Wednesday 15 May 2019 – Lunchtime Seminar with Dr Jims Marchang Ningshen (Lecturer in Computing)

Title: Will resource constraint sensor and IoT (Internet of Things) network be able to harvest the security benefits of a Blockchain Technology?
Speaker: Dr Jims Marchang Ningshen (Lecturer in Computing)

The need for sensors to deliver, communicate, collect, alert, and share information in various applications has made wireless sensor networks very popular. On the other hand, Internet of Things (IoT) is transforming the wellbeing of human lives in different areas (smart healthcare system, smart house, smart street, smart building and smart city). However, securing the resource constraint devices, authorizing and authenticating the devices, conducting secure communication, ensuring data privacy and integrity, is extremely challenging in such networks, but it is vital to protect both the devices and the data it generates.

Due to its limited resources in terms of computation power, battery life and memory storage of the sensors and the IoT devices, it is challenging to add high end security features to guarantee data confidentiality, integrity, and availability. There are various techniques and methods to provide security and Blockchain is one of the latest mechanisms. However, Blockchain is resource hungry in nature. Will such technology support resource constraint sensor or IoT devices? If not, why not and if so, how can it be applied so that the Blockchain security benefits can be harvested?

Dr Jims Marchang Ningshen completed his PhD in 2016 from the CSCAN Research Laboratory, Plymouth University, UK. Before joining Sheffield Hallam University in 2016,  he worked as a Research Assistant for MHRD robotics project (Govt. of India), worked as I.T security specialist and Server Administrator for 5 years and has experience of working as an academic for a period of approximately 7 years. He was the P.I. of the “Interactive web development project” at NIT (India). Recently he completed a SIP project for “Designing a secure IoT locks – client and server based” and secured two teaching enhancement research funded projects. He has secured approximately £100,000/- as scholarships and research funding from various sources in total.

He is a member of IEEE, IEEE young professionals, IEEE IoT community and a Fellow of HEA, UK. As a researcher, he has published over 18 scientific research papers in a leading journals and conferences (IEEE, Elsevier, Springer etc.). He is a reviewer of IEEE Transactions on Vehicular Technology, IEEE TVT Journal, Heliyon Journal (Elsevier), Ad-Hoc Networks (Elsevier), Journal of Information Security and Applications (Elsevier), ETRI Journal, International Journal of Electrical and Computer Engineering and leading IEEE and IFIP conferences.

He is also the author of a book called “Optimising Application Performance in Ad Hoc Networks”, a research perspective, (2017) and co-authored a book called Penetration Testing: A Manager’s Guide, BCS, UK – yet to be published. His current research focuses around Blockchain and IoT securities.


See here for details of other seminars in the series.

All SHU staff and students are welcome to attend the C3RI Lunchtime Research Seminars. If you are from outside of the University and would like to attend a seminar, please email the C3RI Administrator to arrange entry.