Dr Kallol Krishna Karmakar
Research Lecturer
School of Information and Physical Sciences (Computing and Information Technology)
- Email:kallolkrishna.karmakar@newcastle.edu.au
- Phone: (02) 4055 0736
Career Summary
Biography
Kallol Krishna Karmakar is working as a research lecturer at the Advanced Cyber Security Engineering Research Centre, University of Newcastle. He received his PhD in Cybersecurity from the University of Newcastle. His PhD research focussed on developing security services for Software Defined Network (SDN). His current research focuses on securing future network architectures, Network Function Virtualisation (NFV) security, Internet of Things (IoT) security, Malware reverse engineering etc. He has published over 32 publications in various international flagship conferences and journals, such as IEEE IM, IEEE LCN, TIFS, TNSM etc. He is actively working with various government organisations, such as DST, CSIRO, ISIF etc, on various cybersecurity-related projects.
Qualifications
- Doctor of Philosophy, University of Newcastle
- Bachelor of Science, University of Rajshahi - Bangladesh
- Master of Science, University of Rajshahi - Bangladesh
Keywords
- 5G and Beyond Network Security
- Advanced Network and System Exploitation
- Cyber Security
- Internet of Medical Things (IoMT) Security
- Internet of Things Security
- Malware Reverse Engineering
- Network Function Virtualisation Secuirty
- Pentesting
- Software Defined Network Security
- Space and Satellite Security
- Trust Evaluation Techniques
Languages
- English (Fluent)
- Bengali (Mother)
Fields of Research
Code | Description | Percentage |
---|---|---|
460407 | System and network security | 100 |
Professional Experience
UON Appointment
Title | Organisation / Department |
---|---|
Research Lecturer | University of Newcastle College of Engineering, Science and Environment Australia |
Teaching
Code | Course | Role | Duration |
---|---|---|---|
COMP6500 |
Security Attacks: Analysis and Mitigation Strategies Univeristy of Newcastle |
Tutor | 1/1/2022 - 31/7/2022 |
COMP3500 |
Security Attacks: Analysis and Mitigation Strategies The University of Newcastle |
Tutor | 1/1/2020 - 31/7/2020 |
SENG2250 |
System and Network Security The University of Newcastle |
Tutor | 1/1/2018 - 31/7/2018 |
COMP3500 |
Security Attacks: Analysis and Mitigation Strategies Univeristy of Newcastle |
Tutor | 1/1/2021 - 31/7/2021 |
COMP247 |
Data Communications Macquarie University |
Tutor | 1/1/2017 - 31/7/2017 |
COMP6500 |
Security Attacks: Analysis and Mitigation Strategies School of Information and Physical Sciences (SIPS), University of Newcastle |
Lecturer | 17/7/2023 - 20/10/2023 |
COMP 3500 |
Security Attacks: Analysis and Mitigation Strategies The University of Newcastle |
Tutor | 1/1/2022 - 31/7/2022 |
COMP6500 |
Security Attacks: Analysis and Mitigation Strategies (Online) The University of Newcastle |
Tutor | 1/8/2020 - 31/12/2020 |
COMP6500 |
Security Attacks: Analysis and Mitigation Strategies The University of Newcastle |
Tutor | 1/1/2020 - 31/7/2020 |
COMP6500 |
Security Attacks: Analysis and Mitigation Strategies (Online) The University of Newcastle |
Tutor | 1/8/2021 - 31/12/2021 |
COMP247 |
Data Communications Macquarie University |
Tutor | 1/7/2016 - 31/12/2016 |
Publications
For publications that are currently unpublished or in-press, details are shown in italics.
Chapter (1 outputs)
Year | Citation | Altmetrics | Link | |||||
---|---|---|---|---|---|---|---|---|
2023 |
Karmakar KK, Varadharajan V, Tupakula U, 'Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure', Internet of Things Security and Privacy: Practical and Management Perspectives 76-120 (2023) The Internet of Things (IoT) is becoming a prevalent part of our society offering operational flexibility and convenience. These devices require an extensive setup to make them wo... [more] The Internet of Things (IoT) is becoming a prevalent part of our society offering operational flexibility and convenience. These devices require an extensive setup to make them work in any network infrastructure. The onboarding of such devices is termed provisioning. However, insecure provisioning makes IoT devices susceptible to various cyberattacks. For instance, mal-provisioned devices may leak sensitive information allowing the attackers to eavesdrop or disrupt communication infrastructures. Moreover, compromised devices can act as zombies to intensify the scale of the attack. Also, network assets are vulnerable to attacks due to security-constrained IoT devices. Furthermore, adversaries may remain dormant to launch further attacks or intercept the flow-communication of the IoT devices and users. Hence, we need a consolidated security architecture that can perform secure device provisioning and securely manage the IoT infrastructure and flow communication. The secure device provisioning services can counteract device onboarding-related attacks and adverse circumstances. Secure network management will prevent the propagation of attacks and leakage of sensitive information. This chapter explains and introduces a policy-driven security architecture, which consists of two major services: Secure Smart Device Provisioning and Monitoring Service Architecture (SDPM) and Policy-based Security Application (PbSA). The security architecture is suitable for any programmable smart network infrastructures, such as IoT-enabled smart homes or offices, Industrial IoT infrastructures, Healthcare infrastructure, etc. SDPM in our security architecture allows the provisioning of devices so that the malicious devices can be controlled and their activities using a dynamic policy-based approach. The SDPM provides fine granular pre- and post-condition-based policies to provision the IoT devices securely and control their runtime operations. The digital twin concept is used to represent the security status of the devices, which is used for dynamic security status monitoring at runtime. Such a feature empowers the security architecture to automate the update and patch management on-demand automatically. In addition, PbSA helps to enforce fine granular policies to secure the flows in the IoT network infrastructure. This, in turn, helps to create a secure network infrastructure for IoT devices.
|
Journal article (12 outputs)
Year | Citation | Altmetrics | Link | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
2024 |
Varadharajan V, Tupakula U, Karmakar KK, 'Techniques for Enhancing Security in Industrial Control Systems', ACM Transactions on Cyber-Physical Systems, 8 1-36 (2024) [C1]
|
||||||||||
2023 |
Karmakar KK, Varadharajan V, Hitchens M, Tupakula U, Sariputra P, 'A trust-aware openflow switching framework for software defined networks (SDN)', Computer Networks, 237 (2023) [C1] Software Defined Networks (SDN) and Network Function Virtualisation (NFV) are prime driving technologies behind 5G and Beyond 5G (B5G) communications. The network control intellig... [more] Software Defined Networks (SDN) and Network Function Virtualisation (NFV) are prime driving technologies behind 5G and Beyond 5G (B5G) communications. The network control intelligence segregation in the SDN infrastructure enables dynamic network features (such as dynamic end-to-end management of security and quality of service (QoS)) offering significantly improved network performance. Even if one assumes that the centralised SDN controller can be security hardened and hence can be trusted, a fundamental challenge in such networks is that the data plane and switching devices are susceptible to cyberattacks. A malicious adversary can compromise them during run-time making them unreliable for secure and trusted communications. Furthermore, the controller communicating with OpenFlow switching devices is unable to accurately assess the state of the switching devices, which serves as the communication base for NFVs in 5G networks. Vulnerable switching devices can put the whole 5G network infrastructure at risk. Hence, there is a clear need for the controller and the management layer to determine the trustworthiness of the switching devices at run-time. The current trend is for many such devices to deploy trusted computing functionality such as Trusted Platform Module (TPM) or Software Guard Extension (SGx) to achieve local as well as remote attestation. In this paper, we present a dynamic trust management framework for evaluating the trustworthiness of the OpenFlow switching devices deployed in the SDN based networks. We formulate device properties that need to be assessed to determine the trust status of the device. We develop a trust enhanced security architecture which can be used to evaluate the trustworthiness of devices and determine their deployment in the provision of network services. The proposed framework uses subjective logic based techniques to derive trust levels of the switching devices at run-time, which are then used by the architecture to make trust enhanced decisions on the provision of network services. A prototype implementation of the proposed architecture is described, which demonstrates how the trustworthiness of the OpenFlow devices are assessed at run-time. The paper concludes with the performance and security analysis of the implemented trust enhanced architecture services.
|
Nova | |||||||||
2022 |
Varadharajan V, Karmakar KK, Tupakula U, Hitchens M, 'Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures', IEEE Transactions on Network and Service Management, 19 1065-1082 (2022) [C1] Future communication networks such as 5G are expected to support end-to-end delivery of services for several vertical markets with diverging requirements. Network slicing is a key... [more] Future communication networks such as 5G are expected to support end-to-end delivery of services for several vertical markets with diverging requirements. Network slicing is a key construct that is used to provide end to end logical virtual networks running on a common virtualised infrastructure, which are mutually isolated. Having different network slices operating over the same 5G infrastructure creates several challenges in security and trust. This paper addresses the fundamental issue of trust of a network slice. It presents a trust model and property-based trust attestation mechanisms, which can be used to evaluate the trust of the virtual network functions that compose the network slice. The proposed model helps to determine the trust of the virtual network functions, as well as the properties that should be satisfied by the virtual platforms (both at boot and run time), on which these network functions are deployed for them to be trusted. We present a logic-based language that defines simple rules for the specification of properties and the conditions under which these properties need to be satisfied for trusted virtualized platforms. The proposed trust model and mechanisms enable the service providers to determine the trustworthiness of the network services as well as the users to develop trustworthy applications. We have developed a trust management architecture that enables the service providers to determine the trustworthiness of the network slices providing the network services. We have implemented a prototype of the trust management architecture using the Open Source MANO Platform and presented the performance results. The results show that our trust mechanisms cause only a slight reduction in the performance of network slices over virtualized infrastructure. We have also discussed how the proposed architecture can be used to detect and mitigate the impact of malicious virtual network functions in a dynamic manner.
|
Nova | |||||||||
2022 |
Karmakar KK, Varadharajan V, Speirs P, Hitchens M, Robertson A, 'SDPM: A Secure Smart Device Provisioning and Monitoring Service Architecture for Smart Network Infrastructure', IEEE INTERNET OF THINGS JOURNAL, 9 25037-25051 (2022) [C1]
|
Nova | |||||||||
2021 |
Huertas Celdrán A, Karmakar KK, Gómez Mármol F, Varadharajan V, 'Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments', Peer-to-Peer Networking and Applications, 14 2719-2734 (2021) [C1] The evolution of integrated clinical environments (ICE) and the future generations of mobile networks brings to reality the hospitals of the future and their innovative clinical s... [more] The evolution of integrated clinical environments (ICE) and the future generations of mobile networks brings to reality the hospitals of the future and their innovative clinical scenarios. The mobile edge computing paradigm together with network function virtualization techniques and the software-defined networking paradigm enable self-management, adaptability, and security of medical devices and data management processes making up clinical environments. However, the logical centralized approach of the SDN control plane and its protocols introduce new vulnerabilities which affect the security of the network infrastructure and the patients¿ safety. The paper at hand proposes an SDN/NFV-based architecture for the mobile edge computing infrastructure to detect and mitigate cybersecurity attacks exploiting SDN vulnerabilities of ICE in real time and on-demand. A motivating example and experiments presented in this paper demonstrate the feasibility of of the proposed architecture in a realistic clinical scenario.
|
Nova | |||||||||
2021 |
Sood K, Karmakar KK, Varadharajen V, Kumar N, Xiang Y, Yu S, 'Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyond', IEEE Network, 35 34-39 (2021) [C1] With the cool upcoming wave of 5G, currently, the networking and telecommunication industries are facing various digital transformations, which are changing the very fundamental n... [more] With the cool upcoming wave of 5G, currently, the networking and telecommunication industries are facing various digital transformations, which are changing the very fundamental nature of the existing network management infrastructure. Besides the Internet of Things (IoT) domain, we also notice that the 5G network in itself is composed of millions of heterogeneous physical entities and nodes, multiple domains, complex protocols and technologies, different gateways, and so on. This heterogeneity imposes critical impacts on the application specific quality of service (QoS) requirements, performance and utilization of network resources, and data and user security. In order to alleviate the above impacts, researchers propose to use different technologies such as software-defined networking, network function virtualization, blockchain, and artificial intelligence in 5G-enabled IoT networking. We notice that the layers over layers (of protocols and technologies) act like a plug-in over plug-in (PoP) in the network in order to accomplish various aims, including meeting QoS demands, enhancing security, load balancing, and so on. On one hand, we agree that this integration of different technologies in 5G networks bring numerous advantages, but on the other hand, we realize that this has posed a lot of unique critical issues in modern 5G network management. In this article, we point out that this straightforward approach of PoP is eventually not a healthy approach for network transformation. In this regard, using open source MANO (OSM), we provide a proof of concept (PoC) to show that at varying degrees of heterogeneity, PoP adds the delay in the VNF deployment process and further impacts the VIM CPU performance. This eventually affects the QoS requirements of IoT nodes or applications. Following this, we propose a high-level holistic approach that helps to alleviate the PoP issue. Finally, in this context, we also discuss the associated challenges and research opportunities.
|
Nova | |||||||||
2021 |
Karmakar KK, Varadharajan V, Nepal S, Tupakula U, 'SDN-Enabled Secure IoT Architecture', IEEE Internet of Things Journal, 8 6549-6564 (2021) [C1] The Internet of Things (IoT) is increasingly being used in applications ranging from precision agriculture to critical national infrastructure by deploying a large number of resou... [more] The Internet of Things (IoT) is increasingly being used in applications ranging from precision agriculture to critical national infrastructure by deploying a large number of resource-constrained devices in hostile environments. These devices are being exploited to launch attacks in cyber systems. As a result, security has become a significant concern in the design of IoT-based applications. In this article, we present a security architecture for IoT networks by leveraging the underlying features supported by software-defined networks (SDNs). Our security architecture not only restricts network access to authenticated IoT devices but also enforces fine granular policies to secure the flows in the IoT network infrastructure. The authentication is achieved using a lightweight protocol to authenticate IoT devices. Authorization is achieved using a dynamic policy driven approach. Such an integrated security approach involving authentication of IoT devices and enables authorized flows to protect IoT networks from malicious IoT devices and attacks. We have implemented and validated our architecture using ONOS SDN Controller and Raspbian Virtual Machines, and demonstrated how the proposed security mechanisms can counteract malware packet injection, DDoS attacks using Mirai, spoofing/masquerading, and man-in-the-middle attacks. An analysis of the security and performance of the proposed security mechanisms and their applications is presented in this article.
|
Nova | |||||||||
2020 |
Sood K, Karmakar KK, Yu S, Varadharajan V, Pokhrel SR, Xiang Y, 'Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security', IEEE Internet of Things Journal, 7 5964-5975 (2020) [C1]
|
Nova | |||||||||
2019 |
Varadharajan V, Karmakar K, Tupakula U, Hitchens M, 'A Policy based Security Architecture for Software Defined Networks', IEEE Transactions on Information Forensics and Security, 14 897-911 (2019) [C1]
|
Nova | |||||||||
2019 |
Sood K, Karmakar KK, Varadharajan V, Tupakula U, Yu S, 'Analysis of Policy-Based Security Management System in Software-Defined Networks', IEEE COMMUNICATIONS LETTERS, 23 612-615 (2019) [C1]
|
Nova | |||||||||
2019 |
Karmakar KK, Varadharajan V, Tupakula U, 'Mitigating attacks in software defined networks', Cluster Computing, 22 1143-1157 (2019) [C1]
|
Nova | |||||||||
2018 |
Varadharajan V, Tupakula U, Karmakar K, 'Secure Monitoring of Patients with Wandering Behaviour in Hospital Environments', IEEE Access, 6 11523-11533 (2018) [C1]
|
Nova | |||||||||
Show 9 more journal articles |
Conference (23 outputs)
Year | Citation | Altmetrics | Link | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
2022 |
Paul LC, Ahmed SS, Karmakar KK, 'A Smart Multi-user Wireless Nurse Calling System and E-Notice Board for Health Care Management', Lecture Notes in Networks and Systems, Online (2022) [E1]
|
Nova | |||||||||
2022 |
Tupakula U, Karmakar KK, Varadharajan V, Collins B, 'Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN', Proceedings of the 2022 13th International Conference on the Network of the Future, NoF 2022, Ghent, Belgium (2022) [E1]
|
Nova | |||||||||
2021 |
Tupakula U, Varadharajan V, Karmakar KK, 'Techniques for Securing Control Systems from Attacks', Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China (2021) [E1]
|
Nova | |||||||||
2021 |
Thapa C, Karmakar KK, Celdran AH, Camtepe S, Varadharajan V, Nepal S, 'FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation', Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Virtual (2021) [E1]
|
Nova | |||||||||
2021 |
Varadharajan V, Tupakula U, Karmakar KK, 'Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services', Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021, Tokyo, Japan (2021) [E1]
|
Nova | |||||||||
2021 |
Varadharajan V, Tupakula U, Karmakar KK, 'Techniques for Securing 5G Network Services from attacks', Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China (2021) [E1]
|
Nova | |||||||||
2020 |
Tupakula U, Varadharajan V, Karmakar K, 'Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance', Advanced Information Networking and Applications. Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019), Matsue, Japan (2020) [E1]
|
Nova | |||||||||
2020 |
Karmakar KK, Varadharajan V, Tupakula U, Nepal S, Thapa C, 'Towards a security enhanced virtualised network infrastructure for internet of medical things (IoMT)', Proceedings of the 2020 IEEE Conference on Network Softwarization: Bridging the Gap Between AI and Network Softwarization, NetSoft 2020, Virtual (2020) [E1]
|
Nova | |||||||||
2020 |
Tupakula U, Varadharajan V, Karmakar KK, 'Attack detection on the software defined networking switches', Proceedings of the 2020 IEEE Conference on Network Softwarization: Bridging the Gap Between AI and Network Softwarization, NetSoft 2020, Virtual (2020) [E1]
|
Nova | |||||||||
2020 |
Karmakar KK, Varadharajan V, Tupakula U, Hitchens M, 'Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure', Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020, Budapest, Hungary (2020) [E1]
|
Nova | |||||||||
2019 |
Karmakar KK, Varadharajan V, Nepal S, Tupakula U, 'SDN enabled secure IoT architecture', 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019, Washington, DC (2019) [E1]
|
Nova | |||||||||
2019 |
Sood K, Pokhrel SR, Karmakar K, Vardharajan V, Yu S, 'SDN-Capable IoT Last-Miles: Design Challenges', 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), HI, Waikoloa (2019) [E1]
|
Nova | |||||||||
2018 |
Sood K, Karmakar K, Varadharajan V, Tupakula U, Yu S, 'Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks', 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, Abu Dhabi, UAE (2018) [E1]
|
Nova | |||||||||
2017 |
Karmakar KK, Varadharajan V, Tupakula U, 'Mitigating Attacks in Software Defined Network(SDN)', 2017 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), Valencia, SPAIN (2017) [E1]
|
||||||||||
2017 |
Tupakula U, Varadharajan V, Karmakar K, 'SDN-based dynamic policy specification and enforcement for provisioning SECaaS in cloud', Web Information Systems Engineering WISE 2017: 18th International Conference: Proceedings, Puschino, Russia (2017) [E1]
|
Nova | |||||||||
2017 |
Tupakula U, Varadharajan V, Karmakar K, 'Secure monitoring of the patients with wandering behaviour', BodyNets '16: Proceedings of the 11th EAI International Conference on Body Area Networks, Turin, Italy (2017) [E1]
|
||||||||||
2017 |
Varadharajan V, Karmakar KK, Tupakula U, 'Securing communication in multiple Autonomous System domains with Software Defined Networking', Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management, Lisbon, Portugal (2017) [E1]
|
||||||||||
2016 |
Karmakar KK, Varadharajan V, Tupakula U, Hitchens M, 'Policy based security architecture for software defined networks', Proceedings of the ACM Symposium on Applied Computing, Pisa, Italy (2016) [E1]
|
||||||||||
2016 |
Karmakar KK, Varadharajan V, Tupakula U, 'On the Design and Implementation of a Security Architecture for Software Defined Networks', Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; and 2nd IEEE International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, NSW (2016) [E1]
|
||||||||||
2016 |
Karmakar KK, Varadharajan V, Tupakula U, 'On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks', Proceedings - Conference on Local Computer Networks, LCN, Dubai, United Arab Emirates (2016) [E1]
|
Nova | |||||||||
2013 |
Karmakar KK, Khandker MMUR, 'Determination of rearrangement cost for optical networks', Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 (2013) During the path establishment, states of switching elements in the switch network may need rearrangement. C.-T. Lea et. al [1] has first mentioned about the rearrangement behavior... [more] During the path establishment, states of switching elements in the switch network may need rearrangement. C.-T. Lea et. al [1] has first mentioned about the rearrangement behavior of the switching networks. He has analyzed the frequency of its occurrence using stochastic method. It is notable that rearrangement behavior of switching network includes rearrangement of connections and rearrangement of switching elements. Optimization of rearrangement cost of switching network can save both power and time, which in turn can increase the switching speed. This paper determines the rearrangement cost of strictly non-blocking Vertically Stacked Optical Banyan networks in terms of switching elements. We believe that our result will be helpful in designing, implementing and analyzing different algorithms of the networks. © 2013 IEEE.
|
||||||||||
2013 |
Rahman MM, Hossain MM, Karmakar KK, ' -shape microstrip antenna design for WiMAX, Wi-Fi and biomedical application at 2.45 GHz', Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 (2013) This paper represents the novel numerical simulation and hardware simulation of the proposed ¿- shape microstrip Antenna. The proposed antenna can cover mobile Worldwide Interoper... [more] This paper represents the novel numerical simulation and hardware simulation of the proposed ¿- shape microstrip Antenna. The proposed antenna can cover mobile Worldwide Interoperability for Microwave Access (WiMAX) bands as well as Wireless-Fidelity (Wi-Fi) bands. This antenna also operates in the Industrial, Scientific and Medical (ISM) band at 2.45 GHz for biomedical applications. Our proposed ¿- shape microstrip antenna covers full bandwidth of 2.3 GHz mobile WiMAX (IEEE802.16e-2005 frequency spectrum 2.3-2.4 GHz), 2.4 GHz Wi-Fi (2.4-2.5 GHz) operation with sufficient SWR & gain. The proposed antenna provides excellent SWR of 1.045 and a total gain of 15.92 dBi at 2.45GHz. The overall dimension of the proposed antenna is 51 × 35 × 35 mm. The simulation results are obtained by antenna simulator (4nec2X) and in the antenna laboratory. © 2013 IEEE.
|
||||||||||
Show 20 more conferences |
Grants and Funding
Summary
Number of grants | 5 |
---|---|
Total funding | $262,250 |
Click on a grant title below to expand the full details for that specific grant.
20232 grants / $176,000
Secure Cyber Operations Analyst (SCOA)$150,000
'Secure Cyber Operations Analyst (SOCA)' – A partnership with Samoa's Ministry of Communications and Information Technology (MCIT) by Professor Vijay Varadharajan, Dr Uday Tupakula and Dr Kallol Krishna Karmakar from the School of Information and Physical Sciences and the Advanced Cyber Security Engineering Research Centre (ACSRC).
https://www.newcastle.edu.au/newsroom/featured/university-of-newcastle-successful-recipients-of-four-prestigious-australia-awards-fellowships
Funding body: Dept of Foreign Affairs (DFAT), Australia
Funding body | Dept of Foreign Affairs (DFAT), Australia |
---|---|
Project Team | V.Varadharajan, U.Tupakula and K.K.Karmakar |
Scheme | Australia Awards Fellowship |
Role | Investigator |
Funding Start | 2023 |
Funding Finish | 2024 |
GNo | |
Type Of Funding | Aust Competitive - Commonwealth |
Category | 1CS |
UON | N |
To research and develop cyber security techniques for wholesale cloud portal and Netsuite system$26,000
Funding body: Tamburlaine Sales Pty Ltd
Funding body | Tamburlaine Sales Pty Ltd |
---|---|
Project Team | Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar |
Scheme | Entrepreneurs’ Programme: Innovation Connections |
Role | Investigator |
Funding Start | 2023 |
Funding Finish | 2023 |
GNo | G2300247 |
Type Of Funding | C3100 – Aust For Profit |
Category | 3100 |
UON | Y |
20221 grants / $41,000
Securing Software Defined Network Architectures$41,000
Funding body: APNIC Foundation
Funding body | APNIC Foundation |
---|---|
Project Team | Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar, Doctor Uday Tupakula |
Scheme | Research Grant |
Role | Investigator |
Funding Start | 2022 |
Funding Finish | 2022 |
GNo | G2101401 |
Type Of Funding | C3500 – International Not-for profit |
Category | 3500 |
UON | Y |
20211 grants / $25,000
To research, develop and activate a unique cybersecure automated wholesale customer interface$25,000
Funding body: Tamburlaine Sales Pty Ltd
Funding body | Tamburlaine Sales Pty Ltd |
---|---|
Project Team | Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar, Bilby Mani, Ms Manju Cherian |
Scheme | Entrepreneurs’ Programme: Innovation Connections |
Role | Investigator |
Funding Start | 2021 |
Funding Finish | 2021 |
GNo | G2100121 |
Type Of Funding | C3100 – Aust For Profit |
Category | 3100 |
UON | Y |
20191 grants / $20,250
To research, develop and validate a unique integrated public cloud based cybersecure solution for its key Business Management System.$20,250
Funding body: Landos Pty Ltd
Funding body | Landos Pty Ltd |
---|---|
Project Team | Professor Vijay Varadharajan, Doctor Kallol Krishna Karmakar |
Scheme | Entrepreneurs' Programme: Innovation Connections |
Role | Investigator |
Funding Start | 2019 |
Funding Finish | 2019 |
GNo | G1901107 |
Type Of Funding | C3100 – Aust For Profit |
Category | 3100 |
UON | Y |
Research Collaborations
The map is a representation of a researchers co-authorship with collaborators across the globe. The map displays the number of publications against a country, where there is at least one co-author based in that country. Data is sourced from the University of Newcastle research publication management system (NURO) and may not fully represent the authors complete body of work.
Country | Count of Publications | |
---|---|---|
Australia | 33 | |
Bangladesh | 4 | |
China | 3 | |
Switzerland | 2 | |
Spain | 1 | |
More... |
News
News • 1 Aug 2023
University of Newcastle successful recipients of four prestigious Australia Awards Fellowships
From inclusive education in Vanuatu to cyber security training in Samoa, four research teams at the University of Newcastle have been successful recipients of the highly competitive and prestigious Australia Awards Fellowships.
Dr Kallol Krishna Karmakar
Position
Research Lecturer
Advanced Cyber Security Engineering Research Centre
School of Information and Physical Sciences
College of Engineering, Science and Environment
Focus area
Computing and Information Technology
Contact Details
kallolkrishna.karmakar@newcastle.edu.au | |
Phone | (02) 4055 0736 |
Mobile | +61470222130 |
Fax | N/A |
Office
Room | ES.231 |
---|---|
Building | ES |
Location | Callaghan University Drive Callaghan, NSW 2308 Australia |