Research
Research Domains:
Security & Data Privacy Issues in Internet of Things (IoT)
Security Issues in Cloud Computing
Network/Information Security
Wireless/Cell/Multiuser Communications
Wireless/Mobile Sensor Networks
Mobile Ad-Hoc Networks (MANET)
Modeling and Simulation
Mesh Networks
Security and Data Privacy issues in Internet of Things (IoT)
The following topics we are investigating:
Developing attack-surface for (Internet of Things) IoT networks.
Developing an application to provide IoT device-level security for consumers.
Developing auditing and risk management frameworks for cloud computing and IoT networks.
Investigating compliance issues for IoT
Publications:
Syed Rizvi, Joseph Pfeffer, Andrew Kurtz, and Mohammad Rizvi Mohammad R. Rizvi. A Security Matrix for Internet of Things (IoT) Networks. Submitted to Internet of Things; Engineering Cyber Physical Human Systems – Elseiver, December 2019.
Syed Rizvi, RJ Orr, Austin Cox, Prithvee Ashokkumar, and Mohammad R. Rizvi. Identifying the Attack Surface for IoT Network. Internet of Things; Engineering Cyber Physical Human Systems – Elseiver, October 2019.
Syed Rizvi, Nicholas Mcintyre and Jungwoo Ryoo, “Computing Security Scores for IoT Device Vulnerabilities,” 2019 IEEE 5th International Conference on Software Security and Assurance (IEEE ICSSA), July 25-26, St. Pölten, Lower Austria, Austria, (in press).
Ryan Pipetti, Nicholas Mcintyre, Jonathan Todd and Syed Rizvi, "An Attack Vector for IoT Networks," IEEE 4th International Conference on Software Security and Assurance (IEEE ICSSA), July 26-27 2018, Seoul, South Korea (in press).
S Rizvi, A Kurtz, J Pfeffer, M Rizvi, “Securing the Internet of Things (IoT): A Security Taxonomy for IoT,” 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, pp. 163-168, July 31th - August 3rd, 2018, New York, USA. doi: 10.1109/TrustCom/BigDataSE.2018.00034.
Sudha Narendrakumar, Abdul Razaque, Varil Patel, Muder Almi’ani, Syed Rizvi, Akshat Hans. Token Security for the Internet of Things. International Journal of Embedded Systems 10 (4), 334-343, September 2018.
Security and Data Privacy in Cloud Computing
Cloud computing is an emerging computing model that provides numerous advantages to organizations, service providers, and customers in terms of speed, massive scalability, low cost services, and flexibility, to name a few. In addition, cloud computing model allows customers to use relatively low-cost, scalable, location independent platforms for outsourcing one or more types of their internal IT infrastructures to a cloud service provider. This allows businesses to reduce their IT costs and provide services to their consumers without worrying about the essential management and maintenance of their IT infrastructure. However, despite the technical and economical advantages of cloud computing, many potential corporate cloud consumers are still hesitant to join the cloud bandwagon due to cloud security and data privacy concerns. This research work aims to develop a comprehensive auditing framework that could be used as a guideline for cloud security auditors as well as other stakeholders in cloud computing security readiness. Specifically, we develop a software tool that helps the stakeholders arrive at the relevant cloud computing security factors that they should truly care about when making decisions.
Publications:
Hannah Roddy, Ilva Myzyri, Syed Rizvi, and Joseph Gualdoni, “Three-Step Approach to QoS Maintenance in Cloud Computing Using a Third Party Auditor,” 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (Accepted)
Evan English, Daniel Stacey, Syed Rizvi, and Donte Perino, “Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage,” To IEEE 3rd International Conference on Software Security and Assurance, July 24th - 25th, Altoona PA. (Accepted - presented)
Abdul Razaque, Syed Rizvi, Meer JK, Qassim Hani Bani, Julius P Dichter, Reza Meimandi Parizi ” Secure, Energy-Efficient and Quality-of-Service-Supported Service-Oriented Architecture for Cloud Computing Environment”, Computers & Security - Elseiver, Volume 66, May 2017, Pages 169–184. (PDF)
Abdul Razaque, Syed Rizvi, "Privacy Preserving Model: A New Scheme for Auditing Cloud Stakeholders," To Journal of Cloud Computing, (2017) 6: 7. doi:10.1186/s13677-017-0076-1 (PDF)
Syed Rizvi, Trent Bolish and Joseph Pfeffer, "Security Evaluation of Cloud Service Providers Using Third Party Auditors," Second International Conference on Internet of Things and Cloud Computing, Cambridge city, Churchill College. University of Cambridge, United Kingdom. 22-23 March 2017. (in press)
Syed Rizvi and John K. Mitchell, "A New Access Control Scheme for Protecting Distributed Cloud Services and Resources", Services Transactions on Cloud Computing (STCC), 4(3), 2016, pp. 28-41. (PDF)
Abdul Razaque, Syed S. Rizvi, “Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment,” Computers & Security, Volume 62, Pages 328-347, September 2016. (PDF).
Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker. A User Oriented Cloud Security Evaluation Framework, International Journal of Trust Management in Computing and Communications (IJTMCC), Vol. 3, No. 2, 2015. (PDF).
Yuhong Liu, Yan (Lindsay) Sun, Jungwoo Ryoo, Syed Rizvi, and Athanasios V. Vasilakos, “A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions,” Journal of Computing Science and Engineering, Vol. 9, No. 3, September 2015, pp. 119-133. (PDF).
Syed Rizvi, Abdul Razaque, and Katie Cover, “Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment.” 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015), pp. 31-36, November 3 - 5, New York USA. (PDF).
Syed Rizvi, Nathan Showan, and John Mitchell, “Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking,” Complex Adaptive Systems 2015, Volume 61, Pages 206–212, San Jose CA, November 2-4, 2015. (PDF). doi:10.1016/j.procs.2015.09.195
Syed Rizvi, Kelsey Karpinski, Taryn Walker, and Brennen Kelly, “Utilizing Third Party Auditing to Manage Trust in the Cloud,” Complex Adaptive Systems 2015, Volume 61, 2015, Pages 191–197, San Jose CA, November 2-4, 2015. (PDF). doi:10.1016/j.procs.2015.09.192
John Mitchell, Syed Rizvi, and Jungwoo Ryoo, "A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider," To The 2015 The 1st International Conference on Software Security and Assurance (ICSSA'15), pp. 19-24, July 27, 2015, Sungkyunkwan University, Korea. (PDF)
Syed Rizvi, Abdul Razaque and Katie Cover, "Cloud Data Integrity Using a Designated Public Verifier," in 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), pp.1361-1366, 24-26 Aug. 2015. (PDF). doi: 10.1109/HPCC-CSS-ICESS.2015.277
Syed Rizvi and John Mitchell, "A Semi-Distributed Access Control Management Scheme for Securing Cloud Environment," The 8th IEEE International Conference on Cloud Computing (CLOUD 2015), pp. 501-507, New York, US, June 27 - July 2, 2015. (Acceptance Rate is 14%). [PDF]. doi: 10.1109/CLOUD.2015.73 (Paper selected for journal publication in Services Transactions on Cloud Computing).
Diamond Fair, Jaren Schugar, Syed Rizvi, Tyler Milewski, Scott Swetkowski, John Mitchell, "A DMZ based Authentication Scheme for Securing Cloud Environment," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2014), December –12-14, 2014.
S. Rizvi, J. Ryoo, J. Kissell, and W. Aiken. A Stakeholder-Oriented Assessment Index for Cloud Security Auditing. The 9th ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM), Bali, Indonesia, January 2015. (Received best paper award). (Paper selected for journal publication in Journal of Supercomputing - Springer). (PDF)
Syed Rizvi, Katie Cover and Chris Gates, “'A Trusted Third-Party (TTP) Based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment,” 2014 Complex Adaptive Systems, Procedia Computer Science, vol. 36, pp. 381 – 386, November 2014. (PDF).
Natasha Csicsmann, Victoria McIntyre, Patrick Shea, and Syed Rizvi, “Cloud Security: Implementing Biometrics to Help Secure the Cloud," Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 239 – 253, October, 2014. Book Link
John Regola, John Mitchell, Brandon Baez, and Syed Rizvi, “Analyzing the Security Susceptibilities of Biometrics Integrated With Cloud Computing," Securing Cloud-Based Databases with Biometric Applications, Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 194 – 211, October 2014. Book Link
John Mitchell and Syed Rizvi, “A Framework for Leveraging Cloud Computing to Facilitate Biometrics,” 2014 International Conference on Security and Management (SAM'14), pp. 344 – 350, Las Vegas, USA, July 21 - 24.(PDF)
Syed Rizvi; Jungwoo Ryoo; Yuhong Liu; Zazworsky, D.; Cappeta, A, "A centralized trust model approach for cloud computing," In proceedings of 23rd IEEE Wireless and Optical Communication Conference (WOCC), pp.1-6, May 2014. (PDF)
Liu, Yuhong, Jungwoo Ryoo, and Syed Rizvi. Ensuring Data Confidentiality in Cloud Computing: An Encryption and Trust-based Solution." In proceedings of 23rd IEEE Wireless and Optical Communication Conference (WOCC), Newark, NJ, May 2014. (PDF)
Christopher Meek, Syed Rizvi, and Jungwoo Ryoo, “Integrating Software Defined Networks with Cloud Computing: Issues and Challenges,” In proceeding of International Conference on Business, Economics and Information Technology (ICBEIT 2014), March 17 and 18, 2014, Taipei City, Taiwan.
Natasha Csicsmann, Victoria McIntyre, Patrick Shea, Syed Rizvi, and Jungwoo Ryoo, “Biometric Based Authentication Adoption in Cloud and its Security Challenges,” In proceeding of International Conference on Business, Economics and Information Technology (ICBEIT 2014), March 17 and 18, 2014, Taipei City, Taiw
J. Ryoo, Rizvi, S., Aiken, W., and Kissell, J., “Cloud Security Auditing: Challenges and Emerging Approaches”, IEEE Security and Privacy, vol. 12, no. 6, pp. 68 - 74, Nov.-Dec. 2014. (PDF)
W. Aiken, Kissell, J., Ryoo, J., and Rizvi, S., “Auditing the Cloud for Security: Challenges and Solutions”, International Conference on Business, Economics, and Information Technology (ICBEIT). Cairns, Australia, 2013.
Automobile Security
It has been now well established that integrated technology in modern cars makes them highly vulnerable to many security threats/attacks. Our goal is to advance the state of the art in security of automobile networks. Our proposed hybrid security system not only aims to protect conventional vehicles but especially focuses on securing hybrid and electrical cars. Thus, taking a step closer to a fully green planet. For more information, please visit our web site https://sites.google.com/site/autonetsecure/
Publications:
Syed Rizvi, Jonothan Willet, Donte Perino, Chandler Condo, “A Threat to Vehicular Cyber Security and the Urgency for Correction,” 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (Accepted)
Syed Rizvi, Jonathan Willett, Donte Perino, Tyler Vasbinder and Seth Marasco, "Protecting an Automobile Network Using Distributed Firewall System," Second International Conference on Internet of Things and Cloud Computing, Cambridge city, Churchill College. University of Cambridge, United Kingdom. 22-23 March 2017. (in press).
Syed Rizvi and Jonathan Willett. 2017. A new hybrid security program for securing automobile networks: poster session. J. Comput. Sci. Coll. 32, 3 (January 2017), 77-77. (PDF)
Syed Rizvi, Jonathan Willet, Tyler Vasbinder, Donte Perino and Seth Marasco, “Hybrid Security System – An Innovative Scheme to Protect Automotive Networks,” 2nd International Conference on Software Security and Assurance (ICSSA 2016), St. Pölten, Austria, August 24-25 2016.
Minimizing Identity Theft
Andrew Kurtz, Joseph Gualdoni, Syed Rizvi, Megan Wheeler, and Ilva Myzyri, “Secure Online Transaction Algorithm,” 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (Accepted)
Lamjed Zahrouni, Dayton Blackwood, Syed Rizvi, and Joseph Gualdoni, “Preventing Identity Theft Using Biometrics based Authentication System,” To the 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), October 11 - 13, 2017, Amman, Jordan. (Accepted).
Joseph Gualdoni, Andrew Kurtz, Syed Rizvi, Ilva Myzyri, and Megan Wheeler, “Multi-Layer Defense Model for Securing Online Financial Transactions,” To IEEE 3rd International Conference on Software Security and Assurance, July 24 - 25, Altoona PA. (Accepted - presented)
Syed Rizvi, Cory Roger, Aaron Zuchelli, “The Use of Biometrics to Prevent Identity Theft,” Intelligent Systems Technologies and Applications 2016, Volume 530 of the series Advances in Intelligent Systems and Computing, pp 367-381, September 2016. (PDF)
Securing Mobile Devices and Platforms
Ray Zimmerman, Syed Rizvi, Sarah Hoover, Joseph Gualdoni, Andrew Kurtz, “Taint Flow Analysis to Improve Android Application Security.” To 33rd Annual Regional Conference in Cooperation with ACM SIGCSE, October 20-21, 2017, Muhlenberg College, Allentown, PA. (Accepted)
Syed Rizvi, Gabriel Labrador, Whitney Hernandez, Kelsey Karpinski, “Analysis of Mobile Threats and Security Vulnerabilities for Mobile Platforms and Devices. Security,” Privacy and Reliability in Computer Communications and Network, The River Publishers Series in Communications. Published.
Syed Rizvi, Jesse Braughler, Joshua Clark, Adam Contino, and Rebecca Tsang, "Minimizing Black Hat SEO to Improve Security in Mobile Platforms," To The 5th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2015), Las Vegas, Nevada, USA, August 6, 2015.
A Generic Optimized Time Management Algorithms (OTMA) Framework for Simulating Large-Scale Networks
Recent evolutions in wireless networks will require more efficient use of the underlying parallel discrete-event simulation (PDES) synchronization protocols to accommodate the demand for large-scale network simulation. In this research project, we investigate underlying synchronization protocols to improve the performance of large-scale network simulators operating over PDES systems. We begin by proposing a generic optimized time management algorithms (OTMA) framework that combines the improved forms of synchronization protocols on a single platform. Particularly, for the proposed OTMA framework, we use the layered architecture approach to combine the optimized forms of conservative and optimistic time management algorithms. To support the implementation of the OTMA framework, a new m-LP (logical process) simulation model is proposed.
In this research work, the proposed OTMA framework integrates both conservative and optimistic synchronization algorithms on a single platform. In particular, we provide an improved form of NMA by developing a new deterministic model that quantifies the performance dependent critical parameters for PDES systems. In addition, for the implementation of NMA, a new m-LP simulation model along with the varying parameters network topology is proposed. Finally, we provide a separate quantitative model to support the simulation results and experimental verifications for NMA. The current DES based simulators have a large end-to-end latency, communication overhead, and poor memory utilization. OTMA framework will provide an improved form of the existing Time Wrap algorithm by proposing a new unacknowledged message list (UML) scheme. The proposed UML scheme will provide global synchronization among large number of nodes along with a fool proof solution for message transient and simultaneous reporting problems. To illustrate the implementation of the proposed UML scheme, two algorithms are proposed for coordinating and non-coordinating LPs. In order to further improve the global virtual time (GVT) computation process, synchronous barriers (such as tree and butterfly barriers) will be combined with the asynchronous algorithms (such as Time Wrap algorithm) to provide an efficient GVT computation mechanism for large-scale distributed networks.
Research Focus: Conservative and optimistic simulation model, parallel simulation, distributed computer simulation, discrete-event simulation, and data distribution techniques.
Publications:
Syed Rizvi. An LP Simulation Model for conservative Distributed simulation systems. International Journal of Simulation Modelling, Vol. 12, No. 2, June 2013
Syed S. Rizvi and Khaled M. Elleithy, “A Generic Optimized Time Management Algorithms (OTMA) Framework for Simulating Large-Scale Overlay Networks,” Proceedings of the 14th Communications and Networking Simulation Symposium (CNS'11) at the 2011 Spring Simulation Multiconference, pp. 27 - 34, Boston, MA, April 4 – 7, 2011.[PDF]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. An Efficient Optimistic Time Management Algorithm for Discrete-Event Simulation System. International Journal of Simulation Modeling. Vol. 9, No. 3, pp. 117 – 130, 2010. [PDF]
Hemen Patel, Syed S. Rizvi, Laiali Almazaydehand, and Aasia Riasat. Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock. International Journal of Computer Science & Information Technology. Vol. 2, No. 2, pp. 1 - 8, April, 2010. [PDF]
Bevin Thomas, Syed S. Rizvi, and Khaled M. Elleithy, “Reducing Null Messages Using Grouping and Status Retrieval for a Conservative Discrete-Event Simulation System,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]
Syed S. Rizvi, Hemen Patel, and Khaled M. Elleithy, “Parallel and Distributed Algorithms and Implementations: Time Based Mutual Exclusion,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]
Syed S. Rizvi, Bevin Thomas, Khaled M. Elleithy, and Aasia Riasat, “A New Technique of Switch & Feedback Job Scheduling Mechanism in a Distributed System,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, Doubletree Hotel San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]
Hemen Patel, Syed S. Rizvi, and Khaled M. Elleithy, “A New Approach to Avoid Deadlock in Parallel Discrete Event Simulation (PDES) System, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Hiral Patel, Syed S. Rizvi, and Aasia Riasat, “Performance Model for a Conservative Distributed Simulation Environment using Null Messages to Avoid Deadlock, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Abdelrahman Elleithy, Syed S. Rizvi, and Khaled M. Elleithy, "Optimization and Job Scheduling in Heterogeneous Networks," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]
Abdelrahman Elleithy, Syed S. Rizvi, and Khaled M. Elleithy, "Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT Algorithm," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]
Syed Rizvi, Dipali Shah, and Aasia Riasat, "Implementation of Tree and Butterfly Barriers with Optimistic Time Management Algorithms for Discrete Event Simulation," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008.[PDF]
Syed S. Rizvi, Shalini Poathan, and Khaled M. Elleithy, "A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 08), December 5 - 13, 2008. [PDF]
Syed S. Rizvi and Aasia Riasat, “Reducing Null Message Traffic in Large Parallel and Distributed Systems,” 13th IEEE Symposium on Computers and Communications (ISCC'08), July 6 - 9, 2008, Marrakech, Morocco. (Received Best Paper Award) [PDF]
Syed S. Rizvi and Aasia Riasat, "Combining the Synchronous Protocol with the Optimistic Time Management Algorithm (TMA) to Improve the Latency and the Processor Idle Time," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08, Las Vegas, Navada, pp. 290-296, July 14 - 17, 2008. [PDF]
Syed S. Rizvi and Aasia Riasat, "A New Architecture for Minimizing the Transmission Overhead for Large Parallel and Distributed Networks," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08 - Las Vegas, Navada. pp. 270-276, July 14 - 17, 2008. [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “A New Mathematical Model for Optimizing the Performance of Parallel and Discrete Event Simulation Systems,” 11th Communications and Networking Simulation Symposium (CNS'08), Part of the 2008 Spring Simulation Multiconference (SpringSim'08). April 14-16, 2008. Crowne Plaza Ottawa, Ottawa, Ontario [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Trees and Butterflies Barriers in Distributed Simulation System: A Better Approach to Improve Latency and the Processor Idle Time”, IEEE International Conference on Information and Emerging Technologies (IEEE ICIET-2007), pp. 1 – 6, July 06-07, 2007, Karachi, Pakistan. [PDF]
Syed S. Rizvi, K. M. Elleithy, Aasia Riasat, “Minimizing the Null Message Exchange in Conservative Distributed Simulation,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2006, pp. 443-448, December 4-14, Bridgeport CT, 2006. [PDF].
Lee A. Belfore, Saurav Mazumdar, and Syed S. Rizvi et al., “Integrating the joint operation feasibility tool with JFAST,” Proceedings of the fall 2006 Simulation Interoperability Workshop, Orlando Fl, September 10-15 2006. [PDF
Wireless Networks & Cognitive Radio Communications
Multiuser detection is an important technology in wireless CDMA systems for improving both data rate as well as user capacity. However, the computational complexity of this receiver prevents from the widespread use of this technique. Due to the high computational complexity, most of the CDMA systems today and in the near future will continue to use the conventional match filter with comparatively low user capacity and a slow data rate. However, if we could lower the computational complexity of multiuser detectors, most of the CDMA systems would likely to get the advantage of this technique in terms of increased system capacity and a better data rate. The focus of our research is to reduce the computational complexity of multiuser receivers to improve the performance of multiuser detectors. Our research distinguishes itself in a number of ways. First, a new transformation matrix algorithm is used rather than the conventional linear transformation. Second, a mathematical model is proposed to produce consistent values of SNR for a wide range of users. Third, the performance measure adopted in this paper research is the achievable bit rate for a fixed probability of error (10-7).
Research Focus: Quantitative analysis, BER/SNR/MAI measurements, and low-complexity signal detection and decoding, Security of wireless networks
Publications:
Abdul Razaque, Muder Almani, Syed S. Rizvi and Batu Vamsi, "A New Power Efficient Wireless Modem," IEEE 19th International Multi-Topic Conference (INMIC 2016), pp. 1-5. (PDF)
Abdul Razaque, Syed S. Rizvi, "Black-Box: A New Secure Distributed Peer-to-Peer File Storage and Backup System," IEEE 19th International Multi-Topic Conference (INMIC 2016), pp. 1-6. (PDF)
Syed Rizvi, Gabriel Labrador, Matt Guyan and Jeremy Savan, “Advocating for Hybrid Intrusion Detection Prevention System and Framework Improvement,” Procedia Computer Science (2016) pp. 369-374, 21 Sep 2016. (PDF).
Syed Rizvi, John Mitchell, and Nathan Showan. Analysis of Security Vulnerabilities and Threat Assessment in Cognitive Radio (CR) Networks. The 8th International Conference on Application of Information and Communication Technologies (AICT2014), Kazakhstan, Astana, 15-17 October 2014. (PDF)
Syed S. Rizvi and Nathan D. Showan, “A Generic Layered Modeling for Cognitive Radio Networks,” In proceeding of the 2014 Spring Simulation Multi-Conference (SpringSim'14), April 13-16, 2014. Tampa, FL, USA.(PDF)
Syed Rizvi and Nathan Showan. “Bandwidth and End-to-End Delay Analysis of IP and End System Multicast (ESM).” Network Security Conference (FloCon 2014), Charleston, South Carolina, on January 13–16, 2014. (Poster-Presentation)
Syed S. Rizvi. Algorithm for Improving the Computing Power of Next Generation Wireless Receivers. Journal of Computing Science and Engineering, Vol. 6, No. 4, December 2012, pp. 310-319.
Syed S. Rizvi, Khaled M. Elleithy, Aasia Riasat, and Min Song. A Low-Complexity Optimum Multiuser Receiver for DS-CDMA Wireless Systems. Journal of Communications, Vol. 5, No. 6, pp. 455 - 466, June 2010.[PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat. Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks. International Journal of Computer Science and Information Security (IJCSIS). Vol. 3, No. 1, pp. 25-34, 2009. [PDF]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. A Low-Complexity Algorithm for Improving Computing Power of Multiuser Receivers for Next Generation Wireless Systems.International Journal of Computer Science and Network Security (IJCSNS). Vol. 9 No. 6 pp. 1-10, 2009. [PDF]
Syed S. Rizvi, Khaled Elleithy, and Aasia Riasat, “Analyzing SNR Performance of a Low-Complexity Wireless Multiuser Receiver for DS-CDMA Systems,” IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 4, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]
Syed S. Rizvi, Khaled Elleithy, and Aasia Riasat, “A Low Complexity Optimum Multi-user Receiver for Maximizing the BER Performance for DS-CDMA Systems,”IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 6, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]
Syed S. Rizvi, Khaled. M. Elleithy, and Aasia Riasat, Transformation Matrix Algorithm for Reducing the Computational Complexity of Multiuser Receivers for DS-CDMA Wireless Systems,” 8th IEEE Wireless Telecommunication Symposium (IEEE WTS 2007), Pomona, California, April 26-28 2007. [PDF]
Gowrilakshmi Ponuratinam, Bhumika Patel, Syed S. Rizvi, and Khaled M. Elleithy, “Improvement in the Spread Spectrum System in DSSS, FHSS, AND CDMA, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy, “A Closed Form Expression for BER of Synchronous DS-CDMA Multi-user Detector,” 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, pp. 110-114, April 24-26 2008. [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Deterministic Formalization of the Processing Gain for Reducing MAI in Wireless Multiuser DS-CDMA Systems,” 5th Annual IEEE Consumer Communications and Networking Conference (IEEE CCNC'2008), pp. 859 - 860, January 10 – 12, 2008 in Las Vegas, Nevada. [PDF]
Syed S. Rizvi and Aasia Riasat, "Bit Error Rate (BER) Analysis of Synchronous DS-CDMA Multiuser Receivers," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-user Receivers for DS-CDMA Systems,” 5th International Conference on Information Technology: New Generations ITNG 2008, April 7-9, 2008, Las Vegas, Nevada, USA. [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “The Impact of Reduced Computational Complexity of Multiuser Detectors on the Processing Gain in a Wireless DS-CDMA Multiuser System,” Proceedings of the 2007 International Conference on Wireless Networks (ICWN’07). Part of the 2007 World Congress in Computer Science, Computer Engineering, & Applied Computing (Worldcomp’07), pp. 70 – 76, Las Vegas, Nevada, USA, June 25-28, 2007.
Resource Optimization in Wireless/Mobile Sensor Networks
A sensor network is made up of numerous small independent sensor nodes with sensing, processing and communicating capabilities. The sensor nodes have limited battery and a minimal amount of on-board computing power. This primary objective of this research work is to construct a methodology that utilizes source and path redundancy techniques with the intention to efficiently reduce the required energy consumption while maximizing the lifetime of the sensor network. In addition, the developed methodology presents a strategy to optimize the number of active sensor nodes and assign equal time slots to each sensor nodes for sensing and communication with Base Station (BS).
Research Focus: Effective coverage, Energy/power consumption and optimization, self localization, efficient routing, self organization, and self deployment.
Publications:
Syed Rizvi, Kelsey Karpinski, Abdul Razaque. Novel Architecture of Self-organized Mobile Wireless Sensor Networks, Journal of Computing Science and Engineering, Vol. 9, No. 4, December 2015, pp. 163-176. (PDF)
Syed Rizvi and A. Razaque. Secure Data Aggregation Using Access Control and Authentication for Wireless Sensor Networks. Computers & Security - Elseiver, July 2017. (In Press, Accepted Manuscript).
Manal AL-Bzoor, Laiali Almazaydeh, and Syed S. Rizvi. Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks. International Journal of Computer Networks (IJCN), Vol. 5, Issue. 5, pp. 443 - 455, 2011. [PDF]
Bryan Sarazin and Syed S. Rizvi. A Self-Deployment Obstacle Avoidance (SOA) Algorithm for Mobile Sensor Networks. International Journal of Computer Science and Security, Vol. 4, Issue. 3, pp. 316 – 330, 2010. [PDF]
Allon Rai, Sangeta Ale, Syed S. Rizvi, and Aasia Riasat. New Methodology for Self Localization in Wireless Sensor Networks. Journal of Communication and Computer, (JCC). Vol. 6, No. 11, pp. 37-44, 2009. [PDF]
Nilay Patel, Mayuresh Bhalekar, Pandya Nirav, Syed S. Rizvi, Khaled Elleithy, “Reducing Power Consumption in Sensor Network Using Sensor MAC Protocol,”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Allon Rai, Sangita Ale, Syed Rizvi and Aasia Riasat," A New Methodology for Self Localization in Wireless Sensor Networks," 12th IEEE International Multi-topic Conference (IEEE INMIC 2008), 23-24 December 2008, Bahria University Karachi, Pakistan. [PDF]
Allon Rai, Sangita Ale, and Syed S. Rizvi, and Aasia Riasat," A New Power Efficient Algorithm for Self Localization in Wireless Sensor Networks," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 08), December 5 - 13, 2008. [PDF]
Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, “Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing the Energy Consumption”, International Conference on Telecommunications and Networking (TeNe 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)
Syed S. Rizvi, Aasia Riasat, “Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing Energy Consumption,” IEEE International Conference on Information and Emerging Technologies (IEEE ICIET-2007), pp. 1 – 7, July 06-07, 2007, Karachi, Pakistan [PDF]
Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, and Khaled M. Elleithy, “An Approach to Reduce the Energy Consumption in Wireless Sensor Networks through Active Nodes Optimization,” 2007 NEW ENGLAND AMERICAN SOCIETY FOR ENGINEERING EDUCATION CONFERENCE, April 20-21, 2007.[PDF]
Wireless and Network Security
In this research domain, there are three projects I am currently working on. In the 1st project, my main research goal is to construct new efficient security algorithms for message encryption & authentication by combining both symmetric and asymmetric cryptographic techniques such as AES, RSA, and PKI. In addition, my second project is aimed to construct a technique using Dynamic Flushing concepts to prevent cache timing attacks. Finally, in my 3rd project, I am trying to create a model that can be used to detect and remove rogue access points.
Research Focus: Rogue access point detection, cache timing attacks, information security through combined symmetric/asymmetric algorithms.
Publications:
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.1, pp. 82 - 96, January 2010. [PDF]
Jalpa Bani and Syed S. Rizvi, “A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack,” 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, pp. 399-404, April 24-26 2008. [PDF]
Viktorov Dmitry, Barvaliya Narendrakumar, and Syed S. Rizvi, “Teredo Security Modernization,” 2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Estimation of End-to-End Delay and Link Bandwidth for End System Multicasting (ESM)
In this project, the focus of my research is to design an analytical model for estimating the end-to-end delay and link bandwidth performance for ESM. Our analytical model can be used to compare the performance differences between ESM and IP multicast. One of the primary goals of this research project is to design a real time simulation environment to test the feasibility of ESM for real time data such as audio and video data.
Research Focus: End-to-End delay estimation and bandwidth efficiency.
Publications:
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for Multicast Systems, International Journal of Computer Networks (IJCN), Vol. 1, No.1, pp. 1 - 20, September 2009.[PDF] (Extended versions of conference paper )
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Deterministic Formulization of End-to-End Delay for Multicast Systems, International journal of Computer Networks & Communications (IJCNC), Vol. 2, No.1, pp. 170 - 183, January 2010. [PDF] (Extended versions of conference paper )
Syed S. Rizvi, Aasia Riasat, and Mustafa Khan “Deterministic Formulization of Bandwidth Efficiency for Multicast Systems, ”IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 6, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy, “A Mathematical Model for Evaluating the Performance of Multicast Systems,” IEEE International Workshop on IP Multimedia Communications (IPMC 2008), August 4 - 7, 2008, St. Thomas U.S. Virgin Islands in conjunction with the 17TH International Conference on Computer Communications and Networks (ICCCN). [PDF]
Performance Optimization of Mobile Adhoc Networks (MANET)
My research in MANET is divided into three parts: First, one of the goals is to develop a new scheme for minimizing the malicious behavior of mobile nodes in MANET. Second, my goal is to develop a new analytical model to quantify the capacity of MANET for several different network scenarios. Finally, I use my proposed algorithms and schemes to minimize the transmission delay and maximize the network throughput.
Research Focus: Routing protocols, capacity and transmission delay approximations, and malicious behavior of mobile nodes.
Publications:
Syed S. Rizvi and Khaled M. Elleithy. A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks (MANET). International Journal of Computer Science and Information Security (IJCSIS). Vol. 3, No. 1, pp. 45-54, 2009. [PDF]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET). International Journal of Communications, Network and System Sciences (IJCNS). (accepted for publication)
Syed S. Rizvi, Aasia Riasat, Khaled M. Elleithy, and Mustafa Khan, “The Worst and Best case Capacity Analysis of Mobile Ad Hoc Networks (MANET) using a 3-Phase Algorithm,” The 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks: IEEE SECON 2008. June 16-20, 2008, San Francisco Bay Area, 2008 [PDF]
Syed S. Rizvi, Majid A. Jafri, and Khaled Elleithy, “A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET),” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 269 – 274, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Syed S. Rizvi, Aasia Riasat, and Mustafa A. Khan, “A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET,” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 275 – 279, Springer, 2010, ISBN: 978-90-481-3662-9.[PDF]
Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Efficient 3-Phase Algorithm for Performing Capacity Analysis of Mobile Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Ashish Vekaria and Syed S. Rizvi, "A New Efficient Routing Approach for Mobile Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Syed S. Rizvi and Varsha Edla, "REPU-TRUST Algorithm: An Efficient way for Minimizing the Malicious Behavior of Mobile Nodes in Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF].
Syed S. Rizvi, Saroj Poudyal, Varsha Edla, and Ravi Nepal, “A Novel Approach for Creating Trust to Reduce Malicious Behavior in MANET,” Proceedings of the 2007 ACM CoNEXT conference, Columbia University, New York, NY, December 10 -13, 2007.[PDF] (Video Presentation)
Syed S. Rizvi, Saroj Poudyal, Varsha Edla, and Ravi Nepal, “Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks,” Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics, pp. 526 – 531, Springer 2008, ISBN: 978-1-4020-8736-3.[PDF] (Audio Presentation)
Khurram M. Rajput, Khaled M. Elleithy, and Syed S. Rizvi, “A Novel Approach for Creating Consistent Trust and Cooperation (CTC) among Mobile Nodes of Ad Hoc Network,” Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics, pp. 506 – 511, Springer 2008, ISBN: 978-1-4020-8736-3.[PDF].
Faculty Links Optimization and Load-Scalability in Mesh Networks
The nodes or processors in Mesh networks send random point-to-point messages to other nodes in the network. We assume that a node can generate at most one message per cycle time with a global clock algorithm that drives all processors. The primary objective of this research project is to simulate the data throughput and hot spot properties of a Mesh network. In this research, we aim to develop a simple stored and forward one-bit round-robin routing algorithm for transmitting and receiving messages between the nodes. One of the main objectives of this research project is to demonstrate that the proposed routing algorithm not only works in an ideal situation where all the communication links between the nodes are in the operational mode but also works fine in the presence of faulty links. Furthermore, the goal is to implement the designed stored and forward one-bit round-robin routing algorithm that can show some good load-scalability characteristics among the active nodes. In addition, the effects of different architectures such as the dimension of the network, input parameter values, and the introduction of faulty links are evaluated in this research work.
Research Focus: Radio frequency management and fault tolerance.
Publications:
Syed S. Rizvi, Khaled Elleithy, and Aasia Riasat, The Use of Orthogonal Frequency Code Division (OFCD) Multiplexing in Wireless Mesh Network (WMN), Fourth-Generation (4G) Wireless Networks: Applications and Innovations, pp. 565-581, 2010. [PDF]
Syed S. Rizvi, Adil Sheikh, and Aasia Riasat, “Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm, Novel Algorithms and Techniques in Telecommunications and Networking, pp. 281 – 286, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Jaiminkumar Gorasia, Syed S. Rizvi, and Aasia Riasat, “Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD),” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 287 – 292, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, "An Efficient Single Bit Store and Forward (SBSF) Routing Algorithm for Mesh-Hypercube (M-H) Networks," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP'08. Las Vegas, Navada. pp. 69 - 75, July 14 - 17, 2008. [PDF]