Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  On Security Challenges in Internet on Things (RDF17/CIS/ASLAM)


   Faculty of Engineering and Environment

This project is no longer listed on FindAPhD.com and may not be available.

Click here to search FindAPhD.com for PhD studentship opportunities
  Dr Nauman Aslam  No more applications being accepted  Competition Funded PhD Project (Students Worldwide)

About the Project

Internet of Things (IoT) refers to an emerging paradigm where a large number of inter-connected smart devices bridge the link between physical world and cyber world enabling many applications that will support intelligent decision making. In order to realize the full potential of IoT, the envisioned paradigm needs to address multi-dimensional challenges spanning different areas including architecture, communication, data and network management, power and energy storage, security and privacy etc. Although a significant amount of research has been done in the IoT in areas related to communication, architectures, power management, a lot of effort is still needed needed in the areas of security and privacy. Recent DDoS attacks in October 2016 were made possible due to large number of unsecured Internet-connected devices (such as home routers and surveillance cameras). These attacks exposed vulnerability of IoT implementations due to the lack of common standard and architecture for the IoT security. This research project will investigate current challenges in security and privacy for IoT and will attempt to develop proof of concept and solutions. In particular, topics of interest are will focus following aspects, but certainly not limited to:
• Novel ideas for secure architectures IoT (Edge computing, Fog Computing Integration)
• Light weight authentication and encryption protocols
• Data security, authentication and authorization schemes for IoT
• Privacy protection, data sharing technologies (including blockchain technology), tampering protection and detection in IoT systems
• Access Control and Authentication
• Secure integration of IoT and social networks
• Encryption, identity management and intrusion detection techniques

Eligibility and How to Apply
Please note eligibility requirement:
• Academic excellence of the proposed student i.e. 2:1 (or equivalent GPA from non-UK universities [preference for 1st class honours]); or a Masters (preference for Merit or above); or APEL evidence of substantial practitioner achievement.
• Appropriate IELTS score, if required (evidence required by 1 August 2017).

For further details of how to apply, entry requirements and the application form, see
https://www.northumbria.ac.uk/research/postgraduate-research-degrees/how-to-apply/

Please ensure you quote the advert reference above on your application form.
Deadline for applications: 20 January 2017
Start Date: 2 October 2017

Northumbria University is an equal opportunities provider and in welcoming applications for studentships from all sectors of the community we strongly encourage applications from women and under-represented groups.

Funding Notes

This project is being considered for funding in competition with other projects, through one of two types of funding packages available:
• Fully funded studentships include a full stipend, paid for three years at RCUK rates for 2017/18 (this is yet to be set, in 2016/17 this is £14,296 pa) and fees (Home/EU £4,350 / International £13,000 / International Lab-based £16,000), and are available to applicants worldwide.
• As Northumbria celebrates its 25th anniversary as a University and in line with our international outlook, some projects may also be offered to students from outside of the EU supported by a half-fee reduction.

References

Tran The Son, Hoa Le Minh, and Nauman Aslam, "MSAR: A Metric Self-Adaptive Routing Model for Mobile Ad Hoc Networks” Elsevier Journal of Network and Computer Applications, Accepted 2016 (Impact Factor: 2.33)

Mohammad Aluthaman, Nauman Aslam, Li Zhang and Rafe Aslem, "A P2P Botnet Detection Scheme based on Decision Tree and Adaptive Multi-layer Neural Networks”. Journal of Neural Computing and Applications, Accepted 2016 (Impact Factor: 1.53).

Zina A. Almaalie, Z. Ghassemlooy, M. Bhatangar, H. Le-Minh, N. Aslam, S-K Liaw and I. E. Lee, “Investigation on iterative multiuser detection physical layer network coding in two-way relay free-space optical links with turbulences and pointing errors, Applied Optics, Accepted 2016 (Impact Factor: 1.59)

Tran The Son, Hoa Le Minh, Graham Sexton and Nauman Aslam, "A novel encounter-based metric for mobile ad-hoc networks routing"” Elsevier Ad hoc Networks, Volume 14, March 2014, Pages 2–14 (Impact Factor: 1.66)

Andrew Burton, Hoa Le-Minh, Edward Bentley, Fary Ghassemlooy Nauman Aslam, "Experimental Demonstration of a 10BASE-T Ethernet Visible Light Communications System using White Phosphor LEDs", IET Circuits, Devices & Systems, Vol. 8, Issue 4, 2014. Pages 322 - 330 (Impact Factor: 0.59)

Abidalrahman Moh’d, Nauman Aslam, William Phillips and William Robertson, “A dual-mode energy efficient encryption protocol for wireless sensor networks” Elsevier Ad hoc Networks, Volume 11, Issue 8, November 2013, Pages 2588–2604 (Impact Factor: 1.66)

Barraclough, P. A., Hossain M. A., Tahir M., and Aslam, N., “Intelligent phishing detection and protection scheme for online transactions”, Elsevier Science Expert Systems with Applications, 40 (2013) 4697–4706, 2013 (Impact Factor: 2.98)

ZA Khan, S Sivakumar, W Phillips, N Aslam, “A new patient monitoring framework and Energy-aware Peering Routing Protocol (EPR) for Body Area Network communication”, Springer Journal of Ambient Intelligence and Humanized Computing, 1-15, 2013 (Impact Factor: 0.83)

Abidalrahman Moh’d, Nauman Aslam, William Robertson and William Phillips, “SN-SEC: A Secure Wireless Sensor Platform with Hardware Cryptographic Primitives” Journal of Personal and Ubiquitous Computing, May 2012. (Impact Factor: 1.49)

Aslam, N., Robertson, W., Phillips, W., and Sivakumar, S., "A Multi-Criterion Optimization Technique for Energy Efficient Cluster Formation in Wireless Sensor Networks", Elsevier Information Fusion Journal Volume 12, Issue 3 (2011), pages 147-240 (Impact Factor: 4.35)

Where will I study?