Danda B Rawat

Danda B Rawat
Howard University | HU · Department of Electrical Engineering & Computer Science

Ph.D.

About

391
Publications
60,490
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,900
Citations
Additional affiliations
August 2016 - present
Howard University
Position
  • Professor (Full)

Publications

Publications (391)
Chapter
Recently, using credit cards has been considered one of the essential things of our life due to its pros of being easy to use and flexible to pay. The critical impact of the increment of using credit cards is the occurrence of fraudulent transactions, which allow the illegal user to get money and free goods via unauthorized usage. Artificial Intell...
Conference Paper
Visual cues are the most convincing entities which are weaponized by cyber-attackers to carry out phishing attacks. Generally, a genuine-looking UI is sufficient to convince a user. Thinking that it is a legitimate website, users provide their private information to attackers. This is a very serious problem that needs to be solved right before the...
Preprint
Full-text available
This paper presents the features and benefits of legacy IPv4 network migration towards major two latest networking paradigms viz. Internet protocol version 6 (IPv6) and the software-defined networking (SDN). These latest networking paradigms are the enabler of future generation networking so that the standards and requirements of fifth generation (...
Article
Solving Linear Programming (LP) and Non-Linear Programming (NLP) problems are momentous because of their wide applications in real-life problems. There is no unified way to find the global optimum for NLPs. But on the other hand, Simplex Algorithm, as the dominating methodology for LPs for several decades moves only on the boundary (vertices) and i...
Article
Full-text available
An effective anomaly-based intelligent IDS (AN-Intel-IDS) must detect both known and unknown attacks. Hence, there is a need to train AN-Intel-IDS using dynamically generated, real-time data in an adversarial setting. Unfortunately, the public datasets available to train AN-Intel-IDS are ineluctably static, unrealistic, and prone to obsolescence. F...
Article
The papers in this special section focus on artificial intelligence (AI) and machine learning-enabled reconfigurable wireless networks. In recent years, we have witnessed rapid proliferation on development of fully programmable, protocol-independent data planes and languages for programming and algorithms for Artificial Intelligence (AI) and Machin...
Article
Cooperative intelligent and autonomous transportation systems rely on intelligent sensing, computing, and actuating technologies for unmanned freight and public movements. The information gained from neighbors and communication infrastructures provides efficient actuation for safe and sustained transportation. This article resolves traffic data man...
Preprint
The Internet of Vehicles (IoV) is flourishing and offers various applications relating to road safety, traffic and fuel efficiency, and infotainment. Dealing with security and privacy threats and managing the trust (detecting malicious and misbehaving peers) in IoV remains the most significant concern. Artificial Intelligence is one of the most rev...
Article
Full-text available
Internet and telecom service providers worldwide are facing financial sustainability issues in migrating their existing legacy IPv4 networking system due to backward compatibility issues with the latest generation networking paradigms viz. Internet protocol version 6 (IPv6) and software-defined networking (SDN). Bench marking of existing networking...
Article
Internet of Vehicles (IoV) plays an indispensable role in intelligent transportation system (ITS). When the vehicle density is high, the performance of IoV suffers due to the broadcast storm problem. To address this issue, we propose a novel clustering approach using behavioral parameters and current journey parameter. In this approach, we first ca...
Conference Paper
Full-text available
Adversarial machine learning (AML) has emerged as one of the significant research areas in machine learning (ML) because models we train lack robustness and trustworthiness. Federated learning (FL) trains models over distributed devices and model parameters are shared instead of actual data in a privacy-preserving manner. Unfortunately, FL is also...
Conference Paper
Undoubtedly, the recent implacable, widespread, and intricate cyber-attacks demand cognitive cyber-defense techniques. Although machine learning (ML) and artificial intelligence (AI) algorithms are extensively applied for enhanced network security, existing AI-based agents are impeded by incongruous shifts in actionable intelligence. For instance,...
Chapter
Traditional intrusion detection systems (IDSs) are not scalable and efficient in detecting intrusions in IoT systems; hence, protecting them against cyber-attacks. The need to secure the Internet of Things (IoT) platforms deployable at a large scale to build smart systems gave rise to a new class of intelligent and scalable IDSs. Intelligent IDSs,...
Chapter
Full-text available
This paper presents the features and benefits of legacy IPv4 network migration towards major two latest networking paradigms viz. Internet protocol version 6 (IPv6) and the software-defined networking (SDN). These latest networking paradigms are the enabler of future generation networking so that the standards and requirements of fifth generation (...
Poster
Full-text available
RQ1: What are the challenges, risks, and strategies for the migration of legacy IPv4 networks into SoDIP6 networks? RQ2: What is/are the intelligent approach(s) for joint network migration planning and cost optimization? RQ3: What are the roles of SoDIP6 networks for future sustainability of service providers and the society? OB1: Analyze the joint...
Thesis
SDN and IPv6 networks are the latest networking paradigms emerged to avoid all the control, management, and operation complexities with issues of routing and security in legacy IPv4 networking system. But the lack of backward compatibility with IPv6 and SDN creates many challenges for service providers to migrate their legacy networking infrastruct...
Preprint
Full-text available
The emerging Internet of Things (IoT) and bidirectional communications in smart grid are expected to improve smart grid capabilities and electricity management. Because of massive number of IoT devices in smart grid, size of the data to be transmitted increases, that demands a high data rate to meet the real-time smart grid communications requireme...
Article
Anomaly-based machine learning-enabled intrusion detection systems (AML-IDS) show low performance and prediction accuracy while detecting intrusions in the Internet of Things (IoT) than that of deep learning-based intrusion detection systems (DL-IDS). In particular, AML-IDS that employ low complexity models for IoT, such as the Principal Component...
Article
The recent evolution of the Internet of Things in the healthcare sector has attained substantial recognition from the government and industry. Healthcare data accumulated from diverse sources are stored by health service providers which is useful for patient diagnosis as well as for research for pivotal analysis. However, healthcare data contains s...
Article
Internet of Vehicles (IoV) has been sought as a solution to realize an Intelligent Transportation System (ITS) for efficient traffic management. Data driven ITS requires learning from vehicular data and provide vehicles with timely information to support a wide range of safety and infotainment ITS applications. IoV is vulnerable to multitude of cyb...
Article
Full-text available
The emerging Internet of Things (IoT) and bidirectional communications in smart grid are expected to improve smart grid capabilities and electricity management. Because of massive number of IoT devices in smart grid, size of the data to be transmitted increases, that demands a high data rate to meet the real-time smart grid communication requiremen...
Chapter
Internet of Things (IoT) has been recently one of the fastest-growing technologies around the world. Despite the rise of IoT devices, IoT has greatly changed the mode of communication. As of any system, IoT technology might be subjected to various anomalies and security issues such as authentication, authorization, data protection, network security...
Conference Paper
The immense vulnerabilities within network protocols have led to prevalent spoofing attacks. Security measures such as cryptographic authentication, router level filtering, and other anti-spoofing methods are promising yet inadequate. In fact, research shows almost 50% of existing autonomous systems can be "hijacked" and used as spurious network no...
Article
Wireless virtualization has emerged as one of the efficient ways to overcome numerous wireless networking challenges such as RF resource sharing. RF spectrum sharing in wireless networks focuses on increasing the usage efficiency of radio frequency (RF) spectrum with its increasing demand. To reduce uncertainties that accompany the spectrum sharing...
Article
Full-text available
Meta-heuristic algorithms have been proposed to solve several optimization problems in different research areas due to their unique attractive features. Traditionally, heuristic approaches are designed separately for discrete and continuous problems. This paper leverages the meta-heuristic algorithm for solving NP-hard problems in both continuous a...
Article
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency (RF) spectrum utilization. However thee are several challenges to realize them in real systems, such as sensing uncertainty causing issues to licensed users, business models for licensed service providers. Wireless virtualization is regarded as a tech...
Article
Next generation communication systems are expected to be heterogeneous and to have varying Quality of Service (QoS) requirements for different Internet of Things (IoT) applications. Wireless virtualization is regarded as an emerging technology capable of handling the ever growing resource demands by those heterogeneous IoT applications and systems...
Article
The Internet of Unmanned Vehicles (IoUV) is regarded as an emerging technology for military applications not only to make surveillance systems and battlefield operations fully coordinated and automated, but also to provide significant strategic advantages. All the UVs form a coordinated network for exchanging information in IoUV, which enhances con...
Conference Paper
Full-text available
Data falsification attack in Vehicular Ad hoc Networks (VANET) for the Internet of Vehicles (IoV) is achieved by corrupting the data exchanged between nodes with false information. Data is the most valuable asset these days from which many analyses and results can be drawn out. But the privacy concern raised by users has become the greatest hindran...
Preprint
Full-text available
The number of connected smart devices has been increasing exponentially for different Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT systems which has many attack vectors, security flaws and vulnerabilities. Securing billions of B connected devices in IoT is a must task to realize the full potential of IoT...
Preprint
Cyber Physical Systems (CPS) are characterized by their ability to integrate the physical and information or cyber worlds. Their deployment in critical infrastructure have demonstrated a potential to transform the world. However, harnessing this potential is limited by their critical nature and the far reaching effects of cyber attacks on human, in...
Chapter
Vehicular cyber physical systems (VCPS), by leveraging on advancements in sensing, wireless technologies and vehicular ad hoc networks (VANET) have improved driving experience and birthed systems like cooperative adaptive cruise control, and have formed the foundation for autonomous and platooned vehicles. However, its deployment is adversely affec...
Article
Full-text available
Machine learning (ML) has been emerging as a viable solution for intrusion detection systems (IDS) to secure IoT devices against different types of attacks. ML based IDS (ML-IDS) normally detect network traffic anomalies caused by known attacks as well as newly introduced attacks. Recent research focuses on the functionality metrics of ML technique...
Article
Cities have circumvented privacy norms and deployed sensors to track vehicles via toll transponders (like E-Zpass tags). The ethical problems regarding these practices have been highlighted by various privacy advocacy groups. The industry however, has yet to implement a standard privacy protection regime to protect users’ data. Further, existing ri...
Article
Cyber-threats are continually evolving and growing in numbers and extreme complexities with the increasing connectivity of the Internet of Things (IoT). Existing cyber-defense tools seem not to deter the number of successful cyber-attacks reported worldwide. If defense tools are not seldom, why does the cyber-chase trend favor bad actors? Although...
Preprint
Full-text available
In this paper, we present the performance analysis of mixed RF/FSO system with multiple relays. To select the best relay, we adopt partial relay selection with outdated CSI wherein we investigate the effect of the temporal correlation of the channels. Unlike the vast majority of work, we introduce the impairments to the relays and the destination a...
Conference Paper
Financially sustainable solution is the need to migrate legacy IPv4 network infrastructure into latest networking paradigms viz. Software-defined networking (SDN) and the Internet protocol version 6 (IPv6) addressing. For Internet service provider (ISP) networks, IP routers are either to be upgraded or replaced with new device to transform the netw...
Article
Enormous amount of information is processed at different web sites, on a number of different AI tools and in multiple data silos. Sharing data between various sources, this is a significant obstacle, due to administrative, organizational and security considerations. One possible solution is federated machine learning (FML), a system that simultaneo...
Article
Full-text available
Saline water covers approximately 360000000 km <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> , approximately 71% of Earth’s surface and 90% of Earth’s biosphere. The ocean contains 97% of Earth’s water, and oceanographers have stated that less than 5% of the World Ocean has been explored. The...
Book
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42...
Article
Without an effective vaccine, treatment, or therapy, the COVID-19 spreading like fire and claiming lives. Countries began to adopt various strategies such as lockdown, mass testing, tracing, quarantine, sanitization, isolation, and treatment to contain COVID-19. However, it was soon realized that we need to take the help of powerful technologies to...
Article
Full-text available
The number of connected smart devices has been increasing exponentially for different Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT systems which has many attack vectors, security flaws and vulnerabilities. Securing billions of B connected devices in IoT is a must task to realize the full potential of IoT...
Article
Full-text available
This paper studies a problem for seamless migration of legacy networks of Internet service providers to a software-defined networking (SDN)-based architecture along with the transition to the full adoption of the Internet protocol version 6 (IPv6) connectivity. Migration of currently running legacy IPv4 networks into such new approaches requires ei...
Article
Full-text available
Internet-of-Things (IoT) devices are massively interconnected, which overwhelming traffic in network. The concept of edge computing brings a new paradigm to monitor and manage network traffic at the network’s edge. Network traffic classification is a critical task to monitor and identify Internet traffic. Recent traffic classification works suggest...