
Md Sohel RanaDhaka University of Engineering & Technology | DUET · Institute of Information & Communication Technology
Md Sohel Rana
Master of Science
Looking for fully funded Ph.D. offer
About
21
Publications
16,076
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
67
Citations
Introduction
In 2018, I received a B.Sc. (Engg.) in computer science and engineering from Dhaka University of Engineering and Technology (DUET), Gazipur, Dhaka-1707, Bangladesh, and in 2021, I received an M.Sc. in information and communication technology (ICT) from Bangladesh University of Engineering and Technology (BUET), Palashi, Dhaka, Bangladesh.I am currently employed as a faculty member at IICT of DUET. My research interests are in cryptography, network security, and machine learning.
Additional affiliations
Education
August 2013 - February 2018
Publications
Publications (21)
This paper introduces a new lightweight cryptographic algorithm with a hybrid architecture that is specifically designed for securing Internet of Things (IoT) devices. The hybrid architecture uses a unique combination of one-hot encoding (OHE) and substitution-permutation network (SPN) structures to encrypt data in a computationally and memory-effi...
In this research, the standard replication strategies in the distributed cloud computing storage system are investigated and assessed. To guarantee data availability and dependability in cloud storage, replication is a fundamental strategy. Analyzing the effectiveness, scalability, and fault tolerance of different widely used replication strategies...
This research provides a thorough investigation of the self-balancing capabilities of long-range jumping robots. The study focuses on the concepts underlying jumping robots' self-balancing mechanisms and their capacity to retain stability during lengthy jumps. The existing literature on self-balancing robots is reviewed, with an emphasis on the var...
With the emergence of big data and predictive analytics, the fourth industrial revolution (4IR) has transformed the field of supply chain management, providing new opportunities and challenges for organizations. The purpose of this systematic literature review is to investigate the challenges and opportunities of big data and predictive analytics f...
Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorit...
COVID-19 is the most used and significant word in this year. It has taken many lives, created fear among people and changed people's and country's perspective and decision. The virus has kept people isolated in their homes, and borders have been blocked. The third wave of Covid-19 variants has finally come to an end. Based on an online questionnair...
A mobile application, sometimes known as an app, is a form of software designed to operate on a mobile device such as a mobile phone or tablet and is commonly used to deliver user services similar to those accessible on PCs. Mobile applications have become an important part of our lives, allowing us to communicate with people all over the world whi...
In the era of the Internet, faster communication is the most desirable aspect of wireless channels to meet the need for high-speed data transmission. However, for dealing with high-speed data rates as well as multipath fading channels such as AWGN and Rayleigh, orthogonal frequency division multiplexing (OFDM) is the most frequently used and succes...
In December 2019 the novel coronavirus which first appeared in Wuhan City of China spread rapidly around the world and became a pandemic. It has caused a devastating effect on daily lives, public health, and the global economy. As soon as possible we have to detect the affected patient and quickly treat them. There are no accurate automated toolkit...
In recent years, small computing devices used in wireless sensors, radio frequency identification (RFID) tags, Internet of Things (IoT) are increasing rapidly. However, the resources and capabilities of these devices are limited. Conventional encryption ciphers are computationally expensive and not suitable for lightweight devices. Hence, research...
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
The novel coronavirus 2019 (COVID-2019), which first prevailed in Wuhan city of China in
December 2019, be scattered rapidly around the world and turned into a pandemic. It has caused
a subversive effect on both daily lives, public health, and the global economy of a country. It is so
critical to detect the positive cases as early as possible so...
It’s a key scheduling based on neural networks for lightweight block ciphers. Most of the modern ciphers are designed on number theory. So streangth of ciphers depends on complexity of number theory used in the ciphers. Hence, more complexities hinder the performance of the lightweight device. So neural network can be a solution for this problem.
Now-a-days, Security in communication over Internet has turned out to be complex as technology becomes faster and more efficient rapidly especially for resources limited devices like embedded devices, wireless sensors, RFID (Radio Frequency Identification) tags, Internet of Things (IoT) devices. Lightweight cryptographic algorithms provide security...
Abstract—In recent years, small computing devices like
embedded devices, wireless sensors, RFID tags (Radio Frequency
Identification), Internet of Things (IoT) devices are increasing
rapidly. They are expected to generate massive amount of
sensitive data for controlling and monitoring purposes. But their
resources and capabilities are limited....
Questions
Question (1)
I need to check and compare strength of my modified block cipher algorithm. Which tool can I used?