Elsewhere on Ulster
This project is funded by:
Positioned within Ulster University’s Pervasive Computing Research Centre (PCRC) in the Schoolof Computing, this research theme focuses on advancing secure and privacy preserving technologies for next generation Internet of Things networks.
The work aligns with sectoral priorities in Software and Cyber Security.
PhD researchers will explore cutting edge solutions such as physical layer security for 6G IoT. The project aims to deliver scalable, energy efficient, and transparent security mechanisms that enhance resilience, interoperability, and public trust in emerging IoT infrastructures.
The transition from 5G to 6G networks marks significant improvements in communication technology, including ultra-low latency of one microsecond, support for billions of connected devices, and peak data rates reaching the Tbps range.
These improvements will support emerging applications such as autonomous driving, remote healthcare, and immersive virtual reality. However, the increased speed, network heterogeneity, and extensive use of virtualisation introduce new challenges, especially regarding security and privacy.
This PhD aims to develop advanced physical layer security techniques for 6G IoT networks. The focus is on creating a robust and adaptive security framework capable of countering threats such as interference, jamming, eavesdropping, and data spoofing, while being tailored to the IoT devices with limited energy and computational resources.
The PhD will address three critical challenges of next-generation communication systems:
The PhD contributes to the telecommunications industry, and this project can be supported by liaison with Ulster University’s BT Ireland Innovation Centre to provide access to data, test problems and insight into industry priorities.
In particular, the PhD can contribute to developing next generation autonomous IoT platforms that can automate and self-regulate management of IoT services. The PhD is also applicable to secure creation and deployment of software, enabling customers to determine the provenance and integrity of software.
The project can also contribute to protecting IoT networks of devices that cannot support typical encryption algorithms, which is essential for secure deployment and operation of IoT networks in the home.
Applying to Multiple Projects: Applications for more than one PhD studentship are welcome, however if you apply for more than one PhD project within Computing, your first application on the system will be deemed your first-choice preference and further applications will be ordered based on the sequential time of submission.
If you are successfully shortlisted, you will be interviewed only on your first-choice application and ranked accordingly. Those ranked highest will be offered a PhD studentship.
In the situation where you are ranked highly and your first-choice project is already allocated to someone who was ranked higher than you, you may be offered your 2nd or 3rd choice project depending on the availability of this project.
The School of Computing at Ulster University holds Athena Swan Bronze Award since 2016 and is committed to promote and advance gender equality in Higher Education. We particularly welcome female applicants,as they are under represented within the school.
Applicants should hold, or expect to obtain, a First or Upper Second Class Honours Degree in a subject relevant to the proposed area of study.
We may also consider applications from those who hold equivalent qualifications, for example, a Lower Second Class Honours Degree plus a Master’s Degree with Distinction.
In exceptional circumstances, the University may consider a portfolio of evidence from applicants who have appropriate professional experience which is equivalent to the learning outcomes of an Honours degree in lieu of academic qualifications.
If the University receives a large number of applicants for the project, the following desirable criteria may be applied to shortlist applicants for interview.
The University is an equal opportunities employer and welcomes applicants from all sections of the community, particularly from those with disabilities.
Appointment will be made on merit.
This project is funded by:
This scholarship will cover tuition fees and provide a maintenance allowance of £21,000* (tbc) per annum for three years (subject to satisfactory academic performance). A Research Training Support Grant (RTSG) of approximately £900 per annum is also available.
To be eligible for these scholarships, applicants must meet the following criteria:
Applicants should also meet the residency criteria which requires that they have lived in the EEA, Switzerland, the UK or Gibraltar for at least the three years preceding the start date of the research degree programme.
Applicants who already hold a doctoral degree or who have been registered on a programme of research leading to the award of a doctoral degree on a full-time basis for more than one year (or part-time equivalent) are NOT eligible to apply for an award.
Due consideration should be given to financing your studies.
*Part time PhD scholarships may be available, based on 0.5 of the full time rate, and will require a six year registration period
C. Yin, P. Xiao, V. Sharma, Z. Chu, Garcia-Palacios, Machine Learning Based Physical Layer Security for Detecting Active Eavesdropping Attacks, IEEE Commun. Lett., 1-5, 2025.
Bowman, T., Georgalas, N., Reeves, A., Ennis, A., Peoples, C., Black, B., El-Moussa, F. & Moore, A., "Proactive Device Management for the Internet of Things”,2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, p. 1887-1892, May 2024。
C. Yin et al., "Active Reconfigurable Intelligent Surface Enhanced Internet of Medical Things," in IEEE J. Biomed. Health Inform. vol. 28, no. 7, pp. 3831-3840, 2023.
C. Yin et al., "Jointly Active and Passive Beamforming Designs for IRS-Empowered WPCN," in IEEE Internet Things J. vol. 11, no. 7, pp. 11579-11592, 2023
C. Yin, H. Yang, P. Xiao, Z. Chu and E. Garcia-Palacios, "Resource Allocation for UAV-Assisted Wireless Powered D2D Networks With Flying and Ground Eavesdropping," in IEEE Commun. Lett., vol. 27, no. 8, pp. 2103-2107, Aug. 2023
C. Yin, E. Garcia-Palacios, P. Xiao, V. Sharma, O. A. Dobre and T. Q. Duong, "Secrecy Performance Analysis of Heterogeneous Networks With Unreliable Wireless Backhaul and Imperfect Channel Estimation," in IEEE Trans. Veh. Technol., vol. 72, no. 7, pp. 9221-9236, July 2023
Zia, U., McCartney, M., Scotney, B.W., Martinez, J. & Sajjad, A. (Feb 2023). Security and Privacy (Wiley). A Resource Efficient Pseudo Random Number Generator based on Sawtooth Maps for Internet of Things. Wiley Online: https://doi.org/10.1002/spy2.304
Abu Tair, M., Djahel, S., Perry, P., Scotney, B.W., Zia, U., Carracedo, J.M., & Sajjad, A. (Oct 2020). Towards Secure and Privacy-Preserving IoT enabled Smart Home: Architecture and Experimental Study. Sensors, 20, 6131
Ben Brahim, G., Mohammad, N., El-Hajj, W., Parr, G.P. & Scotney, B.W. (Jan 2022). Performance Evaluation and Comparison Study of Adaptive MANET Service Location and Discovery Protocols for Highly Dynamic Environments. Journal on Wireless Communications and Networking, Springer, 6 (2022). https://doi.org/10.1186/s13638-021-02081-4
Abu-Tair, M., Zia, U., Memon, J., Scotney, B.W., Martínez Carracedo, J. & Sajjad, A. (Apr 2024). Transparent Encryption for IoT Using Offline Key Exchange over Public Blockchains. In Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17th -19th April, 2024, Volume 4, Lecture Notes on Data Engineering and Communications Technologies 202, Springer, pp. 301-313
Black, B., Perry, P., Rafferty, J., Cristina, C., Bowman, T., Peoples, C., Ennis, A., Reeves, A., Georgalas, N., Moore, A., & Scotney, B.W. (May 2024). Matrix Platform: Empowering Smart Ports with Advanced Video Analytics for Enhanced Security, Safety, and Efficiency. In Proceedings of 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023), Exeter, UK, 1st – 3rd November 2023, pp. 1822-1826
Georgalas, N., Ennis, A., Peoples, C., Rafferty, J., Perry, P., Cristina, C., Black, B., Moore, A., Bowman, T., Scotney, B.W. & Reeves, A. (May 2024). IoT Device Lifecycle Management. In Proceedings of 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023), Exeter, UK, 1st – 3rd November 2023, pp. 1865-1870
Hussain, T., Beard, A., Chen, L., Nugent, C., Liu, J. & Moore, A., "From Machine Learning Based Intrusion Detection to Cost Sensitive Intrusion Response", 2022 6th International Conference on Cryptography, Security and Privacy (CSP). IEEE, p. 124-130 7 p. (2022 6th International Conference on Cryptography, Security and Privacy (CSP)).
Saedi, M., Moore, A., Perry, P., Thorpe, C. (Editor) & Shaughnessy, S. O. (Editor), "Synthetic Generation of Realistic Signal Strength Data to Enable 5G Rogue Base Station Investigation in Vehicular Platooning”, Dec 2022, In: Applied Sciences. 12, 24, p. 1-18 18 p., 12516.
Submission deadline
Friday 27 February 2026
04:00PM
Interview Date
Mid April 2026
Preferred student start date
14 September 2026
Telephone
Contact by phone
Email
Contact by email