Visiting Assistant Professor
Ph.D in Network Security
Amity University Noida, India
MSc Information Technology
Islamic University of Science & Technology Awantipora, J&K India
BSc Information Technology
University of Kashmir, J&K India
Bio
Dr. Iqra Hussain brings a wealth of teaching experience to her roles as a Visiting Assistant Professor at Zayed University, where she is currently teaching courses in Digital Forensics, Object-Oriented Programming, Python Labs and IT in Global and Local Ventures. Prior to this, she served as an Assistant Professor (Adjunct) at Amity University Dubai, Curtin University Dubai, Murdoch University Dubai and American University in the Emirates, delivering courses such as Digital Forensics and Cyber Security, Data Communications, Introduction to Artificial Intelligence, Unix Operating System and Shell Programming, Object-Oriented Programming with Java, and Network Security, among various others. Dr. Iqra's journey reflects not only her commitment to academic excellence but also her passion for contributing to the broader community through research and education. With a focus on communication, presentation, and management skills, she is poised to bring her technical expertise to ZU by contributing to its growth and her personal development.
Office
Dubai Academic City, E-L1-008
Phone:
+971 4 402 1547
Email:
iqra.hussain@zu.ac.aeTeaching Areas
Cyber Security, Digital Forensics, Object Oriented Programming,
Networking and Data Communications, Data Analysis and Visualization,
Cloud Computing, Artificial Intelligence (AI), Disruptive Technologies,
Research and Professional Activities
Research Area(s)
Cyber Security, Cryptography, Digital Forensics, IoT and IoT Security, Cloud Computing, Data Security.
http://www.linkedin.com/in/driqrahussain
Dr. Iqra's research is centered around enhancing layer 2 security protocols for IoT communication. During her doctoral studies, she delved into the intricacies of security, specifically exploring Networks, Cybersecurity, and IoT applications in various sectors such as industries, automobiles, healthcare, and smart homes. Her work involved in-depth analysis and proposals for security architectures, including the development of a novel encryption and decryption algorithm based on ASCII and Binary Bit sequences. Additionally, she contributed to the field by introducing a lightweight node authentication protocol utilizing Elliptic Curve Cryptography (ECC).
Refereed journal papers
1. Next Generation Power Plant Control through IoT, using encryption in layer 2 of Communication protocol
DOI: https://www.testmagzine.biz/index.php/testmagzine/article/view/246
2. An Efficient Identity Authentication protocol for layer 2 security sourced on ECC for IoT communications
DOI: https://www.testmagzine.biz/index.php/testmagzine/article/view/247
Papers in refereed conference proceedings
1. Proposing an Encryption/ Decryption Scheme for IoT Communications using Binary-bit Sequence and Multistage Encryption.
DOI: https://doi.org/10.1109/ICRITO.2018.8748293
2. Presenting IoT Security based on Cryptographic Practices in Data Link Layer in Power Generation Sector.
DOI: https://doi.org/10.1109/ICRITO48877.2020.9197905
3. A secure IoT-based power plant control using RSA and DES encryption techniques in data link layer.
DOI: https://doi.org/10.1109/ICTUS.2017.8286054
4. Carrier data security using public key steganography in ZigBee.
DOI: https://doi.org/10.1109/ICICCS.2016.7542357
5. Security in ZigBee Using Steganography for IoT Communications.
DOI: https://link.springer.com/chapter/10.1007/978-981-10-7323-6_18
6. Design of framework and analysis of Internet of things at data link layer.
DOI: https://doi.org/10.1109/TEL-NET.2017.8343520