PUBLICATIONS
Welcome to the Publications section, where you can explore my contributions to the field of cybersecurity through various publications, articles, and research papers. As a dedicated cybersecurity professional, I am passionate about sharing insights, knowledge, and best practices to help advance the industry and empower individuals and organizations to enhance their cybersecurity posture. Explore below to discover my published works and delve into topics ranging from emerging threats to innovative security strategies.
Analysing The Security Risks Associated With Using Wireless Communication in IoT Devices in Smart Homes and How That Affects Smart Cities: Proposing a Secure Framework for Unsecured IoT Smart Home Systems
This research paper delves into the topic of securing Internet of Things (IoT) devices with a specific focus on smart home devices. As IoT devices become more prevalent in households, there is a growing concern regarding their security. The objective of this paper is to address these concerns by proposing a practical security framework that caters specifically to smart home devices.
To commence, review existing literature to identify gaps in research and emphasise the necessity for a specialised security framework tailored for IoT smart home devices.
The proposed security framework incorporates measures including AES 128 encryption, HMAC for data integrity and authentication, and safeguards against replay attacks. Finally, demonstrates the effectiveness of this framework through an implementation involving two ESP8266 Microcontrollers (NodeMCU) that simulate a client-server communication scenario.
A critical evaluation of the execution of the project is provided, reflecting on its performance and conduct. Additionally, the paper discusses the project timeline and milestones achieved. Furthermore, it explores the social and ethical implications of this research by considering UK laws and regulations, examining how secure IoT devices can impact society positively and addressing ethical considerations related to data handling.
In conclusion, this research establishes that implementing the proposed security framework can greatly enhance the security of devices in smart homes. It offers a solution that can benefit IoT manufacturers while contributing to ongoing discussions surrounding IoT security. Lastly, future research directions are suggested, along with recommendations, for manufacturers.
The paper highlights the significance of ensuring security on the Internet of Things (IoT) within homes. It adds to the endeavours to establish a safer and more protected digital environment.
07/08/2023 • BY CHAMALKA DE SILVA
Securing RFID Electro Magnetic Door Locks
RFID (Radio Frequency Identification) electromagnetic locking mechanisms, equipped with new technology, represent the most prevalent form of automated and computerized access control systems. While there are numerous advantages to utilizing an RFID system within the industry, it is imperative to acknowledge the inherent vulnerabilities present in the current system.
This research paper endeavours to scrutinize the existing RFID infrastructure, adopting a systemic approach that involves the classification of potential RFID threats, delineation of their fundamental characteristics, and proposition of safeguards aimed at mitigating the prevailing weaknesses and limitations. The primary objective of this study is to discern and categorize flaws in RFID interactions, with a focus on implementing novel methodologies to bolster the security of communication between RFID controllers and magnetic locks.
By arming companies and users with effective methods, algorithms, and processes, this research aims to empower them to enhance and fortify their systems, thereby thwarting potential assaults on their RFID-based programs.
05/05/2020 • BY CHAMALKA DE SILVA
Uses of Unmanned Aerial Vehicles (UAVs) in Crime Scene Investigations
Recent technological advancements have significantly enhanced the quality of life for many individuals. Unmanned Aerial Vehicles (UAVs), commonly referred to as ‘Drones’, represent one such innovation poised to streamline various aspects of daily life. These drones have found widespread application across diverse industries, including agriculture, photography, and transportation, offering immense potential for societal benefit. However, it is imperative to acknowledge that this technology also harbours the capacity for misuse.
Instances of unethical behaviour facilitated by drones include the unauthorized capture of private information, interception of other drone communications, and their deployment for military purposes such as aerial bombings. Addressing each of these scenarios demands tailored investigative approaches, owing to the variability in available evidence. Consequently, digital forensics experts must possess the capability to scrutinize drones effectively within the context of crime scene investigations.
This article delves into the intricacies of drone technology and elucidates their utility in forensic investigations, thereby aiding investigators in navigating the complexities of digital forensics involving drones. Read More…
28/10/2019 • BY CHAMALKA DE SILVA / CHIRATH DE ALWIS