Mohammad Iftekhar Husain

Learn More
Wireless sensor networks are becoming ubiquitous and their application areas are widening by the day. Localization algorithms play an important role in enhancing the utility of data collected by enabling sensors to determine the location from which each data packet is obtained. Localization can be done by implementing beacon based algorithms or signature(More)
Smart phones with Internet capability are growing in popularity, due to many of their useful capabilities. Among other handy features of smart phones, Instant Messaging (IM) is very popular due to the level of convenience it provides in interpersonal communications. As the usage of IM on smart phone is increasing rapidly, it is important to take measures in(More)
Abstract—A common approach for introducing security at the physical layer is to rely on the channel variations of the wireless environment. This type of approach is not always suitable for wireless networks where the channel remains static for most of the network lifetime. For these scenarios, a channel independent physical layer security measure is more(More)
Apple iPhone has made significant impact on the society both as a handheld computing device and as a cellular phone. Due to the unique hardware system as well as storage structure, iPhone has already attracted the forensic community in digital investigation of the device. Currently available commercial products and methodologies for iPhone forensics are(More)
We consider the following problem that arises in outsourced storage: a user stores her data x on a remote server but wants to audit the server at some later point to make sure it actually did store x. The goal is to design a (randomized) verification protocol that has the property that if the server passes the verification with some reasonably high(More)
We show that every almost universal hash function also has the storage enforcement property. Almost universal hash functions have found numerous applications and we show that this new storage enforcement property allows the application of almost universal hash functions in a wide range of remote verification tasks: (i) Proof of Secure Erasure (where we want(More)
Drop box is a cloud based file storage service used by more than 200 million users. Its ability to seamlessly provide cloud storage with minimal user complexity is the key for its wide spread popularity. Despite of its high usability, Drop box has been recently criticized for loose ends in security. Security and usability is not always mutually exclusive,(More)