Title: | Advanced Graph Modeling for Cybersecurity in Complex Smart Systems |
Subject: | Software engineering, Computer science |
Level: | Basic, Advanced |
Description: |
Smart environments today are made up of many different connected devices (e.g., IoT sensors, smart appliances, robotics kits, and home automation tools), which together create complex systems. The interconnectedness and diversity of these devices, such as Raspberry Pi models, Arduino kits, Zigbee and Z-Wave controllers, environmental sensors, and smart home gadgets, introduce numerous security challenges and weaknesses. Finding these vulnerabilities in such dynamic and heterogeneous systems demands an analytical framework beyond traditional security methods.
This thesis proposes using graph theory to map out these smart environments. By treating devices, their connections, data flows, and points where users interact as parts of a graph (with nodes and edges), it becomes easier to analyze how everything is linked and identify potential security risks. This graph-based approach captures the physical setup, logical relationships, and security aspects, giving a fuller picture of how the smart system is built and where it might be vulnerable. 1-How can graph theory and its associated algorithms be applied to model, analyze, and identify critical vulnerabilities in complex smart environments? The smart environment will be modeled as a graph, where devices, sensors, actuators, user points, and subsystems are nodes, and their interactions—such as communication and control permissions—are edges. Nodes and edges will include security attributes like access rights and encryption status. Graph theory techniques such as centrality measures (Degree, Betweenness, Closeness), community detection algorithms (Louvain, Girvan-Newman), shortest path analysis, and PageRank will be applied to analyze the network. Centrality measures will identify key or vulnerable components; community detection will reveal clusters of risk; shortest path analysis will map possible attack routes; and PageRank will highlight critical targets. Advanced graph embedding methods (e.g., node2vec, DeepWalk) will transform the graph into a vector space for machine learning-based threat prediction. Implementation will use Python libraries such as NetworkX, igraph, and PyTorch Geometric. The proposed approach will be demonstrated using theoretical case studies or representative device configurations, and its effectiveness will be discussed based on established criteria from existing literature. Expected Outcomes:
|
Start date: | |
End date: | |
Prerequisites: |
|
IDT supervisors: | Sara Abbaspour |
Examiner: | |
Comments: | |
Company contact: |