Dr Prosanta Gope
School of Computer Science
Senior Lecturer in Cybersecurity
PGR Admissions Tutor
Member of the Security of Advanced Systems research group
+44 114 222 1897
Full contact details
School of Computer Science
Regent Court (DCS)
211 Portobello
Sheffield
S1 4DP
- Profile
-
Dr Prosanta Gope is currently working as an Associate Professor in the Department of Computer Science (Cyber Security) at the University of Sheffield, UK. Dr Gope served as a Research Fellow in the Department of Computer Science at the National University of Singapore (NUS). Primarily driven by challenging real-world security problems, he has expertise in lightweight authentication, authenticated encryption, access control, mobile communications security, healthcare, Internet of Things, Cloud, RFIDs, WSNs, Smart-Grid and IoT Hardware. He has authored more than 100 peer-reviewed articles in several reputable international journals and conferences and has four filed patents. Several of his papers have been published in high-impact journals (such as IEEE TIFS, IEEE TDSC, IEEE TIE, IEEE TSG, and IEEE/ACM TON) and prominent security conferences (such as IEEE Computer Security Foundations Symposium (CSF), Euro S&P, IEEE TrustCom, IEEE HoST, etc.) Dr Gope has served as a TPC member/Co-Chair in several reputable international conferences such as IEEE TrustCom, IEEE GLOBECOM(Security-Track), ARES, ESORICS, etc. He currently serves as an Associate Editor of the IEEE Internet of Things Journal, IEEE Systems Journal, IEEE Sensors Journal, and the Journal of Information Security and Applications (Elsevier). His research has been funded by EPSRC, Innovate UK, and the Royal Society.
- Research interests
-
-
Lightweight and Anonymous Authentication Protocol Design
-
Security and Privacy in Internet of Things
-
Security and Privacy in Mobile Communication
-
WSN and RFID Security
-
Security and Privacy in Smart-Grid
-
Hardware Security of the IoT Devices
-
5G and Next Generation Communication Security
-
Decentralized Communication Security (D2D Communication Security, Machine-type Communication Security)
-
Security and Privacy in Tactile-Internet-based Applications
-
Machine-learning or Modelling Attacks on Physically Unclonable Functions
-
Adaptive Intrusion Detection and Prevention System (IDS & IPS)
-
Adversarial Machine Learning
-
Privacy-Preserving Machine Learning
-
- Publications
-
Journal articles
- UniHand: Privacy-Preserving Universal Handover for Small-Cell Networks in 5G-Enabled Mobile Communication with KCI Resilience. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 21, 573-588.
- PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices. 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
- User-empowered secure privacy-preserving authentication scheme for Digital Twin. Computers & Security, 140, 103793-103793.
- E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system. Journal of Computer Security, abs/2207.05890, 1-30.
- Attacking Delay-based PUFs with Minimal Adversarial Knowledge. IEEE Transactions on Information Forensics and Security, 1-1.
- Incremental hybrid intrusion detection for 6LoWPAN. Computers & Security, 135, 103447-103447.
- A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI.. IEEE Trans. Veh. Technol., 72, 14771-14786.
- AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks. IEEE/ACM Transactions on Networking, 1-16.
- A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI. IEEE Transactions on Vehicular Technology.
- PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-based Authentication with DRAM-PUFs Using Machine Learning. IEEE Transactions on Information Forensics and Security, 1-1.
- Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralized Identity. IEEE Internet of Things Magazine, 6(1), 70-75.
- Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication. IEEE Transactions on Information Forensics and Security, 1-1.
- PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning.. IEEE Trans. Inf. Forensics Secur., 18, 2451-2465.
- Data Privacy Enhancing in the IoT User/Device Behavior Analytics. ACM Transactions on Sensor Networks, 19(2), 1-13.
- User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential. ACM Transactions on Management Information Systems, 13(4), 1-21.
- Adversarial RL-based IDS for Evolving Data Environment in 6LoWPAN. IEEE Transactions on Information Forensics and Security, 1-1.
- Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges. IEEE Transactions on Industrial Informatics, 1-2.
- Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics, 11(13).
- QR-PUF: Design and Implementation of A RFID-based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code. IEEE Transactions on Network Science and Engineering, 1-9.
- A Security-enabled Safety Assurance Framework for IoT-based Smart Homes. IEEE Transactions on Industry Applications, PP(99), 1-1.
- Data Anonymization Evaluation for Big Data and IoT Environment. Information Sciences.
- CB-DA : lightweight and escrow-free certificate-based data aggregation for smart grid. IEEE Transactions on Dependable and Secure Computing.
- An ultra-lightweight data-aggregation scheme with deep learning security for smart grid. IEEE Wireless Communications, 29(2), 30-36.
- ABCAttack : a gradient-free optimization black-box attack for fooling deep image classifiers. Entropy, 24(3).
- Edge-based Collaborative Training System for Artificial Intelligence-of-Things. IEEE Transactions on Industrial Informatics, 1-1.
- An AI-Driven Secure and Intelligent Robotic Delivery System. IEEE Transactions on Engineering Management.
- Consensus Adversarial Defense Method Based on Augmented Examples. IEEE Transactions on Industrial Informatics.
- RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach. IEEE Transactions on Intelligent Transportation Systems, 1-10.
- Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication. IEEE Transactions on Intelligent Transportation Systems, 1-14.
- A comparative study of design paradigms for PUF-based security protocols for IoT devices: current progress, challenges, and future expectation. Computer, 54(11), 36-46.
- A privacy-aware reconfigurable authenticated key exchange scheme for secure communication in smart grids. IEEE Transactions on Smart Grid.
- A blockchain based secure communication framework for community interaction. Journal of Information Security and Applications, 58.
- Design, analysis and implementation of a smart next generation secure shipping infrastructure using autonomous robot. Computer Networks, 187. View this article in WRRO
- ReCognizing SUspect and PredictiNg ThE SpRead of Contagion Based on Mobile Phone LoCation DaTa (COUNTERACT): A system of identifying COVID-19 infectious and hazardous sites, detecting disease outbreaks based on the internet of things, edge computing, and artificial intelligence. Sustainable Cities and Society, 69, 102798-102798.
- Security in 5G-enabled Internet of Things communication: issues, challenges, and future research roadmap. IEEE Access, 9, 4466-4489.
- SCBS: A Short Certificate-Based Signature Scheme with Efficient Aggregation for Industrial Internet of Things Environment. IEEE Internet of Things Journal, 1-1.
- Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.. IEEE Access, 9, 4466-4489.
- Intrusion Detection Systems in RPL-based 6LoWPAN: A Systematic Literature Review. IEEE Sensors Journal, 1-1.
- PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment.. IEEE Trans. Dependable Secur. Comput., 18, 1095-1107.
- A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on PUF-based Authentication Mechanisms for Internet-of-Medical-Things. IEEE Transactions on Industrial Informatics, 1-1.
- SCBS: A Short Certificate-Based Signature Scheme With Efficient Aggregation for Industrial-Internet-of-Things Environment.. IEEE Internet Things J., 8, 9305-9316.
- PF-DA: Pairing Free and Secure Data Aggregation for Energy Internet-based Smart Meter-to-Grid Communication. IEEE Transactions on Smart Grid.
- SHARIF: Solid Pod-based Secured HealthcareInformation Storage and Exchange Solution in IoT. IEEE Transactions on Industrial Informatics.
- A provably secure authentication scheme for RFID-enabled UAV applications. Computer Communications, 166, 19-25.
- An efficient blockchain-based authentication scheme for energy-trading in V2G networks. IEEE Transactions on Industrial Informatics.
- An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Transactions on Vehicular Technology.
- A secure IoT-based modern healthcare system with fault-tolerant decision making process. IEEE Journal of Biomedical and Health Informatics. View this article in WRRO
- PharmaCrypt : blockchain for critical pharmaceutical industry to counterfeit drugs. Computer, 53(7), 29-44. View this article in WRRO
- Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme. Future Generation Computer Systems, 109, 45-55.
- PMAKE : Privacy-aware multi-factor authenticated key establishment scheme for advance metering infrastructure in smart grid. Computer Communications. View this article in WRRO
- An Efficient Privacy-Friendly Hop-by-Hop Data Aggregation Scheme for Smart Grids. IEEE Systems Journal, 14(1), 343-352.
- Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Future Generation Computer Systems, 108, 1267-1286.
- An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid, 10(6), 6607-6618. View this article in WRRO
- Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Transactions on Industrial Informatics, 15(9), 4957-4968.
- LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Computers & Security, 86, 223-237. View this article in WRRO
- Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Transactions on Smart Grid, 10(4), 3953-3962.
- Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System. IEEE Journal of Biomedical and Health Informatics, 23(4), 1749-1759.
- Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids. IEEE Transactions on Information Forensics and Security, 14(6), 1554-1566. View this article in WRRO
- PrivHome: Privacy-preserving authenticated communication in smart home environment. IEEE Transactions on Dependable and Secure Computing. View this article in WRRO
- Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions. IEEE Consumer Electronics Magazine, 8(3), 10-16.
- Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet of Things, 6(1), 580-589. View this article in WRRO
- Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. Journal of Ambient Intelligence and Humanized Computing, 10(1), 153-161.
- Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. IEEE Transactions on Information Forensics and Security, 13(11), 2831-2843.
- Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Generation Computer Systems, 83, 629-637.
- Anonymous and expeditious mobile user authentication scheme for GLOMONET environments. International Journal of Communication Systems, 31(2), e3461-e3461.
- Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimedia Tools and Applications, 77(14), 18295-18325.
- An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids. IEEE Internet of Things Journal, 5(4), 3126-3135.
- Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks. IEEE Sensors Journal, 17(2), 498-503.
- Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks. Journal of Information Security and Applications, 35, 160-167.
- Robust Anonymous Mutual Authentication Scheme for
n -Times Ubiquitous Mobile Cloud Computing Services. IEEE Internet of Things Journal, 4(5), 1764-1772. - IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks. Wireless Personal Communications, 94(3), 467-479.
- Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Information Processing, 16(8).
- Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States. International Journal of Theoretical Physics, 55(6), 2969-2976.
- An Efficient Quantum Private Comparison of Equality over Collective-Noise Channels. International Journal of Theoretical Physics, 55(4), 2125-2138.
- BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network. IEEE Sensors Journal, 16(5), 1368-1376.
- Faecal contamination of commuters’ hands in main vehicle stations in Dhaka city, Bangladesh. Transactions of The Royal Society of Tropical Medicine and Hygiene, 110(6), 367-372.
- A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks. IEEE Transactions on Industrial Electronics, 63(11), 7124-7132.
- A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data. Journal of Medical Systems, 40(11).
- RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode. Cryptologia, 40(1), 1-14.
- PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption. Cryptologia, 40(3), 285-302.
- PFX: an essence of authencryption for block-cipher security. Security and Communication Networks, 9(10), 1186-1197.
- Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network. Security and Communication Networks, 9(7), 667-679.
- An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications, 62, 1-8.
- Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks. IEEE Systems Journal, 10(4), 1370-1379.
- Untraceable Sensor Movement in Distributed IoT Infrastructure. IEEE Sensors Journal, 15(9), 5340-5348.
- Multi-party quantum private comparison with an almost-dishonest third party. Quantum Information Processing, 14(11), 4225-4235.
- Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography.. IACR Cryptol. ePrint Arch., 2015, 897-897.
- A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Computers & Security, 55, 271-280.
- IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes. Security and Communication Networks, 8(18), 3939-3952.
- Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Personal Communications, 82(4), 2231-2245.
- Erratum to: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Personal Communications, 82(4), 2247-2247.
- Enhancement of Wettability of Aluminum Based Silicon Carbide Reinforced Particulate Metal Matrix Composite. High Temperature Materials and Processes, 0(0).
- Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets. Wireless Personal Communications, 77(1), 197-224.
- BACKM-EHA: A novel blockchain-enabled security solution for IoMT-based e-healthcare applications. ACM Transactions on Internet Technology.
- A Secure and Anonymous Communicate Scheme over the Internet of Things. ACM Transactions on Sensor Networks.
- Smart aging monitoring and early dementia recognition (SAMEDR): uncovering the hidden wellness parameter for preventive well-being monitoring to categorize cognitive impairment and dementia in community-dwelling elderly subjects through AI. Neural Computing and Applications.
- Smart Aging System: Uncovering the Hidden Wellness Parameter for Well-Being Monitoring and Anomaly Detection. Sensors, 19(4), 766-766.
- Smart Home Anti-Theft System: A Novel Approach for Near Real-Time Monitoring and Smart Home Security for Wellness Protocol. Applied System Innovation, 1(4), 42-42.
- Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs. Information Technology And Control, 44(3).
- An Enhanced JPEG Steganography Scheme with Encryption Technique. International Journal of Computer and Electrical Engineering, 924-930.
- An enhanced secure delegation-based anonymous authentication protocol for PCSs. International Journal of Communication Systems, e4199-e4199.
- Smart Home Anti-Theft System: A Novel Approach for Near Real-Time Monitoring, Smart Home Security and Large Video Data Handling for Wellness Protocol.
Chapters
- Optimal Machine-Learning Attacks on Hybrid PUFs, Lecture Notes in Computer Science (pp. 251-270). Springer Nature Switzerland
- Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids, Information and Communications Security (pp. 281-300). Springer International Publishing
- An efficient ambient intelligent–assisted people searching for Internet of Things–based health-care system, Assistive Technology for the Elderly (pp. 45-58). Elsevier
Conference proceedings papers
- Failure Analysis of IoT-based Smart Agriculture System: Towards Sustainable Food Security. 2023 5th International Conference on Sustainable Technologies for Industry 5.0 (STI), 9 December 2023 - 10 December 2023.
- A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers. 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 1 May 2023 - 4 May 2023.
- A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs. 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 3 July 2023 - 7 July 2023.
- Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond. Proceedings of the 9th International Conference on Information Systems Security and Privacy, 22 February 2023 - 24 February 2023.
- A Reconfigurable and Secure Firmware Updating Framework for Advanced Metering Infrastructure. 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 25 October 2022 - 28 October 2022.
- Combining Drone-based Monitoring and Machine Learning for Online Reliability Evaluation of Wind Turbines. 2022 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 17 August 2022 - 18 August 2022.
- ATVSA: Vehicle Driver Profiling for Situational Awareness. 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 6 June 2022 - 10 June 2022.
- Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network. 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 6 June 2022 - 10 June 2022.
- Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model. 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 25 October 2021 - 28 October 2021. View this article in WRRO
- Reinforcement-Learning-based IDS for 6LoWPAN. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 20 October 2021 - 22 October 2021.
- Message from the General Chairs. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 20 October 2021 - 22 October 2021.
- An Efficient Privacy-Friendly Multi-Hop Data Aggregation Scheme for Smart Grids. 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), 18 February 2019 - 21 February 2019.
- A Lightweight and Privacy-Preserving Data Aggregation for Dynamic Pricing-based Billing in Smart Grids. 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), 21 October 2018 - 25 October 2018.
- An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids. 2018 IEEE Conference on Communications and Network Security (CNS), 30 May 2018 - 1 June 2018.
- Issues and mitigation of attenuation and direction of arrival in wellness protocol to wireless sensors and networks based smart building. 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), 20 April 2017 - 22 April 2017.
- Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System. 2016 International Computer Symposium (ICS), 15 December 2016 - 17 December 2016.
- Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System. 2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS) (pp 244-247)
- Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services. 2016 11th International Conference on Availability, Reliability and Security (ARES), 31 August 2016 - 2 September 2016.
- Security Weaknesses on a Mutual Authentication and Key Agreement Scheme in Global Mobile Networks. Computer Science & Information Technology ( CS & IT )
- Provably secure mutual authentication and key agreement scheme with user anonymity. 2013 9th International Conference on Information, Communications & Signal Processing, 10 December 2013 - 13 December 2013.
- An efficient cryptographic approach for secure policy based routing: (TACIT Encryption Technique). 2011 3rd International Conference on Electronics Computer Technology, 8 April 2011 - 10 April 2011.
- An Enhanced Round Robin Policy for Real Time Traffic (pp 44-50)
- X-MODDES (eXtended Multi Operator Delimiter Based Data Encryption Standard). 2010 Second International Conference on Future Networks, 22 January 2010 - 24 January 2010.
- A COMPARATIVE STUDY OF PERFORMANCE BASED CRYPTO ANALYSIS FEATURES FOR STANDARD DATA ENCRYPTION ALGORITHMS WITH (MODDES). Computer and Network Technology
- MULTI OPERATOR DELIMITER BASED DATA ENCRYPTION STANDARD (MODDES). Computer and Network Technology
Preprints
- AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks, arXiv.
- A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids, arXiv.
- Adaptive Hybrid Heterogeneous IDS for 6LoWPAN, arXiv.
- Grants
-
Current Grants
- ATM II: Automated Threat Modelling for Enterprise AI-enabled Assets, Innovate UK, 10/2023 - 03/2024, £59,376, as Co-PI
-
Security of Digital Twins in Manufacturing, EPSRC, 10/2021 - 01/2025, £619,963, as Co-PI
Previous Grants
-
ATM: Automated Threat Modelling for Enterprise AI-enabled Assets, Innovate UK, 05/2023 - 09/2023, £24,977, as Co-PI
-
ATDPS: Adaptive Trojan Detection and Prevention Systems for Networks-onChips (NoCs) - Phase II, Innovate UK, 09/2022 - 02/2023, £52,433, as PI
-
ATDPS: Adaptive Trojan Detection and Prevention Systems for Networks-on-Chips (NoCs), Innovate UK, 04/2022 - 07/2022, £22,316, as PI
-
A provably secure modelling attack resilient PUF for hardware security of IoT devices, Royal Society, 03/2022 - 09/2023, £17,791, as PI
- Professional activities and memberships
-
- Member of the Security of Advanced Systems Research Group
Editorial Board Member of the Following Journals:
- Associate Editor of the IEEE Internet of Things Journal
- Associate Editor of the IEEE Systems Journal
- Associate Editor of the IEEE Sensors Journal
- Associate Editor of the Security and Communication Networks
- Associate Editor of the Journal of Information Security and Applications (Elsevier)