Skip to main content

Showing 1–21 of 21 results for author: Atiquzzaman, M

.
  1. arXiv:2309.09372  [pdf, other

    cs.NI cs.LG

    A Survey on Congestion Control and Scheduling for Multipath TCP: Machine Learning vs Classical Approaches

    Authors: Maisha Maliha, Golnaz Habibi, Mohammed Atiquzzaman

    Abstract: Multipath TCP (MPTCP) has been widely used as an efficient way for communication in many applications. Data centers, smartphones, and network operators use MPTCP to balance the traffic in a network efficiently. MPTCP is an extension of TCP (Transmission Control Protocol), which provides multiple paths, leading to higher throughput and low latency. Although MPTCP has shown better performance than T… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

    Comments: 13 pages, 7 figures

  2. Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence

    Authors: Veronika Stephanie, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman

    Abstract: We propose a privacy-preserving ensemble infused enhanced Deep Neural Network (DNN) based learning framework in this paper for Internet-of-Things (IoT), edge, and cloud convergence in the context of healthcare. In the convergence, edge server is used for both storing IoT produced bioimage and hosting DNN algorithm for local model training. The cloud is used for ensembling local models. The DNN-bas… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Journal ref: IEEE Internet of Things Journal, vol. 10, no. 5, pp. 3763-3773, 1 March1, 2023

  3. Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain

    Authors: Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi

    Abstract: The advancement of Internet and Communication Technologies (ICTs) has led to the era of Industry 4.0. This shift is followed by healthcare industries creating the term Healthcare 4.0. In Healthcare 4.0, the use of IoT-enabled medical imaging devices for early disease detection has enabled medical practitioners to increase healthcare institutions' quality of service. However, Healthcare 4.0 is stil… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Journal ref: IEEE Transactions on Industrial Informatics, 2022

  4. Smart Policy Control for Securing Federated Learning Management System

    Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman

    Abstract: The widespread adoption of Internet of Things (IoT) devices in smart cities, intelligent healthcare systems, and various real-world applications have resulted in the generation of vast amounts of data, often analyzed using different Machine Learning (ML) models. Federated learning (FL) has been acknowledged as a privacy-preserving machine learning technology, where multiple parties cooperatively t… ▽ More

    Submitted 18 May, 2023; v1 submitted 15 May, 2023; originally announced May 2023.

    Journal ref: IEEE Transactions on Network and Service Management, 2023

  5. SMPC-based Federated Learning for 6G enabled Internet of Medical Things

    Authors: Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor

    Abstract: Rapidly develo** intelligent healthcare systems are underpinned by Sixth Generation (6G) connectivity, ubiquitous Internet of Things (IoT), and Deep Learning (DL) techniques. This portends a future where 6G powers the Internet of Medical Things (IoMT) with seamless, large-scale, and real-time connectivity amongst entities. This article proposes a Convolutional Neural Network (CNN) based Federate… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Journal ref: IEEE Network, vol. 36, no. 4, pp. 182-189, July/August 2022

  6. Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things

    Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor

    Abstract: This paper proposes a blockchain-based Federated Learning (FL) framework with Intel Software Guard Extension (SGX)-based Trusted Execution Environment (TEE) to securely aggregate local models in Industrial Internet-of-Things (IIoTs). In FL, local models can be tampered with by attackers. Hence, a global model generated from the tampered local models can be erroneous. Therefore, the proposed framew… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Journal ref: IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1703-1714, Feb. 2023

  7. arXiv:2212.04933  [pdf, other

    eess.SP

    How Can Optical Communications Shape the Future of Deep Space Communications? A Survey

    Authors: Sarah Karmous, Nadia Adem, Mohammed Atiquzzaman, Sumudu Samarakoon

    Abstract: With a large number of deep space (DS) missions anticipated by the end of this decade, reliable and high-capacity DS communications are needed more than ever. Nevertheless, existing technologies are far from meeting such a goal. Improving current systems does not only require engineering leadership, but also, very crucially, investigating potential technologies that overcome the unique challenges… ▽ More

    Submitted 19 May, 2024; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: 17 pages, 10 Figures

  8. arXiv:2209.08075  [pdf

    cs.NI

    Stable Dynamic Predictive Clustering (SDPC) Protocol for Vehicular Ad hoc Network

    Authors: Mohammad Mukhtaruzzaman, Mohammed Atiquzzaman

    Abstract: Vehicular communication is an essential part of a smart city. Scalability is a major issue for vehicular communication, specially, when the number of vehicles increases at any given point. Vehicles also suffer some other problems such as broadcast problem. Clustering can solve the issues of vehicular ad hoc network (VANET); however, due to the high mobility of the vehicles, clustering in VANET suf… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

  9. Controller-based Energy-Aware Wireless Sensor Network Routing using Quantum Algorithms

    Authors: Jie Chen, Prasanna Date, Nicholas Chancellor, Mohammed Atiquzzaman, Cormac Sreenan

    Abstract: Energy efficient routing in wireless sensor networks has attracted attention from researchers in both academia and industry, most recently motivated by the opportunity to use SDN (software defined network)-inspired approaches. These problems are NP-hard, with algorithms needing computation time which scales faster than polynomial in the problem size. Consequently, heuristic algorithms are used in… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Journal ref: IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-12, 2022, Art no. 3102912

  10. arXiv:2108.10319  [pdf, other

    cs.CR cs.NI

    Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing

    Authors: Anirudh Paranjothi, Mohammed Atiquzzaman

    Abstract: Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. Rogue nodes in VANETs cause a Sybil attack to create an illusion of fake traffic congestion by broadcasting malicious information leading to catastrophic consequences, such as the collision of vehicles. Previous researchers used either cryptography, trust scores, or past vehicle data to detec… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2102.00839, arXiv:2108.10267

  11. arXiv:2108.10267  [pdf, other

    cs.NI

    A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing

    Authors: Anirudh Paranjothi, Mohammed Atiquzzaman

    Abstract: Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences in Vehicular Ad Hoc Networks (VANETs). Previous researchers used either cryptography, trust scores, or past vehicle data to detect rogue nodes; however, these methods suffer from high processing delay, overhead, and False-Positive Rate (FPR). We propose herein Greenshield's traffic model-based fog c… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: arXiv admin note: text overlap with arXiv:2102.00839

  12. Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System

    Authors: Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman

    Abstract: There has been an intense concern for security alternatives because of the recent rise of cyber attacks, mainly targeting critical systems such as industry, medical, or energy ecosystem. Though the latest industry infrastructures largely depend on AI-driven maintenance, the prediction based on corrupted data undoubtedly results in loss of life and capital. Admittedly, an inadequate data-protection… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 07 Pages, 4 Figures, IEEE Communication Magazine

    ACM Class: E.3

    Journal ref: in IEEE Communications Magazine, vol. 59, no. 5, pp. 128-134, May 2021

  13. F-RouND: Fog-based Rogue Nodes Detection in Vehicular Ad hoc Networks

    Authors: Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan

    Abstract: Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. The rogue nodes in VANETs broadcast malicious information leading to potential hazards, including the collision of vehicles. Previous researchers used either cryptography, trust values, or past vehicle data to detect rogue nodes, but they suffer from high processing delay, overhead, and false… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

  14. arXiv:2101.11147  [pdf

    cs.NI cs.DC

    Cloud based VANET Simulator (CVANETSIM)

    Authors: Mohammad Mukhtaruzzaman, Mohammed Atiquzzaman

    Abstract: Vehicular ad hoc network (VANET) is an integral part of vehicular communication. VANET suffers many problems such as scalability. To solve scalability and other problems of VANET, clustering is proposed. VANET clustering is different than any other kind of clustering due to the high mobility of the vehicles. Likewise, VANET and VANET clustering, VANET simulator requires some unique features such a… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

  15. Clustering in VANET: Algorithms and Challenges

    Authors: Mohammad Mukhtaruzzaman, Mohammed Atiquzzaman

    Abstract: Clustering is an important concept in vehicular ad hoc network (VANET) where several vehicles join to form a group based on common features. Mobility-based clustering strategies are the most common in VANET clustering; however, machine learning and fuzzy logic algorithms are also the basis of many VANET clustering algorithms. Some VANET clustering algorithms integrate machine learning and fuzzy lo… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

    Journal ref: Computers & Electrical Engineering, Volume 88, December 2020, 106851

  16. arXiv:2009.01634  [pdf

    cs.NI

    Message Dissemination in Connected Vehicles

    Authors: Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan

    Abstract: Advances in connected vehicles based on Vehicular Ad-hoc Networks (VANETs) in recent years have gained significant attention in Intelligent Transport Systems (ITS) in terms of disseminating messages in an efficient manner. VANET uses Dedicated Short Range Communication (DSRC) for disseminating messages between vehicles and between infrastructures. Though DSRC based communications are viable, it is… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

  17. Local Differential Privacy for Deep Learning

    Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman

    Abstract: The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation of software-defined networks (SDN) and network function virtualization (NFV) in the edge-cloud interplay. Deep learning (DL) is becoming popular due to its remarkabl… ▽ More

    Submitted 9 November, 2019; v1 submitted 8 August, 2019; originally announced August 2019.

  18. arXiv:1807.03362  [pdf

    cs.NI

    Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment

    Authors: Anirudh Paranjothi, Mohammad S Khan, Mohammed Atiquzzaman

    Abstract: Routing of messages in Vehicular Ad-hoc Networks (VANETs) is challenging due to obstacle shadowing regions with high vehicle densities, which leads to frequent disconnection problems and blocks radio wave propagation between vehicles. Previous researchers used multi-hop, vehicular cloud or roadside infrastructures to solve the routing issue among the vehicles, but they suffer from significant pack… ▽ More

    Submitted 9 July, 2018; originally announced July 2018.

  19. arXiv:1805.07662  [pdf

    cs.NI

    DFCV: A Novel Approach for Message Dissemination in Connected Vehicles using Dynamic Fog

    Authors: Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman

    Abstract: Vehicular Ad-hoc Network (VANET) has emerged as a promising solution for enhancing road safety. Routing of messages in VANET is challenging due to packet delays arising from high mobility of vehicles, frequently changing topology, and high density of vehicles, leading to frequent route breakages and packet losses. Previous researchers have used either mobility in vehicular fog computing or cloud c… ▽ More

    Submitted 30 May, 2018; v1 submitted 19 May, 2018; originally announced May 2018.

  20. NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection In Online Social Networks

    Authors: Vishal Sharma, Ravinder Kumar, Wen-Huang Cheng, Mohammed Atiquzzaman, Kathiravan Srinivasan, Albert Y. Zomaya

    Abstract: Use of social network is the basic functionality of today's life. With the advent of more and more online social media, the information available and its utilization have come under the threat of several anomalies. Anomalies are the major cause of online frauds which allow information access by unauthorized users as well as information forging. One of the anomalies that act as a silent attacker is… ▽ More

    Submitted 18 April, 2018; v1 submitted 18 April, 2018; originally announced April 2018.

    Comments: 14 Pages, 16 Figures, 5 Tables, Accepted in IEEE Transactions on Knowledge and Data Engineering (2018)

    Journal ref: IEEE Transactions on Knowledge and Data Engineering. doi: 10.1109/TKDE.2018.2818163

  21. Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover

    Authors: Jianfeng Guan, Vishal Sharma, Ilsun You, Mohammad Atiquzzaman

    Abstract: Fast handover for Proxy Mobile IPv6 (FPMIPv6) can reduce handover delay and packet loss compared with Proxy Mobile IPv6 (PMIPv6). However, FPMIPv6 still cannot handle heterogeneous handovers due to the lack of unified Layer 2 triggering mechanism along with the booming of emerging wireless technologies. Media Independent Handover (MIH) can provide heterogeneous handover support, and a lot of integ… ▽ More

    Submitted 27 May, 2017; originally announced May 2017.

    Comments: 14 pages, 17 figures, 5 tables

    Journal ref: Future Gener. Comput. Syst. 97: 775-791 (2019)