Position: Senior Lecturer
Location: EBG.33
Telephone: +44 (0) 20 8223 2120
Email: d.bennett@uel.ac.uk
Contact address:
School of Architecture, Computing and Engineering (ACE)
University of East London
4-6 University Way
Beckton
London E16 2RD
Devon is a experienced professional with over 20 years of knowledge gained within the Higher Education, Telecommunications, Internetworking & Communication Security industries. For the past ten years he has held the position of Senior Lecturer in the School of Architecture, Computing, and Engineering (ACE) as a member of the field of Computer Science; where he is the Programme Leader for both the BSc Honours in Computer Networks and Information Systems Security. Prior to entering the field of Higher Education; He was a Senior Project Manager for a number of network communications solution providers where he gained extensive experience in Telecommunications, Commercial Infrastructure Networking and Internetworking environments. During that period he successfully delivered a number of Mid to large-scale multi-million pound infrastructure and network communications projects. At present his area of research is concerned with developing a secured localised multi-hop routing platform to interface with the UK governments TETRA private mobile radio (PMR) network.
Phd Student :- TITLE: Development of a last-mile emergency services localised MANET to enhance the resilience of the UK governments national critical infrastructure policy for the rollout of the TETRA private mobile radio (PMR) infrastructure.
Research Area: Development of secure intelligent peer to peer dynamically generated networks with a continuously changing topology, that is responsible for self-authentication and authorisation of nomadic nodes.
Interest: Teaching advanced courses in Networking & Communication Security, Surveillance security principles and techniques utilized by law enforcement, government bodies and local councils/ authorities for systems and human surveillance purposes.
Primarily concerned with the multi-layered security methods used to monitor and combat malicious use of authorised communication platforms for unauthorised purposes, in order to gain illegal access to legitimate resources.

For a general description of these pages and an explanation of how they should work with screenreading equipment please follow this link: Link to general description
For further information on this web site’s accessibility features please follow this link: Link to accessibility information