Computer Forensics Laboratory_7282.jpg

Research

We are currently working on a number of different research areas including:

In addition, we have PhD research students working on the following areas:

  • Cyber-Maintainable Safety-Critical Complex Systems
  • The Application of Pattern of Life Analysis to the Problem of Early Intrusion and Threat Detection and Classification in Industrial Control Systems
  • Comprehensive risk and vulnerability identification within an Industrial Control System
  • Security Operations and Network Monitoring
  • Security in 5G Networks
  • Quantifying the Effects of Adversarial Deception Methods in Defending Complex Systems from Cyber Threats

Research

Gareth Davies is a co-opted member of the British Standards Institute (BSI) representing the UK working on FORMOBILE, a EU project, funded under the Horizon 2020 programme. 

It involves a consortium of partners, working in collaboration to create an end-to-end mobile forensic investigation chain, striving to improve digital safety, and security in the EU while respecting fundamental rights. 

A result of the project will be a standardised European process for the forensic investigation of mobile phones.

It is also an aim for the new FORMOBILE standard to become a European Committee for Standardisation (CEN), Workshop Agreement (CWA).

CWAs are frequently the forerunner of ENs and ISO standards. The objective is to collect the best practices and common working methods - combining them to an agreed standard, which is to be adopted by the relevant stakeholders across Europe.

The standard will also consider fundamental frights, contributing to EU efforts in protecting and promoting human rights, democracy and the rule of law.

Utilisation of a common, pan-European standard will allow LEAs and other related associations to increase efficiency and efficacy when dealing with mobile device-related crime.

Gareth Davies

Gareth Davies is working on the Incident Response and Digital Forensics aspects of ResiCAV, a pioneering project to ensure that connected and autonomous vehicles (CAVs) and their infrastructure are protected against rising cybersecurity threats.

Combining cross-sector expertise, it is delivered by a consortium led by HORIBA MIRA, Thales and BT, with support from the University of South Wales, University of Warwick, Coventry University, Bristol University, the Centre for Modelling & Simulation, Oxfordshire County Council, AESIN Techworks, plus the National Digital Exploitation Centre (NDEC).


The wider espousal of smart vehicle technology around the globe is becoming a reality. 

Smart vehicles, powered through smart grids, offer key benefits such as reduction in carbon footprint, data monitoring, low noise and potentially many others. These smart vehicles have several embedded sensors and actuators. 

The data, generated by these sensors, are shared, subject to appropriate authorization, with several entities such as vehicle owners, vehicle-related service providers, vehicle manufacturers, government organisations and marketing agencies. Similarly, the relevant data by all involved bodies and entities are shared with related stakeholders for operational and efficiency reasons. 

The accuracy of the decision making of all involved bodies heavily relies on the trustworthiness of the involved entities and their generated data. 

This project intends to explore the possibility of designing and developing a novel reputation management framework for smart vehicles and other involved entities of the whole ‘smart vehicle ecosystem’.

Dr Muhammad Usman

Despite the rapid developments in multiscale cyber-physical systems such as smart home, smart grid, smart vehicular network, smart transportation, avionics and maritime systems, the data transmitted by the contributing sensing devices are vulnerable to anomalies due to attacks, node faults and transmission errors. This may affect the consistency of the received data and may lead to the incorrect decision making at both ‘local’ and ‘global contexts’. 

This project aims to introduce novel anomaly detection schemes which consider stochastic variability and other underlying characteristics of data. This interdisciplinary study draws knowledge from several theoretical fields such as fuzzy logic, fuzzy random variables, decision theory, optimization theory and others. 

The designed and developed schemes empower anomaly detection system to detect multifaceted anomalies with higher accuracy and efficiency. 

Dr Muhammad Usman

Energy Internet (EI)-based vehicle-to-grid (V2G) technology facilitates the vehicles to not only inject additional electricity into smart grids, but also enable them to receive electricity. 

The secure key establishment is imperative in order to securely initiate the process of bidirectional electricity power delivery. To effectively realize EI-based V2G communication, the authentication protocol must be robust against cyber-attacks. This study aims to not only explore the drawbacks of several smart grid-based authentication protocols, but also presents innovative key agreement schemes to overcome those limitations. 

We particularly work on removing drawbacks which may disrupt proper functioning of the protocols and cause de-synchronisation issues. Our designed schemes intend to be both robust and efficient. 

The results are typically compared with several contemporary schemes, and security characteristics of our schemes are typically validated through both formal and informal analyses.

Dr Muhammad Usman

Are Digital Forensic Investigators under-estimating the importance of Steganography within criminal investigations?

This research explores the use of the anti-forensic technique of Steganography, the method of hiding data within data. 

There are a range of freely available software tools online for computer users to utilise which enables the hiding of potentially incriminating data. 

We conducted research into the active digital forensic investigators to determine if this potentially powerful technique is under-estimated in the current age.  

View article online

Rachael Medhurst

Sensing-as-a-Service paradigm has advanced several Industrial Internet of Things (IIoT) applications in different real-world settings. The aim of this study is to consider smart factory.


The selection of an appropriate set of services, among discovered services which are result of

the discovery process, remains a vital challenge by keeping intact the service data privacy.

Unlike existing Quality-of-Service (QoS) information, this study has aimed at exploiting topological and other such underlying information to rank industrial sensing services. 

Our approach considers both local (node level) and global (topological) information to compute ranking scores. 

Furthermore, some additional features, such as degree (drawing knowledge from network theory), are also studied and then incorporated in the process of the ranking of industrial sensing services. 

The suitability of onion routing is studied to offer anonymous communication in order to prevent unauthorized entities from accessing ranking results in the whole process.

Dr Muhammad Usman

http://staff.southwales.ac.uk/users/11961-musman



Modern learning systems are integration of learning resources with human interactions in IT infrastructure-enabled face-to-face and online (virtual) environments. 

The utility of learning objectives needs to be measured in these feedback-driven learning environments. This study intends to design and develop comprehensive trust evaluation models to support decision making. 

The models employ key parameters such as previous course result percentage, active participation and reputation of learners. The weighted models are dynamic in nature and capable to compute user-specified trust values of learning objectives. 

The preliminary work of this study received the best paper award in IEEE ComTech 2017.

Dr Muhammad Usman