Delay Tolerant Networks: Develop efficient routing protocols, Model communication of radio antennas working on ISM bands, Develop mobility models of humans, Measure privacy disclosure in mobility based social networks, Investigate the efficiency of secure two-party and multi-party communications in power constraint mobile devices, Routing in temporal networks, Apply complex network theories on mobile social networks, Measure robustness of mobile social networks.
Cyber Security in IoT: Explore attack models on Internet of Things (IoT), Privacy leakage through IoT, Develop (passive or active) attack detection tools in IoT, Security and privacy in WLAN (Wi-Fi, Bluetooth, Zigbee, etc)
Cyber Security in CPS and IIoT: Develop (passive or active) attack detection tools in Cyber Physical Systems (CPS)
Security of WPA2 and WPA3: Explore security vulnerabilities in WEP, WPA, WPA2 and WPA3, Detect and prevent attacks on Wi-Fi through passive and/or active sniffing, Explore DragonFly protocol for security vulnerabilities.
Privacy and Security in Smart City: Geo-Fencing, Geo-Routing and Geo-Privacy