-
Towards a secured smart IoT using light weight blockchain: An aim to secure Pharmacy Products
Authors:
Md. Faruk Abdullah Al Sohan,
Samiur Rahman Khan,
Nusrat Jahan Anannya,
Md Taimur Ahad
Abstract:
Blockchain has proven a very developed and secured technology. It ensures data integrity with authentic connected nodes. Now-a-days, blockchain with IoT is a great combination for secured and smart end to end product delivery. This observation has motivated the research to develop a conceptual model to provide a secure pharmaceutical product delivery by develo** a IoT integrated with lightweight…
▽ More
Blockchain has proven a very developed and secured technology. It ensures data integrity with authentic connected nodes. Now-a-days, blockchain with IoT is a great combination for secured and smart end to end product delivery. This observation has motivated the research to develop a conceptual model to provide a secure pharmaceutical product delivery by develo** a IoT integrated with lightweight blockchain. The undeveloped and most of the develo** countries are facing problems such as drug counterfeits, shortages, opiates and tracking them became difficult because of less transparency. Also, nature sensitive medicines need to be stored under controlled temperature known as cold-chain ship**. The storage of these information in the recent software is done in the centralized databases that is prone to data manipulations and hacks. Due to less production drugs needed to be imported with maintaining drug supply chain regulations by law. This paper proposes a lightweight blockchain model for pharmaceutical industries by using IoT. This model ensures traceability of drugs within a very simple way which is less complex compared to the existing ones.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support
Authors:
Asad Ali,
Samin Rahman Khan,
Sadman Sakib,
Md. Shohrab Hossain,
Ying-Dar Lin
Abstract:
Multi-Access or Mobile Edge Computing (MEC) is being deployed by 4G/5G operators to provide computational services at lower latencies. Federating MECs across operators expands capability, capacity, and coverage but gives rise to two issues - third-party authentication and application mobility - for continuous service during roaming without re-authentication. In this work, we propose a Federated St…
▽ More
Multi-Access or Mobile Edge Computing (MEC) is being deployed by 4G/5G operators to provide computational services at lower latencies. Federating MECs across operators expands capability, capacity, and coverage but gives rise to two issues - third-party authentication and application mobility - for continuous service during roaming without re-authentication. In this work, we propose a Federated State transfer and 3rd-party Authentication (FS3A) mechanism that uses a transparent proxy to transfer the information of both authentication and application state across operators to resolve these issues. The FS3A proxy is kept transparent, with virtual counterparts, to avoid any changes to the existing MEC and cellular architectures. FS3A provides users with a token, when authenticated by an MEC, which can be reused across operators for faster authentication. Prefetching of subscription and state is also proposed to further reduce the authentication and application mobility latencies. We evaluated FS3A on an OpenAirInterface (OAI)-based testbed and the results show that token reuse and subscription prefetching reduce the authentication latency by 53-65%, compared to complete re-authentication, while state prefetching reduces application mobility latency by 51-91%, compared to no prefetching. Overall, FS3A reduces the service interruption time by 33%, compared to no token reuse and prefetching.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
Extracting Sub-Exposure Images from a Single Capture Through Fourier-based Optical Modulation
Authors:
Shah Rez Khan,
Martin Feldman,
Bahadir K. Gunturk
Abstract:
Through pixel-wise optical coding of images during exposure time, it is possible to extract sub-exposure images from a single capture. Such a capability can be used for different purposes, including high-speed imaging, high-dynamic-range imaging and compressed sensing. In this paper, we demonstrate a sub-exposure image extraction method, where the exposure coding pattern is inspired from frequency…
▽ More
Through pixel-wise optical coding of images during exposure time, it is possible to extract sub-exposure images from a single capture. Such a capability can be used for different purposes, including high-speed imaging, high-dynamic-range imaging and compressed sensing. In this paper, we demonstrate a sub-exposure image extraction method, where the exposure coding pattern is inspired from frequency division multiplexing idea of communication systems. The coding masks modulate sub-exposure images in such a way that they are placed in non-overlap** regions in Fourier domain. The sub-exposure image extraction process involves digital filtering of the captured signal with proper band-pass filters. The prototype imaging system incorporates a Liquid Crystal over Silicon (LCoS) based spatial light modulator synchronized with a camera for pixel-wise exposure coding.
△ Less
Submitted 13 February, 2018; v1 submitted 26 December, 2016;
originally announced December 2016.
-
Android based security and home automation system
Authors:
Sadeque Reza Khan,
Farzana Sultana Dristy
Abstract:
The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also…
▽ More
The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also the car door lock. Another important feature of the designed system is that it can control the overall appliances in a room. The mobile to security system or home automation system interface is established through Bluetooth. The hardware part is designed with the PIC microcontroller.
△ Less
Submitted 28 March, 2015;
originally announced April 2015.
-
The performance evaluation of IEEE 802.16 physical layer in the basis of bit error rate considering reference channel models
Authors:
Arifa Ferdousi,
Farhana Enam,
Sadeque Reza Khan
Abstract:
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its ro…
▽ More
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its robust performance in multipath environment. Consequently WiMAX forum has adopted this version to develop the network world wide. In this paper the performance of IEEE 802.16 OFDM PHY Layer has been investigated by using the simulation model in Matlab. The Stanford University Interim (SUI) channel models are selected for the performance evaluation of this standard. The Ideal Channel estimation is considered in this work and the performance evaluation is observed in the basis of BER.
△ Less
Submitted 25 December, 2013;
originally announced December 2013.
-
Hardware and logic implementation of multiple alarm system for GSM BTS rooms
Authors:
Arifa Ferdousi,
Sadeque Reza Khan
Abstract:
Cellular communication becomes the major mode of communication in present century. With the development of this phase of communication the globalization process is also in its peak of speed. The development of cellular communication is largely depending on the improvement and stability of Base Transceiver Station (BTS) room. So for the purpose of the development of cellular communication a large n…
▽ More
Cellular communication becomes the major mode of communication in present century. With the development of this phase of communication the globalization process is also in its peak of speed. The development of cellular communication is largely depending on the improvement and stability of Base Transceiver Station (BTS) room. So for the purpose of the development of cellular communication a large numbered BTS rooms are installed throughout the world. To ensure proper support from BTS rooms there must be a security system to avoid any unnecessary vulnerability. Therefore multiple alarm system is designed to secure the BTS rooms from any undesired circumstances. This system is designed with a PIC Microcontroller as a main controller and a several sensors are interfaced with it to provide high temperature alarm, smoke alarm, door alarm and water alarm. All these alarms are interfaced with the alarm box in the BTS room which provides the current status directly to Network Management Centre (NMC) of a Global System for Mobile (GSM) communication network.
△ Less
Submitted 25 December, 2013;
originally announced December 2013.
-
Development of Low Cost Private Office Access Control System (OACS)
Authors:
Sadeque Reza Khan
Abstract:
Over the years, access control systems have become more and more sophisticated and several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints, t…
▽ More
Over the years, access control systems have become more and more sophisticated and several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints, the iris and facial recognition. We have designed a flexible and low cost modular system based on integration of keypad, magnetic lock and a controller. PIC 16F876A which is an 8-bit Microcontroller, is used here as a main controller. An advanced simulation based compiler Flowcode V4 is used to develop the software part in this project.
△ Less
Submitted 20 December, 2012;
originally announced December 2012.
-
Voltage Temperature Monitoring System (VTMS) for a BTS Room
Authors:
Sadeque Reza Khan,
Siddique Reza Khan,
Arifa Ferdousi
Abstract:
Although Cellular communication is getting more and more popular in our country present days, but its network improvement is hampered by the crysis of electricity. The recent decision of present Government is that they will not provide any electricity from the grid to any new BTS rooms of any Celluler operator companies like Grammen Phone, Robi, Airtel etc. These companies have to develop their ow…
▽ More
Although Cellular communication is getting more and more popular in our country present days, but its network improvement is hampered by the crysis of electricity. The recent decision of present Government is that they will not provide any electricity from the grid to any new BTS rooms of any Celluler operator companies like Grammen Phone, Robi, Airtel etc. These companies have to develop their own power stations either by using generators or by develo** solar plants. Now a days most of the BTS rooms, that the cellular operators are installing with a generator and 48 volt battery backup. So for the synchronisation of the operation of PDB, Generator and battery, they require a device called Voltage Temperature Monitoring System or VTMS. It is a Microcontroller based controlling unit which controlls the operation of generator and battery when PDB in not available in the BTS room.
△ Less
Submitted 19 December, 2012;
originally announced December 2012.