- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Security in Wireless Sensor Networks
- Data Management and Algorithms
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Steganography and Watermarking Techniques
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- Biometric Identification and Security
- Data-Driven Disease Surveillance
- User Authentication and Security Systems
- Caching and Content Delivery
University of New Brunswick
2017-2023
ORCID
2019
Iran University of Science and Technology
2012
The Internet of Things (IoT) is an emerging technology that enables the development low-cost and energy-efficient IoT devices across various solutions from smart cities to healthcare domains. With such a complex heterogeneous instance their applications, numerous challenges arise in both device management security concerns. Thus, it essential develop intelligent identification/profiling intrusion detection components are tailored applications. Such systems require realistic multidimensional...
The advance of Internet-of-Things (IoT) techniques has promoted an increasing number organizations to explore more mission-critical solutions. However, the response latency, bandwidth usage, and reliability are still challenging issues in traditional IoT. To tackle these challenges, fog-based IoT become popular range query is one most frequently used operations IoT, where given a query, fog node will return aggregated data from devices user. Because nodes not fully trusted, there desire...
The proliferation of heterogeneous Internet things (IoT) devices connected to the produces several operational and security challenges, such as monitoring, detecting, recognizing millions interconnected IoT devices. Network system administrators must correctly identify which are functional, need updates, or vulnerable specific attacks. profiling is an emerging technique validate devices’ behaviour isolate suspected within network for further monitoring. This article provides a comprehensive...
Blockchain technologies have recently received considerable attention, partly due to the success of cryptocurrency applications such as Bitcoin and Ethereum. As adoption blockchain by various sectors increases, there is a demand for tools that enable regulatory enforcement, which include monitoring, examining ensuring compliance data stored systems, all in privacy preserving way. Current solutions store transactions append-only immutable fashion without any indexing, contributes limited...
The fog computing architectural model has recently seen advances with respect to bandwidth and latency issues. However, since devices are deployed at the network edge not fully trustable, there still security privacy challenges. In this article, aiming improving both communication efficiency protection, we propose a new efficient privacy-preserving range query scheme in fog-based Internet of Things (IoT). We, first, introduce decomposition technique efficiently interpret given [L, U], where...
Fog computing-enhanced IoT (Internet of Things), as it can provide better services at the network edge, has received considerable attention in recent years. In this paper, for new paradigm, we present a privacy-preserving multi dot-product query scheme, called PMQ, which enables control center to gain k results simultaneously one query. Specifically, proposed PMQ BGN homomorphic encryption is employed encrypting request and response, fog device deployed edge assist privacy- preserving...
Industrial Internet of Things (IIoT) is gradually changing the mode production, in which users can directly access data from smart devices through network instead collecting where are deployed. However, these usually transmitted via an insecure channel, raises several security concerns. To solve issues, many authentication and key agreement schemes have been proposed. Nevertheless, majority said only achieve between one user device. When a wants to multiple simultaneously, he has initiate...
Fog-enhanced Internet of Things (IoT), which can locally process data at the network edge for better response to IoT field and pre-computation further efficient cloud side, has attracted substantial studies in recent years. However, as fog device is not fully trustable edge, more advancement efficiency privacy should be considered persuade enterprises migrate environments. With this mind, paper, we propose a new communication-efficient privacy-preserving range query fog-enhanced IoT. The...
Fog-enhanced IoT (Internet of Things) is a fast-growing technology in which many firms and industries are currently investing to develop their own real-time low latency scenarios. Compared with the traditional IoT, fog-enhanced can offer higher level efficiency stronger security by providing local data pre-processing, filtering, forwarding mechanisms. However, faces some privacy challenges, since fog nodes deployed at network edge may not be fully trustable. In this paper, we present new...