- Caching and Content Delivery
- Cooperative Communication and Network Coding
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Advanced Data Storage Technologies
- Cloud Computing and Resource Management
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Peer-to-Peer Network Technologies
- Advanced Malware Detection Techniques
- Advanced Authentication Protocols Security
- Blockchain Technology Applications and Security
- Advanced Steganography and Watermarking Techniques
- Cloud Data Security Solutions
- IPv6, Mobility, Handover, Networks, Security
- User Authentication and Security Systems
- Vehicular Ad Hoc Networks (VANETs)
- Privacy-Preserving Technologies in Data
- Age of Information Optimization
- Wireless Body Area Networks
- Smart Grid Security and Resilience
- Adversarial Robustness in Machine Learning
- Advanced Photocatalysis Techniques
- Virtual Reality Applications and Impacts
- Covalent Organic Framework Applications
University of Notre Dame
2022-2025
University of Nebraska at Omaha
2019-2023
Institute of Electrical and Electronics Engineers
2023
Abdul Wali Khan University Mardan
2021
UCLA Health
2017-2019
University of California, Los Angeles
2017
National Technical University of Athens
2015
As a proposed Internet architecture, Named Data Networking (NDN) takes fundamental departure from today's TCP/IP thus requiring extensive experimentation and evaluation. To facilitate such experimentation, we have developed ndnSIM, an open-source NDN simulator based on the NS-3 simulation framework. Since its first release in 2012, ndnSIM has gone through five years of active development integration with prototype implementations, become popular platform used by hundreds researchers around...
This article presents an overview of the security mechanisms in NDN architecture that have been developed over past several years. changes network communication model from delivery packets to hosts identified by IP addresses retrieval named and secured data packets. Consequently, also fundamentally approaches security. Making centerpiece leads a new framework secures directly, uses name semantics enable applications reason about automate use cryptographic keys. In this article, we introduce...
Digital image watermarking is the process of embedding and extracting watermark covertly on a carrier image. Incorporating deep learning networks with has attracted increasing attention during recent years. However, existing learning-based systems cannot achieve robustness, blindness, automated extraction simultaneously. In this paper, fully system based neural proposed to generalize processes. An unsupervised structure novel loss computation are high capacity robustness without any prior...
Industry 5.0 is the digitalization, automation and data exchange of industrial processes that involve artificial intelligence, Industrial Internet Things (IIoT), Cyber-Physical Systems (I-CPS). In healthcare, I-CPS enables intelligent wearable devices to gather from real-world transmit virtual world for decision-making. makes our lives comfortable with emergence innovative healthcare applications. Similar any other IIoT paradigm, capable applications face numerous challenging issues. The...
Modern distributed computing frameworks and domain-specific languages provide a convenient robust way to structure large applications deploy them on either data center or edge environments. The current systems suffer however from the need for complex underlay of services allow run effectively existing Internet protocols. These include centralized schedulers, DNS-based name translation, stateful load balancers, heavy-weight transport In contrast, ICN-oriented remote invocation methodologies...
In today's era of explosion Internet Things (IoT) and end-user devices their data volume emanating at the network's edge, network should be more in-tune with meeting needs these demanding edge computing applications. To this end, we design prototype Information-Centric (ICedge), a general-purpose networking framework that streamlines service invocation improves reuse redundant computation edge. ICedge runs on top named-data networking, realization information-centric vision, handles...
The awareness of edge computing is attaining eminence and largely acknowledged with the rise Internet Things (IoT). Edge-enabled solutions offer efficient control at network to resolve scalability latency-related concerns. Though, it comes be challenging for tackle diverse applications IoT as they produce massive heterogeneous data. IoT-enabled frameworks Big Data analytics face numerous challenges in their existing structural design, instance, high volume data storage processing,...
Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the industrial processes using Artificial Intelligence (AI) within cyber-physical systems. In IIoT ecosystem, devices applications communicate with each other little human intervention. They need to act intelligently safeguard confidentiality devices' authenticity. The ability gather, process, store real-time depends on quality data, network connectivity, processing capabilities these devices. Pervasive...
Cyber–physical systems (CPS) connected in the form of Internet Things (IoT) are vulnerable to various security threats, due infrastructure-less deployment IoT devices. Device-to-Device (D2D) authentication these networks ensures integrity, authenticity, and confidentiality information deployed area. The literature suggests different approaches address issues CPS technologies. However, they mostly based on centralized techniques or specific system deployments with a higher cost computation...
A fundamental expectation of the stakeholders from Industrial Internet Things (IIoT) is its trustworthiness and sustainability to avoid loss human lives in performing a critical task. trustworthy IIoT-enabled network encompasses security characteristics, such as trust, privacy, security, reliability, resilience, safety. The traditional mechanisms procedures are insufficient protect these networks owing protocol differences, limited update options, older adaptations mechanisms. As result,...
Unnamed Ariel Vehicle-assisted-Internet of Things (UAV-assisted IoT) applications have emerged as a powerful integrated technology, showcasing remarkable results in many domains with numerous advantages. However, this technology encounters several challenges, and security is one them. Given that, authentication verification legitimate devices data privacy pose key concerns wireless communication environment. Even though, the literature highlights growing threats where attackers can easily...
In Named Data Networking (NDN), mobility of data consumers is natively supported by the stateful forwarding plane. However, additional mechanisms are needed, so that requests for can be forwarded toward a mobile producer. this paper, we present KITE, trace-based producer support further exploits plane NDN. KITE takes soft-state approach to create hop-by-hop path between reachable rendezvous server and through authenticated Interest-Data exchanges. locator-free, transparent retrieval routing,...
Internet of Things (IoT) is considered as a key enabler health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect transfer biomedical data pertaining blood pressure, electrocardiography (ECG), sugar levels, body temperature, etc. Among these devices, wearables have found their presence in wide range healthcare applications. These generate real-time transmit them nearby gateways remote servers processing visualization. The transmitted by...
Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution today's Internet. However, deploying ICN in wireless environment poses different set challenges compared wired environment, especially when it comes security. In this paper, we present issues that may arise attacks occur from points view is deployed environments. The discussed target both applications network itself by...
Metaverse technology is assumed as the future of digital healthcare because this has potential to contribute a lot. Despite extensive exploration concept in various domains, including healthcare, there remains notable gap addressing security concerns within virtual worlds. This vulnerability arises from several factors, wireless communication, open-area deployment, adoption new devices and users, authentication processes. These factors make susceptible internal external threats, such...
Virtual Reality (VR) technology has gained substantial traction and the potential to transform a number of industries, including education, entertainment, professional sectors. Nevertheless, concerns have arisen about security privacy implications VR applications impact that they might on users. In this paper, we investigate following overarching research question: can user activities in context such (e.g., manipulating virtual objects, walking, talking, flying) be identified based...
The rapid growth of Internet Things (IoT) devices has introduced significant challenges to privacy, particularly as network traffic analysis techniques evolve. While encryption protects data content, attributes such packet size and timing can reveal sensitive information about users devices. Existing single-technique obfuscation methods, padding, often fall short in dynamic environments like smart homes due their predictability, making them vulnerable machine learning-based attacks. This...
Delay-sensitive applications have been driving the move away from cloud computing, which cannot meet their low-latency requirements. Edge computing and programmable switches among first steps toward pushing computation closer to end-users in order reduce cost, latency, overall resource utilization. This article presents "compute-less" paradigm, builds on top of well known edge paradigm through a set communication optimization mechanisms (e.g.,, in-network task clustering aggregation, reuse)....