Research

Research Domains:

Security and Data Privacy issues in Internet of Things (IoT)

The following topics we are investigating:

Publications:

Security and Data Privacy in Cloud Computing

            Cloud computing is an emerging computing model that provides numerous advantages to organizations, service providers, and customers in terms of speed, massive scalability, low cost services, and flexibility, to name a few. In addition, cloud computing model allows customers to use relatively low-cost, scalable, location independent platforms for outsourcing one or more types of their internal IT infrastructures to a cloud service provider. This allows businesses to reduce their IT costs and provide services to their consumers without worrying about the essential management and maintenance of their IT infrastructure. However, despite the technical and economical advantages of cloud computing, many potential corporate cloud consumers are still hesitant to join the cloud bandwagon due to cloud security and data privacy concerns. This research work aims to develop a comprehensive auditing framework that could be used as a guideline for cloud security auditors as well as other stakeholders in cloud computing security readiness. Specifically, we develop a software tool that helps the stakeholders arrive at the relevant cloud computing security factors that they should truly care about when making decisions.

Publications:

Automobile Security 

It has been now well established that integrated technology in modern cars makes them highly vulnerable to many security threats/attacks. Our goal is to advance the state of the art in security of automobile networks. Our proposed hybrid security system not only aims to protect conventional vehicles but especially focuses on securing hybrid and electrical cars. Thus, taking a step closer to a fully green planet. For more information, please visit our web site https://sites.google.com/site/autonetsecure/


Publications:

Minimizing Identity Theft

Securing Mobile Devices and Platforms

A Generic Optimized Time Management Algorithms (OTMA) Framework for Simulating Large-Scale Networks

Recent evolutions in wireless networks will require more efficient use of the underlying parallel discrete-event simulation (PDES) synchronization protocols to accommodate the demand for large-scale network simulation. In this research project, we investigate underlying synchronization protocols to improve the performance of large-scale network simulators operating over PDES systems. We begin by proposing a generic optimized time management algorithms (OTMA) framework that combines the improved forms of synchronization protocols on a single platform. Particularly, for the proposed OTMA framework, we use the layered architecture approach to combine the optimized forms of conservative and optimistic time management algorithms. To support the implementation of the OTMA framework, a new m-LP (logical process) simulation model is proposed.

In this research work, the proposed OTMA framework integrates both conservative and optimistic synchronization algorithms on a single platform. In particular, we provide an improved form of NMA by developing a new deterministic model that quantifies the performance dependent critical parameters for PDES systems. In addition, for the implementation of NMA, a new m-LP simulation model along with the varying parameters network topology is proposed. Finally, we provide a separate quantitative model to support the simulation results and experimental verifications for NMA. The current DES based simulators have a large end-to-end latency, communication overhead, and poor memory utilization. OTMA framework will provide an improved form of the existing Time Wrap algorithm by proposing a new unacknowledged message list (UML) scheme. The proposed UML scheme will provide global synchronization among large number of nodes along with a fool proof solution for message transient and simultaneous reporting problems. To illustrate the implementation of the proposed UML scheme, two algorithms are proposed for coordinating and non-coordinating LPs. In order to further improve the global virtual time (GVT) computation process, synchronous barriers (such as tree and butterfly barriers) will be combined with the asynchronous algorithms (such as Time Wrap algorithm) to provide an efficient GVT computation mechanism for large-scale distributed networks.

Research Focus: Conservative and optimistic simulation model, parallel simulation, distributed computer simulation, discrete-event simulation, and data distribution techniques.

Publications:

Wireless Networks & Cognitive Radio Communications

Multiuser detection is an important technology in wireless CDMA systems for improving both data rate as well as user capacity. However, the computational complexity of this receiver prevents from the widespread use of this technique. Due to the high computational complexity, most of the CDMA systems today and in the near future will continue to use the conventional match filter with comparatively low user capacity and a slow data rate. However, if we could lower the computational complexity of multiuser detectors, most of the CDMA systems would likely to get the advantage of this technique in terms of increased system capacity and a better data rate. The focus of our research is to reduce the computational complexity of multiuser receivers to improve the performance of multiuser detectors. Our research distinguishes itself in a number of ways. First, a new transformation matrix algorithm is used rather than the conventional linear transformation. Second, a mathematical model is proposed to produce consistent values of SNR for a wide range of users. Third, the performance measure adopted in this paper research is the achievable bit rate for a fixed probability of error (10-7).

Research Focus: Quantitative analysis, BER/SNR/MAI measurements, and low-complexity signal detection and decoding, Security of wireless networks 

Publications:

Resource Optimization in Wireless/Mobile Sensor Networks

A sensor network is made up of numerous small independent sensor nodes with sensing, processing and communicating capabilities. The sensor nodes have limited battery and a minimal amount of on-board computing power. This primary objective of this research work is to construct a methodology that utilizes source and path redundancy techniques with the intention to efficiently reduce the required energy consumption while maximizing the lifetime of the sensor network. In addition, the developed methodology presents a strategy to optimize the number of active sensor nodes and assign equal time slots to each sensor nodes for sensing and communication with Base Station (BS).

Research Focus: Effective coverage, Energy/power consumption and optimization, self localization, efficient routing, self organization, and self deployment.   

Publications:

Wireless and Network Security

In this research domain, there are three projects I am currently working on. In the 1st project, my main research goal is to construct new efficient security algorithms for message encryption & authentication by combining both symmetric and asymmetric cryptographic techniques such as AES, RSA, and PKI. In addition, my second project is aimed to construct a technique using Dynamic Flushing concepts to prevent cache timing attacks. Finally, in my 3rd project, I am trying to create a model that can be used to detect and remove rogue access points.   

Research Focus: Rogue access point detection, cache timing attacks, information security through combined symmetric/asymmetric algorithms. 

Publications:

Estimation of End-to-End Delay and Link Bandwidth for End System Multicasting (ESM)

In this project, the focus of my research is to design an analytical model for estimating the end-to-end delay and link bandwidth performance for ESM. Our analytical model can be used to compare the performance differences between ESM and IP multicast.  One of the primary goals of this research project is to design a real time simulation environment to test the feasibility of ESM for real time data such as audio and video data.  

Research Focus: End-to-End delay estimation and bandwidth efficiency. 

Publications:

Performance Optimization of Mobile Adhoc Networks (MANET)

My research in MANET is divided into three parts: First, one of the goals is to develop a new scheme for minimizing the malicious behavior of mobile nodes in MANET. Second, my goal is to develop a new analytical model to quantify the capacity of MANET for several different network scenarios. Finally, I use my proposed algorithms and schemes to minimize the transmission delay and maximize the network throughput. 

Research Focus: Routing protocols, capacity and transmission delay approximations, and malicious behavior of mobile nodes. 

Publications:

Faculty Links Optimization and Load-Scalability in Mesh Networks

The nodes or processors in Mesh networks send random point-to-point messages to other nodes in the network. We assume that a node can generate at most one message per cycle time with a global clock algorithm that drives all processors. The primary objective of this research project is to simulate the data throughput and hot spot properties of a Mesh network. In this research, we aim to develop a simple stored and forward one-bit round-robin routing algorithm for transmitting and receiving messages between the nodes. One of the main objectives of this research project is to demonstrate that the proposed routing algorithm not only works in an ideal situation where all the communication links between the nodes are in the operational mode but also works fine in the presence of faulty links. Furthermore, the goal is to implement the designed stored and forward one-bit round-robin routing algorithm that can show some good load-scalability characteristics among the active nodes. In addition, the effects of different architectures such as the dimension of the network, input parameter values, and the introduction of faulty links are evaluated in this research work. 

Research Focus: Radio frequency management and fault tolerance. 

Publications: