
Md Sohel RanaDhaka University of Engineering & Technology | DUET · Institute of Information and Communication Technology
Md Sohel Rana
Master of Science
About
17
Publications
9,987
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
38
Citations
Citations since 2017
Introduction
In 2018, I received a B.Sc. (Engg.) in computer science and engineering from Dhaka University of Engineering and Technology (DUET), Gazipur, Dhaka-1707, Bangladesh, and in 2021, I received an M.Sc. in information and communication technology (ICT) from Bangladesh University of Engineering and Technology (BUET), Palashi, Dhaka, Bangladesh.I am currently employed as a faculty member at IICT of DUET. My research interests are in cryptography, network security, and machine learning.
Additional affiliations
Education
August 2013 - February 2018
Publications
Publications (17)
Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorit...
COVID-19 is the most used and significant word in this year. It has taken many lives, created fear among people and changed people's and country's perspective and decision. The virus has kept people isolated in their homes, and borders have been blocked. The third wave of Covid-19 variants has finally come to an end. Based on an online questionnair...
A mobile application, sometimes known as an app, is a form of software designed to operate on a mobile device such as a mobile phone or tablet and is commonly used to deliver user services similar to those accessible on PCs. Mobile applications have become an important part of our lives, allowing us to communicate with people all over the world whi...
In December 2019 the novel coronavirus which first appeared in Wuhan City of China spread rapidly around the world and became a pandemic. It has caused a devastating effect on daily lives, public health, and the global economy. As soon as possible we have to detect the affected patient and quickly treat them. There are no accurate automated toolkit...
In recent years, small computing devices used in wireless sensors, radio frequency identification (RFID) tags, Internet of Things (IoT) are increasing rapidly. However, the resources and capabilities of these devices are limited. Conventional encryption ciphers are computationally expensive and not suitable for lightweight devices. Hence, research...
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
The novel coronavirus 2019 (COVID-2019), which first prevailed in Wuhan city of China in
December 2019, be scattered rapidly around the world and turned into a pandemic. It has caused
a subversive effect on both daily lives, public health, and the global economy of a country. It is so
critical to detect the positive cases as early as possible so...
It’s a key scheduling based on neural networks for lightweight block ciphers. Most of the modern ciphers are designed on number theory. So streangth of ciphers depends on complexity of number theory used in the ciphers. Hence, more complexities hinder the performance of the lightweight device. So neural network can be a solution for this problem.
Now-a-days, Security in communication over Internet has turned out to be complex as technology becomes faster and more efficient rapidly especially for resources limited devices like embedded devices, wireless sensors, RFID (Radio Frequency Identification) tags, Internet of Things (IoT) devices. Lightweight cryptographic algorithms provide security...
Abstract—In recent years, small computing devices like
embedded devices, wireless sensors, RFID tags (Radio Frequency
Identification), Internet of Things (IoT) devices are increasing
rapidly. They are expected to generate massive amount of
sensitive data for controlling and monitoring purposes. But their
resources and capabilities are limited....
In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited. Those also wo...
Questions
Question (1)
I need to check and compare strength of my modified block cipher algorithm. Which tool can I used?
Projects
Projects (5)
To observe the BER of different OFDM techniques
This Distributed Hash Generator system consists of two programs, the worker client and the server. The server creates a Hash Table with 1024 Blocks each of which contains 222 Keys and is also responsible for distribution of Blocks to different Clients. The clients and server communicate with each other using the sockets API to send UDP packets. Also Server waits for client requests.
After get connected to the server successfully, the Client sends the Data request to get a range of Nonce (Key range) for a specific Block. Then the Server replies to the clients with a Block Number. After receiving a block number, Clients try to find all possible keys within the range by hashing with MD5. If Client finds any keys then the client sends a successfully packet to the server with matching Hash Key M. Server writes all the found keys in an output file.
If Clients failed to get key within a block, Clients request for next block to the server and try to find possible keys from all blocks.