Papers by Mohammad Ayub Latif
2020 Global Conference on Wireless and Optical Technologies (GCWOT), 2020
Internet of things (IoT) is a technology that allows devices that can be completely different to ... more Internet of things (IoT) is a technology that allows devices that can be completely different to connect via internet for data exchange. The example of such devices can be a toy which is used by a child, a stereo system in your car or a kitchen appliance. It wasn't a distinct idea even by the end of the previous century, but in the last twenty years in has become a part and parcel of our lives. The core reason for this is super paced adaptability by the consumers. The unfortunate aspect for sharing this bulk amount of data between different IoT devices is that hackers and the unethical users gets interested in such data and these devices becomes a target for such people who dwell into vulnerabilities to acquire the data. Moreover, if this data goes in the hands of hackers or unethical users, it can easily compromise the entire organization which is the owner of that data. In this paper we initially investigate the security requirements for IoT (Internet of Things), those security requirements are classified in terms of layers of the TCP/IP model. After the in-depth analysis and critical evaluation of the security requirements, we look into the key management perspective of systems and IoT in particular. In last we discuss lightweight cryptography which is particular used for IoT. We perform in depth analysis of all the possible algorithms that are used in IoT with lightweight cryptography. Complete comparisons with strengths and weakness of all the lightweight algorithms are also carried out in our research work. The major security concerns in IoT configurations are also authentication and confidentiality. Therefore, we conclude that for client to client communication secret key cryptography should be used and where clients need to communicate with the server in IoT configuration, Elliptic Curve Cryptography based on lightweight algorithms can be used for authentication and secret key mechanism can be followed for confidentiality.
Lecture Notes in Computer Science, 2013
Recent years have seen the world become a closely connected society with the emergence of differe... more Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties influence the resilience in different ways. In this paper, we perform two sets of experiments and draw conclusions from the results pertaining to the resilience of social networks. The first experiment performs a comparative analysis of four different classes of networks namely small world networks, scale free networks, small worldscale free networks and random networks with four semantically different social networks under different attack strategies. The second experiment compares the resilience of these semantically different social networks under different attack strategies. Empirical analysis reveals interesting behavior of different classes of networks with different attack strategies.
Uploads
Papers by Mohammad Ayub Latif