Rezvi Shahariar | University of Dhaka, Bangladesh (original) (raw)

Uploads

Papers by Rezvi Shahariar

Research paper thumbnail of The Need Of Trustworthy Announcements To Achieve Driving Comfort

arXiv (Cornell University), May 8, 2024

An Intelligent Transport System (ITS) is more demanding nowadays and it can be achieved through d... more An Intelligent Transport System (ITS) is more demanding nowadays and it can be achieved through deploying Vehicular Ad Hoc Networks (VANETs). Vehicles and Roadside Units (RSUs) exchange traffic events. Malicious drivers generate false events. Thus, they need to be identified to maintain trustworthy communication. When an authorised user acts maliciously, the security scheme typically fails. However, a trust model can isolate false messages. In this paper, the significance of trustworthy announcements for VANETs is analysed. To this end, a series of experiments is conducted in Veins to illustrate how the trustworthiness of announcements affects travel time. A traffic scenario is created where vehicles detour to an alternate route with an announcement from the leading vehicle. Both true and false announcements are considered. Results confirm that false announcements and refraining from announcements increase travel time. However, the travel time is reduced with trustworthy announcements. From this analysis, it can be concluded that trustworthy announcements facilitate driver comfort.

Research paper thumbnail of A Trust Management Framework for Vehicular Ad Hoc Networks

International journal of security, privacy and trust management, Feb 27, 2023

Vehicular Ad Hoc Networks (VANETs) enable road users and public infrastructure to share informati... more Vehicular Ad Hoc Networks (VANETs) enable road users and public infrastructure to share information that improves the operation of roads and driver experience. However, these are vulnerable to poorly behaved authorized users. Trust management is used to address attacks from authorized users in accordance with their trust score. By removing the dissemination of trust metrics in the validation process, communication overhead and response time are lowered. In this paper, we propose a new Tamper-Proof Device (TPD) based trust management framework for controlling trust at the sender side vehicle that regulates driver behaviour. Moreover, the dissemination of feedback is only required when there is conflicting information in the VANET. If a conflict arises, the RoadSide Unit (RSU) decides, using the weighted voting system, whether the originator is to be believed, or not. The framework is evaluated against a centralized reputation approach and the results demonstrate that it outperforms the latter.

Research paper thumbnail of A Fuzzy Reward and Punishment Scheme for Vehicular Ad Hoc Networks

International Journal of Advanced Computer Science and Applications, 2023

Trust management is an important security approach for the successful implementation of Vehicular... more Trust management is an important security approach for the successful implementation of Vehicular Ad Hoc Networks (VANETs). Trust models evaluate messages to assign reward or punishment. This can be used to influence a driver's future behaviour. In the author's previous work, a sender-side based trust management framework is developed which avoids the receiver evaluation of messages. However, this does not guarantee that a trusted driver will not lie. These "untrue attacks" are resolved by the RSUs using collaboration to rule on a dispute, providing a fixed amount of reward and punishment. The lack of sophistication is addressed in this paper with a novel fuzzy RSU controller considering the severity of incident, driver past behaviour, and RSU confidence to determine the reward or punishment for the conflicted drivers. Although any driver can lie in any situation, it is expected that trustworthy drivers are more likely to remain so, and vice versa. This behaviour is captured in a Markov chain model for sender and reporter drivers where their lying characteristics depend on trust score and trust state. Each trust state defines the driver's likelihood of lying using different probability distribution. An extensive simulation is performed to evaluate the performance of the fuzzy assessment and examine the Markov chain driver behaviour model with changing the initial trust score of all or some drivers in Veins simulator. The fuzzy and the fixed RSU assessment schemes are compared, and the result shows that the fuzzy scheme can encourage drivers to improve their behaviour.

Research paper thumbnail of A Rule Based Extractive Text Summarization Technique for Bangla News Documents

International Journal of Modern Education and Computer Science, 2018

Research paper thumbnail of Avoiding Low Energy Routing Node in MANET Based on Critical Energy Level

Dhaka University Journal of Science, 2016

Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route ... more Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route breakage is a common event in Every node is equipped with battery energy. This form of energy is one of the scarce resources in MANET. This paper is focused on promiscuous mode to observe packets coming from the nodes within a direct transmission range. At the same time critical energy of a routing node is used to find the low energy node on an ongoing route. This low energy node will perform local route repairing scheme such as QLR-APM to find alternate node of low energy node which avoids route breakage in MANET. This approach prevents route breakage and the same time packet loss and retransmission of packets are reduced in MANET. Thus it is easily seen that QLR-APM incorporating this proposed approach outperforms than QLR-APM.Dhaka Univ. J. Sci. 64(1): 39-44, 2016 (January)

Research paper thumbnail of Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node

In mobile ad hoc network communication is performed usually by using only send and receive messag... more In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node’s total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approach, when source receives Warning Message from any routing node on the ongoing route then it will stop sending packets on the ongoing route. Critical energy level of routing node has been defined to generate a Warning Message when routing node’s energy level reduces to critical energy level.

Research paper thumbnail of Predicting fertilizer treatment of maize using decision tree algorithm

Indonesian Journal of Electrical Engineering and Computer Science

Machine learning approaches are progressively successful in image based analysis such as differen... more Machine learning approaches are progressively successful in image based analysis such as different diseases prediction as well as level of risk assessment etc. In this paper, image based data analysis with machine learning technique were used for fertilizer treatment of maize. We address this issue as our country depend on agricultural field rather than others. Maize has a bright future. To predict fertilizer treatment of maize dataset were comprised of ground coverage region which highlights the green pixels of a maize image. For calculating green pixels from an image we used “Can Eye” tool. The achievement of machine learning approaches is highly dependent on quality and quantity of the dataset which is used for training the machine for better classification result. For this perseverance, we collected images from the maize field directly. Then processed those images and classified the data into four classes (Less Nitrogen=-N, Less Phosphorus=-P, Less Potassium=-K and NPK) to trai...

Research paper thumbnail of Avoiding Low Energy Routing Node in MANET Based on Critical Energy Level

Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route ... more Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route breakage is a common event i Every node is equipped with battery energy. This form of energy is one of the scar promiscuous mode to observe packets coming from the nodes within a direct transmission range. At the same time critical energ routing node is used to find the low energy node on an ongoing route. QLR-APM to find alternate node of low energy node which avoids route breakage in MANET. This approach prevents route breakage and the same time packet loss and retransmission of pack proposed approach outperforms than QLR-APM.

Research paper thumbnail of Modified QLRS-APM: A Proposal to Avoid Initiating Route Error Messages to Source in Mobile Ad Hoc Networks

Existing local route repair schemes such as localized route repair (LRR), ad hoc on-demand distan... more Existing local route repair schemes such as localized route repair (LRR), ad hoc on-demand distance vector-backup routing (AODV-BR), and witness-aided routing (WAR) can be incorporated with reactive routing protocols to repair route breakages on ongoing routes. All of these schemes have some problems in local route repairing such as long delay, excessive energy consumption etc. To mitigate these problems in existing local route repair schemes, quick local repair scheme using adaptive promiscuous mode (QLRS-APM) is proposed. QLRS-APM is a novel approach in local route repairing but sometimes generates unnecessarily route error to the source. This paper provides a solution by giving an extension on QLRS-APM to avoid initiating route error messages to the source and also at the same time reducing excessive energy consumption from the network.

Research paper thumbnail of Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node

In mobile ad hoc network communication is performed usually by using only send and receive messag... more In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node's total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approach, when source receives Warning Message from any routing node on the ongoing route then it will stop sending packets on the ongoing route. Critical energy level of routing node has been defined to generate a Warning Message when routing node's energy level reduces to critical energy level.

Research paper thumbnail of Nature of the Cyber Crime Activities among the Secondary Student in Dhaka City of Bangladesh: A Baseline Study

Cyber crime is a concerning issue and threat for the information and communication technology (IC... more Cyber crime is a concerning issue and threat for the information and communication technology (ICT) sector of Bangladesh. Significant numbers of Dhaka city dwellers mostly secondary level (13 to 19 years old) students are doing this unlawful crime consciously or unconsciously. Here, computer is used either as a tool or target or both. There is apparently no distinction between cyber and conventional crime. The differentiation lies in the involvement of the medium in cases of cyber crime. But the identification of crime and implementation of law both are new in our society. It indicates the frequent incidence of cyber crime among the secondary school students of Dhaka city. Hacking, credit card fraud, software piracy, cyber identity theft, cloning of website/phishing, pornography, cyber defamation, virus dissemination and cyber stalking are the common cyber crime in Dhaka City.

Research paper thumbnail of The Need Of Trustworthy Announcements To Achieve Driving Comfort

arXiv (Cornell University), May 8, 2024

An Intelligent Transport System (ITS) is more demanding nowadays and it can be achieved through d... more An Intelligent Transport System (ITS) is more demanding nowadays and it can be achieved through deploying Vehicular Ad Hoc Networks (VANETs). Vehicles and Roadside Units (RSUs) exchange traffic events. Malicious drivers generate false events. Thus, they need to be identified to maintain trustworthy communication. When an authorised user acts maliciously, the security scheme typically fails. However, a trust model can isolate false messages. In this paper, the significance of trustworthy announcements for VANETs is analysed. To this end, a series of experiments is conducted in Veins to illustrate how the trustworthiness of announcements affects travel time. A traffic scenario is created where vehicles detour to an alternate route with an announcement from the leading vehicle. Both true and false announcements are considered. Results confirm that false announcements and refraining from announcements increase travel time. However, the travel time is reduced with trustworthy announcements. From this analysis, it can be concluded that trustworthy announcements facilitate driver comfort.

Research paper thumbnail of A Trust Management Framework for Vehicular Ad Hoc Networks

International journal of security, privacy and trust management, Feb 27, 2023

Vehicular Ad Hoc Networks (VANETs) enable road users and public infrastructure to share informati... more Vehicular Ad Hoc Networks (VANETs) enable road users and public infrastructure to share information that improves the operation of roads and driver experience. However, these are vulnerable to poorly behaved authorized users. Trust management is used to address attacks from authorized users in accordance with their trust score. By removing the dissemination of trust metrics in the validation process, communication overhead and response time are lowered. In this paper, we propose a new Tamper-Proof Device (TPD) based trust management framework for controlling trust at the sender side vehicle that regulates driver behaviour. Moreover, the dissemination of feedback is only required when there is conflicting information in the VANET. If a conflict arises, the RoadSide Unit (RSU) decides, using the weighted voting system, whether the originator is to be believed, or not. The framework is evaluated against a centralized reputation approach and the results demonstrate that it outperforms the latter.

Research paper thumbnail of A Fuzzy Reward and Punishment Scheme for Vehicular Ad Hoc Networks

International Journal of Advanced Computer Science and Applications, 2023

Trust management is an important security approach for the successful implementation of Vehicular... more Trust management is an important security approach for the successful implementation of Vehicular Ad Hoc Networks (VANETs). Trust models evaluate messages to assign reward or punishment. This can be used to influence a driver's future behaviour. In the author's previous work, a sender-side based trust management framework is developed which avoids the receiver evaluation of messages. However, this does not guarantee that a trusted driver will not lie. These "untrue attacks" are resolved by the RSUs using collaboration to rule on a dispute, providing a fixed amount of reward and punishment. The lack of sophistication is addressed in this paper with a novel fuzzy RSU controller considering the severity of incident, driver past behaviour, and RSU confidence to determine the reward or punishment for the conflicted drivers. Although any driver can lie in any situation, it is expected that trustworthy drivers are more likely to remain so, and vice versa. This behaviour is captured in a Markov chain model for sender and reporter drivers where their lying characteristics depend on trust score and trust state. Each trust state defines the driver's likelihood of lying using different probability distribution. An extensive simulation is performed to evaluate the performance of the fuzzy assessment and examine the Markov chain driver behaviour model with changing the initial trust score of all or some drivers in Veins simulator. The fuzzy and the fixed RSU assessment schemes are compared, and the result shows that the fuzzy scheme can encourage drivers to improve their behaviour.

Research paper thumbnail of A Rule Based Extractive Text Summarization Technique for Bangla News Documents

International Journal of Modern Education and Computer Science, 2018

Research paper thumbnail of Avoiding Low Energy Routing Node in MANET Based on Critical Energy Level

Dhaka University Journal of Science, 2016

Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route ... more Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route breakage is a common event in Every node is equipped with battery energy. This form of energy is one of the scarce resources in MANET. This paper is focused on promiscuous mode to observe packets coming from the nodes within a direct transmission range. At the same time critical energy of a routing node is used to find the low energy node on an ongoing route. This low energy node will perform local route repairing scheme such as QLR-APM to find alternate node of low energy node which avoids route breakage in MANET. This approach prevents route breakage and the same time packet loss and retransmission of packets are reduced in MANET. Thus it is easily seen that QLR-APM incorporating this proposed approach outperforms than QLR-APM.Dhaka Univ. J. Sci. 64(1): 39-44, 2016 (January)

Research paper thumbnail of Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node

In mobile ad hoc network communication is performed usually by using only send and receive messag... more In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node’s total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approach, when source receives Warning Message from any routing node on the ongoing route then it will stop sending packets on the ongoing route. Critical energy level of routing node has been defined to generate a Warning Message when routing node’s energy level reduces to critical energy level.

Research paper thumbnail of Predicting fertilizer treatment of maize using decision tree algorithm

Indonesian Journal of Electrical Engineering and Computer Science

Machine learning approaches are progressively successful in image based analysis such as differen... more Machine learning approaches are progressively successful in image based analysis such as different diseases prediction as well as level of risk assessment etc. In this paper, image based data analysis with machine learning technique were used for fertilizer treatment of maize. We address this issue as our country depend on agricultural field rather than others. Maize has a bright future. To predict fertilizer treatment of maize dataset were comprised of ground coverage region which highlights the green pixels of a maize image. For calculating green pixels from an image we used “Can Eye” tool. The achievement of machine learning approaches is highly dependent on quality and quantity of the dataset which is used for training the machine for better classification result. For this perseverance, we collected images from the maize field directly. Then processed those images and classified the data into four classes (Less Nitrogen=-N, Less Phosphorus=-P, Less Potassium=-K and NPK) to trai...

Research paper thumbnail of Avoiding Low Energy Routing Node in MANET Based on Critical Energy Level

Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route ... more Mobile ad hoc network is a temporary wireless network consisting of mobile nodes. Frequent route breakage is a common event i Every node is equipped with battery energy. This form of energy is one of the scar promiscuous mode to observe packets coming from the nodes within a direct transmission range. At the same time critical energ routing node is used to find the low energy node on an ongoing route. QLR-APM to find alternate node of low energy node which avoids route breakage in MANET. This approach prevents route breakage and the same time packet loss and retransmission of pack proposed approach outperforms than QLR-APM.

Research paper thumbnail of Modified QLRS-APM: A Proposal to Avoid Initiating Route Error Messages to Source in Mobile Ad Hoc Networks

Existing local route repair schemes such as localized route repair (LRR), ad hoc on-demand distan... more Existing local route repair schemes such as localized route repair (LRR), ad hoc on-demand distance vector-backup routing (AODV-BR), and witness-aided routing (WAR) can be incorporated with reactive routing protocols to repair route breakages on ongoing routes. All of these schemes have some problems in local route repairing such as long delay, excessive energy consumption etc. To mitigate these problems in existing local route repair schemes, quick local repair scheme using adaptive promiscuous mode (QLRS-APM) is proposed. QLRS-APM is a novel approach in local route repairing but sometimes generates unnecessarily route error to the source. This paper provides a solution by giving an extension on QLRS-APM to avoid initiating route error messages to the source and also at the same time reducing excessive energy consumption from the network.

Research paper thumbnail of Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node

In mobile ad hoc network communication is performed usually by using only send and receive messag... more In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node's total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approach, when source receives Warning Message from any routing node on the ongoing route then it will stop sending packets on the ongoing route. Critical energy level of routing node has been defined to generate a Warning Message when routing node's energy level reduces to critical energy level.

Research paper thumbnail of Nature of the Cyber Crime Activities among the Secondary Student in Dhaka City of Bangladesh: A Baseline Study

Cyber crime is a concerning issue and threat for the information and communication technology (IC... more Cyber crime is a concerning issue and threat for the information and communication technology (ICT) sector of Bangladesh. Significant numbers of Dhaka city dwellers mostly secondary level (13 to 19 years old) students are doing this unlawful crime consciously or unconsciously. Here, computer is used either as a tool or target or both. There is apparently no distinction between cyber and conventional crime. The differentiation lies in the involvement of the medium in cases of cyber crime. But the identification of crime and implementation of law both are new in our society. It indicates the frequent incidence of cyber crime among the secondary school students of Dhaka city. Hacking, credit card fraud, software piracy, cyber identity theft, cloning of website/phishing, pornography, cyber defamation, virus dissemination and cyber stalking are the common cyber crime in Dhaka City.