Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohammad Iftekhar Husain is active.

Publication


Featured researches published by Mohammad Iftekhar Husain.


military communications conference | 2012

CD-PHY: Physical layer security in wireless networks through constellation diversity

Mohammad Iftekhar Husain; Suyash Mahant; Ramalingam Sridhar

A common approach for introducing security at the physical layer is to rely on the channel variations of the wireless environment. This type of approach is not always suitable for wireless networks where the channel remains static for most of the network lifetime. For these scenarios, a channel independent physical layer security technique is more appropriate which will rely on a secret known to the sender and the receiver but not to the eavesdropper. In this paper, we propose CD-PHY, a physical layer security technique that exploits the constellation diversity of wireless networks which is independent of the channel variations. The sender and the receiver use a custom bit sequence to constellation symbol mapping to secure the physical layer communication which is not known a priori to the eavesdropper. Through theoretical modeling and experimental simulation, we show that this information theoretic construct can achieve Shannon secrecy and any brute force attack from the eavesdropper incurs high overhead and minuscule probability of success. Our results also show that the high bit error rate also makes decoding practically infeasible for the eavesdropper, thus securing the communication between the sender and receiver.


international conference on digital forensics | 2010

A Simple Cost-Effective Framework for IPhone Forensic Analysis

Mohammad Iftekhar Husain; Ibrahim Baggili; Ramalingam Sridhar

Apple iPhone has made significant impact on the society both as a handheld computing device and as a cellular phone. Due to the unique hardware system as well as storage structure, iPhone has already attracted the forensic community in digital investigation of the device. Currently available commercial products and methodologies for iPhone forensics are somewhat expensive, complex and often require additional hardware for analysis. Some products are not robust and often fail to extract optimal evidence without modifying the iPhone firmware which makes the analysis questionable in legal platforms. In this paper, we present a simple and inexpensive framework (iFF) for iPhone forensic analysis. Through experimental results using real device, we have shown the effectiveness of this framework in extracting digital evidence from an iPhone.


Proceedings of Annual Symposium on Information Assurance (ASIA) | 2009

IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks

Sriram Sankaran; Mohammad Iftekhar Husain; Ramalingam Sridhar


Archive | 2009

LASE: Latency Aware Simple Encryption for Embedded Systems Security

Kerry Courtright; Mohammad Iftekhar Husain; Ramalingam Sridhar


military communications conference | 2013

Lightweight Reconfigurable Encryption Architecture for Moving Target Defense

Mohammad Iftekhar Husain; Kerry Courtright; Ramalingam Sridhar


Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers | 2012

A Simple Cost-Effective Framework for iPhone Forensic Analysis

Mohammad Iftekhar Husain; Ibrahim Baggili; Ramalingam Sridhar


computer applications in industry and engineering | 2009

D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis.

Mohammad Iftekhar Husain; Ramalingam Sridhar


arXiv: Cryptography and Security | 2016

Chill-Pass: Using Neuro-Physiological Responses to Chill Music to Defeat Coercion Attacks.

Max Wolotsky; Mohammad Iftekhar Husain; Elisha Choe


arXiv: Cryptography and Security | 2012

How to Bypass Verified Boot Security in Chromium OS

Mohammad Iftekhar Husain; Lokesh Mandvekar; Chunming Qiao; Ramalingam Sridhar


Digital Forensics and Cyber Crime. First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers | 2012

iForensics: Forensic Analysis of Instant Messaging on Smart Phones

Mohammad Iftekhar Husain; Ramalingam Sridhar

Collaboration


Dive into the Mohammad Iftekhar Husain's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kerry Courtright

State University of New York System

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Suyash Mahant

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

Sriram Sankaran

Amrita Vishwa Vidyapeetham

View shared research outputs
Researchain Logo
Decentralizing Knowledge