Dr  Kallol Krishna Karmakar

Dr Kallol Krishna Karmakar

Research Lecturer

School of Information and Physical Sciences (Computing and Information Technology)

Career Summary

Biography

Kallol Krishna Karmakar is working as a research lecturer at the Advanced Cyber Security Engineering Research Centre, University of Newcastle. He received his PhD in Cybersecurity from the University of Newcastle. His PhD research focussed on developing security services for Software Defined Network (SDN). His current research focuses on securing future network architectures, Network Function Virtualisation (NFV) security, Internet of Things (IoT) security, Malware reverse engineering etc. He has published over 32 publications in various international flagship conferences and journals, such as IEEE IM, IEEE LCN, TIFS, TNSM etc. He is actively working with various government organisations, such as  DST, CSIRO, ISIF etc, on various cybersecurity-related projects. 


Qualifications

  • Doctor of Philosophy, University of Newcastle
  • Bachelor of Science, University of Rajshahi - Bangladesh
  • Master of Science, University of Rajshahi - Bangladesh

Keywords

  • 5G and Beyond Network Security
  • Advanced Network and System Exploitation
  • Cyber Security
  • Internet of Medical Things (IoMT) Security
  • Internet of Things Security
  • Malware Reverse Engineering
  • Network Function Virtualisation Secuirty
  • Pentesting
  • Software Defined Network Security
  • Space and Satellite Security
  • Trust Evaluation Techniques

Languages

  • English (Fluent)
  • Bengali (Mother)

Fields of Research

Code Description Percentage
460407 System and network security 100

Professional Experience

UON Appointment

Title Organisation / Department
Research Lecturer University of Newcastle
College of Engineering, Science and Environment
Australia

Teaching

Code Course Role Duration
COMP6500 Security Attacks: Analysis and Mitigation Strategies
Univeristy of Newcastle
Tutor 1/1/2022 - 31/7/2022
COMP3500 Security Attacks: Analysis and Mitigation Strategies
The University of Newcastle
Tutor 1/1/2020 - 31/7/2020
SENG2250 System and Network Security
The University of Newcastle
Tutor 1/1/2018 - 31/7/2018
COMP3500 Security Attacks: Analysis and Mitigation Strategies
Univeristy of Newcastle
Tutor 1/1/2021 - 31/7/2021
COMP247 Data Communications
Macquarie University
Tutor 1/1/2017 - 31/7/2017
COMP6500 Security Attacks: Analysis and Mitigation Strategies
School of Information and Physical Sciences (SIPS), University of Newcastle
Lecturer 17/7/2023 - 20/10/2023
COMP 3500 Security Attacks: Analysis and Mitigation Strategies
The University of Newcastle
Tutor 1/1/2022 - 31/7/2022
COMP6500 Security Attacks: Analysis and Mitigation Strategies (Online)
The University of Newcastle
Tutor 1/8/2020 - 31/12/2020
COMP6500 Security Attacks: Analysis and Mitigation Strategies
The University of Newcastle
Tutor 1/1/2020 - 31/7/2020
COMP6500 Security Attacks: Analysis and Mitigation Strategies (Online)
The University of Newcastle
Tutor 1/8/2021 - 31/12/2021
COMP247 Data Communications
Macquarie University
Tutor 1/7/2016 - 31/12/2016
Edit

Publications

For publications that are currently unpublished or in-press, details are shown in italics.


Chapter (1 outputs)

Year Citation Altmetrics Link
2023 Karmakar KK, Varadharajan V, Tupakula U, 'Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure', Internet of Things Security and Privacy: Practical and Management Perspectives 76-120 (2023)

The Internet of Things (IoT) is becoming a prevalent part of our society offering operational flexibility and convenience. These devices require an extensive setup to make them wo... [more]

The Internet of Things (IoT) is becoming a prevalent part of our society offering operational flexibility and convenience. These devices require an extensive setup to make them work in any network infrastructure. The onboarding of such devices is termed provisioning. However, insecure provisioning makes IoT devices susceptible to various cyberattacks. For instance, mal-provisioned devices may leak sensitive information allowing the attackers to eavesdrop or disrupt communication infrastructures. Moreover, compromised devices can act as zombies to intensify the scale of the attack. Also, network assets are vulnerable to attacks due to security-constrained IoT devices. Furthermore, adversaries may remain dormant to launch further attacks or intercept the flow-communication of the IoT devices and users. Hence, we need a consolidated security architecture that can perform secure device provisioning and securely manage the IoT infrastructure and flow communication. The secure device provisioning services can counteract device onboarding-related attacks and adverse circumstances. Secure network management will prevent the propagation of attacks and leakage of sensitive information. This chapter explains and introduces a policy-driven security architecture, which consists of two major services: Secure Smart Device Provisioning and Monitoring Service Architecture (SDPM) and Policy-based Security Application (PbSA). The security architecture is suitable for any programmable smart network infrastructures, such as IoT-enabled smart homes or offices, Industrial IoT infrastructures, Healthcare infrastructure, etc. SDPM in our security architecture allows the provisioning of devices so that the malicious devices can be controlled and their activities using a dynamic policy-based approach. The SDPM provides fine granular pre- and post-condition-based policies to provision the IoT devices securely and control their runtime operations. The digital twin concept is used to represent the security status of the devices, which is used for dynamic security status monitoring at runtime. Such a feature empowers the security architecture to automate the update and patch management on-demand automatically. In addition, PbSA helps to enforce fine granular policies to secure the flows in the IoT network infrastructure. This, in turn, helps to create a secure network infrastructure for IoT devices.

DOI 10.1201/9781003199410-4
Co-authors Vijay Varadharajan

Journal article (12 outputs)

Year Citation Altmetrics Link
2024 Varadharajan V, Tupakula U, Karmakar KK, 'Techniques for Enhancing Security in Industrial Control Systems', ACM Transactions on Cyber-Physical Systems, 8 1-36 (2024) [C1]
DOI 10.1145/3630103
Co-authors Vijay Varadharajan, Uday Tupakula
2023 Karmakar KK, Varadharajan V, Hitchens M, Tupakula U, Sariputra P, 'A trust-aware openflow switching framework for software defined networks (SDN)', Computer Networks, 237 (2023) [C1]

Software Defined Networks (SDN) and Network Function Virtualisation (NFV) are prime driving technologies behind 5G and Beyond 5G (B5G) communications. The network control intellig... [more]

Software Defined Networks (SDN) and Network Function Virtualisation (NFV) are prime driving technologies behind 5G and Beyond 5G (B5G) communications. The network control intelligence segregation in the SDN infrastructure enables dynamic network features (such as dynamic end-to-end management of security and quality of service (QoS)) offering significantly improved network performance. Even if one assumes that the centralised SDN controller can be security hardened and hence can be trusted, a fundamental challenge in such networks is that the data plane and switching devices are susceptible to cyberattacks. A malicious adversary can compromise them during run-time making them unreliable for secure and trusted communications. Furthermore, the controller communicating with OpenFlow switching devices is unable to accurately assess the state of the switching devices, which serves as the communication base for NFVs in 5G networks. Vulnerable switching devices can put the whole 5G network infrastructure at risk. Hence, there is a clear need for the controller and the management layer to determine the trustworthiness of the switching devices at run-time. The current trend is for many such devices to deploy trusted computing functionality such as Trusted Platform Module (TPM) or Software Guard Extension (SGx) to achieve local as well as remote attestation. In this paper, we present a dynamic trust management framework for evaluating the trustworthiness of the OpenFlow switching devices deployed in the SDN based networks. We formulate device properties that need to be assessed to determine the trust status of the device. We develop a trust enhanced security architecture which can be used to evaluate the trustworthiness of devices and determine their deployment in the provision of network services. The proposed framework uses subjective logic based techniques to derive trust levels of the switching devices at run-time, which are then used by the architecture to make trust enhanced decisions on the provision of network services. A prototype implementation of the proposed architecture is described, which demonstrates how the trustworthiness of the OpenFlow devices are assessed at run-time. The paper concludes with the performance and security analysis of the implemented trust enhanced architecture services.

DOI 10.1016/j.comnet.2023.110109
Citations Scopus - 1
Co-authors Vijay Varadharajan
2022 Varadharajan V, Karmakar KK, Tupakula U, Hitchens M, 'Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures', IEEE Transactions on Network and Service Management, 19 1065-1082 (2022) [C1]

Future communication networks such as 5G are expected to support end-to-end delivery of services for several vertical markets with diverging requirements. Network slicing is a key... [more]

Future communication networks such as 5G are expected to support end-to-end delivery of services for several vertical markets with diverging requirements. Network slicing is a key construct that is used to provide end to end logical virtual networks running on a common virtualised infrastructure, which are mutually isolated. Having different network slices operating over the same 5G infrastructure creates several challenges in security and trust. This paper addresses the fundamental issue of trust of a network slice. It presents a trust model and property-based trust attestation mechanisms, which can be used to evaluate the trust of the virtual network functions that compose the network slice. The proposed model helps to determine the trust of the virtual network functions, as well as the properties that should be satisfied by the virtual platforms (both at boot and run time), on which these network functions are deployed for them to be trusted. We present a logic-based language that defines simple rules for the specification of properties and the conditions under which these properties need to be satisfied for trusted virtualized platforms. The proposed trust model and mechanisms enable the service providers to determine the trustworthiness of the network services as well as the users to develop trustworthy applications. We have developed a trust management architecture that enables the service providers to determine the trustworthiness of the network slices providing the network services. We have implemented a prototype of the trust management architecture using the Open Source MANO Platform and presented the performance results. The results show that our trust mechanisms cause only a slight reduction in the performance of network slices over virtualized infrastructure. We have also discussed how the proposed architecture can be used to detect and mitigate the impact of malicious virtual network functions in a dynamic manner.

DOI 10.1109/TNSM.2021.3128882
Citations Scopus - 1
Co-authors Uday Tupakula, Vijay Varadharajan
2022 Karmakar KK, Varadharajan V, Speirs P, Hitchens M, Robertson A, 'SDPM: A Secure Smart Device Provisioning and Monitoring Service Architecture for Smart Network Infrastructure', IEEE INTERNET OF THINGS JOURNAL, 9 25037-25051 (2022) [C1]
DOI 10.1109/JIOT.2022.3195227
Citations Scopus - 3
Co-authors Vijay Varadharajan
2021 Huertas Celdrán A, Karmakar KK, Gómez Mármol F, Varadharajan V, 'Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments', Peer-to-Peer Networking and Applications, 14 2719-2734 (2021) [C1]

The evolution of integrated clinical environments (ICE) and the future generations of mobile networks brings to reality the hospitals of the future and their innovative clinical s... [more]

The evolution of integrated clinical environments (ICE) and the future generations of mobile networks brings to reality the hospitals of the future and their innovative clinical scenarios. The mobile edge computing paradigm together with network function virtualization techniques and the software-defined networking paradigm enable self-management, adaptability, and security of medical devices and data management processes making up clinical environments. However, the logical centralized approach of the SDN control plane and its protocols introduce new vulnerabilities which affect the security of the network infrastructure and the patients¿ safety. The paper at hand proposes an SDN/NFV-based architecture for the mobile edge computing infrastructure to detect and mitigate cybersecurity attacks exploiting SDN vulnerabilities of ICE in real time and on-demand. A motivating example and experiments presented in this paper demonstrate the feasibility of of the proposed architecture in a realistic clinical scenario.

DOI 10.1007/s12083-021-01082-w
Citations Scopus - 5Web of Science - 3
Co-authors Vijay Varadharajan
2021 Sood K, Karmakar KK, Varadharajen V, Kumar N, Xiang Y, Yu S, 'Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyond', IEEE Network, 35 34-39 (2021) [C1]

With the cool upcoming wave of 5G, currently, the networking and telecommunication industries are facing various digital transformations, which are changing the very fundamental n... [more]

With the cool upcoming wave of 5G, currently, the networking and telecommunication industries are facing various digital transformations, which are changing the very fundamental nature of the existing network management infrastructure. Besides the Internet of Things (IoT) domain, we also notice that the 5G network in itself is composed of millions of heterogeneous physical entities and nodes, multiple domains, complex protocols and technologies, different gateways, and so on. This heterogeneity imposes critical impacts on the application specific quality of service (QoS) requirements, performance and utilization of network resources, and data and user security. In order to alleviate the above impacts, researchers propose to use different technologies such as software-defined networking, network function virtualization, blockchain, and artificial intelligence in 5G-enabled IoT networking. We notice that the layers over layers (of protocols and technologies) act like a plug-in over plug-in (PoP) in the network in order to accomplish various aims, including meeting QoS demands, enhancing security, load balancing, and so on. On one hand, we agree that this integration of different technologies in 5G networks bring numerous advantages, but on the other hand, we realize that this has posed a lot of unique critical issues in modern 5G network management. In this article, we point out that this straightforward approach of PoP is eventually not a healthy approach for network transformation. In this regard, using open source MANO (OSM), we provide a proof of concept (PoC) to show that at varying degrees of heterogeneity, PoP adds the delay in the VNF deployment process and further impacts the VIM CPU performance. This eventually affects the QoS requirements of IoT nodes or applications. Following this, we propose a high-level holistic approach that helps to alleviate the PoP issue. Finally, in this context, we also discuss the associated challenges and research opportunities.

DOI 10.1109/MNET.011.2000390
Citations Scopus - 6Web of Science - 2
Co-authors Vijay Varadharajan
2021 Karmakar KK, Varadharajan V, Nepal S, Tupakula U, 'SDN-Enabled Secure IoT Architecture', IEEE Internet of Things Journal, 8 6549-6564 (2021) [C1]

The Internet of Things (IoT) is increasingly being used in applications ranging from precision agriculture to critical national infrastructure by deploying a large number of resou... [more]

The Internet of Things (IoT) is increasingly being used in applications ranging from precision agriculture to critical national infrastructure by deploying a large number of resource-constrained devices in hostile environments. These devices are being exploited to launch attacks in cyber systems. As a result, security has become a significant concern in the design of IoT-based applications. In this article, we present a security architecture for IoT networks by leveraging the underlying features supported by software-defined networks (SDNs). Our security architecture not only restricts network access to authenticated IoT devices but also enforces fine granular policies to secure the flows in the IoT network infrastructure. The authentication is achieved using a lightweight protocol to authenticate IoT devices. Authorization is achieved using a dynamic policy driven approach. Such an integrated security approach involving authentication of IoT devices and enables authorized flows to protect IoT networks from malicious IoT devices and attacks. We have implemented and validated our architecture using ONOS SDN Controller and Raspbian Virtual Machines, and demonstrated how the proposed security mechanisms can counteract malware packet injection, DDoS attacks using Mirai, spoofing/masquerading, and man-in-the-middle attacks. An analysis of the security and performance of the proposed security mechanisms and their applications is presented in this article.

DOI 10.1109/JIOT.2020.3043740
Citations Scopus - 40Web of Science - 14
Co-authors Vijay Varadharajan, Uday Tupakula
2020 Sood K, Karmakar KK, Yu S, Varadharajan V, Pokhrel SR, Xiang Y, 'Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security', IEEE Internet of Things Journal, 7 5964-5975 (2020) [C1]
DOI 10.1109/JIOT.2019.2959025
Citations Scopus - 35Web of Science - 15
Co-authors Vijay Varadharajan
2019 Varadharajan V, Karmakar K, Tupakula U, Hitchens M, 'A Policy based Security Architecture for Software Defined Networks', IEEE Transactions on Information Forensics and Security, 14 897-911 (2019) [C1]
DOI 10.1109/TIFS.2018.2868220
Citations Scopus - 80Web of Science - 46
Co-authors Vijay Varadharajan, Uday Tupakula
2019 Sood K, Karmakar KK, Varadharajan V, Tupakula U, Yu S, 'Analysis of Policy-Based Security Management System in Software-Defined Networks', IEEE COMMUNICATIONS LETTERS, 23 612-615 (2019) [C1]
DOI 10.1109/LCOMM.2019.2898864
Citations Scopus - 15Web of Science - 7
Co-authors Uday Tupakula, Vijay Varadharajan
2019 Karmakar KK, Varadharajan V, Tupakula U, 'Mitigating attacks in software defined networks', Cluster Computing, 22 1143-1157 (2019) [C1]
DOI 10.1007/s10586-018-02900-2
Citations Scopus - 17Web of Science - 13
Co-authors Vijay Varadharajan, Uday Tupakula
2018 Varadharajan V, Tupakula U, Karmakar K, 'Secure Monitoring of Patients with Wandering Behaviour in Hospital Environments', IEEE Access, 6 11523-11533 (2018) [C1]
DOI 10.1109/ACCESS.2017.2773647
Citations Scopus - 27Web of Science - 18
Co-authors Uday Tupakula, Vijay Varadharajan
Show 9 more journal articles

Conference (23 outputs)

Year Citation Altmetrics Link
2022 Paul LC, Ahmed SS, Karmakar KK, 'A Smart Multi-user Wireless Nurse Calling System and E-Notice Board for Health Care Management', Lecture Notes in Networks and Systems, Online (2022) [E1]
DOI 10.1007/978-981-16-7597-3_35
Citations Scopus - 3
2022 Tupakula U, Karmakar KK, Varadharajan V, Collins B, 'Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN', Proceedings of the 2022 13th International Conference on the Network of the Future, NoF 2022, Ghent, Belgium (2022) [E1]
DOI 10.1109/NoF55974.2022.9942644
Citations Scopus - 1
Co-authors Vijay Varadharajan, Uday Tupakula
2021 Tupakula U, Varadharajan V, Karmakar KK, 'Techniques for Securing Control Systems from Attacks', Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China (2021) [E1]
DOI 10.1109/TrustCom53373.2021.00053
Co-authors Uday Tupakula, Vijay Varadharajan
2021 Thapa C, Karmakar KK, Celdran AH, Camtepe S, Varadharajan V, Nepal S, 'FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Virtual (2021) [E1]
DOI 10.1007/978-3-030-91424-0_1
Citations Scopus - 7
Co-authors Vijay Varadharajan
2021 Varadharajan V, Tupakula U, Karmakar KK, 'Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services', Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021, Tokyo, Japan (2021) [E1]
DOI 10.1109/NetSoft51509.2021.9492704
Co-authors Vijay Varadharajan, Uday Tupakula
2021 Varadharajan V, Tupakula U, Karmakar KK, 'Techniques for Securing 5G Network Services from attacks', Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China (2021) [E1]
DOI 10.1109/TrustCom53373.2021.00052
Citations Scopus - 2
Co-authors Uday Tupakula, Vijay Varadharajan
2020 Tupakula U, Varadharajan V, Karmakar K, 'Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance', Advanced Information Networking and Applications. Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019), Matsue, Japan (2020) [E1]
DOI 10.1007/978-3-030-15032-7_109
Citations Scopus - 1
Co-authors Vijay Varadharajan, Uday Tupakula
2020 Karmakar KK, Varadharajan V, Tupakula U, Nepal S, Thapa C, 'Towards a security enhanced virtualised network infrastructure for internet of medical things (IoMT)', Proceedings of the 2020 IEEE Conference on Network Softwarization: Bridging the Gap Between AI and Network Softwarization, NetSoft 2020, Virtual (2020) [E1]
DOI 10.1109/NetSoft48620.2020.9165387
Citations Scopus - 22Web of Science - 7
Co-authors Vijay Varadharajan, Uday Tupakula
2020 Tupakula U, Varadharajan V, Karmakar KK, 'Attack detection on the software defined networking switches', Proceedings of the 2020 IEEE Conference on Network Softwarization: Bridging the Gap Between AI and Network Softwarization, NetSoft 2020, Virtual (2020) [E1]
DOI 10.1109/NetSoft48620.2020.9165459
Citations Scopus - 4
Co-authors Uday Tupakula, Vijay Varadharajan
2020 Karmakar KK, Varadharajan V, Tupakula U, Hitchens M, 'Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure', Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020, Budapest, Hungary (2020) [E1]
DOI 10.1109/NOMS47738.2020.9110405
Citations Scopus - 4Web of Science - 1
Co-authors Vijay Varadharajan, Uday Tupakula
2019 Karmakar KK, Varadharajan V, Nepal S, Tupakula U, 'SDN enabled secure IoT architecture', 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019, Washington, DC (2019) [E1]
Citations Scopus - 18Web of Science - 7
Co-authors Vijay Varadharajan, Uday Tupakula
2019 Sood K, Pokhrel SR, Karmakar K, Vardharajan V, Yu S, 'SDN-Capable IoT Last-Miles: Design Challenges', 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), HI, Waikoloa (2019) [E1]
DOI 10.1109/GLOBECOM38437.2019.9014145
Citations Scopus - 4Web of Science - 2
2018 Sood K, Karmakar K, Varadharajan V, Tupakula U, Yu S, 'Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks', 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, Abu Dhabi, UAE (2018) [E1]
DOI 10.1109/GLOCOM.2018.8647833
Citations Scopus - 1
Co-authors Uday Tupakula, Vijay Varadharajan
2017 Karmakar KK, Varadharajan V, Tupakula U, 'Mitigating Attacks in Software Defined Network(SDN)', 2017 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), Valencia, SPAIN (2017) [E1]
Citations Scopus - 22Web of Science - 12
Co-authors Uday Tupakula, Vijay Varadharajan
2017 Tupakula U, Varadharajan V, Karmakar K, 'SDN-based dynamic policy specification and enforcement for provisioning SECaaS in cloud', Web Information Systems Engineering WISE 2017: 18th International Conference: Proceedings, Puschino, Russia (2017) [E1]
DOI 10.1007/978-3-319-68786-5_44
Citations Scopus - 1Web of Science - 1
Co-authors Uday Tupakula, Vijay Varadharajan
2017 Tupakula U, Varadharajan V, Karmakar K, 'Secure monitoring of the patients with wandering behaviour', BodyNets '16: Proceedings of the 11th EAI International Conference on Body Area Networks, Turin, Italy (2017) [E1]
Citations Scopus - 1
Co-authors Uday Tupakula, Vijay Varadharajan
2017 Varadharajan V, Karmakar KK, Tupakula U, 'Securing communication in multiple Autonomous System domains with Software Defined Networking', Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management, Lisbon, Portugal (2017) [E1]
DOI 10.23919/INM.2017.7987280
Citations Scopus - 8
Co-authors Vijay Varadharajan, Uday Tupakula
2016 Karmakar KK, Varadharajan V, Tupakula U, Hitchens M, 'Policy based security architecture for software defined networks', Proceedings of the ACM Symposium on Applied Computing, Pisa, Italy (2016) [E1]
DOI 10.1145/2851613.2851728
Citations Scopus - 17
Co-authors Uday Tupakula, Vijay Varadharajan
2016 Karmakar KK, Varadharajan V, Tupakula U, 'On the Design and Implementation of a Security Architecture for Software Defined Networks', Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; and 2nd IEEE International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, NSW (2016) [E1]
DOI 10.1109/HPCC-SmartCity-DSS.2016.0099
Citations Scopus - 4Web of Science - 4
Co-authors Vijay Varadharajan, Uday Tupakula
2016 Karmakar KK, Varadharajan V, Tupakula U, 'On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks', Proceedings - Conference on Local Computer Networks, LCN, Dubai, United Arab Emirates (2016) [E1]
DOI 10.1109/LCN.2016.82
Citations Scopus - 1Web of Science - 1
Co-authors Uday Tupakula, Vijay Varadharajan
2013 Karmakar KK, Khandker MMUR, 'Determination of rearrangement cost for optical networks', Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 (2013)

During the path establishment, states of switching elements in the switch network may need rearrangement. C.-T. Lea et. al [1] has first mentioned about the rearrangement behavior... [more]

During the path establishment, states of switching elements in the switch network may need rearrangement. C.-T. Lea et. al [1] has first mentioned about the rearrangement behavior of the switching networks. He has analyzed the frequency of its occurrence using stochastic method. It is notable that rearrangement behavior of switching network includes rearrangement of connections and rearrangement of switching elements. Optimization of rearrangement cost of switching network can save both power and time, which in turn can increase the switching speed. This paper determines the rearrangement cost of strictly non-blocking Vertically Stacked Optical Banyan networks in terms of switching elements. We believe that our result will be helpful in designing, implementing and analyzing different algorithms of the networks. © 2013 IEEE.

DOI 10.1109/IAdCC.2013.6514239
2013 Rahman MM, Hossain MM, Karmakar KK, ' -shape microstrip antenna design for WiMAX, Wi-Fi and biomedical application at 2.45 GHz', Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 (2013)

This paper represents the novel numerical simulation and hardware simulation of the proposed ¿- shape microstrip Antenna. The proposed antenna can cover mobile Worldwide Interoper... [more]

This paper represents the novel numerical simulation and hardware simulation of the proposed ¿- shape microstrip Antenna. The proposed antenna can cover mobile Worldwide Interoperability for Microwave Access (WiMAX) bands as well as Wireless-Fidelity (Wi-Fi) bands. This antenna also operates in the Industrial, Scientific and Medical (ISM) band at 2.45 GHz for biomedical applications. Our proposed ¿- shape microstrip antenna covers full bandwidth of 2.3 GHz mobile WiMAX (IEEE802.16e-2005 frequency spectrum 2.3-2.4 GHz), 2.4 GHz Wi-Fi (2.4-2.5 GHz) operation with sufficient SWR & gain. The proposed antenna provides excellent SWR of 1.045 and a total gain of 15.92 dBi at 2.45GHz. The overall dimension of the proposed antenna is 51 × 35 × 35 mm. The simulation results are obtained by antenna simulator (4nec2X) and in the antenna laboratory. © 2013 IEEE.

DOI 10.1109/IAdCC.2013.6514285
Citations Scopus - 12
2013 Rahman M, Hossain M, Karmakar KK, 'Pi-shape microstrip antenna design for WiMAX, Wi-Fi and biomedical application at 2.45 GHz', PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), Ghaziabad, INDIA (2013)
Citations Web of Science - 7
Show 20 more conferences
Edit

Grants and Funding

Summary

Number of grants 5
Total funding $262,250

Click on a grant title below to expand the full details for that specific grant.


20232 grants / $176,000

Secure Cyber Operations Analyst (SCOA)$150,000

'Secure Cyber Operations Analyst (SOCA)' – A partnership with Samoa's Ministry of Communications and Information Technology (MCIT) by Professor Vijay Varadharajan, Dr Uday Tupakula and Dr Kallol Krishna Karmakar from the School of Information and Physical Sciences and the Advanced Cyber Security Engineering Research Centre (ACSRC).

https://www.newcastle.edu.au/newsroom/featured/university-of-newcastle-successful-recipients-of-four-prestigious-australia-awards-fellowships

Funding body: Dept of Foreign Affairs (DFAT), Australia

Funding body Dept of Foreign Affairs (DFAT), Australia
Project Team

V.Varadharajan, U.Tupakula and K.K.Karmakar

Scheme Australia Awards Fellowship
Role Investigator
Funding Start 2023
Funding Finish 2024
GNo
Type Of Funding Aust Competitive - Commonwealth
Category 1CS
UON N

To research and develop cyber security techniques for wholesale cloud portal and Netsuite system$26,000

Funding body: Tamburlaine Sales Pty Ltd

Funding body Tamburlaine Sales Pty Ltd
Project Team Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar
Scheme Entrepreneurs’ Programme: Innovation Connections
Role Investigator
Funding Start 2023
Funding Finish 2023
GNo G2300247
Type Of Funding C3100 – Aust For Profit
Category 3100
UON Y

20221 grants / $41,000

Securing Software Defined Network Architectures$41,000

Funding body: APNIC Foundation

Funding body APNIC Foundation
Project Team Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar, Doctor Uday Tupakula
Scheme Research Grant
Role Investigator
Funding Start 2022
Funding Finish 2022
GNo G2101401
Type Of Funding C3500 – International Not-for profit
Category 3500
UON Y

20211 grants / $25,000

To research, develop and activate a unique cybersecure automated wholesale customer interface$25,000

Funding body: Tamburlaine Sales Pty Ltd

Funding body Tamburlaine Sales Pty Ltd
Project Team Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar, Bilby Mani, Ms Manju Cherian
Scheme Entrepreneurs’ Programme: Innovation Connections
Role Investigator
Funding Start 2021
Funding Finish 2021
GNo G2100121
Type Of Funding C3100 – Aust For Profit
Category 3100
UON Y

20191 grants / $20,250

To research, develop and validate a unique integrated public cloud based cybersecure solution for its key Business Management System.$20,250

Funding body: Landos Pty Ltd

Funding body Landos Pty Ltd
Project Team Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar
Scheme Entrepreneurs' Programme: Innovation Connections
Role Investigator
Funding Start 2019
Funding Finish 2019
GNo G1901107
Type Of Funding C3100 – Aust For Profit
Category 3100
UON Y
Edit

Research Collaborations

The map is a representation of a researchers co-authorship with collaborators across the globe. The map displays the number of publications against a country, where there is at least one co-author based in that country. Data is sourced from the University of Newcastle research publication management system (NURO) and may not fully represent the authors complete body of work.

Country Count of Publications
Australia 33
Bangladesh 4
China 3
Switzerland 2
Spain 1
More...
Edit

News

Left to right: Sherol George, Vanuatu Skills Partnership, Dr Angela Page, School of Education, Angelinah Eldads Vira, Ministry of Education and Training

News • 1 Aug 2023

University of Newcastle successful recipients of four prestigious Australia Awards Fellowships

From inclusive education in Vanuatu to cyber security training in Samoa, four research teams at the University of Newcastle have been successful recipients of the highly competitive and prestigious Australia Awards Fellowships.

Dr Kallol Krishna Karmakar

Position

Research Lecturer
Advanced Cyber Security Engineering Research Centre
School of Information and Physical Sciences
College of Engineering, Science and Environment

Focus area

Computing and Information Technology

Contact Details

Email kallolkrishna.karmakar@newcastle.edu.au
Phone (02) 4055 0736
Mobile +61470222130
Fax N/A

Office

Room ES.231
Building ES
Location Callaghan
University Drive
Callaghan, NSW 2308
Australia
Edit