Associate Professor
School of Computing Science
University of Glasgow, Singapore

SIT@RP Campus  >> 
SIT Building, Level 8
73 Woodlands Ave 9, S 737729

E: SyeLoong.Keoh (at)     
T: +65 6908 6042
Last Updated: 05 Oct 2015 © SLK UoGS 
Oct 26 - 27, 2015       Singapore  
Cloud Asia and ICCCRI Conference

Dec 8 - 11, 2015        Los Angeles
ACSAC Conference 

Dec 14 - 16, 2015       Morocco         
Information Assurance Security (IAS)

May 23 - 27, 2016       Kuala Lumpur
IEEE ICC Conference

Jun 17 - Jul 15, 2016   Glasgow UK
Overseas Immersion Program (OIP) 

Singapore Institute of Technology (SIT)
University of Glasgow Singapore
University of Glasgow
Imperial College London
Universiti Teknologi Malaysia
Republic Polytechnic Singapore

Philips Research
A*Star Research Institute

Internet Engineering Task Force (IETF)
Security Protocols for IP-based IoT: Adapting the standard DTLS for use in IoT environment through the profiling of DTLS to reduce its complexity, and using DTLS for device bootstrapping, key management and protection of multicast messages.

papers: JIoT'14, WiSec'13, AINA'13, ID-Multicast
Security for SCADA/ICS/BAC: Access control management and intrusion detection for critical infrastructure are important to ensure the smooth operation. End-to-end security between the field devices and the central controller is rudimentary to guarantee the authenticity and integrity of the data collected for monitoring. 

papers: IAS'14ICS & SCADA'13, ICCCN'12 
Main research interests are: security & privacy for pervasive computing and Internet-of-Things, security management for distributed systems and wireless sensor networks

*PhD Scholarship (tuition fee waiver) is available for suitably qualified candidates to pursue a University of Glasgow PhD degree in Singapore. Please get in touch if you are interested.

Key Management for Pervasive Systems: Lightweight group key management scheme for lighting control applications, body sensor networks and eHealth applications. This includes mechanisms for key distribution and key updates for securing unicast & multicast. Currently working on a scheme that uses matrix-based broadcast encryption.

papers: ICC'11, Percom'09
Cloud Storage Security: Providing the user with exclusive control over his/her data in the cloud without relying on the cloud provider's security infrastructure. This prevents the third parties such as the service providers and their partners, to have access to the user's storage. 

papers: ICCCRI'15

Body Sensor Networks (BSN): Monitoring of the user's physiological parameters such as ECG, body temperature, oxygen saturation to detect cardiac problems using Imperial's BSN nodes. Sensors are managed through an event-based feedback control loop defined using event-condition-action rules.

papers: TNSM'09, BSN'07, Mobiquitous'07
Policy-based Security Management: Using a policy-based approach to facilitate the bootstrapping of mobile ad-hoc networks and governing the behaviour of mobile nodes using access control and obligation policies. Security protocols were designed to manage the group membership.

papers: ACSAC'04, SPC'05