This project is funded by:
The Internet of Things (IoT) represents a network of physical devices, from household appliances to industrial machinery, that use sensors and software to collect and exchange data via the internet [1]. As the number of these connected devices continues to surge—predicted to reach tens of billions within the next decade—their impact on daily life and essential industries becomes increasingly significant. IoT devices facilitate numerous modern conveniences and efficiencies, such as automated home systems, enhanced healthcare monitoring, optimized manufacturing processes, and more [2].
Despite their advantages, IoT devices pose substantial cybersecurity risks that can undermine individual privacy, corporate security, and even national safety. These vulnerabilities arise from several inherent characteristics of IoT systems [3]:
* Diverse and Fragmented Ecosystem: IoT devices often operate on heterogeneous networks with varying security protocols and standards, making uniform security measures difficult to implement.
* Resource Constraints: Many IoT devices have limited processing power and memory, which restrict their ability to run complex security software, making them easy targets for cyber attacks.
* Extended Attack Surface: The sheer volume and variety of IoT devices increase the number of potential entry points for cyber attacks. Devices are often deployed in physically insecure environments accessible to adversaries.
* Lack of Regular Updates: IoT devices frequently receive insufficient software updates and patches, leaving known vulnerabilities unaddressed. This is exacerbated by the long operational life of many devices which may outlast their manufacturer's support.
* Data Sensitivity and Privacy Issues: IoT devices generate vast amounts of data, much of which is sensitive personal or business information. Unauthorized access and data breaches can have severe consequences.
These challenges are compounded by the traditional centralized architectures of IoT networks, where a single point of failure can compromise the entire network's security and integrity.
Blockchain technology offers a novel approach to addressing many of the intrinsic security challenges of IoT devices through its core characteristics [4]:
* Decentralization: By its nature, blockchain eliminates single points of failure and distributes data across a network of nodes, making it more resilient against attacks and hardware failures.
* Immutability: Once recorded on a blockchain, data cannot be altered without the consensus of the network, ensuring data integrity and helping to prevent fraud and tampering.
* Transparency and Traceability: Every transaction on a blockchain is transparent and trackable. In the context of IoT, this means that device interactions and data exchanges are openly recorded and verifiable by all network participants.
* Enhanced Security and Privacy: With the use of cryptographic techniques like hash functions and digital signatures, blockchain ensures secure, authenticated communications between devices. It can also support privacy-enhancing technologies such as zero-knowledge proofs to protect user data even in a transparent system [5].
Blockchain's potential to provide a secure, autonomous, and self-regulating environment aligns well with the needs of IoT networks. It can underpin a new paradigm in IoT security, ensuring device integrity, securing data exchanges, and fostering trust among disparate and decentralized devices without relying on traditional centralized security models. Thus, implementing blockchain could fundamentally transform the landscape of IoT cybersecurity, offering a scalable, efficient, and robust solution to many of its current vulnerabilities [6].
Applicants should hold, or expect to obtain, a First or Upper Second Class Honours Degree in a subject relevant to the proposed area of study.
We may also consider applications from those who hold equivalent qualifications, for example, a Lower Second Class Honours Degree plus a Master’s Degree with Distinction.
In exceptional circumstances, the University may consider a portfolio of evidence from applicants who have appropriate professional experience which is equivalent to the learning outcomes of an Honours degree in lieu of academic qualifications.
If the University receives a large number of applicants for the project, the following desirable criteria may be applied to shortlist applicants for interview.
The University is an equal opportunities employer and welcomes applicants from all sections of the community, particularly from those with disabilities.
Appointment will be made on merit.
This project is funded by:
Our fully funded PhD scholarships will cover tuition fees and provide a maintenance allowance of £19,237 (tbc) per annum for three years* (subject to satisfactory academic performance). A Research Training Support Grant (RTSG) of £900 per annum is also available.
These scholarships, funded via the Department for the Economy (DfE) and the Vice Chancellor’s Research Scholarships (VCRS), are open to applicants worldwide, regardless of residency or domicile.
Applicants who already hold a doctoral degree or who have been registered on a programme of research leading to the award of a doctoral degree on a full-time basis for more than one year (or part-time equivalent) are NOT eligible to apply for an award.
*Part time PhD scholarships may be available, based on 0.5 of the full time rate, and will require a six year registration period (individual project advertisements will note where part time options apply).
Due consideration should be given to financing your studies.
[1] Damien Campbell, William Farrelly, Kevin Curran (2024) A Cloud Based IoT Electricity Consumption Monitoring Platform for a Residential Household. Comm&Optics Connect. Vol. 1, No. 1, ISSN: 3006-4813, DOI: doi.org/10.69709/COConnect.2024.195151
[2] Thomas Mayfield, Gary Cullen, Karen Bailey, Paul Greaney, Kevin Curran (2023) ELITE: Edge Layer IoT Trustless Environment. Irish Signals & Systems Conference (ISSC) 2023, Dublin, Ireland, June 13-14 2023, IEEE, p: 1-7, ISBN (Print): 979-8-3503-4058-7
[3] Yassine Maleh, Ahmed A. Abd El-Latif, Kevin Curran, Patrick Siarry (2023) Computational Intelligence for Medical Internet of Things (MIoT) Application Systems Elsevier, ISBN-13: 978-0323994217
[4] Dylan Rafferty, Kevin Curran (2021) The Role of Blockchain in cyber security. Semiconductor Science and Information Devices. Vol. 3, No. 1, pp:1-9, Biligual Publishing, DOI: https://doi.org/10.30564/ssid.v3i1.3153
[5] Hasan Al-Aswad, Wael M. El-Medany, Chitra Balakrishna, Nedal Ababneh & Kevin Curran (2021) BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation. Arab Journal of Basic and Applied Sciences, Vol: 28, No. 1, pp: 154-171, DOI: 10.1080/25765299.2020.1870812
[6] Kevin Curran, Jack Curran (2020) Blockchain security and potential future use cases. Blockchain for Cybersecurity and Privacy: Architectures, challenges and applications. CRC Taylor & Francis, 2020, chapter 4, pp:75-84, ISBN: 9780367473587
Submission deadline
Monday 24 February 2025
04:00PM
Interview Date
3 April 2025
Preferred student start date
15 September 2025
Telephone
Contact by phone
Email
Contact by email