Publications

  1. Khan, R., Kumar, P., Jayakody, D., Liyanage, M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions IEEE Communications Surveys & Tutorials 1 1
  2. Kumar, P. Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks IEEE Access 7 64040 64052
  3. Kumar, P. Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues IEEE Communications Surveys & Tutorials 21 3 2886 2927
  4. Vasilakos, A., Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A. The Quest for Privacy in the Internet of Things IEEE Cloud Computing 3 2 36 45
  5. Kumar, P., Gurtov, A., Iinatti, J., Sain, M., Ha, P. Access Control Protocol With Node Privacy in Wireless Sensor Networks IEEE Sensors Journal 16 22 8142 8150

See more...

Teaching

  • CSC318 Cryptography and IT-Security

    The aim of this course is to examine theoretical and practical aspects of computer and network security.

  • CSCM18 IT-Security: Cryptography and Network Security

    The aim of this course is to examine theoretical and practical aspects of computer and network security.

  • CSCM88 Network and Wireless Security

    Low cost networked computers add eyes and ears (or sensors) and arms, legs and voices (or actuators) to the Internet ¿ called the Internet of Things (IoT) connected smart objects. Networking technologies play a critical role in almost all modern software-based systems, whether the fixed networks of computers, or the growing pervasive devices which have increasingly diverse profiles of network connectivity. As a result, they provide a potential vector for many forms of attack and are an ideal location for many threat mitigations and isolation technologies.

Supervision

  • Secure asset data systems for a future without ownership. (current)

    Student name:
    MSc
    Other supervisor: Prof Arnold Beckmann