Skip to main content

Showing 1–4 of 4 results for author: Sajid, M S I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01426  [pdf, other

    cs.CR cs.DC

    Maximizing Blockchain Performance: Mitigating Conflicting Transactions through Parallelism and Dependency Management

    Authors: Faisal Haque Bappy, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom, Tariqul Islam

    Abstract: While blockchains initially gained popularity in the realm of cryptocurrencies, their widespread adoption is expanding beyond conventional applications, driven by the imperative need for enhanced data security. Despite providing a secure network, blockchains come with certain tradeoffs, including high latency, lower throughput, and an increased number of transaction failures. A pivotal issue contr… ▽ More

    Submitted 2 July, 2024; v1 submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2312.09123  [pdf, other

    cs.DC cs.CR

    MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain

    Authors: Tariqul Islam, Faisal Haque Bappy, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom

    Abstract: The core of a blockchain network is its consensus algorithm. Starting with the Proof-of-Work, there have been various versions of consensus algorithms, such as Proof-of-Stake (PoS), Proof-of-Authority (PoA), and Practical Byzantine Fault Tolerance (PBFT). Each of these algorithms focuses on different aspects to ensure efficient and reliable processing of transactions. Blockchain operates in a dece… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  3. arXiv:2312.08305  [pdf, other

    cs.DC

    ConChain: A Scheme for Contention-free and Attack Resilient BlockChain

    Authors: Faisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom

    Abstract: Although blockchains have become widely popular for their use in cryptocurrencies, they are now becoming pervasive as more traditional applications adopt blockchain to ensure data security. Despite being a secured network, blockchains have some tradeoffs such as high latency, low throughput, and transaction failures. One of the core problems behind these is improper management of "conflicting tran… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  4. arXiv:2202.04620  [pdf, other

    cs.CR

    IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms

    Authors: Md Morshed Alam, Md Sajidul Islam Sajid, Weichao Wang, **peng Wei

    Abstract: With the emergence and fast development of trigger-action platforms in IoT settings, security vulnerabilities caused by the interactions among IoT devices become more prevalent. The event occurrence at one device triggers an action in another device, which may eventually contribute to the creation of a chain of events in a network. Adversaries exploit the chain effect to compromise IoT devices and… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

    Comments: This paper appears in the 2022 IEEE Wireless Communications and Networking Conference (WCNC 2022). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses