Samad Rostampour

ORCID: 0000-0003-0183-5993
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • RFID technology advancements
  • User Authentication and Security Systems
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Smart Grid Security and Resilience
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Consumer Retail Behavior Studies
  • Electrostatic Discharge in Electronics
  • Advanced Manufacturing and Logistics Optimization
  • Internet Traffic Analysis and Secure E-voting
  • Green IT and Sustainability
  • Security in Wireless Sensor Networks
  • Context-Aware Activity Recognition Systems
  • Network Packet Processing and Optimization
  • Innovative Approaches in Technology and Social Development
  • DNA and Biological Computing
  • Supercapacitor Materials and Fabrication
  • Urban and Freight Transport Logistics
  • Integrated Circuits and Semiconductor Failure Analysis
  • Retinal Imaging and Analysis
  • Chaos-based Image/Signal Encryption
  • Indoor and Outdoor Localization Technologies

Vanier College
2019-2025

Université du Québec à Montréal
2018-2025

Islamic Azad University, Ahvaz Branch
2011-2020

Islamic Azad University, Science and Research Branch
2014-2017

Islamic Azad University, Tehran
2011

In today's competitive landscape, manufacturing companies must embrace digital transformation. This study asserts that integrating Internet of Things (IoT) technologies for the deployment real-time location systems (RTLS) is crucial better monitoring critical assets. Despite challenge selecting right technology specific needs from a wide range indoor RTLS options, this provides solution to assist in exploring and implementing IoT their needs. The current academic literature has not...

10.3390/s24051711 article EN cc-by Sensors 2024-03-06

With the exponential growth of connected Internet Things (IoT) devices around world, security protection and privacy preservation have risen to forefront design development innovative systems services. For low-value IoT that identify track billion goods in various industries—such as radio-frequency identification (RFID) tags—this involves multiple challenges very constrained environments. aim low-cost, low-complexity infrastructure while enabling robust authentication protocols with reduced...

10.1109/jiot.2022.3184293 article EN IEEE Internet of Things Journal 2022-06-20

With the exponential increase of Internet things (IoT) connected devices, important security risks are raised as any device could be used an attack channel. This preoccupation is particularly with devices featuring limited processing power and memory capabilities for purposes. In line this idea, Xu et al. (2018) proposed a lightweight Radio Frequency Identification (RFID) mutual authentication protocol based on Physical Unclonable Function (PUF)—ensuring tag-reader verification preventing...

10.3390/s18124444 article EN cc-by Sensors 2018-12-15

The widespread adoption of IoT devices has made the production low-cost systems a priority. Since construction costs are generally directly related to complexity security methods, researchers exploring methods that provide acceptable with minimal hardware complexity. One such method is use permutation functions in ultra-lightweight authentication protocols employ simple operators as XOR and Shift. This paper demonstrates critical importance internal structure function ensuring system...

10.1038/s41598-025-01041-y article EN cc-by-nc-nd Scientific Reports 2025-05-12

A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and between utility companies customers. Although most involved in such grids have reached maturity, meters—as connected devices—introduce new security challenges. To overcome this significant obstacle modernization, safeguarding privacy has emerged as a paramount concern. In paper, we begin by evaluating levels recently proposed authentication methods for meters. Subsequently,...

10.3390/fi16010009 article EN cc-by Future Internet 2023-12-28

Abstract Radio frequency identification grouping proof authentication protocol is an approach to identify a set of tagged objects simultaneously. Over the past decade, several protocols in this domain have been presented, but each was weak with flawed attributes. It essential that be both scalable and affordable, considering its use for applications large quantities tags high level security. In paper, we present secure by utilizing encryption method called authenticated encryption. This...

10.1002/sec.1718 article EN Security and Communication Networks 2016-12-01

Summary Radio Frequency Identification (RFID)‐based parking management systems provide facilities to control lot within easy access and secure inspection. Chen Chong have presented a scheme prevent car thefts for systems, which is based on EPC C1‐G2 RFID standard. They claimed that their protocol resistant against well‐known attacks. In this paper, we prove Chong's not secret disclosure impersonation Therefore, in system, may be stolen without having valid tag. also show the proposed attack...

10.1002/dac.3313 article EN International Journal of Communication Systems 2017-03-24

Radio Frequency Identification (RFID) is a method for automated identifying objects. One of the problems this technology its security. RFID tags include resource limitation; therefore, system designers cannot implement complex circuits to enhance their Usually symmetric and asymmetric encryption methods increase resources cost. Because it believed increasing security inconsistent with simplicity, researchers mostly use one-way methods. In paper, we propose mutual authentication protocol...

10.5815/ijmecs.2014.01.02 article EN International Journal of Modern Education and Computer Science 2014-01-08

In this paper, we propose a new design with high-level security and low-cost implementation for different network topologies. Achieving both factors at the same time is challenging work experts, especially when they want to apply defense in depth strategy various components of their networks. Offered scenario has been done one most visited web sites an Iranian organization more than 15,000 concurrent users that all them reliably smoothly were served. Also, used provide sufficient level...

10.1109/scored.2011.6148781 article EN 2011-12-01

Au cours des dernières années, la poursuite d’une stratégie numérique entreprises dans le secteur de vente au détail et, plus récemment, l’utilisation croissante technologies l’Internet Objets (IdO), permettent l’élimination frontières entre commerce en ligne et les points physiques. Grâce aux IdO, comme ressources informationnelles connectives uniques, développent nouvelles capacités décisionnelles. Toutefois, ces profitent surtout grandes chaînes magasins vs petites pour qui projets...

10.3917/maorg.045.0049 article FR Marché et organisations 2022-10-12

10.5815/ijmecs.2014.02.01 article EN International Journal of Modern Education and Computer Science 2014-02-08

Abstract Over the last decade, technological advances in smart grids have permitted modernization of legacy electricity networks. As Internet Things(IoT)-based are becoming an efficient response to managing changing electric demand, heterogeneous network equipment required make these Cyber-Physical Systems a reality poses some security threats. This paper proposes novel mutual authentication and key agreement scheme ensure communications protect users' privacy grid applications. In proposed...

10.21203/rs.3.rs-2738981/v1 preprint EN cc-by Research Square (Research Square) 2023-03-29

Abstract Over the last decade, technological advances in smart grids have permitted modernization of legacy electricity networks. As Internet Things(IoT)-based are becoming an efficient response to managing changing electric demand, heterogeneous network equipment required make these Cyber-Physical Systems a reality poses some security threats. This paper proposes novel mutual authentication and key agreement scheme ensure communications protect users’ privacy grid applications. In proposed...

10.21203/rs.3.rs-2802756/v1 preprint EN cc-by Research Square (Research Square) 2023-04-14

In this panel talk, we share research insights on the development of a smart bus shelter designed for next generation cities. such context, one first requirements to automatically interact with users is detect them inside-out relative precision - according envisioned use case. Hence selecting right Internet Things (IoT) technologies critical, convert real live data capture (citizens/user's behaviors) into actionable information. Various technological options are tested, including WiFi, BLE...

10.1145/3364544.3371503 article EN 2019-11-13

This article shows a new method to detect blood vessels in the retina by digital images. Retinal vessel segmentation is important for detection of side effect diabetic disease, because diabetes can form capillaries which are very brittle. The research has been done two phases: preprocessing and processing. Preprocessing phase consists apply filter that produces suitable output. It dark color on white background make good difference between background. complexity low extra images eliminated....

10.1117/12.913411 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2011-09-09
Coming Soon ...