Imran Makhdoom

Imran Makhdoom
University of Technology Sydney | UTS · Faculty of Engineering and Information Technology

Doctor of Philosophy

About

17
Publications
30,485
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
691
Citations
Introduction
Imran Makhdoom (Student member IEEE) received the B.E. degree in telecommunications engineering and the master’s degree in information security from the National University of Sciences and Technology, Pakistan, in 2004 and 2015, respectively. He has worked as a Project Manager on various wireless communication and IT projects involving Satellite, OFC and CISCO networks. He has also served in a semi-government organization for various cyber-security auditing tasks from 2014 to 2016. Imran is an EC-Council Certified Secure Computer User and certified IoT specialist from University of California Irvine, USA. He was a recipient of the President’s Gold Medal for securing first position in his master’s degree. Currently, he is pursuing the Ph.D. degree with the University of Technology Sydney.
Additional affiliations
December 2016 - present
University of Technology Sydney
Position
  • Research Assistant
Description
  • Researching the potential of leveraging Blockchain technology to secure IoT against data and device integrity attacks.

Publications

Publications (17)
Article
Full-text available
The ubiquitous use of Internet of Things (IoT) ranges from industrial control systems to e-Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber-physical systems and a lot more. However, the data collected and processed by IoT systems especially the ones with central- ized control are vulnerable to availabili...
Article
The majority of existing DDoS defense mechanisms in SDN impose a significant computational burden on the controller and employ limited flow statistics and packet features. Tackling these issues, this paper presents a multi-layer defense mechanism that detects and mitigates three distinct types of flooding DDoS attacks. In the proposed framework, th...
Article
Full-text available
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weaknesses in the implementation of encryption algorithms and can thus decrypt or guess the related crypt...
Article
Full-text available
Most of the existing science and technology parks resort to various conventional ways to attract different stakeholders to the park. Some of these traditional measures include business support, workspaces, laboratories, networking events, accommodation, and essential commodities. Besides, with rampantly changing multidisciplinary technologies and i...
Article
Full-text available
Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a Collaborative Intrusion Detection System successfully detects and prevents various attacks, it is possible that an inside attacker performs a malicio...
Article
Full-text available
Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved. This survey article discusses the evolution of the Internet of Things and presents the vision for In...
Article
Full-text available
Recently great strides have been made in the field of automatic speech recognition (ASR) by using various deep learning techniques. In this study, we present a thorough comparison between cutting-edged techniques currently being used in this area, with a special focus on the various deep learning methods. This study explores different feature extra...
Conference Paper
Full-text available
Exhibition of malicious behavior during blockchain consensus, threats against reputation systems, and high TX latency are significant issues for blockchain-based IoT systems. Hence, to mitigate such challenges we propose “Pledge”, a unique Proof-of-Honesty based consensus protocol. Initial experimen- tation shows that Pledge is economical with low c...
Conference Paper
Full-text available
As a tool for human technological advancement, the peer-review system acts as a gateway for ensuring academic paper qualities. However, the system has proven to be slow and expensive. Also, biasedness remains an unsolved problem. Such issues could become a major bottleneck, which can adversely impact research progress and dissemination of knowledge...
Article
Full-text available
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. The ubiquitous use of IoT ranges from Industrial Control Systems (ICS) to e-Health, e-Commerce, smart cities, supply chain management, smart cars, Cyber Physical Systems (CPS) and a lot more. Such reliance on IoT is resulting in a significant...
Conference Paper
Full-text available
Bitcoin has revolutionized the decentralized payment system by excluding the need for a trusted third party, reducing the transaction (TX) fee and time involved in TX confirmation as compared to a conventional banking system. The underlying technology of Bitcoin is Blockchain, which was initially designed for financial TXs only. However, due to its...
Article
Full-text available
Wireless Sensor Networks (WSN) due to their distributed nature are vulnerable to various external and insider attacks. Classic cryptographic measures do protect against external attacks to some extent but they fail to defend against insider attacks involving node compromise. A compromised node can be used to launch various attacks of which Sybil At...

Network

Cited By