This is a PhD studentship in cybersecurity with a strong focus on mobile network security. It provides an excellent opportunity for a student to delve into the fascinating world of radio-based networks and the challenges associated with protecting them.
Technologies such as the Authentication and Key Agreement (AKA) protocol been used by mobile networks starting with 3G. The primary purpose of AKA has been to provide mutual authentication, and prevent fake base-station or other men-in-the-middle attacks from being deployed. However, despite its use, mobile-relay nodes can still be deployed under specific constraints, allowing adversaries to intercept and analyse encrypted traffic. Furthermore, due to complexities associated with the study of mobile network security, the extent to which LTE and 5G standards remain vulnerable to man-in-the-middle like attacks is still unclear. One of the aims of this project to design and implement new tools that to aid with the analysis of mobile-network deployments form a cybersecurity point of view. The research is centred around understanding the protocols that make up the 5G standard and how data is generated and transmitted over the radio-link for the purposes of identifying security and privacy limitations, using new technologies such as machine-learning algorithms.
Research into cybersecurity for mobile networks such as 5G and beyond is crucial to stay ahead of emerging threats and protect against potential cyberattacks. As the technology continues to advance, so do the risks associated with it. The main focus of this studentship is to study both existing and emerging mobile network protocols, identify cybersecurity limitations and develop solutions to mitigate associated risks. This can include developing new authentication and encryption protocols, identifying new threats and attack vectors, and exploring the use of machine learning and artificial intelligence to enhance cybersecurity. Furthermore, research in this area can indirectly focus on developing measures that protect mobile devices against threats such as malware, phishing, and unauthorized access to personal data.
Required skills: excellent C and C++ programming, good understanding of network protocols and security
Helpful skills: experience in working with embedded technologies and devices such as microcontrollers, FPGAs, Raspberry Pi, etc; some understanding of mathematical concepts and algorithms relevant to radio waves propagation such as, but not limited to, the Fast-Fourier Transformation,
First or Upper Second Class Honours undergraduate degree and/or postgraduate degree with Distinction (or an international equivalent). We also consider applicants from diverse backgrounds that have provided them with equally rich relevant experience and knowledge. Full-time and part-time study modes are available.