Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  Cybersecurity analysis of cellular/mobile network protocols and devices (fully funded)


   School of Computer Science

This project is no longer listed on FindAPhD.com and may not be available.

Click here to search FindAPhD.com for PhD studentship opportunities
  Dr Mihai Ordean  No more applications being accepted  Funded PhD Project (Students Worldwide)

About the Project

This is a PhD studentship in cybersecurity with a strong focus on mobile network security. It provides an excellent opportunity for a student to delve into the fascinating world of radio-based networks and the challenges associated with protecting them.

Technologies such as the Authentication and Key Agreement (AKA) protocol been used by mobile networks starting with 3G. The primary purpose of AKA has been to provide mutual authentication, and prevent fake base-station or other men-in-the-middle attacks from being deployed. However, despite its use, mobile-relay nodes can still be deployed under specific constraints, allowing adversaries to intercept and analyse encrypted traffic. Furthermore, due to complexities associated with the study of mobile network security, the extent to which LTE and 5G standards remain vulnerable to man-in-the-middle like attacks is still unclear. One of the aims of this project to design and implement new tools that to aid with the analysis of mobile-network deployments form a cybersecurity point of view. The research is centred around understanding the protocols that make up the 5G standard and how data is generated and transmitted over the radio-link for the purposes of identifying security and privacy limitations, using new technologies such as machine-learning algorithms.

Research into cybersecurity for mobile networks such as 5G and beyond is crucial to stay ahead of emerging threats and protect against potential cyberattacks. As the technology continues to advance, so do the risks associated with it. The main focus of this studentship is to study both existing and emerging mobile network protocols, identify cybersecurity limitations and develop solutions to mitigate associated risks. This can include developing new authentication and encryption protocols, identifying new threats and attack vectors, and exploring the use of machine learning and artificial intelligence to enhance cybersecurity. Furthermore, research in this area can indirectly focus on developing measures that protect mobile devices against threats such as malware, phishing, and unauthorized access to personal data.

Required skills: excellent C and C++ programming, good understanding of network protocols and security

Helpful skills: experience in working with embedded technologies and devices such as microcontrollers, FPGAs, Raspberry Pi, etc; some understanding of mathematical concepts and algorithms relevant to radio waves propagation such as, but not limited to, the Fast-Fourier Transformation,

First or Upper Second Class Honours undergraduate degree and/or postgraduate degree with Distinction (or an international equivalent). We also consider applicants from diverse backgrounds that have provided them with equally rich relevant experience and knowledge. Full-time and part-time study modes are available.

Computer Science (8)

Funding Notes

The position offered is for three and a half years full-time study. The current (2023-24) value of the award is stipend; £18,622 pa; tuition fee: £4,712 (home) or £24,780 (international) pa. Awards are usually incremented on 1 October each following year.

References


Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui and Dominik Rys, Watching your call: Breaking VoLTE Privacy in LTE/5G Networks, In Proceedings on Privacy Enhancing Technologies, 2023.

Sam L. Thomas, Jan Van den Herrewegen, Georgios Vasilakis, Zitai Chen, Mihai Ordean and Flavio D. Garcia, Cutting Through the Complexity of Reverse Engineering Embedded Devices, In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2021.

Tom Chothia, Mihai Ordean, Joeri de Ruiter and Richard J. Thomas, An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols, In Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2017.

How good is research at University of Birmingham in Computer Science and Informatics?


Research output data provided by the Research Excellence Framework (REF)

Click here to see the results for all UK universities

Where will I study?