Sumita Mishra Headshot

Sumita Mishra

Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences
Graduate Program Director, Cybersecurity

585-475-4475
Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Sumita Mishra

Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences
Graduate Program Director, Cybersecurity

Education

BS, Patna University (India); BS, Ph.D., State University of New York at Buffalo

Bio

Sumita Mishra is the Graduate Program Director and a Professor in the Department of Cybersecurity. She joined RIT in 2007 and has taught networking and security courses at both undergraduate and graduate levels. Her current research interests are in privacy for the smart grid and critical infrastructure protection. Recent awards include the cybersecurity best paper at the 2017 IEEE International Symposium on Technologies for Homeland Security (HST). Funding sources for Dr. Mishra's current and past projects include the National Science Foundation, Department of Homeland Security, Air Force Research Lab (Rome), Air Force Research Lab (Wright Patterson), NASA and Boeing. She has served on program committees of several IEEE and ACM conferences. She has published over 60 articles in national and international journals and conferences.

585-475-4475

Areas of Expertise

Select Scholarship

Journal Paper
Wagh, Gaurav, Sumita Mishra, and Anurag Agarwal. "A Distributed Privacy-Preserving Framework With Integrity Verification Capabilities for Metering Data and Dynamic Billing in a Malicious Setting." IEEE Transactions on Smart Grid 15. 6 (2024): 5813-5825. Web.
Mir, Darakhshan, et al. "How Do Faculty Partner While Teaching Interdisciplinary CS+X Courses: Models and Experiences." J. Comput. Sci. Coll. 32. 6 (2017): 24-33. Print.
Romanowski, Carol, et al. "Regional Response to Large-scale Emergency Events: Building on Historical Data." International Journal of Critical Infrastructure Protection 11. (2015): 12-21. Print.
Show 1 More
Published Conference Proceedings
Greenwood, Lisa, et al. "Preparing the Engineers of Tomorrow: Standards Education for Infrastructure Improvement and Resilience." Proceedings of the 2024 ASEE St. Lawrence Section Annual Conference. Ed. ASEE. Toronto, Canada: ASEE, 2024. Web.
Donga, Lalitha, et al. "A Proactive Digital Chain of Custody for Internet of Healthcare Things (IoHT) Data." Proceedings of the IEEE International Conference on Healthcare Informatics (ICHI). Ed. IEEE. Orlando, FL: IEEE, 2024. Web.
Wagh, Gaurav and Sumita Mishra. "A distributed approach to privacy-preservation and integrity assurance of smart metering data." Proceedings of the e-Energy \'23: Proceedings of the 14th ACM International Conference on Future Energy Systems. Ed. ACM SIGEnergy. Orlando, FL: pp. 60-65, 2023. Web.
Show 38 More
Book Chapter
Dongre, Siddharth, et al. "Quantifying the cost of data breaches." Critical Infrastructure Protection XIII), IFIP Advances in Information and Communication Technology. Ed. J. Staggs and S. Shenoi. Switzerland, AG: Springer, 2019. 3-16. Print.
Alnemari, A., et al. "Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy." Critical Infrastructure Protection XII. IFIP Advances in Information and Communication Technology, vol 542. Ed. Staggs J., Shenoi S.. Cham, Switzerland: Springer, 2018. 113-125. Web.
Oh, T., S. Mishra, and C. Hochgraf. "Smart Grid Security in the Last Mile." Security and Privacy in Smart Grids. Ed. Yang Xiao. Boca Raton, FL: CRC Press, 2013. 271-290. Print.
Show 2 More
Peer Reviewed/Juried Poster Presentation or Conference Paper
Prasad, N., P. Talukdar, and S. Mishra. "Analysis of AES and PRESENT for encryption in IOT devices." Proceedings of the Women in Cybersecurity Conference (WiCYS 2019). Ed. WiCYS. Pittsburgh, PA: WiCYS.
Alnemari, A., et al. "Achieving Resiliency while Preserving Privacy in the Healthcare Sector." Proceedings of the 2018 International Symposium for Sustainable Systems and Technology (ISSST), June 25-28, 2018, Buffalo, New York. Ed. ISSST. Buffalo, NY: n.p..
Raj, Rajendra K., Sumita Mishra, Carol Romanowski, Jennifer Schneider, and Suhair Alshehri. "Modeling Threats: Insider Attacks on Critical Infrastructure Assets." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE.
Invited Article/Publication
Association, Computing Research. "Innovative Approaches to Computing Education." Computing Education Final Report. (2015). Web.
Published Article
Golen, Erik F., Sumita Mishra, and Nirmala Shenoy. “An Underwater Sensor Allocation Scheme for a Range Dependent Environment.” Computer Networks, 54.3 (2010): 404-415. Print. "  «
GoleGolen, Erik F., Sumita Mishra, and Nirmala Shenoy. “On the Effects of Deployment Imprecision on Underwater Sensor Connectivity.” Proceedings of the Fifth ACM International Workshop on UnderWater Networks, 2010. n.p. Print. "  *
Formal Presentation
Pearson, David, Sumita Mishra, and Yin Pan. “Security Attacks and Defenses in Sensor Networks”, The 2010 International Conference on Security and Management (SAM’10), Las Vegas, NV. 12-15 July 2010. Presentation. " 

Currently Teaching

CSEC-472
3 Credits
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
CSEC-604
3 Credits
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics.
CSEC-790
1 - 6 Credits
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference.
CSEC-791
1 - 3 Credits
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic within the computing security domain. A project involves some type of practical development with a deliverable. This may include development with computer equipment, software packages, and programming/scripting languages. Alternately, it may be the development and demonstration of an innovative process that addresses a current computing security issue or problem. Students must submit an acceptable proposal to a project committee (chair, and reader) before they may be registered by the department for the MS in CSEC Project. Students must defend their work in an open project defense and complete a written report of their work before a letter grade is awarded. A well-written professional report is required that details current thinking on the topic in the professional literature, the design and implementation of development that was done, and a critical evaluation of the results.
CSEC-793
3 Credits
This course is one of the capstone options in the MS in Computing Security program. Students will apply their knowledge to solve real-world problems in the areas of computing security. Students will work on an individual semester-long project involving some type of practical development with a deliverable. This may include development with computer equipment, software packages, and programming or scripting languages. Alternately, it may be the development and demonstration of an innovative process that addresses a current computing security issue or problem. A well-written professional report is required that details current thinking on the topic in the professional literature, the design and implementation of development that was done, and a critical evaluation of the results. The students will also present their findings in an open forum. Students are expected to submit a short proposal before they can be enrolled in the class.
CSEC-909
0 Credits
This course is part of a capstone experience for graduate students who are beginning the capstone experience. Students will submit an accepted proposal as a prerequisite for the formal thesis.