Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  Privacy risks and countermeasures for IoT devices [SELF-FUNDED STUDENTS ONLY]


   Cardiff School of Computer Science & Informatics

  , ,  Applications accepted all year round  Self-Funded PhD Students Only

About the Project

IoT devices, such as smart plugs and switches, smart lightbulbs, doorbells and door locks, motion sensors, smart watches, operate within a networked home environment in frequent interaction with the user. As these devices become more and more prevalent, they integrate closely within our daily lives so the data that they collect, store and transmit can reveal sensitive patterns for the individual who uses them. For example, lack of activity in a motion sensor indicates that the person is either absent or sleeping.

The first aim of this project is explore the privacy risks of IoT devices in the form of inferences that can be made about a person’s life patterns through the network data activity of various IoT devices that are typically used in a home. The next aim is to propose countermeasures that inhibit inferences but also preserve the functionality of the IoT device for the user.

Relevant methods for this project include data collection from a typical home IoT network, data analysis with appropriate machine learning techniques to identify patterns that constitute privacy risks, and statistical or other performance evaluation techniques to assess the effectiveness of the proposed countermeasures.

Indicative Deliverables: Algorithms and data mining techniques that can reveal sensitive patterns in a dataset; Evaluation techniques for assessing countermeasures; Specific conclusions about the privacy risks of typical IoT devices in homes; Specific countermeasures to reduce privacy leakage in typical IoT devices

Keywords: Internet of Things (IoT); Privacy; Machine Learning; Statistics; Cybersecurity; Networks

Contact for information on the project:

Academic criteria: A 2:1 Honours undergraduate degree or a master's degree, in computing or a related subject. Applicants with appropriate professional experience are also considered. Degree-level mathematics (or equivalent) is required for research in some project areas. 

Applicants for whom English is not their first language must demonstrate proficiency by obtaining an IELTS score of at least 6.5 overall, with a minimum of 6.0 in each skills component. 

How to apply:  

This project is accepting applications all year round, for self-funded candidates. 

Please contact the supervisors of the project prior to submitting your application to discuss and develop an individual research proposal that builds on the information provided in this advert. Once you have developed the proposal with support from the supervisors, please submit your application following the instructions provided below.

Please submit your application via Computer Science and Informatics - Study - Cardiff University 

In order to be considered candidates must submit the following information:  

  • Supporting statement  
  • CV  
  • In the ‘Research Proposal’ section of the application enter the name of the project you are applying to and upload your Individual research proposal, as mentioned above in BOLD 
  • In the funding field of your application, please provide details of your funding source.  
  • Qualification certificates and Transcripts 
  • References x 2  
  • Proof of English language (if applicable) 

Interview - If the application meets the entrance requirements, you will be invited to an interview.   

If you have any additional questions or need more information, please contact:  

Computer Science (8)

Funding Notes

This project is offered for self-funded students only, or those with their own sponsorship or scholarship award.
Please note that a PhD Scholarship may also be available for this PhD project. If you are interested in applying for a PhD Scholarship, please search FindAPhD for this specific project title, supervisor or School within its Scholarships category.

References

Subahi A, Theodorakopoulos G. Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic. Sensors. 2019; 19(21):4777. https://doi.org/10.3390/s19214777

Register your interest for this project



How good is research at Cardiff University in Computer Science and Informatics?


Research output data provided by the Research Excellence Framework (REF)

Click here to see the results for all UK universities

Where will I study?