security issues. Network admini...
Article
Full-text available
Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze...
Chapter
Full-text available
Cyber-Physical Systems (CPS) often involve trans-disciplinary approaches, merging theories of different scientific domains, such as cybernetics, control systems, and process design. Advances in CPS expand the horizons of these critical systems and at the same time, bring the concerns regarding safety, security, and resiliency. To minimize the opera...
Article
Full-text available
Existing blockchain smart contract platforms are designed as monolithic architectures. Even though there are multiple smart contracts with fully independent business logic, they run on a single monolithic container. This dependence on a monolithic container can be a performance bottleneck during the processing of a large number of transactions. To...
Chapter
Full-text available
Blockchain is a form of a distributed storage system that stores a chronological sequence of transactions in a tamper-evident manner. Due to the decentralized trust ecosystem in blockchain, various industries have adopted blockchain to build their applications. This paper presents a novel approach to building a blockchain-based document archive sto...
Preprint
Full-text available
In this Chapter, a software-defined network (SDN)-based framework for future smart cities has been proposed and discussed. It also comprises a distributed addressing scheme to facilitate the allocation of addresses to devices in the smart city dynamically. The framework is dynamic and modules can be added and omitted by a centralized controlling un...