˽·¿¾ãÀÖ²¿

Dr Sarmadullah Khan

Job: Senior Lecturer in Cyber Security

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Address: ˽·¿¾ãÀÖ²¿, The Gateway, Leicester, LE1 9BH UK

T: +44(0)1162506429

E: sarmadullah.khan@dmu.ac.uk

W:

 

Personal profile

Dr Khan is currently working as a Senior Lecturer in Cyber Security at Cyber Technology Institute (CTI), ˽·¿¾ãÀÖ²¿, UK. He joined ˽·¿¾ãÀÖ²¿ in December 2017. Since June 2018, Dr Khan is leading four MSc programmes (1) MSc Cyber Security, (2) MSc Cyber Technology, (3) MSc Professional Practice in Digital Forensics and Security, and (4) MSc Software Engineering. Dr Khan main role comprises academic leadership and management of the delivery and development of the programme. He liaises with the module leaders for the planning and management of the programme and appropriate approach for innovative teaching and assessment methodologies. He ensures the implementation of agreed policies and procedures and all students in the programme are provided with appropriate support. He acts and responds to identified quality improvement needs at the programme level.

Dr Khan successfully led the NCSC Full certification process for MSc Cyber Technology & Cyber Security programmes. Also, Dr Khan contributed to the recognition process of Cyber Technology Institute (CTI) of the ˽·¿¾ãÀÖ²¿ as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR). Dr Khan supervised 1-PhD student to completion in 2020. Currently, he is involved in in supervising 7-PhD student.

Dr Khan’s current research activities include cryptography, key management, block-chain adaptation in the development of the security algorithms to provide authenticity and privacy for Internet of Things (IoTs) application, smart grid applications and content centric networking. Before joining ˽·¿¾ãÀÖ²¿, he was a PostDoc research fellow at Politecnico di Torino, Italy. His PostDoc research activities were focused on developing security algorithms for IoT devices, more specifically, focusing on the resource constrained devices. 

Key areas of cyber security research: Cryptography and key management, Internet of Things (IoTs), Content Centric Networks (CCN), Blockchain and attribute based encryption, Smart Grid, Digital Forensics

Main contributions to cyber security research: Dr Khan has more than 10 years of research experience in cryptography and networking and cyber security. He has a good knowledge of using Elliptic Curve Cryptography (ECC), Edwards Curve Cryptography and Public Key infrastructure in developing key establishment and management techniques for various IoT and WSN applications. He contributed in a few national/international European research projects by developing a key establishment and management algorithms. He does collaborate with many foreign universities and research institutes (i.e. Politecnico di Torino, Queen’s University Belfast, Istituto Superiore Mario Boella, University of Luxembourg, King Abdulaziz University, King Saud University, COMSATS, NUST, UoT). He has authored/co-authored several scientific research publications in numerous international venues. 

My long-term research goal is to develop a mechanism that ensures access control, authenticity, integrity and privacy of both devices and data in IoT using blockchain, physically unclonable functions and attribute-based mechanisms.

Research group affiliations

Cyber Security Centre and Internet of Things Security

Publications and outputs

S. Zafar, M. Nazir, T. Bakhshi, H. A. Khattak, S. Khan, M. Bilal, K. -K. R. Choo, K. -S. Kwak, A. Sabah,; "A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things," in IEEE Access, vol. 9, pp. 93529-93566, 2021.

Naveed Jan, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni, "C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9912626, 17 pages, 2021. 

Obermaier, Christina; Riebl, Raphael; Al-Bayatti, Ali H.; Khan, Sarmadullah; Facchi, Christian. 2021. "Measuring the Realtime Capability of Parallel-Discrete-Event-Simulations" Electronics 10, no. 6: 636.

Malik, Ahmad K.; Emmanuel, Naina; Zafar, Sidra; Khattak, Hasan A.; Raza, Basit; Khan, Sarmadullah; Al-Bayatti, Ali H.; Alassafi, Madini O.; Alfakeeh, Ahmed S.; Alqarni, Mohammad A. 2020. "From Conventional to State-of-the-Art IoT Access Control Models" Electronics 9, no. 10: 1693.

Alfakeeh, A.S.; Khan, S.; Al-Bayatti, A.H. A Multi-User, Single-Authentication Protocol for Smart Grid Architectures. Sensors 2020, 20, 1581.

S. Khan, A. I. Alzahrani, O. Alfarraj, N. Alalwan and A. H. Al-Bayatti, "Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices," in IEEE Access, vol. 7, pp. 170615-170628, 2019.

N. Jan, S.Khan, “Energy efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP),” in Transactions on Emerging Telecommunications Technologies.  2019.

Fawad Zaman, Sungchang Lee, Mohamad K. A. Rahim, and Sarmadullah Khan, “Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications,” Wireless Communications and Mobile Computing, vol. 2019, Article ID 6475832, 3 pages, 2019.

Secure Communication Architecture for Dynamic Energy Management in Smart Grid
S Khan, R Khan, AH Al-Bayatti
IEEE Power and Energy Technology Systems Journal, 2019


VANSec: Attack Resistant VANETs Security Algorithm in terms of Trust Computation Error and Normalized Routing Overhead

S Ahmed, MU Rehman, A Ishtiaq, S Khan, A Ali, S Begum
Journal of Sensors 2018, 17, 2018


Multiple authorities attribute-based verification mechanism for Blockchain mircogrid transactions

S Khan, R Khan
Energies 11 (5), 1154, 2018


Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids

S Khan, R Khan
Energies 11 (4), 759, 2018


ARV2V: Attack resistant vehicle to vehicle algorithm, performance in term of end-to-end delay and trust computation error in VANETs

MU Rehman, S Ahmed, SU Khan, S Begum, A Ishtiaq
2018 International Conference on Computing, Mathematics and Engineering …, 2018


Quantized adaptive decentralized control for interconnected nonlinear systems with actuator faults

W Khan, Y Lin, SU Khan, N Ullah
Applied Mathematics and Computation 320, 175-189, 2018


Design and implementation of an automated network monitoring and reporting back system
R Khan, SU Khan
Journal of Industrial Information Integration 9, 24-34, 2018

Research interests/expertise

  1. Internet of Things Security (IoT security)
  2. Wireless sensor networks security
  3. Content centric networks security
  4. Key establishment and management

Areas of teaching

  1. Network Security
  2. Cryptography
  3. Communication Systems
  4. Mobile and Sensor Network
  5. Cyber Engineering

Qualifications

PhD

Courses taught

Cyber Engineering, Digital Investigation, Malware Analysis, Windows Security, Linux Security

Honours and awards

MS leading to PhD scholarship from Higher Education Commission of Pakistan. (2008-2012)

Membership of professional associations and societies

IEEE member, Fellow of Higher Education Academy (FHEA)

Professional licences and certificates

Postgraduate Certificate in Learning and Teaching in Higher Education (PGCertHE)

Conference attendance

  1. International Conference on Emerging Technologies (ICET), December 2015, Peshawar, Pakistan
  2. The 5th International Conference on Sensor Systems and Software (S-CUBE-2014), Coventry, Great Britain, October 6-7, 2014
  3. The 6th International Conference on Security of Information and Networks (SIN '13). November 2013, Askaray,Turkey, 376-379
  4. Frontiers of Information Technology (FIT), 2012 10th International Conference on, Islamabad, 2012, pp. 257-260
  5. 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS), Timisoara, 2011.
  6. Information Society (i-Society), 2011 International Conference on, London, 2011.

Key articles information

S. Zafar, M. Nazir, T. Bakhshi, H. A. Khattak, S. Khan, M. Bilal, K. -K. R. Choo, K. -S. Kwak, A. Sabah,; "A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things," in IEEE Access, vol. 9, pp. 93529-93566, 2021

Naveed Jan, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni, "C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9912626, 17 pages, 2021.

Obermaier, Christina; Riebl, Raphael; Al-Bayatti, Ali H.; Khan, Sarmadullah; Facchi, Christian. 2021. "Measuring the Realtime Capability of Parallel-Discrete-Event-Simulations" Electronics 10, no. 6: 636.

Malik, Ahmad K.; Emmanuel, Naina; Zafar, Sidra; Khattak, Hasan A.; Raza, Basit; Khan, Sarmadullah; Al-Bayatti, Ali H.; Alassafi, Madini O.; Alfakeeh, Ahmed S.; Alqarni, Mohammad A. 2020. "From Conventional to State-of-the-Art IoT Access Control Models" Electronics 9, no. 10: 1693.

Alfakeeh, A.S.; Khan, S.; Al-Bayatti, A.H. A Multi-User, Single-Authentication Protocol for Smart Grid Architectures. Sensors 2020, 20, 1581.

S. Khan, A. I. Alzahrani, O. Alfarraj, N. Alalwan and A. H. Al-Bayatti, "Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices," in IEEE Access, vol. 7, pp. 170615-170628, 2019.

N. Jan, S.Khan, “Energy efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP),” in Transactions on Emerging Telecommunications Technologies.  2019.

Fawad Zaman, Sungchang Lee, Mohamad K. A. Rahim, and Sarmadullah Khan, “Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications,” Wireless Communications and Mobile Computing, vol. 2019, Article ID 6475832, 3 pages, 2019.

Rafiullah Khan, Sarmad Ullah Khan, “Design and Implementation of an Automated Network Monitoring and Reporting Back System”, Journal of Industrial Information Integration.

R. Khan and S.U. Khan, “Design and Implementation of UPnP-based Energy Gateway for Demand Side Management in Smart Grid”, in Journal of Industrial Information Integration, 2017.

R. Khan and S. U. Khan, "Reducing Energy Waste Due to Idle Network Devices," in IEEE Potentials, vol. 36, no. 5, pp. 37-45, Sept.-Oct. 2017.

R. Khanand S.U. Khan, “Energy Saving Through Intelligent Coordination Among Daily Used Fixed and Mobile Devices”, in Elsevier Journal on Sustainable Computing: Informatics and Systems, vol. 14, pp 43-57, June 2017.

R. Khanand S.U. Khan, “Design and Implementation of Ad-Hoc Collaborative Proxying Scheme for Reducing Network Energy Waste”, in Elsevier Journal on Digital Communications and Networks, vol. 3, issue 2, pp 118-128, May 2017.

W. Khan, Y. Lin and S. U. Khan, " " 2017 36th Chinese Control Conference (CCC), Dalian, 2017, pp. 1359-1366

W. Khan, Y. Lin and S. U. Khan, "Robust tracking control for a class of multivariable nonlinear systems with input quantization," 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS), Wuhan, 2017, pp. 317-322

Mehraban Khan, Zahid Ullah, Qazi Mudassir, Sarmad Ullah Khan, “Address Resolution Protocol Caching using Optimized RAM-Based CAM”, International Journal of Computer Science and Information Security, Vol.14, No.08, August 2016, ISSN 1947-5500

Rafiullah Khan, Sarmad Ullah Khan, Achieving Energy Saving through Proxying Applications on behalf of Idle Devices, Procedia Computer Science, Volume 83, 2016, Pages 187-194, ISSN 1877-0509.

Sarmad Ullah Khan, Luciano Lavagno, Claudio Pastrone, M.A. Spirito, "Online Authentication and Key Establishment Scheme for Heterogeneous Sensor Networks," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 718286, 11 pages, 2014

Current research students

Main-Supervisor: Design and Implementation of Privacy and Data Security protocol for Internet of Things (IoT) Based Healthcare Application. (In Progress)

Co-supervisor:  Test Methodology for Hardware in the Loop Tests of Car2X-Systems. (In Progress)

Co-supervisor:  Improving Road Safety for Vulnerable Road Users. (In Progress)

Co-supervisor:  Research in Service Innovation of Blockchain Customs Services. (In Progress)

Co-supervisor:  Cyber Security & Law within Industrial Internet of Things. (In Progress)

Co-supervisor:  Enhancing Digital Forensics Readiness in the Internet of Things. (In Progress)

Co-supervisor:  Optimization the Size of 3D Stereoscopic Film by using Multiwavelet Transform after Removing Disappear Areas. (In Progress)

sarmad