Muhammad Taqi Raza

ORCID: 0000-0003-1245-1151
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Energy Efficient Wireless Sensor Networks
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Opportunistic and Delay-Tolerant Networks
  • IoT Networks and Protocols
  • Context-Aware Activity Recognition Systems
  • Wireless Body Area Networks
  • Interconnection Networks and Systems
  • Smart Grid Security and Resilience
  • Security and Verification in Computing
  • Advanced Authentication Protocols Security
  • IPv6, Mobility, Handover, Networks, Security
  • Security in Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Network Packet Processing and Optimization
  • Human-Automation Interaction and Safety
  • Spam and Phishing Detection
  • Real-Time Systems Scheduling
  • Advanced Wireless Communication Technologies
  • Distributed systems and fault tolerance

University of Massachusetts Amherst
2023-2025

University of Arizona
2020-2022

University of California, Los Angeles
2017-2019

UCLA Health
2017

LG (South Korea)
2012

Electronics and Telecommunications Research Institute
2009-2010

Ajou University
2008-2009

University of Maryland, College Park
1996

Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as baseline for link layer technology, implies low rate power consumption with periodic sleep wakeups without requiring them incorporate complex hardware. Also enabling nodes IPv6 ensures that can be accessed anytime anywhere from world. Several existing...

10.3390/s90705844 article EN cc-by Sensors 2009-07-23

LTE Network Function Virtualization (LTE-NFV) scales user services in a low cost fashion by transforming the centralized legacy Core architecture to distributed architecture. This makes multiple instances of Functions (NFs) and virtualizes them on commodity data-center network. The functionality LTE-NFV breaks however, since NF connected via unreliable IP links delay execution critical events. failure time-critical events results users' quality service degradation temporary unavailability....

10.1109/icnp.2017.8117554 article EN 2017-10-01

Anti-malware engines are the first line of defense against malicious software. While widely used, feature engineering-based anti-malware vulnerable to unseen (zero-day) attacks. Recently, deep learning-based static detectors have achieved success in identifying attacks without requiring engineering and dynamic analysis. However, these susceptible malware variants with slight perturbations, known as adversarial examples. Generating effective examples is useful reveal vulnerabilities such...

10.48550/arxiv.2012.07994 preprint EN cc-by arXiv (Cornell University) 2020-01-01

Public cloud offers economy of scale to adapt workload changes in an autonomic manner, maximizing the use resources. Through network function virtualization (NFV), operators can move LTE core cloud; hence removing their dependency on carrier-grade functions. Recent research efforts discuss performance, latency, and fault tolerance NFV, largely ignoring security aspects. In this paper, we discover new vulnerabilities that NFV face today with no standard solutions address them. These span at...

10.1109/tifs.2019.2908800 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2019-04-01

This paper proposes an energy aware and bandwidth efficient mobility support architecture which handles of 6LoWPAN devices, such that the communication between it its corresponding nodes remain undisrupted. As devices are resource constrained enabling in these with help conventional Host Based protocols like MIPv6 is not suitable. Moreover, may be possible many scenarios Mobile Node (MN) moves far from Gateway (GW), while communicating it. In this case MN has to increase transmission power,...

10.1109/milcom.2008.4753365 article EN 2008-11-01

An extremely reliable source to sink communication is required for most of the contemporary WSN applications especially pertaining military, healthcare and disaster-recovery. However, due their intrinsic energy, bandwidth computational constraints, Wireless Sensor Networks (WSNs) encounter several challenges in communication. In this paper, we present a novel topology that uses hotlines between sensor gateways boost reliability end-to-end transmissions. This efficient routing alternative...

10.3390/s100301619 article EN cc-by Sensors 2010-03-01

Network Function Virtualization (NFV) migrates the carrier-grade LTE Evolved Packet Core (EPC) that runs on commodity boxes to public cloud. In new virtualized environment, EPC must offer high availability its mobile users upon failures. Achieving service is challenging because failover procedure keep latency-sensitive control-plane procedures intact during Through our empirical study, we show existing recovery mechanisms cloud and standardized solutions are coarse-grained, thus unable...

10.1109/tnsm.2022.3182008 article EN publisher-specific-oa IEEE Transactions on Network and Service Management 2022-06-10

Network functions virtualization (NFV) allows service providers to deliver new services their customers more quickly by adopting software-centric network implementation over commercial, off-the-shelf hardwares. This NFV-based approach cannot use dedicated mechanisms implemented custom built boxes reduce latencies and tolerate faults. We present a case study of IP multimedia subsystem (IMS), which is the most complex NFV instance, requires extremely low end-to-end latency (40 msec), demands...

10.1109/jsac.2018.2869965 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2018-09-12

Network Functions Virtualization (NFV) allows service providers to deliver new services their customers more quickly by adopting software centric network functions implementation over commercial, off-the-shelf hardwares. IP Multimedia Subsystem (IMS) which is one of the most complex NFV instances requires extremely low end-to-end latency (up 40 msec), and demands system availability as high five nines. We discover that highly modular 3GPP standardized IMS virtualized platform (1) incurs...

10.23919/cnsm.2017.8256015 article EN 2017-11-01

Service discovery in Ubiquitous Sensor Networks has been targeted mostly for services available within certain proximity, but the service availability only close vicinity is no longer feasible pervasive and ubiquitous era. In order to address ubiquity discovery, we have proposed a framework that makes use of Electronic Number Mapping (ENUM) protocol. Our network architecture consists sensor nodes associated with few relatively powerful called master nodes. Only IPv6 enabled Low power...

10.1109/wcnc.2010.5506568 article EN 2010-04-01

IMS (IP Multimedia Subsystem) is an emerging architectural framework that delivers a number of multimedia services -- ranging from voice/video over LTE, interactive gaming and many more in operational LTE network. Network operators are embracing cloud-based to meet increasing traffic demand. They can easily cost-efficiently implement applications while ensuring superior end-user experiences through always-on real-time engagement. In this paper, we reveal cannot provide session-level...

10.1145/3132062.3132064 article EN 2017-11-15

The explosion of mobile applications and phenomenal adoption connectivity by end users make all-IP based 4G LTE as an ideal choice for providing Internet access on the go. core network which handles device control-plane data-plane traffic becomes susceptible to resource constraints. To ease these constraints, Network Function Virtualization (NFV) provides high scalability flexibility enabling dynamic allocation resources. NFV achieves this decomposing Functions (NF) into multiple instances....

10.1109/tnsm.2021.3103160 article EN IEEE Transactions on Network and Service Management 2021-08-09

Target tracking is one of the key applications Wireless Sensor Networks (WSNs) that forms basis for numerous other applications. The overall procedures target involve detection, localization, and tracking. Because WSNs' resource constraints (especially energy), it highly desired should be done by involving as less number sensor nodes possible. Due to uncertain behavior resulting mobility patterns, this goal becomes harder achieve without predicting future locations target. presence a...

10.1093/ietcom/e91-b.11.3524 article EN IEICE Transactions on Communications 2008-11-01

Web Portals function as a single point of access to information on the World Wide (WWW). The web portal always contacts portal's gateway for flow that causes network traffic over Internet. Moreover, it provides real time/dynamic stored information, but not time information. This inherent functionality portals limits their role resource constrained digital devices in Ubiquitous era (U-era). paper presents framework U-era. We have introduced concept Local Regions proposed framework, so local...

10.3390/s90705201 article EN cc-by Sensors 2009-07-02

Target tracking is one of the key applications Wireless Sensor Networks (WSNs) that forms basis for numerous other applications. Real situations in tracking, such as an unexpected change mobile event's direction, failure event detection, or transmission error message may result into erroneous information. Thus, order to prevent and handle errors effectively, it required algorithm must incorporate avoidance correction phase. In this paper we present Dead Reckoning (DR) based target protocol....

10.1145/1851340.1851342 article EN ACM SIGBED Review 2009-10-01

Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access these without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that radio communication becomes side channel precisely infer user's in real-time. The key idea lies observing physical MAC layer interactions over time reveal application's behavior. receives application requests network assign...

10.48550/arxiv.2407.07361 preprint EN arXiv (Cornell University) 2024-07-10

research-article Open Access Share on On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact Authors: Muhammad Taqi Raza The University of Arizona, United States America AmericaView Profile , Yunqi Guo UCLA UCLAView Songwu Lu Fatima Anwar UMASS Amherst AmherstView Authors Info & Claims ACSAC '21: Annual Computer Security Applications ConferenceDecember 2021 Pages 877–886https://doi.org/10.1145/3485832.3485833Published:06 December 2021Publication History...

10.1145/3485832.3485833 article EN Annual Computer Security Applications Conference 2021-12-06

Web Portal functions as a single point of access to information on the World Wide (WWW). The portal always contacts portalpsilas gateway for flow that causes network traffic over Internet. Moreover it provides real time/dynamic stored information, but not time information. This inherit functionality limits its role resource constrained digital devices in ubiquitous era (U-era). paper presents framework web U-era. We have introduced concept locals proposed framework, so local queries could be...

10.1109/cnsr.2009.25 article EN 2009-05-01

Network function virtualization (NFV) of IP Multimedia Subsystem (IMS) pose promise to service increasing multimedia traffic demand. In this paper, we show that virtualized IMS (vIMS) is unable provide session-level resilience under faults and becomes the bottleneck high availability. We propose a design fault-tolerance for vIMS operations. control-plane, our system decomposes single operation into different atomic actions, partition these actions critical non-critical actions. Only are then...

10.1109/jsac.2020.2999686 article EN IEEE Journal on Selected Areas in Communications 2020-06-05

Mobile Internet is becoming the norm. With more personalized mobile devices in hand, many services choose to offer alternative, usually convenient, approaches authenticating and delivering content between users service providers. One main option use SMS (i.e., short messaging service). Such carrier-grade text has been widely used assist versatile services, including social networking, banking, name a few. Though can be spoofed via certain providers which cooperated with carriers, such...

10.48550/arxiv.1510.08531 preprint EN other-oa arXiv (Cornell University) 2015-01-01
Coming Soon ...