Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Mr Maxim Chernyshev

Overview of thesis

Security Attacks and Countermeasures for IoT in Smart Cities.

Security is a major component of the intellectual structure of Internet of Things (IoT) research. Urban IoT is an enabler of the smart city vision – a vision built around leveraging technology to deliver value-added services to city’s administration and inhabitants. Set in the physical world, IoT deployments are characterised by scale, heterogeneity, unattended operation, limited sensor capacity, openness, and reliance on exposed wireless communication protocols. These characteristics present a number of unique security challenges given the associated complex multi-layer threat model that can lead to cascading failures. IoT threats pose significant risks that can materialise into tangible physical damage, substantial economic impact and, ultimately, loss of life.

While security practitioners strongly advocate extensive security evaluation during product development and regular security assessments upon commissioning to support risk mitigation, conducting these activities in practice is often not feasible. A realistic testbed for evaluation would require a comparable amount of infrastructure and assessments of existing deployments may not be practical due to strict availability requirements and the risk of collateral damage. In light of these challenges, simulation has been used for IoT security assessment. In addition to a realistic wireless communications model, urban IoT simulation requires integration of urban mobility and urban environment components. The proposed study is built around the hypothesis that integration of existing urban wireless profiles can enhance simulation realism. Following the development of a comprehensive IoT threat and countermeasures taxonomy, the project will replicate a smart city IoT service scenario to deliver 1) a method for capturing urban wireless profiles and 2) a model for subsequent integration to evaluate profile impact on simulated security assessments.

Qualifications

  • MSc Software Engineering, Edith Cowan University, 2008

Other Qualifications

  • Certified Information Systems Security Professional (CISSP), ISC2, 2017

Awards and Recognition

  • Best Paper Award, The zombies strike back: Towards client-side BeEF detection. Paper presented at the 12th Australian Digital Forensics Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia.

Research

Research Interests

  • Digital forensics
  • Network security
  • Internet of Things (IoT)

Recent Publications (within the last five years)

Journal Articles

  • Chernyshev, M., Valli, C., & Johnstone, M. (2017). Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, In-print doi: 10.1109/tifs.2017.2678463
  • Chernyshev, M., Valli, C., & Hannay, P. (2016). On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584-593.  doi: 10.1109/TIFS.2015.2507542

Conference Publications/ Presentations

  • Chernyshev, M., Valli, C., & Hannay, P. (2016, 5-8 Jan. 2016). Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges. Paper presented at the 2016 49th Hawaii International Conference on System Sciences (HICSS). doi: 10.1109/HICSS.2016.678
  • Chernyshev, M., & Hannay, P. (2015, 30 November – 2 December). Security assessment of IoT devices: The case of two smart TVs. Paper presented at the 13th Australian Digital Forensics Conference, Edith Cowan University Joondalup Campus, Perth, Western Australia. doi: 10.4225/75/57b3fa87fb88d
  • Chernyshev, M. (2015, 30 November – 2 December). An overview of bluetooth device discovery and fingerprinting techniques – assessing the local context. Paper presented at the 13th Australian Digital Forensics Conference, Edith Cowan University Joondalup Campus, Perth, Western Australia. doi: 10.4225/75/57b3f8ebfb88c
  • Chernyshev, M., & Hannay, P. (2014, 1-3 December, 2014). The zombies strike back: Towards client-side BeEF detection. Paper presented at the 12th Australian Digital Forensics Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia. doi: 10.4225/75/57b3de3dfb87a
  • Chernyshev, M. (2014, 1-3 December, 2014). Locational wireless and social media-based surveillance. Paper presented at the 12th Australian Digital Forensics Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia. doi: 10.4225/75/57b3dd30fb879
  • Chernyshev, M. (2013, 2-4 December, 2014). Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis. Paper presented at the 11th Australian Digital Forensics Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia. doi: 10.4225/75/57b3c136fb869

Supervisors

Professor Craig Valli (Security Research Institute)
Dr Zubair Baig (School of Science)

Contact

Mr Maxim Chernyshev
PhD Student
Security Research Institute
School of Science
Skip to top of page