Avatar

I am an assistant professor in the School of Computing at the Wichita State University (WSU). I also hold an appointment in the Electrical and Computer Engineering department. I lead the Cyber-Physical Systems Security Research Lab (CPS2RL). I received my Ph.D. in Computer Science from the University of Illinois Urbana-Champaign (UIUC). My dissertation work focused on securing real-time systems, particularly integrating security as a first-class principle in real-time schedulers. I obtained my M.Sc. in Electrical and Computer Engineering from the University of Manitoba (UM). I have completed my B.Sc. in Computer Science and Engineering from Bangladesh University of Engineering and Technology (BUET).

My current research interests broadly in the areas of systems security and wireless networks (security in real-time and cyber-physical systems, Internet-of-Things, and vehicular communication networks). My recent work has evaluated various security and resiliency aspects of broader cyber-physical domains including security in real-time systems, misbehavior detection in vehicular communication networks, and the use of software defined networking (SDN) in safety-critical systems.

  See more on my curriculum vitae and research publications.

Openings: There are multiple openings for projects related to cyber-physical systems and vehicular communication security starting in Summer/Fall 2022. If you are interested please feel free to contact me with your CV. Prior experience on cyber-physical systems/wireless communications/security is not mandatory. Students with solid foundation on Mathematics (real-time scheduling, optimization, control theory) and experience in Systems (operating systems, embedded systems programming, Linux kernel development) are highly encouraged to apply.

WSU is one of America’s most innovative research universities and known for its impactful student experience. Our engineering graduate programs are the highest ranked in the state of Kansas and one of nation's top 100 engineering graduate programs. Consider applying to WSU for Fall 2022!

Recent News

See older news here.


Publications

2021

Conference
[C8]

A. Kashinath, M. Hasan, R. Kumar, S. Mohan, R. Bobba, and S. Padhy, Safety critical networks using commodity SDNs, in Proc. of IEEE International Conference on Computer Communications (INFOCOM), May 2021.  [PDF]

2020

Workshop
[W7]

A. Kashinath, M. Hasan, S. Mohan, R. Bobba, and R. Mittal, Improving dependability via deadline guarantees in commodity real-time networks, in Proc. of IEEE GLOBECOM Workshop on Secure and Dependable Software-defined Networking for Sustainable Smart Communities (SecSDN), Dec. 2020.  [PDF]
US Patent
[P1]

G. Ciocarlie, I. Agadakos, C. Chen, M. Campanelli, P. Anantharaman, M. Hasan, U. Lindqvist, M. Locasto, B. Copos, T. Lepoint, and M. Filippone, Modeling cyber-physical attack paths in the Internet-of-things, U.S. Patent Application No. 16/634,591, May 2020.  [PDF]
Journal
[J7]

M. Hasan, S. Mohan, T. Shimizu, and H. Lu, Securing vehicle-to-everything (V2X) communication platforms, IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713, Dec. 2020.  [PDF]
Conference
[C7]

M. Hasan, S. Mohan, R. Pellizzoni, and R. B. Bobba, Period adaptation for continuous security monitoring in multicore systems, in Proc. of Design, Automation and Test in Europe (DATE), pp. 430-435, Mar. 2020.  [PDF]

2019

Workshop
[W6]

M. Hasan and S. Mohan, Protecting actuators in safety-critical IoT systems from control spoofing attacks, in Proc. of ACM Workshop on the Internet of Things Security and Privacy (IoT S&P), pp. 8-14, Nov. 2019.  [PDF]
Journal
[J6]

F. Abdi, C. Chen, M. Hasan, S. Liu, S. Mohan, and M. Caccamo, Preserving physical safety under cyber attacks, IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6285-6300, Aug. 2019.  [PDF]

2018

Journal
[J5]

C. Chen, M. Hasan, and S. Mohan, Securing real-time Internet-of-things, Sensors, vol. 18, no. 12, Dec. 2018.  [PDF]
Conference
[C6]

F. Abdi, C. Chen, M. Hasan, S. Liu, S. Mohan, and M. Caccamo, Guaranteed physical security with restart-based design for cyber-physical systems, in Proc. of ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 10-21, Apr. 2018.  [PDF]
Conference
[C5]

M. Hasan, S. Mohan, R. Pellizzoni, and R. B. Bobba, A design-space exploration for allocating security tasks in multicore real-time systems, in Proc. of Design, Automation and Test in Europe (DATE), pp. 225-230, Mar. 2018.  [PDF]

2017

Conference
[C4]

R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan, and R. Bobba, End-to-end network delay guarantees for real-time systems using SDN, in Proc. of IEEE Real-Time Systems Symposium (RTSS), pp. 231-242, Dec. 2017.  [PDF]
Workshop
[W5]

I. Agadakos, C. Chen, M. Campanelli, P. Anantharaman, M. Hasan, B. Copos, T. Lepoint, M. Locasto, G. Ciocarlie, and U. Lindqvist, Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things, in Proc. of ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), pp. 37-48, Nov. 2017.  [PDF]
Workshop
[W4]

R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan, and R. Bobba, Dependable end-to-end delay constraints for real-time systems using SDN, in Proc. of International Workshop on Real-Time Networks (RTN), Jun. 2017.  [PDF]
Conference
[C3]

M. Hasan, S. Mohan, R. Pellizzoni, R. B. Bobba, Contego: An adaptive framework for integrating security tasks in real-time systems, in Proc. of Euromicro Conference on Real-Time Systems (ECRTS), vol. 76, pp. 23:1-23:22, Jun. 2017.  [PDF]

2016

Workshop
[W3]

M. Hasan, S. Mohan, R. B. Bobba, and R. Pellizzoni, A server model to integrate security tasks into fixed-priority real-time systems, in Proc. of Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), pp. 61-68, Nov. 2016.  [PDF]
Workshop
[W2]

F. Abdi, M. Hasan, S. Mohan, D. Agarwal, and M. Caccamo, ReSecure: A restart-based security protocol for tightly actuated hard real-time systems, in Proc. of Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), pp. 47-53, Nov. 2016.  [PDF]
Conference
[C2]

M. Hasan, S. Mohan, R. B. Bobba, and R. Pellizzoni, Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems, IEEE Real-Time Systems Symposium (RTSS), pp. 123-134, Dec. 2016. (received Outstanding Paper and Best Student Paper award)  [PDF]
Book Ch.
[BC1]

M. Hasan and E. Hossain, Distributed resource allocation in 5G cellular networks, book chapter in Towards 5G: Applications, Requirements & Candidate Technologies, Wiley, 2016.  [PDF]

2015

Journal
[J4]

M. Hasan and E. Hossain, Distributed resource allocation for relay-aided device-to-device communication under channel uncertainties: A stable matching approach, IEEE Transactions on Communications, vol. 63, no. 10, pp. 3882-3897, Oct. 2015.  [PDF]
Conference
[C1]

M. Hasan and E. Hossain, Distributed resource allocation in D2D-enabled multi-tier cellular networks: An auction approach, in Proc. of IEEE International Conference on Communications (ICC), pp. 4552-4557, Jun. 2015.  [PDF]
Magazine
[M3]

E. Hossain and M. Hasan, 5G cellular: Key enabling technologies and research challenges, IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, pp. 11-21, Jun. 2015.  [PDF]
Journal
[J3]

M. Rasti, M. Hasan, L. B. Le, and E. Hossain, Distributed uplink power control for multi-cell cognitive radio networks, IEEE Transactions on Communications, vol. 63, no. 3, pp. 628-642, Mar. 2015.  [PDF]
Magazine
[M2]

M. Hasan, E. Hossain, S. Balasubramaniam, and Y. Koucheryavy, Social behavior in bacterial nanonetworks: Challenges and opportunities, IEEE Network, vol. 29, no. 1, pp. 26-34, Jan. 2015.  [PDF]

2014

Journal
[J2]

M. Hasan and E. Hossain, Distributed resource allocation for relay-aided device-to-device communication: A message passing approach, IEEE Transactions on Wireless Communications, vol. 13, no. 11, pp. 6326-6341, Nov. 2014.  [PDF]
Journal
[J1]

M. Hasan, E. Hossain, and D. I. Kim, Resource allocation under channel uncertainties for relay-aided device-to-device communications underlaying LTE-A cellular networks, IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2322-2338, Apr. 2014.  [PDF]

2013

Workshop
[W1]

M. Hasan and E. Hossain, Resource allocation for network-integrated device-to-device communications using smart relays, in Proc. of IEEE Globecom Workshop on Device-to-Device (D2D) Communication With and Without Infrastructure, pp. 597-602, Dec. 2013.  [PDF]
Magazine
[M1]

M. Hasan, E. Hossain, and D. Niyato, Random access for machine-to-machine communication in LTE-Advanced networks: Issues and approaches, IEEE Communications Magazine, vol. 51, no. 6, pp. 86-93, Jun. 2013.  [PDF]

Thesis and Dissertation

  • M. Hasan, Integrating Security into Real-Time Cyber-Physical Systems, Ph.D. Dissertation, University of Illinois at Urbana-Champaign, Dec. 2020. [PDF]  [URI]
  • M. Hasan, Radio resource management for relay-aided device-to-device communication, M.Sc. Thesis, University of Manitoba, May 2015.  [PDF]  [URI]

Teaching

  • CS 898CC: Security for Real-Time Internet-of-Things (Spring 2021)
  • CS 898CD: Trusted Execution for Embedded Systems (Fall 2021)

Students

Current Graduate Students
Undergraduate Students
  • Erick Oduniyi, Summer 2021
  • Chidera Okoro, Summer 2021
  • Hasan Qamber, Summer 2021

Note for prospective students: I am always looking to hire postdoctoral scholars and motivated students to work together on systems security research. If you are a prospective graduate student interested in working with me, please apply to one of our graduate programs and inform me. If you are already an admitted PhD/MS student at WSU or looking for postdoctoral opportunities, please email me to schedule a meeting.


Contact Information


244 Jabara Hall
Campus Box 83
1845 Fairmount, Wichita, KS 67260 - 0083
monowar [dot] hasan [at] wichita [dot] edu
+1 316 978 6070