Dr Prosanta Gope
School of Computer Science
Senior Lecturer in Cybersecurity
Course Director for MSc Cybersecurity & AI
Member of the Security of Advanced Systems research group
 
   
  Full contact details
School of Computer Science
Regent Court (DCS)
211 Portobello
Sheffield
S1 4DP
- Profile
- 
    Dr Prosanta Gope is currently working as an Associate Professor in the Department of Computer Science (Cyber Security) at the University of Sheffield, UK. Dr Gope served as a Research Fellow in the Department of Computer Science at the National University of Singapore (NUS). Primarily driven by challenging real-world security problems, he has expertise in lightweight authentication, authenticated encryption, access control, mobile communications security, healthcare, Internet of Things, Cloud, RFIDs, WSNs, Smart-Grid and IoT Hardware. He has authored more than 100 peer-reviewed articles in several reputable international journals and conferences and has four filed patents. Several of his papers have been published in high-impact journals (such as IEEE TIFS, IEEE TDSC, IEEE TIE, IEEE TSG, and IEEE/ACM TON) and prominent security conferences (such as IEEE Computer Security Foundations Symposium (CSF), Euro S&P, IEEE TrustCom, IEEE HoST, etc.) Dr Gope has served as a TPC member/Co-Chair in several reputable international conferences such as IEEE TrustCom, IEEE GLOBECOM(Security-Track), ARES, ESORICS, etc. He currently serves as an Associate Editor of the IEEE Internet of Things Journal, IEEE Systems Journal, IEEE Sensors Journal, and the Journal of Information Security and Applications (Elsevier). His research has been funded by EPSRC, Innovate UK, and the Royal Society. 
- Research interests
- 
    - Lightweight and Anonymous Authentication Protocol Design 
- Security and Privacy in Internet of Things 
- Security and Privacy in Mobile Communication 
- WSN and RFID Security 
- Security and Privacy in Smart-Grid 
- Hardware Security of the IoT Devices 
- 5G and Next Generation Communication Security 
- Decentralized Communication Security (D2D Communication Security, Machine-type Communication Security) 
- Security and Privacy in Tactile-Internet-based Applications 
- Machine-learning or Modelling Attacks on Physically Unclonable Functions 
- Adaptive Intrusion Detection and Prevention System (IDS & IPS) 
- Adversarial Machine Learning 
- Privacy-Preserving Machine Learning 
 
- Publications
- 
    Journal articles-  QT-PAKE: Secure Messaging via Quantum-Safe Threshold PAKE. IEEE Transactions on Consumer Electronics, 1-1. 
					    
-  Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting. IEEE Transactions on Dependable and Secure Computing, 1-19. 
					    
-  Lightweight and Privacy-Preserving Reconfigurable Authentication Scheme for IoT Devices. IEEE Transactions on Services Computing, 18(2), 912-925. 
					    
-  Privacy-preserving Robotic-based Multi-factor Authentication Scheme for Secure Automated Delivery System. IEEE Transactions on Information Forensics and Security, 1-1. 
					    
-  Attacking Delay-Based PUFs With Minimal Adversarial Knowledge. IEEE Transactions on Information Forensics and Security, 19, 7259-7274. 
					    
-  UniHand: Privacy-Preserving Universal Handover for Small-Cell Networks in 5G-Enabled Mobile Communication with KCI Resilience. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 573-588. 
					    
-  PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices. 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 309-319. 
					    
-  User-empowered secure privacy-preserving authentication scheme for Digital Twin. Computers & Security, 140. View this article in WRRO 
					    
-  E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system. Journal of Computer Security. View this article in WRRO 
					    
-  AIDPS: Adaptive intrusion detection and prevention system for underwater acoustic sensor networks. IEEE/ACM Transactions on Networking, 32(2), 1080-1095. View this article in WRRO 
					    
-  An AI-Driven Secure and Intelligent Robotic Delivery System. IEEE Transactions on Engineering Management, 71, 12658-12673. 
					    
-  A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI.. IEEE Trans. Veh. Technol., 72, 14771-14786. 
					    
-  Incremental hybrid intrusion detection for 6LoWPAN. Computers & Security, 135. View this article in WRRO 
					    
-  BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications. ACM Transactions on Internet Technology, 23(3), 1-28. 
					    
-  A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI. IEEE Transactions on Vehicular Technology, 1-16. 
					    
-  PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning. IEEE Transactions on Information Forensics and Security, 18, 2451-2465. 
					    
-  Privacy-aware secure region-based handover for small cell networks in 5G-enabled mobile communication. IEEE Transactions on Information Forensics and Security, 18, 1898-1913. View this article in WRRO 
					    
-  Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralized Identity. IEEE Internet of Things Magazine, 6(1), 70-75. 
					    
-  Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges. IEEE Transactions on Industrial Informatics, 19(1), 867-869. 
					    
-  PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning.. IEEE Trans. Inf. Forensics Secur., 18, 2451-2465. 
					    
-  Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication. IEEE Transactions on Intelligent Transportation Systems, 24(12), 15400-15413. 
					    
-  Data Privacy Enhancing in the IoT User/Device Behavior Analytics. ACM Transactions on Sensor Networks, 19(2), 1-13. 
					    
-  RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach. IEEE Transactions on Intelligent Transportation Systems, 24(4), 4641-4650. 
					    
-  QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code. IEEE Transactions on Network Science and Engineering, 10(5), 2637-2650. 
					    
-  A Security-Enabled Safety Assurance Framework for IoT-Based Smart Homes. IEEE Transactions on Industry Applications, 59(1), 6-14. 
					    
-  Consensus Adversarial Defense Method Based on Augmented Examples. IEEE Transactions on Industrial Informatics, 19(1), 984-994. 
					    
-  Smart aging monitoring and early dementia recognition (SAMEDR): uncovering the hidden wellness parameter for preventive well-being monitoring to categorize cognitive impairment and dementia in community-dwelling elderly subjects through AI. Neural Computing and Applications, 35(33), 23739-23751. View this article in WRRO 
					    
-  Adversarial RL-based IDS for evolving data environment in 6LoWPAN. IEEE Transactions on Information Forensics and Security, 17, 3831-3846. View this article in WRRO 
					    
-  User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential. ACM Transactions on Management Information Systems, 13(4), 1-21. 
					    
-  Data anonymization evaluation for big data and IoT environment. Information Sciences, 605, 381-392. 
					    
-  Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics, 11(13). 
					    
-  CB-DA : lightweight and escrow-free certificate-based data aggregation for smart grid. IEEE Transactions on Dependable and Secure Computing. 
					    
-  A Secure and Anonymous Communicate Scheme over the Internet of Things. ACM Transactions on Sensor Networks, 18(3), 1-21. 
					    
-  An ultra-lightweight data-aggregation scheme with deep learning security for smart grid. IEEE Wireless Communications, 29(2), 30-36. 
					    
-  ABCAttack : a gradient-free optimization black-box attack for fooling deep image classifiers. Entropy, 24(3). 
					    
-  Edge-Based Collaborative Training System for Artificial Intelligence-of-Things. IEEE Transactions on Industrial Informatics, 18(10), 7162-7173. 
					    
-  PF-DA: Pairing Free and Secure Data Aggregation for Energy Internet-Based Smart Meter-to-Grid Communication. IEEE Transactions on Smart Grid, 13(3), 2294-2304. 
					    
-  SHARIF: Solid Pod-Based Secured Healthcare Information Storage and Exchange Solution in Internet of Things. IEEE Transactions on Industrial Informatics, 18(8), 5609-5618. 
					    
-  A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things. IEEE Transactions on Industrial Informatics, 18(3), 1971-1980. 
					    
-  A comparative study of design paradigms for PUF-based security protocols for IoT devices: current progress, challenges, and future expectation. Computer, 54(11), 36-46. 
					    
-  An efficient blockchain-based authentication scheme for energy-trading in V2G networks. IEEE Transactions on Industrial Informatics, 17(10), 6971-6980. 
					    
-  A privacy-aware reconfigurable authenticated key exchange scheme for secure communication in smart grids. IEEE Transactions on Smart Grid, 12(6), 5335-5348. 
					    
-  PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. IEEE Transactions on Dependable and Secure Computing, 18(3), 1095-1107. 
					    
-  A blockchain based secure communication framework for community interaction. Journal of Information Security and Applications, 58, 102790-102790. 
					    
-  Intrusion detection systems in RPL-based 6LoWPAN: a systematic literature review. IEEE Sensors Journal, 21(11), 12940-12968. View this article in WRRO 
					    
-  Design, analysis and implementation of a smart next generation secure shipping infrastructure using autonomous robot. Computer Networks, 187. 
					    
-  A secure IoT-based modern healthcare system with fault-tolerant decision making process. IEEE Journal of Biomedical and Health Informatics, 25(3), 862-873. 
					    
-  ReCognizing SUspect and PredictiNg ThE SpRead of Contagion Based on Mobile Phone LoCation DaTa (COUNTERACT): A system of identifying COVID-19 infectious and hazardous sites, detecting disease outbreaks based on the internet of things, edge computing, and artificial intelligence. Sustainable Cities and Society, 69, 102798-102798. 
					    
-  SCBS: A Short Certificate-Based Signature Scheme With Efficient Aggregation for Industrial-Internet-of-Things Environment. IEEE Internet of Things Journal, 8(11), 9305-9316. 
					    
-  A provably secure authentication scheme for RFID-enabled UAV applications. Computer Communications, 166, 19-25. 
					    
-  Security in 5G-enabled Internet of Things communication: issues, challenges, and future research roadmap. IEEE Access, 9, 4466-4489. 
					    
-  Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.. IEEE Access, 9, 4466-4489. 
					    
-  PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment.. IEEE Trans. Dependable Secur. Comput., 18, 1095-1107. 
					    
-  SCBS: A Short Certificate-Based Signature Scheme With Efficient Aggregation for Industrial-Internet-of-Things Environment.. IEEE Internet Things J., 8, 9305-9316. 
					    
-  An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Transactions on Vehicular Technology, 69(11), 13621-13630. 
					    
-  Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme. Future Generation Computer Systems, 109, 45-55. 
					    
-  PharmaCrypt : blockchain for critical pharmaceutical industry to counterfeit drugs. Computer, 53(7), 29-44. 
					    
-  Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Future Generation Computer Systems, 108, 1267-1286. 
					    
-  PMAKE : Privacy-aware multi-factor authenticated key establishment scheme for advance metering infrastructure in smart grid. Computer Communications, 152, 338-344. 
					    
-  An Efficient Privacy-Friendly Hop-by-Hop Data Aggregation Scheme for Smart Grids. IEEE Systems Journal, 14(1), 343-352. 
					    
-  An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid, 10(6), 6607-6618. 
					    
-  LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Computers & Security, 86, 223-237. View this article in WRRO 
					    
-  Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids. IEEE Transactions on Information Forensics and Security, 14(6), 1554-1566. 
					    
-  Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions. IEEE Consumer Electronics Magazine, 8(3), 10-16. 
					    
-  Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet of Things, 6(1), 580-589. 
					    
-  Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Transactions on Industrial Informatics, 15(9), 4957-4968. 
					    
-  Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System. IEEE Journal of Biomedical and Health Informatics, 23(4), 1749-1759. 
					    
-  Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Transactions on Smart Grid, 10(4), 3953-3962. 
					    
-  Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. Journal of Ambient Intelligence and Humanized Computing, 10(1), 153-161. 
					    
-  Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. IEEE Transactions on Information Forensics and Security, 13(11), 2831-2843. 
					    
-  Smart Home Anti-Theft System: A Novel Approach for Near Real-Time Monitoring, Smart Home Security and Large Video Data Handling for Wellness Protocol. 
					    
-  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Generation Computer Systems, 83, 629-637. 
					    
-  An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids. IEEE Internet of Things Journal, 5(4), 3126-3135. 
					    
-  Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimedia Tools and Applications, 77(14), 18295-18325. 
					    
-  Anonymous and expeditious mobile user authentication scheme for GLOMONET environments. International Journal of Communication Systems, 31(2). 
					    
-  Robust Anonymous Mutual Authentication Scheme for <italic>n</italic>-Times Ubiquitous Mobile Cloud Computing Services. IEEE Internet of Things Journal, 4(5), 1764-1772. 
					    
-  Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks. Journal of Information Security and Applications, 35, 160-167. 
					    
-  Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Information Processing, 16(8). 
					    
-  Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks. IEEE Sensors Journal, 17(2), 498-503. 
					    
-  IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks. Wireless Personal Communications, 94(3), 467-479. 
					    
-  A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data. Journal of Medical Systems, 40(11). 
					    
-  Faecal contamination of commuters’ hands in main vehicle stations in Dhaka city, Bangladesh. Transactions of The Royal Society of Tropical Medicine and Hygiene, 110(6), 367-372. 
					    
-  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks. IEEE Transactions on Industrial Electronics, 63(11), 7124-7132. 
					    
-  An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications, 62, 1-8. 
					    
-  Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States. International Journal of Theoretical Physics, 55(6), 2969-2976. 
					    
-  PFX: an essence of authencryption for block-cipher security. Security and Communication Networks, 9(10), 1186-1197. 
					    
-  BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network. IEEE Sensors Journal, 16(5), 1368-1376. 
					    
-  PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption. Cryptologia, 40(3), 285-302. 
					    
-  Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network. Security and Communication Networks, 9(7), 667-679. 
					    
-  An Efficient Quantum Private Comparison of Equality over Collective-Noise Channels. International Journal of Theoretical Physics, 55(4), 2125-2138. 
					    
-  RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode. Cryptologia, 40(1), 1-14. 
					    
-  Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks. IEEE Systems Journal, 10(4), 1370-1379. 
					    
-  Multi-party quantum private comparison with an almost-dishonest third party. Quantum Information Processing, 14(11), 4225-4235. 
					    
-  IAR‐CTR and IAR‐CFB: integrity aware real‐time based counter and cipher feedback modes. Security and Communication Networks, 8(18), 3939-3952. 
					    
-  Untraceable Sensor Movement in Distributed IoT Infrastructure. IEEE Sensors Journal, 15(9), 5340-5348. 
					    
-  Erratum to: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Personal Communications, 82(4), 2247-2247. 
					    
-  A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Computers & Security, 55, 271-280. 
					    
-  Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wireless Personal Communications, 82(4), 2231-2245. 
					    
-  Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography.. IACR Cryptol. ePrint Arch., 2015, 897-897. 
					    
-  Enhancement of Wettability of Aluminum Based Silicon Carbide Reinforced Particulate Metal Matrix Composite. High Temperature Materials and Processes, 0(0). 
					    
-  Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets. Wireless Personal Communications, 77(1), 197-224. 
					    
-  An enhanced secure delegation-based anonymous authentication protocol for PCSs. International Journal of Communication Systems, e4199-e4199. 
					    
-  Smart Aging System: Uncovering the Hidden Wellness Parameter for Well-Being Monitoring and Anomaly Detection. Sensors, 19(4), 766-766. 
					    
-  Smart Home Anti-Theft System: A Novel Approach for Near Real-Time Monitoring and Smart Home Security for Wellness Protocol. Applied System Innovation, 1(4), 42-42. 
					    
-  Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs. Information Technology and Control, 44(3), 329-333. 
					    
-  An Enhanced JPEG Steganography Scheme with Encryption Technique. International Journal of Computer and Electrical Engineering, 924-930. 
					    
 Book chapters-  Optimal Machine-Learning Attacks on Hybrid PUFs, Lecture Notes in Computer Science (pp. 251-270). Springer Nature Switzerland 
					    
-  Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids, Lecture Notes in Computer Science (pp. 281-300). Springer International Publishing 
					    
-  Linear Regression and Artificial Neural Network (ANN)-based Approaches to Predict Air Pollution, Encyclopedia of Sensors and Biosensors First Edition Four Volume Set (pp. V3-511). 
					    
-  An efficient ambient intelligent–assisted people searching for Internet of Things–based health-care system, Assistive Technology for the Elderly (pp. 45-58). Elsevier 
					    
 Conference proceedings-  PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature. 2025 IEEE Symposium on Security and Privacy (SP) (pp 1140-1158), 12 May 2025 - 15 May 2025. 
					    
-  Strong privacy-preserving universally composable AKA protocol with seamless handover support for Mobile Virtual Network Operator. CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp 2057-2071). Salt Lake City, UT, USA, 14 October 2024 - 14 October 2024. View this article in WRRO 
					    
-  Failure Analysis of IoT-based Smart Agriculture System: Towards Sustainable Food Security. 2023 5th International Conference on Sustainable Technologies for Industry 5.0 (STI) (pp 1-6), 9 December 2023 - 10 December 2023. 
					    
-  A generic obfuscation framework for preventing ML-attacks on strong-PUFs through exploitation of DRAM-PUFs. 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) (pp 92-106). Delft, Netherlands, 3 July 2023 - 3 July 2023. View this article in WRRO 
					    
-  A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers. 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (pp 326-336), 1 May 2023 - 4 May 2023. 
					    
-  Design rationale for symbiotically secure key management systems in IoT and beyond. Proceedings of the 9th International Conference on Information Systems Security and Privacy, Vol. 1 (pp 583-591). Lisbon, Portugal, 22 February 2023 - 22 February 2023. View this article in WRRO 
					    
-  A Reconfigurable and Secure Firmware Updating Framework for Advanced Metering Infrastructure. 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) (pp 453-459), 25 October 2022 - 28 October 2022. 
					    
-  Combining Drone-based Monitoring and Machine Learning for Online Reliability Evaluation of Wind Turbines. 2022 International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp 53-58), 17 August 2022 - 18 August 2022. 
					    
-  Reinforcement-learning-based IDS for 6LoWPAN. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp 1049-1060). Shenyang, China, 20 October 2021 - 20 October 2021. View this article in WRRO 
					    
-  ATVSA: Vehicle Driver Profiling for Situational Awareness. 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp 348-357), 6 June 2022 - 10 June 2022. 
					    
-  Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network. 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 6 June 2022 - 10 June 2022. 
					    
-  Message from the General Chairs. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp xxxvi-xxxvi), 20 October 2021 - 22 October 2021. 
					    
-  Electricity theft detection in the presence of prosumers using a cluster-based multi-feature detection model. 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). Aachen, Germany, 25 October 2021 - 25 October 2021. View this article in WRRO 
					    
-  An Efficient Privacy-Friendly Multi-Hop Data Aggregation Scheme for Smart Grids. 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (pp 1-6), 18 February 2019 - 21 February 2019. 
					    
-  A Lightweight and Privacy-Preserving Data Aggregation for Dynamic Pricing-based Billing in Smart Grids. 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) (pp 1-7), 21 October 2018 - 25 October 2018. 
					    
-  An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids. 2018 IEEE Conference on Communications and Network Security (CNS) (pp 1-2), 30 May 2018 - 1 June 2018. 
					    
-  Retracted: Issues and mitigation of attenuation and direction of arrival in wellness protocol to wireless sensors and networks based smart building. 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA) (pp 700-705), 20 April 2017 - 22 April 2017. 
					    
-  Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System. 2016 International Computer Symposium (ICS) (pp 244-247), 15 December 2016 - 17 December 2016. 
					    
-  Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services. 2016 11th International Conference on Availability, Reliability and Security (ARES) (pp 247-252), 31 August 2016 - 2 September 2016. 
					    
-  Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System. 2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS) (pp 244-247) 
					    
-  Security Weaknesses on a Mutual Authentication and Key Agreement Scheme in Global Mobile Networks. Computer Science & Information Technology ( CS & IT ) (pp 01-07) 
					    
-  Provably secure mutual authentication and key agreement scheme with user anonymity. 2013 9th International Conference on Information, Communications & Signal Processing (pp 1-5), 10 December 2013 - 13 December 2013. 
					    
-  An efficient cryptographic approach for secure policy based routing: (TACIT Encryption Technique). 2011 3rd International Conference on Electronics Computer Technology (pp 359-363), 8 April 2011 - 10 April 2011. 
					    
-  An Enhanced Round Robin Policy for Real Time Traffic (pp 44-50) 
					    
-  X-MODDES (eXtended Multi Operator Delimiter Based Data Encryption Standard). 2010 Second International Conference on Future Networks (pp 399-403), 22 January 2010 - 24 January 2010. 
					    
-  A COMPARATIVE STUDY OF PERFORMANCE BASED CRYPTO ANALYSIS FEATURES FOR STANDARD DATA ENCRYPTION ALGORITHMS WITH (MODDES). Computer and Network Technology (pp 164-168) 
					    
-  MULTI OPERATOR DELIMITER BASED DATA ENCRYPTION STANDARD (MODDES). Computer and Network Technology (pp 159-163) 
					    
 Preprints-  Privacy-preserving Robotic-based Multi-factor Authentication Scheme for Secure Automated Delivery System, arXiv. 
					    
-  Leveraging A New GAN-based Transformer with ECDH Crypto-system for Enhancing Energy Theft Detection in Smart Grid, arXiv. 
					    
-  AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks, arXiv. 
					    
-  A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids, arXiv. 
					    
-  Adaptive Hybrid Heterogeneous IDS for 6LoWPAN, arXiv. 
					    
 
-  QT-PAKE: Secure Messaging via Quantum-Safe Threshold PAKE. IEEE Transactions on Consumer Electronics, 1-1. 
					
- Grants
- 
    - CipherGrit: Real-time ransomware detection system using transfer-learning, Innovate UK, 04/2025 - 07/2025, £18,371, as PI
- DIDShield: A Privacy-Centric Approach to Digital Wallet Security, Innovate UK, 04/2025 - 07/2025, £22,757, as Co-PI
- Security of Digital Twins in Manufacturing, EPSRC, 10/2021 - 05/2025, £619,963, as Co-PI
- ATM II: Automated Threat Modelling for Enterprise AI-enabled Assets, Innovate UK, 10/2023 - 03/2024, £59,376, as Co-PI
- ATM: Automated Threat Modelling for Enterprise AI-enabled Assets, Innovate UK, 05/2023 - 09/2023, £24,977, as Co-PI
- ATDPS: Adaptive Trojan Detection and Prevention Systems for Networks-onChips (NoCs) - Phase II, Innovate UK, 09/2022 - 02/2023, £52,433, as PI
- ATDPS: Adaptive Trojan Detection and Prevention Systems for Networks-on-Chips (NoCs), Innovate UK, 04/2022 - 07/2022, £22,316, as PI
- A provably secure modelling attack resilient PUF for hardware security of IoT devices, Royal Society, 03/2022 - 09/2023, £17,791, as PI
 
- Professional activities and memberships
- 
    - Member of the Security of Advanced Systems Research Group
 Editorial Board Member of the Following Journals:- Associate Editor of the IEEE Internet of Things Journal
- Associate Editor of the IEEE Systems Journal
- Associate Editor of the IEEE Sensors Journal
- Associate Editor of the Security and Communication Networks
- Associate Editor of the Journal of Information Security and Applications (Elsevier)