Future Cities Research Network
Telecommunications Engineering Research Group
Proposed supervisory team
Dr Sufian Yousef
Summary of the research project
The smart city is an alluring image of the future, where traffic lights, smart meters for utilities, public transport, smart street lights, traffic tracking sensors in roads, collected data on pollution and health, earthquake early warning and flood control in some cases are expected sources of data management and control through wired and wireless networks.
The software and hardware technologies are allowing exponentially rising numbers of smart devices to be connected to the Internet for the sake of smart city applications and services. The collected data from devices, sensors, smart units will be at different formats and quality requirements. This can be a source of hindrance for an effective use of the collected data. The scalability of the data collection and analysis methods that needs higher level of abstraction can be a challenge. Semantic Web technologies can provide reasoning about security, information and knowledge extraction and interoperability.
Smart Cities process large amounts of data streams which raise serious privacy and security concerns for everybody involved. Many attempts are needed to be made to ensure the security of the people’s data. There are issues that categorise data, for example, data reliability, data ownership and service provider trustworthiness. Some researchers have warned that smart cities could be more vulnerable to hacking than the smartphones of today.
The fact that most of the data will be transmitted wirelessly poses a real exposure to all sources of security attacks. This means that a very reliable and strong encryption method that can outperform the current encryption techniques is required. At our University in the Telecommunications Engineering Research Group a new encryption method that uses parallel computing has been designed and tested where the complexity is very high and the resulted delay in the encryption process is negligible. This method is named “Anglia 1”.
In this proposal, the research in advanced computing will consider the security of cloud computing by deployment of data offloading on a middleware that will be supporting a mobile cloudlet which is a medium between the core server and the mobile device. The aim is to ensure cloud computing end-to-end secure and privacy features for trustable data acquisition, transmission, processing and legitimate service provisioning.
This research on the privacy and security of data will be part of designing suitable smart network infrastructure that can have their own security protocols which are able to work harmoniously with the proposed confidentiality and authentication techniques. Gateways play good role in connecting devices to the network. However, an interfacing between gateways and IP has to be stable in routing and resource allocation management. This means that it is essential to convert the current IP protocol to hoist larger address spaces than the current addressing capacity of IPv6 in order to suit large number of connected sensors.
In a nutshell, this proposal is confined to developing a complexity encryption and authentication technique for wireless networks, mobile networks, ad hoc mobile networks and cloud networks by parallel computing encryption, gateways routing of large sensors’ data and the IPv6 address extensions. These proposed research items are related to each other.
Where you'll study
This project is self-funded.
Details of studentships for which funding is available are selected by a competitive process and are advertised on our jobs website as they become available.
If you wish to be considered for this project, we strongly advise you contact the proposed supervisory team. You will also need to formally apply for our Engineering and the Built Environment PhD. In the section of the application form entitled 'Outline research proposal', please quote the above title and include a research proposal.