shafiqul abidin - Academia.edu (original) (raw)

Papers by shafiqul abidin

Research paper thumbnail of Withdrawn: Iot-Harpseca: A Secure Design and Development System of Roadmap for Devices and Technologies in Iot Space

Microprocessors and Microsystems, 2021

Abstract As the Internet of Services (IoT) is emerging in all ways it is essential to make the ro... more Abstract As the Internet of Services (IoT) is emerging in all ways it is essential to make the road map for securing in all ways. The framework was designed in the novel IoT Hardware Platform Security Advisor (IoT-HarPsecA) where the framework was evaluated. Based on this framework it is designed in all the ways and implemented in hardware as well as software. But this proposed work is an extension to that by implementing more security by including the concept of a digital signature. By implementing the digital signature concept it is aware of the intermediate intruders. If they modified the data or messages which are sent then the signature will be invalidated suggesting that the message is subjected to modification. Thus the security is maintained. There are many available schemes. One among them is the RSA (Rivest–Shamir–Adleman) algorithm. By implementing the concepts like key generation, key distribution the security was adopted.

Research paper thumbnail of Face Recognition using Image Gradient Regression Approach

This paper represents a robust face recognition system. The proposed face recognition system cons... more This paper represents a robust face recognition system. The proposed face recognition system consist is useful in forming an effective face recognition. Proposed methodovercomes the problem of multi collinearity and also give good results in case of small sample size (SSS) problem . In Image Gradient Regression Approach (IGRA), first in preprocessing stage image is transformed by normalizing gradient of the image. Then image is converted into zero average data matrix. After preprocessing ridge regression is executed on projected data and identity is determined by calculating maximum correlation coefficient. Experiments carried out on faces94 and Pie facial databases reveal that the proposed framework outperforms the state-of-theart methods and demonstrates promising abilities against face recognition.

Research paper thumbnail of Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks

Data Science and Management

Research paper thumbnail of Big Data and Its Role in Cybersecurity

Advances in intelligent systems and computing, 2023

Research paper thumbnail of Grey Wolf Based Portfolio Optimization Model Optimizing Sharpe Ratio in Bombay Stock Exchange

Research paper thumbnail of Safe Electronic Healthcare System with Innovative Blockchain Technology

Current Overview on Disease and Health Research Vol. 8, Dec 31, 2022

Research paper thumbnail of Wireless Communication Without the Need for Pre-Shared Secrets is Consummate Via the Use of Spread Spectrum Technology

Journal of nuclear energy science & power generation technology, 2021

Research paper thumbnail of Authentication of DSS and Secrecy

The Diffie-Hellman key algorithm was the first proposed public key algorithm by which two parties... more The Diffie-Hellman key algorithm was the first proposed public key algorithm by which two parties can communicate with each other without having any prior knowledge of each other over an insecure communication channel. This algorithm was first published by Whitfield Diffie and Martin Hellman in 1976. It is helpful in a variety of authenticated protocols. Further, it is also found suitable in transport layers. After his investigation this protocol was integrated to digital signature algorithm. In this paper we are presenting the verification of digital signature standard with the help of Diffie-Hellman key exchange protocol by using two randomly selected integers. We also tried to show that the use of protocol can provide the secrecy and freshness of key due to continuous selection of random numbers.

Research paper thumbnail of Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)

Materials Today: Proceedings, 2021

Quantum cryptography concentrates on the solution of cryptography that is imperishable due to the... more Quantum cryptography concentrates on the solution of cryptography that is imperishable due to the reason of fortification of secrecy which is applied to the public key distribution of quantum. It is a very prominent technology in which 2 beings can securely communicate along with the sights belongings to quantum physics. However, on basis of classical level cryptography, the used encodes were bits for data. As quantum utilizes the photons or particles polarize ones for encoding the quantized property. This is presented in qubits as a unit. Transmissions depend directly on the inalienable mechanic’s law of quantum for security. This paper includes detailed insight into the three most used and appreciated quantum cryptography applications that are providing its domain-wide service in the field of mobile cloud computing. These services are (it) DARPA Network, (ii) IPSEC implementation, and (iii) the twisted light HD implementation along with quantum elements, key distribution, and protocols

Research paper thumbnail of EEG Processing for Computer-Aided Seizure Detection Using Artificial Neural Networks

Emerging Technologies in Data Mining and Information Security, 2021

Research paper thumbnail of Identification of Disease based on Symptoms by Employing ML

2022 International Conference on Inventive Computation Technologies (ICICT)

Research paper thumbnail of Development And Organize Of Wireless Sensor Network In Home Management Using Iot

Int. J. of Aquatic Science, Jun 1, 2021

This research has shown that the Internet of Things (IoT) used to evaluate and assess normal hous... more This research has shown that the Internet of Things (IoT) used to evaluate and assess normal household circumstances using a circuit of relatively inexpensive sensors is effectively implemented. The linking methods are given for data analysis procedure that generates monitoring by intelligent sensing devices communication through the Network. This article provides easy and versatile home management and surveillance system with just a communication protocol mote and IP communication for controlling utilizing the mobile phone app. Technologies along with ambient temperature, moisture sensors, ammeter-based sensors, and air pressure sensors are combined also with recommended house automation models to ensure the efficacy of the whole system.

Research paper thumbnail of Contextual Cluster-Based Glow-Worm Swarm Optimization (GSO) Coupled Wireless Sensor Networks for Smart Cities

Sensors

The cluster technique involves the creation of clusters and the selection of a cluster head (CH),... more The cluster technique involves the creation of clusters and the selection of a cluster head (CH), which connects sensor nodes, known as cluster members (CM), to the CH. The CH receives data from the CM and collects data from sensor nodes, removing unnecessary data to conserve energy. It compresses the data and transmits them to base stations through multi-hop to reduce network load. Since CMs only communicate with their CH and have a limited range, they avoid redundant information. However, the CH’s routing, compression, and aggregation functions consume power quickly compared to other protocols, like TPGF, LQEAR, MPRM, and P-LQCLR. To address energy usage in wireless sensor networks (WSNs), heterogeneous high-power nodes (HPN) are used to balance energy consumption. CHs close to the base station require effective algorithms for improvement. The cluster-based glow-worm optimization technique utilizes random clustering, distributed cluster leader selection, and link-based routing. Th...

Research paper thumbnail of Smart Health Monitoring System with Wireless Networks to Detect Kidney Diseases

Computational Intelligence and Neuroscience

It is essential to change health services from a hospital to a patient-centric platform since med... more It is essential to change health services from a hospital to a patient-centric platform since medical costs are steadily growing and new illnesses are emerging on a worldwide scale. This study provides an optimal decision support system based on the cloud and Internet of Things (IoT) for identifying Chronic Kidney Disease (CKD) to provide patients with efficient remote healthcare services. To identify the presence of medical data for CKD, the proposed technique uses an algorithm named Improved Simulated Annealing-Root Mean Square -Logistic Regression (ISA-RMS-LR). The four subprocesses that make up the proposed model are a collection of data, preprocessing, feature selection, and classification. The incorporation of Simulated Annealing (SA) during Feature Selection (FS) enhances the ISA-RMS-LR model’s classifier outputs. Using the CKD benchmark dataset, the ISA-RMS-LR model’s efficacy has been verified. According to the experimental findings, the proposed ISA-RMS-LR model effectivel...

Research paper thumbnail of Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network

Transactions on Emerging Telecommunications Technologies

Research paper thumbnail of On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN

Advances in Computer, Communication and Computational Sciences

A Wireless sensor network (WSN) comprises several sensor nodes such as magnetic, thermal, and inf... more A Wireless sensor network (WSN) comprises several sensor nodes such as magnetic, thermal, and infrared, and the radar is set up in a particular geographical area. The primary aim of sensor network is to transmit reliable, secure data from one node to another node, node to base station and vice versa and from base station to all nodes in a network and to conserve the energy of sensor nodes. On the other hand, there are several restrictions such as large energy consumption, limited storage/memory and processing ability, higher latency, and insufficient resources. The related security issues in wireless sensor network are authenticity, confidentiality, robustness, integrity, and data freshness. The sensor nodes are susceptible to several attacks such as DOS, Sybil, flood, black hole, selective forwarding which results in the leakage of sensitive and valuable information. It is therefore necessary to provide security against these critical attacks in the network. Wireless sensor network were earlier used for military applications with the objective of monitoring friendly and opposing forces, battlefield surveillance, detection of attacks, but today Wireless Networking have a huge number of applications-environmental, healthcare, home, industrial, commercial and are still counting. This paper is an extensive review of the security requirements, attacks that are to be avoided and resolved for achieving a secure network connection. This paper also emphasizes various limitations and defense strategies to prevent threats and attacks. The issues of applications of wireless sensor network for smooth and reliable transmissions are also discussed. The sensor networks are popular for mission-critical-tasks and security is immensely required for such hostile environment employed networks.

Research paper thumbnail of Classifying Time-Bound Hierarchical Key Assignment Schemes

Advances in Computer, Communication and Computational Sciences, 2020

A time-bound hierarchical key assignment scheme (TBHKAS) ensures time-restricted access to the hi... more A time-bound hierarchical key assignment scheme (TBHKAS) ensures time-restricted access to the hierarchical data. There is a large number of such schemes are proposed in the literature. Crampton et al. studied the existing hierarchical key assignment schemes in detail and classify them into generic schemes on the basis of storage and computational requirements. Such generic classification helps the implementers and researchers working in this area in identifying a suitable scheme for their work. This work studies the TBHKAS and classifies them with the same spirit. As best of our knowledge, the proposed classification captures every existing TBHKAS in the literature. Furthermore, the proposed schemes are compared and analyzed in detail.

Research paper thumbnail of A Review Report on Cryptovirology and Cryptography

Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive... more Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive eavesdropper. Public key infrastructures defend against an active adversary that mounts a man-in-the-middle attack. Digital signature algorithms defend against a forger. Ecash systems defend against a counterfeiter and a double-spender. Pseudorandom bit generators defend against a next-bit predictor, and so on. Crypto virology extends beyond finding protocol failures and design vulnerabilities. It is a forward engineering discipline that can be used for attacking rather than defending.

Research paper thumbnail of AN EFFICIENT BLOCKCHAIN-BASED IIoT SYSTEM FORTRANSPARENCY AND CONCURENCY MECHANISM

Industrial Internet of Things (IIoT) performs an indispensable role intended for Industries. Now-... more Industrial Internet of Things (IIoT) performs an indispensable role intended for Industries. Now-a-days all industries like banking (ATM’s, sensor based transaction devices), hospitals (transaction Machines) are using IIOT (Industrial Internet of Things which means small devices communicate with centralized servers to exchange data) devices to communicate with their servers. This devices will have internet connection to communicate with industries servers and this devices will have limited battery power so heavy cryptographic algorithms cannot be implemented to provide/improve security. We are using Blackchain based algorithms such as POW (proof of work) and credit consensus. Entire Blockchain technique cannot be implement as this devices are small and run on battery so author is using POW and Credit Consensus concept from Blockchain technique. But it having more processing and storage cost. To overcome from this problem, in this document we introducing two techniques. Those are dat...

Research paper thumbnail of AI Revolution and Swarm Intelligence

In the modern era of information technology, artificial intelligence is spreading its scope merel... more In the modern era of information technology, artificial intelligence is spreading its scope merely in various area . So swarm intelligence is prominent concept comes under the category of artificial intelligence [1]. The term Swarm intelligence was first given by Gerardo Beni and Jing Wang in 1989. It was developed from Cellular Robotic System point of view. It is a concept of collective behavior of SelfOrganised, Decentralised system , natural or artificial. So basically this paper deals with the way in which various natural organisms behave whenever they are in group and their, this behavior provides us with the inspiration of solving many computational problems. So this paper on SI briefly describes the various algorithms, fall under the category of SI and various applications in which these algorithms can be fruitful. Also it clearly tells about the various future related works that can lead to a new revolution in the field of AI. Keywords— ACO Ant Colony Optimization, AI, Artif...

Research paper thumbnail of Withdrawn: Iot-Harpseca: A Secure Design and Development System of Roadmap for Devices and Technologies in Iot Space

Microprocessors and Microsystems, 2021

Abstract As the Internet of Services (IoT) is emerging in all ways it is essential to make the ro... more Abstract As the Internet of Services (IoT) is emerging in all ways it is essential to make the road map for securing in all ways. The framework was designed in the novel IoT Hardware Platform Security Advisor (IoT-HarPsecA) where the framework was evaluated. Based on this framework it is designed in all the ways and implemented in hardware as well as software. But this proposed work is an extension to that by implementing more security by including the concept of a digital signature. By implementing the digital signature concept it is aware of the intermediate intruders. If they modified the data or messages which are sent then the signature will be invalidated suggesting that the message is subjected to modification. Thus the security is maintained. There are many available schemes. One among them is the RSA (Rivest–Shamir–Adleman) algorithm. By implementing the concepts like key generation, key distribution the security was adopted.

Research paper thumbnail of Face Recognition using Image Gradient Regression Approach

This paper represents a robust face recognition system. The proposed face recognition system cons... more This paper represents a robust face recognition system. The proposed face recognition system consist is useful in forming an effective face recognition. Proposed methodovercomes the problem of multi collinearity and also give good results in case of small sample size (SSS) problem . In Image Gradient Regression Approach (IGRA), first in preprocessing stage image is transformed by normalizing gradient of the image. Then image is converted into zero average data matrix. After preprocessing ridge regression is executed on projected data and identity is determined by calculating maximum correlation coefficient. Experiments carried out on faces94 and Pie facial databases reveal that the proposed framework outperforms the state-of-theart methods and demonstrates promising abilities against face recognition.

Research paper thumbnail of Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks

Data Science and Management

Research paper thumbnail of Big Data and Its Role in Cybersecurity

Advances in intelligent systems and computing, 2023

Research paper thumbnail of Grey Wolf Based Portfolio Optimization Model Optimizing Sharpe Ratio in Bombay Stock Exchange

Research paper thumbnail of Safe Electronic Healthcare System with Innovative Blockchain Technology

Current Overview on Disease and Health Research Vol. 8, Dec 31, 2022

Research paper thumbnail of Wireless Communication Without the Need for Pre-Shared Secrets is Consummate Via the Use of Spread Spectrum Technology

Journal of nuclear energy science & power generation technology, 2021

Research paper thumbnail of Authentication of DSS and Secrecy

The Diffie-Hellman key algorithm was the first proposed public key algorithm by which two parties... more The Diffie-Hellman key algorithm was the first proposed public key algorithm by which two parties can communicate with each other without having any prior knowledge of each other over an insecure communication channel. This algorithm was first published by Whitfield Diffie and Martin Hellman in 1976. It is helpful in a variety of authenticated protocols. Further, it is also found suitable in transport layers. After his investigation this protocol was integrated to digital signature algorithm. In this paper we are presenting the verification of digital signature standard with the help of Diffie-Hellman key exchange protocol by using two randomly selected integers. We also tried to show that the use of protocol can provide the secrecy and freshness of key due to continuous selection of random numbers.

Research paper thumbnail of Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)

Materials Today: Proceedings, 2021

Quantum cryptography concentrates on the solution of cryptography that is imperishable due to the... more Quantum cryptography concentrates on the solution of cryptography that is imperishable due to the reason of fortification of secrecy which is applied to the public key distribution of quantum. It is a very prominent technology in which 2 beings can securely communicate along with the sights belongings to quantum physics. However, on basis of classical level cryptography, the used encodes were bits for data. As quantum utilizes the photons or particles polarize ones for encoding the quantized property. This is presented in qubits as a unit. Transmissions depend directly on the inalienable mechanic’s law of quantum for security. This paper includes detailed insight into the three most used and appreciated quantum cryptography applications that are providing its domain-wide service in the field of mobile cloud computing. These services are (it) DARPA Network, (ii) IPSEC implementation, and (iii) the twisted light HD implementation along with quantum elements, key distribution, and protocols

Research paper thumbnail of EEG Processing for Computer-Aided Seizure Detection Using Artificial Neural Networks

Emerging Technologies in Data Mining and Information Security, 2021

Research paper thumbnail of Identification of Disease based on Symptoms by Employing ML

2022 International Conference on Inventive Computation Technologies (ICICT)

Research paper thumbnail of Development And Organize Of Wireless Sensor Network In Home Management Using Iot

Int. J. of Aquatic Science, Jun 1, 2021

This research has shown that the Internet of Things (IoT) used to evaluate and assess normal hous... more This research has shown that the Internet of Things (IoT) used to evaluate and assess normal household circumstances using a circuit of relatively inexpensive sensors is effectively implemented. The linking methods are given for data analysis procedure that generates monitoring by intelligent sensing devices communication through the Network. This article provides easy and versatile home management and surveillance system with just a communication protocol mote and IP communication for controlling utilizing the mobile phone app. Technologies along with ambient temperature, moisture sensors, ammeter-based sensors, and air pressure sensors are combined also with recommended house automation models to ensure the efficacy of the whole system.

Research paper thumbnail of Contextual Cluster-Based Glow-Worm Swarm Optimization (GSO) Coupled Wireless Sensor Networks for Smart Cities

Sensors

The cluster technique involves the creation of clusters and the selection of a cluster head (CH),... more The cluster technique involves the creation of clusters and the selection of a cluster head (CH), which connects sensor nodes, known as cluster members (CM), to the CH. The CH receives data from the CM and collects data from sensor nodes, removing unnecessary data to conserve energy. It compresses the data and transmits them to base stations through multi-hop to reduce network load. Since CMs only communicate with their CH and have a limited range, they avoid redundant information. However, the CH’s routing, compression, and aggregation functions consume power quickly compared to other protocols, like TPGF, LQEAR, MPRM, and P-LQCLR. To address energy usage in wireless sensor networks (WSNs), heterogeneous high-power nodes (HPN) are used to balance energy consumption. CHs close to the base station require effective algorithms for improvement. The cluster-based glow-worm optimization technique utilizes random clustering, distributed cluster leader selection, and link-based routing. Th...

Research paper thumbnail of Smart Health Monitoring System with Wireless Networks to Detect Kidney Diseases

Computational Intelligence and Neuroscience

It is essential to change health services from a hospital to a patient-centric platform since med... more It is essential to change health services from a hospital to a patient-centric platform since medical costs are steadily growing and new illnesses are emerging on a worldwide scale. This study provides an optimal decision support system based on the cloud and Internet of Things (IoT) for identifying Chronic Kidney Disease (CKD) to provide patients with efficient remote healthcare services. To identify the presence of medical data for CKD, the proposed technique uses an algorithm named Improved Simulated Annealing-Root Mean Square -Logistic Regression (ISA-RMS-LR). The four subprocesses that make up the proposed model are a collection of data, preprocessing, feature selection, and classification. The incorporation of Simulated Annealing (SA) during Feature Selection (FS) enhances the ISA-RMS-LR model’s classifier outputs. Using the CKD benchmark dataset, the ISA-RMS-LR model’s efficacy has been verified. According to the experimental findings, the proposed ISA-RMS-LR model effectivel...

Research paper thumbnail of Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network

Transactions on Emerging Telecommunications Technologies

Research paper thumbnail of On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN

Advances in Computer, Communication and Computational Sciences

A Wireless sensor network (WSN) comprises several sensor nodes such as magnetic, thermal, and inf... more A Wireless sensor network (WSN) comprises several sensor nodes such as magnetic, thermal, and infrared, and the radar is set up in a particular geographical area. The primary aim of sensor network is to transmit reliable, secure data from one node to another node, node to base station and vice versa and from base station to all nodes in a network and to conserve the energy of sensor nodes. On the other hand, there are several restrictions such as large energy consumption, limited storage/memory and processing ability, higher latency, and insufficient resources. The related security issues in wireless sensor network are authenticity, confidentiality, robustness, integrity, and data freshness. The sensor nodes are susceptible to several attacks such as DOS, Sybil, flood, black hole, selective forwarding which results in the leakage of sensitive and valuable information. It is therefore necessary to provide security against these critical attacks in the network. Wireless sensor network were earlier used for military applications with the objective of monitoring friendly and opposing forces, battlefield surveillance, detection of attacks, but today Wireless Networking have a huge number of applications-environmental, healthcare, home, industrial, commercial and are still counting. This paper is an extensive review of the security requirements, attacks that are to be avoided and resolved for achieving a secure network connection. This paper also emphasizes various limitations and defense strategies to prevent threats and attacks. The issues of applications of wireless sensor network for smooth and reliable transmissions are also discussed. The sensor networks are popular for mission-critical-tasks and security is immensely required for such hostile environment employed networks.

Research paper thumbnail of Classifying Time-Bound Hierarchical Key Assignment Schemes

Advances in Computer, Communication and Computational Sciences, 2020

A time-bound hierarchical key assignment scheme (TBHKAS) ensures time-restricted access to the hi... more A time-bound hierarchical key assignment scheme (TBHKAS) ensures time-restricted access to the hierarchical data. There is a large number of such schemes are proposed in the literature. Crampton et al. studied the existing hierarchical key assignment schemes in detail and classify them into generic schemes on the basis of storage and computational requirements. Such generic classification helps the implementers and researchers working in this area in identifying a suitable scheme for their work. This work studies the TBHKAS and classifies them with the same spirit. As best of our knowledge, the proposed classification captures every existing TBHKAS in the literature. Furthermore, the proposed schemes are compared and analyzed in detail.

Research paper thumbnail of A Review Report on Cryptovirology and Cryptography

Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive... more Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive eavesdropper. Public key infrastructures defend against an active adversary that mounts a man-in-the-middle attack. Digital signature algorithms defend against a forger. Ecash systems defend against a counterfeiter and a double-spender. Pseudorandom bit generators defend against a next-bit predictor, and so on. Crypto virology extends beyond finding protocol failures and design vulnerabilities. It is a forward engineering discipline that can be used for attacking rather than defending.

Research paper thumbnail of AN EFFICIENT BLOCKCHAIN-BASED IIoT SYSTEM FORTRANSPARENCY AND CONCURENCY MECHANISM

Industrial Internet of Things (IIoT) performs an indispensable role intended for Industries. Now-... more Industrial Internet of Things (IIoT) performs an indispensable role intended for Industries. Now-a-days all industries like banking (ATM’s, sensor based transaction devices), hospitals (transaction Machines) are using IIOT (Industrial Internet of Things which means small devices communicate with centralized servers to exchange data) devices to communicate with their servers. This devices will have internet connection to communicate with industries servers and this devices will have limited battery power so heavy cryptographic algorithms cannot be implemented to provide/improve security. We are using Blackchain based algorithms such as POW (proof of work) and credit consensus. Entire Blockchain technique cannot be implement as this devices are small and run on battery so author is using POW and Credit Consensus concept from Blockchain technique. But it having more processing and storage cost. To overcome from this problem, in this document we introducing two techniques. Those are dat...

Research paper thumbnail of AI Revolution and Swarm Intelligence

In the modern era of information technology, artificial intelligence is spreading its scope merel... more In the modern era of information technology, artificial intelligence is spreading its scope merely in various area . So swarm intelligence is prominent concept comes under the category of artificial intelligence [1]. The term Swarm intelligence was first given by Gerardo Beni and Jing Wang in 1989. It was developed from Cellular Robotic System point of view. It is a concept of collective behavior of SelfOrganised, Decentralised system , natural or artificial. So basically this paper deals with the way in which various natural organisms behave whenever they are in group and their, this behavior provides us with the inspiration of solving many computational problems. So this paper on SI briefly describes the various algorithms, fall under the category of SI and various applications in which these algorithms can be fruitful. Also it clearly tells about the various future related works that can lead to a new revolution in the field of AI. Keywords— ACO Ant Colony Optimization, AI, Artif...