Loading [MathJax]/extensions/MathMenu.js
Mahmud Hossain - IEEE Xplore Author Profile

Showing 1-25 of 29 results

Filter Results

Show

Results

Social distancing requirements urged by the COVID-19 pandemic along with high transportation cost reduced inperson meetings significantly in recent times. In consequence, many people are seeking for virtual reality (VR) to feel a similar experiences of visiting and enjoying places that are unaccessible. VR has immense success in domains, such as automotive industry, healthcare, tourism, entertainm...Show More
Recently, Blockchain-based applications have become immensely popular because of limited reliance on a single entity, unlike a centralized system. However, reaching a consensus among blockchain networks is a challenging and vital aspect of blockchain-based applications. There are various types of blockchain networks for different kinds of application scenarios. Among all of them, the consensus alg...Show More
Autonomous vehicles (AVs) are capable of making driving decisions autonomously using multiple sensors and a complex autonomous driving (AD) software. However, AVs introduce numerous unique security challenges that have the potential to create safety consequences on the road. Security mechanisms require a benchmark suite and an evaluation framework to generate comparable results. Unfortunately, AVs...Show More
The Internet of Things (IoT) offers new services in the context of smart cities through digital devices embedded with sensing, computation, and communication capabilities. The IoT devices enhance the smart city vision by employing advanced communication and computation technologies for smart city administrations. The IoT-based smart city applications require many IoT devices and gateways to be dep...Show More
The Internet of Things (IoT) devices exchange certificates and authorization tokens over the IEEE 802.15.4 radio medium that supports a maximum transmission unit (MTU) of 127 bytes. However, these credentials are significantly larger than the MTU and are, therefore, sent in a large number of fragments. As IoT devices are resource constrained and battery powered, there are considerable computations...Show More
Deep learning models usually require large memory space and computation power for training on vast size datasets. This costly overhead creates a bottleneck in the research and development of neural network models. Efficient and resourceful deep learning models that work on the balance between computation cost and performance are required. Given these scenarios of less performance improvement over ...Show More
Natural Language Processing (NLP) is a challenging and evolving field with the potential of mushroom growth. This technology is expected to assume a pivotal role in bridging the gap between human communication and digital data. In line with that, NLP-driven sentiment analysis has become an attractive research area. On the other hand, bitcoin, arguably the most valuable cryptocurrency, has gained p...Show More
The service-oriented nature of the Universal Plug-and-Play (UPnP) protocol supports the creation of flexible, open, and dynamic systems. As such, it is widely used in Internet-of-Things (IoT) deployments. However, the protocol’s service access mechanism does not consider security from the first principles and is therefore vulnerable to various attacks. In this article, we present an in-depth analy...Show More
The host identity protocol (HIP) has emerged as the most suitable solution to uniquely identify smart devices in the mobile and distributed Internet-of-Things (IoT) systems, such as smart cities, homes, cars, and healthcare. The HIP provides authentication methods that enable secure communications between HIP peers. However, the authentication methods provided by the HIP cannot be adopted by the I...Show More
Crowdsourcing is an efficient and scalable way for the service providers (SP) to provide a broad range of services with a low initial service setup cost. With its growing popularity, people are continuously introducing new crowdsourcing-based applications and searching for suitable crowd platforms for the deployment of those applications as a service. Consequently, a contributor participates in mu...Show More
The ubiquitous nature of IoT devices has brought new and exciting applications in computing and communication paradigms. Due to its ability to enable auto-configurable communication between IoT devices, pervasive applications, and remote clients, the use of the Universal Plug and Play (UPnP) protocol is widespread. However, the advertisement and discovery mechanism of UPnP incurs significant overh...Show More
Cloud computing has become popular in various application domains based on infrastructure, platform, and software as a service model. Rapid deployment, high scalability, on-demand, and (theoretically) infinite resources have driven the industry towards the wide adoption of cloud computing services. However, the difficulty of cross-provider resource allocation and seamless resource transition is a ...Show More
Advances in the development and increased availability of smart devices ranging from small sensors to complex cloud infrastructures as well as various networking technologies and communication protocols have supported the rapid expansion of Internet of Things deployments. The Universal Plug and Play (UPnP) protocol has been widely accepted and used in the IoT domain to support interactions among h...Show More
The widespread adoption of the Internet of Things (IoT) devices has increased its popularity and usage in diverse dimensions, including smart city, home, healthcare, and vehicles. The pervasiveness of the number of IoT devices that operate in low power and lossy network leads to performance issues. An excessive amount of IoT devices that operate with a fixed number of gateways reduce the quality o...Show More
The increased deployment of Internet of Things (IoT) devices will make them targets for attacks. IoT devices can also be used as tools for committing crimes. In this regard, we propose FIF-IoT - a forensic investigation framework using a public digital ledger to find facts in criminal incidents in IoT-based systems. FIF-IoT collects interactions that take place among various IoT entities (clouds, ...Show More
The increased deployment of Internet of Things (IoT) devices will make them targets for attacks. IoT devices can also be used as tools for committing crimes. In this regard, we propose Probe-IoT - a forensic investigation framework using a public digital ledger to find facts in criminal incidents in IoT-based systems. Probe-IoT collects interactions that take place among various IoT entities (clou...Show More
This paper proposes a framework for an IoT-based health prescription assistant (HPA), which helps each patient to follow the doctors recommendations properly. The paper also designs a security system that ensures user authentication and protected access to resources and services. Based on the OpenID standard, an access control mechanism is implemented to prevent unauthorized access to medical devi...Show More
The Internet of Vehicles (IoV) is a complex and dynamic mobile network system that enables information sharing between vehicles, their surrounding sensors, and clouds. While IoV opens new opportunities in various applications and services to provide safety on the road, it introduces new challenges in the field of digital forensics investigations. The existing tools and procedures of digital forens...Show More
In recent years, the concept of the Internet of Things (IoT) has already been implemented in numerous application domains, such as smart city, intelligent healthcare assistant, and smart transportation management. Researchers or developers associated with these domains frequently require diverse types of IoT devices to implement or test their IoT related innovations. However, building an IoT-testb...Show More
The Internet of Things (IoT) devices perform security-critical operations and deal with sensitive information in the IoT-based systems. Therefore, the increased deployment of smart devices will make them targets for cyber attacks. Adversaries can perform malicious actions, leak private information, and track devices' and their owners' location by gaining unauthorized access to IoT devices and netw...Show More
The Internet of Things (IoT) is becoming a key infrastructure for the development of smart ecosystems. However, the increased deployment of IoT devices with poor security has already rendered them increasingly vulnerable to cyber attacks. In some cases, they can be used as a tool for committing serious crimes. Although some researchers have already explored such issues in the IoT domain and provid...Show More
The Internet of Things (IoT) have become popular in diverse domains because of their accessibility and mobility as well as cost-efficient manufacturing, deployment, and maintenance process. The widespread deployment of IoT devices makes them an attractive target for an attacker trying to gain unauthorized access to an IoT-based system. An adversary clones a real hardware device or compromises embe...Show More
Cloud computing provides software, platform, and infrastructure as a service that helps organizations to perform several resource intensive tasks. The services offered by a cloud service provider are limited by provider-specific options in terms of the pre-specified configurations. Moreover, it is sometimes expensive to pay a fixed amount of money without any format of negotiation or price-matchin...Show More
Cloud computing has become the industry standard for rapid application deployment, scalable server support, mobile and distributed services, and it provides access to (theoretically) infinite resources. Unfortunately, researchers are still trying to converge towards cross-provider cloud computing frameworks to enable compatibility and seamless resource transition between cloud providers. Moreover,...Show More
Cloud computing has emerged as the primary and popular computing paradigm recently. Since cloud users move continuously, sustaining the required quality of service (QoS) in a cost effective manner is very challenging. For maintaining the required QoS for a moving user, the current cloud systems use some of the existing service replication or/and migration strategies. However, those policies become...Show More