Designing Trusted Firmware upgrade manager tool, new end-to-end security protocol for Firmware upgrade, Secure boot authentication. Designing/ Implementing Secure Software Development Lifecycle for IIoT, Upgrading PKI standards with SUITE-B and CNSA algorithms. Threat analysis and mitigation design for firmware features. Participating in Cyber Security trainings. FreeRTOS, ECC, X.509, NIST, TLS, TCP, IPv4, IPv6. Cyber Security Architecture reviews, Risk analysis and mitigation design, NIST standard suite, End to End security design, AWS IOT Authentication and Authorization. End to End Secure mutual authentication protocols and firmware upgrade protocol in public key infrastructure using NIST standard suite of Elliptic Curve Crypto System with X.509 certificates over TCP/(IPv4/IPv6) networks. Implementing Certificate Authority, CA signing for domains relevant to food and beverages, Building Automation, Home Automation, Electric Utilities, Security Solutions, IoT, Network Security Appliances, Embedded devices using NIST Standard suite of Elliptic Curve Crypto System. Certificate Authorities for food and beverages Industry. Certificate Authorities for Home Automation, Building Automation industry. Certificate Authorities for Electric grid, Utilities. Certificate Authorities for Security Solutions. Certificate Authorities for Enterprise networks. Certificate Authorities for Network Security Appliances, IoT devices, IoT gateways, Embedded devices. Secure Handshake protocols, Session Creation protocols(By location, by machine ID, by Inventory information etc etc), Dynamic key agreement protocols for Secure boot, for firmware upgrade, for device connectivity, for monitoring device health using NIST Standard suite of Public Key Cryptography algorithms and Elliptic Curve Crypto System. Cyber Security Architecture Reviews, Threat Analysis, Mitigation Design. End to End Secure Application Security protocol design suitable for scalable cloud application to embedded device(s) with RTOS and Elliptic Curve Crypto System, Digital Signatures for Mutual Authentication, Non Repudiation. Symmetric Key Exchange for Confidentiality (also for use in HMAC algorithm) using Deffie-Hellman key Exchange, Symmetric Key Exchange for Confidentiality (also for use in HMAC algorithm) using Digital Signature backed by Elliptic Curve Crypto System,SHA. SHA for Integrity check. Session Creation, Session Termination, Option to add Additional Authentication with User identity, by Location, by Inventory information. Authorization with user privillages based on User Identity, Role, Location etc. (AppSecProtocol)/TLS/TCP/(IPv4/IPv6)/(Physical Media). at. scalable cloud application. <<===to===>> (AppSecProtocol)/TLS/TCP/(IPv4/IPv6)/(Physical Media). at embedded field device(s) with RTOS. Suitable for Secure Connectivity, Secure firmware upgrade over the air, Secure boot authentications, for Secure Monitoring the health of remote Embedded device and for securely controlling the remote embedded device. Reference from NIST Roles and responsibilities: Threat analysis and mitigation design for firmware features: Secure Boot, Firmware Upgrade, Role Based Access Control, IPv6. Solution design against IP spoofing, Man in Middle, Deprecated PKI standards. Involved in Cyber Security Blue-Team Activities.