Hassan Mahdikhani

ORCID: 0000-0003-1306-0304
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Security in Wireless Sensor Networks
  • Data Management and Algorithms
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Steganography and Watermarking Techniques
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • Biometric Identification and Security
  • Data-Driven Disease Surveillance
  • User Authentication and Security Systems
  • Caching and Content Delivery

University of New Brunswick
2017-2023

ORCID
2019

Iran University of Science and Technology
2012

The Internet of Things (IoT) is an emerging technology that enables the development low-cost and energy-efficient IoT devices across various solutions from smart cities to healthcare domains. With such a complex heterogeneous instance their applications, numerous challenges arise in both device management security concerns. Thus, it essential develop intelligent identification/profiling intrusion detection components are tailored applications. Such systems require realistic multidimensional...

10.1109/pst55820.2022.9851966 article EN 2022-08-22

The advance of Internet-of-Things (IoT) techniques has promoted an increasing number organizations to explore more mission-critical solutions. However, the response latency, bandwidth usage, and reliability are still challenging issues in traditional IoT. To tackle these challenges, fog-based IoT become popular range query is one most frequently used operations IoT, where given a query, fog node will return aggregated data from devices user. Because nodes not fully trusted, there desire...

10.1109/jiot.2020.2977253 article EN IEEE Internet of Things Journal 2020-02-28

The proliferation of heterogeneous Internet things (IoT) devices connected to the produces several operational and security challenges, such as monitoring, detecting, recognizing millions interconnected IoT devices. Network system administrators must correctly identify which are functional, need updates, or vulnerable specific attacks. profiling is an emerging technique validate devices’ behaviour isolate suspected within network for further monitoring. This article provides a comprehensive...

10.1145/3539736 article EN ACM Transactions on Internet of Things 2022-05-31

Blockchain technologies have recently received considerable attention, partly due to the success of cryptocurrency applications such as Bitcoin and Ethereum. As adoption blockchain by various sectors increases, there is a demand for tools that enable regulatory enforcement, which include monitoring, examining ensuring compliance data stored systems, all in privacy preserving way. Current solutions store transactions append-only immutable fashion without any indexing, contributes limited...

10.1109/blockchain.2019.00061 article EN 2019-07-01

The fog computing architectural model has recently seen advances with respect to bandwidth and latency issues. However, since devices are deployed at the network edge not fully trustable, there still security privacy challenges. In this article, aiming improving both communication efficiency protection, we propose a new efficient privacy-preserving range query scheme in fog-based Internet of Things (IoT). We, first, introduce decomposition technique efficiently interpret given [L, U], where...

10.1109/jiot.2020.3029472 article EN IEEE Internet of Things Journal 2020-10-07

Fog computing-enhanced IoT (Internet of Things), as it can provide better services at the network edge, has received considerable attention in recent years. In this paper, for new paradigm, we present a privacy-preserving multi dot-product query scheme, called PMQ, which enables control center to gain k results simultaneously one query. Specifically, proposed PMQ BGN homomorphic encryption is employed encrypting request and response, fog device deployed edge assist privacy- preserving...

10.1109/glocom.2017.8253982 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

Industrial Internet of Things (IIoT) is gradually changing the mode production, in which users can directly access data from smart devices through network instead collecting where are deployed. However, these usually transmitted via an insecure channel, raises several security concerns. To solve issues, many authentication and key agreement schemes have been proposed. Nevertheless, majority said only achieve between one user device. When a wants to multiple simultaneously, he has initiate...

10.1109/jsyst.2022.3209868 article EN IEEE Systems Journal 2022-10-04

Fog-enhanced Internet of Things (IoT), which can locally process data at the network edge for better response to IoT field and pre-computation further efficient cloud side, has attracted substantial studies in recent years. However, as fog device is not fully trustable edge, more advancement efficiency privacy should be considered persuade enterprises migrate environments. With this mind, paper, we propose a new communication-efficient privacy-preserving range query fog-enhanced IoT. The...

10.1109/icc40277.2020.9148813 article EN 2020-06-01

Fog-enhanced IoT (Internet of Things) is a fast-growing technology in which many firms and industries are currently investing to develop their own real-time low latency scenarios. Compared with the traditional IoT, fog-enhanced can offer higher level efficiency stronger security by providing local data pre-processing, filtering, forwarding mechanisms. However, faces some privacy challenges, since fog nodes deployed at network edge may not be fully trustable. In this paper, we present new...

10.1109/access.2019.2961270 article EN cc-by IEEE Access 2019-01-01
Coming Soon ...