Document Type



Doctor of Philosophy (PhD)


Electrical and Computer Engineering

First Advisor's Name

Dr. A. Selcuk Uluagac

First Advisor's Committee Title

Committee Chair

Second Advisor's Name

Dr. Kemal Akkaya

Second Advisor's Committee Title

Committee Member

Third Advisor's Name

Dr. Alexander Perez-Pons

Third Advisor's Committee Title

Committee Member

Fourth Advisor's Name

Dr. Leonardo Bobadilla

Fourth Advisor's Committee Title

Committee Member


Cybersecurity, Internet of Things, Cyber-Physical Systems, Industrial IoT, resource-limited devices

Date of Defense



This doctoral dissertation introduces novel mechanisms to provide on-device security and privacy for resource-limited smart devices and their applications. These mechanisms aim to cover five fundamental contributions in the emerging Cyber-Physical Systems (CPS), Internet of Things (IoT), and Industrial IoT (IIoT) fields. First, we present a host-based fingerprinting solution for device identification that is complementary to other security services like device authentication and access control. Then, we design a kernel- and user-level detection framework that aims to discover compromised resource-limited devices based on behavioral analysis. Further we apply dynamic analysis of smart devices’ applications to uncover security and privacy risks in real-time. Then, we describe a solution to enable digital forensics analysis on data extracted from interconnected resource-limited devices that form a smart environment. Finally, we offer to researchers from industry and academia a collection of benchmark solutions for the evaluation of the discussed security mechanisms on different smart domains. For each contribution, this dissertation comprises specific novel tools and techniques that can be applied either independently or combined to enable a broader security services for the CPS, IoT, and IIoT domains.







Rights Statement

Rights Statement

In Copyright. URI:
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).