Publications

  1. & Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks. IEEE Access 7, 64040-64052.
  2. & Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. IEEE Communications Surveys & Tutorials, 1-1.
  3. & The Quest for Privacy in the Internet of Things. IEEE Cloud Computing 3(2), 36-45.
  4. & Access Control Protocol With Node Privacy in Wireless Sensor Networks. IEEE Sensors Journal 16(22), 8142-8150.
  5. & Anonymous Secure Framework in Connected Smart Home Environments. IEEE Transactions on Information Forensics and Security 12(4), 968-979.

See more...

Teaching

  • CSC318 Cryptography and IT-Security

    The aim of this course is to examine theoretical and practical aspects of computer and network security.

  • CSCM18 IT-Security: Cryptography and Network Security

    The aim of this course is to examine theoretical and practical aspects of computer and network security.

  • CSCM88 Network and Wireless Security

    Low cost networked computers add eyes and ears (or sensors) and arms, legs and voices (or actuators) to the Internet ¿ called the Internet of Things (IoT) connected smart objects. Networking technologies play a critical role in almost all modern software-based systems, whether the fixed networks of computers, or the growing pervasive devices which have increasingly diverse profiles of network connectivity. As a result, they provide a potential vector for many forms of attack and are an ideal location for many threat mitigations and isolation technologies.

Supervision

  • Secure asset tracing systems. (current)

    Student name:
    MSc
    Other supervisor: Prof Arnold Beckmann