Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  Intelligent and Privacy-preserving security solutions for IoT networks


   School of Computing, Engineering & the Built Environment

This project is no longer listed on FindAPhD.com and may not be available.

Click here to search FindAPhD.com for PhD studentship opportunities
  Dr Isam Wadhaj, Dr Baraq Ghaleb  No more applications being accepted  Funded PhD Project (Students Worldwide)

About the Project

Over the past decade, several cyber security attacks have made the headlines targeting several sectors and causing irreversible damage on both the financial and social fronts. While the emergence of the Internet of Things (IoT) networks has facilitated the deployment of several applications ranging from smart homes to smart cities, the state-of-the-art research into the current IoT standards and technologies (e.g., 6LoWPAN and LoRa) has uncovered several security issues and shows that IoT networks are unavoidably exposed to a large number of attacks targeting their scarce resources, traffic, and topology. In addition, large amounts of private information are captured and processed by IoT nodes giving rise to serious privacy threats. Hence, ignoring such security and privacy threats can lead to undesired consequences that may limit the adoption of the IoT paradigm and realising its full potential. This project aims to conduct, beyond state-of-the-art research into novel secure, scalable, intelligent, and reliable IoT solutions that protect against IoT security threats and preserve the privacy of its users.

This includes, but is not limited to, the following:

  • Develop intelligent security countermeasures for a wide range of IoT attacks
  • Devise a suite of privacy-preserving solutions for IoT networks that satisfy critical privacy requirements

Academic qualifications

A first-class honours degree, or a distinction at master level, or equivalent achievements ideally in Computer Science with a good fundamental knowledge of programming.

English language requirement

IELTS score must be at least 6.5 (with not less than 6.0 in each of the four components). Other, equivalent qualifications will be accepted. Full details of the University’s policy are available online. 

Application process

Prospective applicants are encouraged to contact the supervisor Dr Isam Wadhaj at [Email Address Removed] to discuss the content of the project and the fit with their qualifications and skills before preparing an application. 

The application must include: 

Research project outline of 2 pages (list of references excluded) with the details about: 

  • Background and motivation of the project. The motivation must be supported by relevant literature. You can discuss also the applications you expect for the project results. 
  • Research questions or objectives. 
  • Methodology: types of data to be used, approach to data collection, and data analysis methods 
  • List of references 

Statement no longer than 1 page describing your motivations and fit with the project.

Recent and complete curriculum vitae. 

Two academic references (but if you have been out of education for more than three years, you may submit one academic and one professional reference), the form can be downloaded here

Documents proving your qualifications and your skills. 

Applications can be submitted here. To be considered, the application must use: 

  • “SCEBE0523” as project code. 
  • the advertised title as project title  

All applications must be received by 21st May 2023 and include the required documents. Applicants who have not been contacted by 1 month later should assume that they have been unsuccessful.

Computer Science (8)

References

1. Raoof, Ahmed, Ashraf Matrawy, and Chung-Horng Lung. "Routing attacks and mitigation methods for RPL-based Internet of Things." IEEE Communications Surveys & Tutorials 21.2 (2018): 1582-1606.
2. Al-Amiedy, Taief Alaa, et al. "A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things." Sensors 22.9 (2022): 3400.
3. Agiollo, Andrea, et al. "DETONAR: Detection of routing attacks in RPL-based IoT." IEEE Transactions on Network and Service Management 18.2 (2021): 1178-1190.
4. Pu, Cong. "Sybil attack in RPL-based internet of things: analysis and defenses." IEEE Internet of Things Journal 7.6 (2020)

 About the Project