Md. Endadul Hoque

Learn More
Context awareness is just beginning to revolutionize the ways we interact with networked devices. In order for context awareness to flourish, especially in a pervasive environment, users must be certain that their privacy is respected. Privacy in pervasive online community depends on the level of granularity of the provided information, user’s(More)
RFID tags are a new generation of small devices used for identification in many applications today. RFID authentication plays an important role in applications where security and privacy is a major concern. As an example, RFID has gained appreciation as an emerging technology to thwart counterfeiting problems. Public key cryptography (PKC) provides an(More)
Privacy protection is a very important issue during authentications in RFID systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Another technique can be to perform group based private authentication that improves the(More)
RFID technology has become increasingly popular in todays society and plays an important role in daily life. However, the exploitation of this technology requires practical and secure solutions to overcome certain issues. In the case of RFID systems, privacy protection and scalability are two conflicting goals. Nevertheless, in this paper we propose a(More)
RFID systems have been scrutinized nowadays as one of the emerging technologies in pervasive environment. And authentication becomes indispensible in applications where security and privacy are major concerns. Besides thwarting some major attacks, RFID systems need to be able to recover from unexpected conditions during operation. In this paper, we propose(More)
Security and performance are critical goals for distributed systems. The increased design complexity, incomplete expertise of developers, and limited functionality of existing testing tools often result in bugs and vulnerabilities that prevent implementations from achieving their design goals in practice. Many of these bugs, vulnerabilities, and(More)
We focus on automated adversarial testing of real-world implementations of wireless routing protocols. We extend an existing platform, Turret, designed for general distributed systems, to address the specifics of wireless routing protocols. Specifically, we add functionality to differentiate routing messages from data messages and support wireless specific(More)