Rahamatullah KhondokerMittelhessen University of Applied Sciences | THM · MND
Rahamatullah Khondoker
Dr.-Ing.
About
83
Publications
28,642
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
993
Citations
Introduction
A German Cyber Security Professor
Skills and Expertise
Publications
Publications (83)
Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter these cyberattacks, policymakers have made strong guidelines, and various security provisions like secure authentication and encryption mechanisms as effective countermeasures...
In modern automobiles, the infotainment system is crucial for enhancing driver and passenger capabilities, offering advanced features such as music, navigation, communication, and entertainment. Leveraging Wi-Fi, cellular networks, NFC, and Bluetooth, the system ensures continuous internet connectivity, providing seamless access to information. How...
In modern automobiles, Infotainment High-Performance Computing (HPC) systems play a vital role in enhancing the capabilities of drivers and passengers by providing advanced features consisting of music, navigation, communication, entertainment, etc. However, as the use of information technology in vehicles increases, it results in cybersecurity thr...
The increasing usage of autonomous and automatic systems within the automotive industry is steering us towards a more interconnected world. This enhanced interconnectivity fosters a more streamlined driving experience, reduces costs, and provides timely driver assistance. The electric/electronic (EE) architectures of modern vehicles are inherently...
Industrial Cyber Physical Systems (CPS) are large-scale critical infrastructures that are vulnerable to cyberattacks with wide-ranging consequences. Being a combination of heterogeneous devices and protocols, the large-scale CPS anomaly is also exposed to critical vulnerabilities. These vulnerabilities are treated in terms of anomalies and cyberatt...
As a result of quick transformation to digitalization for providing the employees teleworking/home office services with the capabilities to access company resources from outside the company over Internet using remote desktop and virtual private network (VPN) applications and the increase in digital activity during COVID-19 such as the usage of audi...
The main objective of this study is to find the challenges and opportunities for the adoption of 5G technology for the development and growth of the business environment in Bangladesh. An online survey based on an opinion poll (questionnaire) has been selected as the research method due to the short turnaround time, quick delivery, and simple retur...
Modern autonomous vehicles with an electric/electronic (E/E) architecture represent the next big step in the automation and evolution of smart and self-driving vehicles. This technology is of significant interest nowadays and humans are currently witnessing the development of the different levels of automation for their vehicles. According to recen...
In the recent years, Distributed Denial of Service (DDoS) attacks on Internet of Things (IoT) devices have become one of the prime concerns to Internet users around the world. One of the sources of the attacks on IoT ecosystems are botnets. Intruders force IoT devices to become unavailable for its legitimate users by sending large number of message...
In the recent years, we have witnessed a huge growth in the number of Internet of Things (IoT) and edge devices being used in our everyday activities. This demands the security of these devices from cyber attacks to be improved to protect its users. For years, Machine Learning (ML) techniques have been used to develop Network Intrusion Detection Sy...
The concept of traditional farming is changing rapidly with the introduction of smart technologies like the Internet of Things (IoT). Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity to e...
The concept of traditional farming is changing rapidly with the introduction of smart technologies like the Internet of Things (IoT). Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity to e...
The concept of traditional farming is changing
rapidly with the introduction of smart technologies like the
Internet of Things (IoT). Under the concept of smart agriculture,
precision agriculture is gaining popularity to enable Decision
Support System (DSS)-based farming management that utilizes
widespread IoT sensors and wireless connectivity to e...
Telesurgery allows surgeons to perform surgery on patients remotely with the advancement of surgical robots and network communication technologies. But there are potential issues such as communication latency and cyber security. Researchers found that the use of fifth generation of mobile communication technologies (5G) is a radical change in reduc...
Software defined applications for WAN (Wide Area Network) are primarily designed to manage and deploy enterprise WAN infrastructure. SDN controller feature helps an organization to automate complex WAN configuration and route data efficiently among its remote sites from a centralized point. Recently various vendors have stepped in this market and c...
Software-defined networking (SDN) has major advantages over traditional network setups. The SDN paradigm decreases management complexity of computer networks by separating the control layer from network devices, thereby centralizing management functionalities for easier administration of the network. Due to the nature of being a massively decentral...
Big Data is a term that describes structured and unstructured large data sets. One of the frameworks to store , process and analyze this data is Apache Hadoop . Software Defined Networking (SDN) enhances the performance aspects of Hadoop by optimizing bandwidth utilization and improving network management. Security attacks on the SDN controller and...
With the steady increase in the information and high network resource sharing, organizations require big data centers. To control the workload in the data centers and minimize the response time, effective load-balancing systems are necessary. The routing applications play an important role here. Some routing applications based on Software Defined N...
Middleware assurance substrate (MIDAS) is a state-of-the-art approach for Distributed Real-Time and Embedded (DRE) systems, which enables a Data Distribution Service (DDS) with Quality of Service (QoS) properties to provide performance guarantees in the system. MIDAS is based on the OpenFlow protocol for Software-defined Networking (SDN) by McKeown...
Mobile devices like smartphones, tablets and laptops demand highly-available and ubiquitous wireless networks, also named as Wireless Fidelity (WiFi) or Wireless Local Area Network (WLAN). The steadily rising amount of mobile devices implies new requirements claimed by administrators of enterprise wireless networks and owners of guest WiFi spots, s...
Software-defined network (SDN) is an emerging approach to replace legacy network’s (coupled software and hardware) control and management by decoupling the control plane (software) from the data plane (hardware). SDN provides flexibility to the developers by making the central control plane directly programmable. Some new challenges, such as single...
Recently with the emergence of Software Defined Networking (SDN), cloud environments have gone through modifications as traditional data centers adopt SDN as a network management solution. As cloud networking platform provides great power to configure networks in cloud, there is also a downside that intruders and hackers may control the network fun...
This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoft’s threat modeling framework STRIDE.
Before deploying new technologies in the production environment, their security aspects must be considered. Software Defined Networking (SDN) and Network Functi...
Preceded by three industrial evolutions with the virtue of innovation in basic technologies such as mechanics (first evolution, beginning in the 1780s), electricity (second evolution, beginning from the 1870s), and electronics and computation (third evolution, starting from the 1970s), the vision for the fourth industrial evolution (in German calle...
Software‐Defined Networks (SDNs) are emerging as one of the most promising new era network technologies with its centralized and easily programmable nature. Many security issues with legacy networks could easily be resolved using SDNs central management and control; at the same time, security vulnerabilities of this technology are still the biggest...
Everything of our life is migrating into virtualization and we are depending on information technology. We are using information and program extensively day by day. To access data globally and timely we are storing data into Cloud Storage Space. Cloud service providers maintain authentication and authorization mechanism but there are no mechanisms...
There is an immense expectation on Software-Defined Networking (SDN) in industry as a novel approach towards potentially replacing conventional network management and control. However, SDN is not immune to security vulnerabilities which currently exist in the legacy systems or which may newly arise due to change in the network design. Since the beg...
Software-defined Networking (SDN) is a novel approach to manage enterprise and data center networks easily. Integration of middleboxes, which provides Network Functions (NF)s that are crucial for network security, performance and reliability, raises new challenges, for example, traversing middle-boxes in a given order makes routing more complex. Re...
With the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control...
The complexity of modern communication networks and innovative cyber-attacking methods make it difficult to automatically detect and prevent attacks. Software-Defined Networking (SDN) separates the forwarding of network traffic from the decision plane of the network and offers a central and programmable interface for the configuration of the networ...
Driven by future Internet projects such as GENI and FIND, the worldwide research of future network architectures results in several architectural approaches such as NENA, XIA, SONATE, RINA, and ANA, to name a few. Even though the same service with different qualities of attributes can be offered by the same architecture, the probability of having s...
Using different selection and composition approaches in the same architecture such as SONATE, the possibility of offering many similar coarse-grained services (e.g., protocol graphs) with different qualities of service is increasing. Such a case can be even higher when many different future network architectural approaches (e.g., NENA, RBA, RNA) co...
Most of the issues in the Internet arise because of inflexibility and rigidness attributes of the network architecture, which is built upon a protocol stack. The problem that is faced by the Internet is that it is hard to integrate new functionalities in it and to remove existing functionalities from it. The reason is that protocols and layers are...
A communication service (in short, a service), a set of effects provided by an execution of an implementation of protocol(s) or mechanism(s), is described by its “Service Description”. Existing web service description languages such as WSDL [139], which are used to describe web services, are not suitable for describing communication services as the...
Software Defined Networking (SDN) enables the use of programmable networking devices including switches and routers. As with other software, bugs are inevitable in SDN and ruin software quality. To ensure good quality SDN software, programmable devices and components in a SDN environment must be continuously checked and improved. To achieve this, t...
The research focus of Rahamatullah Khondoker is on Future Internet Architectures, Network Security, Software-Defined Networking, and Network Function Virtualization. In his PhD thesis, the author tackles challenges of today’s layered network architecture (such as TCP/IP protocol stack) which is inflexible. He proposes that the evolution of the netw...
The aim of Future Internet is to provide 24/7/365 satisfactory secure connectivity for everyone and everything which will bring changes in the society and industry. To achieve this goal, researchers are working to improve existing Radio, Core, and Management technologies and adding new concepts and technologies like Software Defined Networking (SDN...
The field of mobile communication is a fast evolving area. New protocols and technologies are developed, for example, LTE or MIMO. However, problems arise in implementing and managing these technologies, for example, today a Radio Access Network (RAN) provider buys new hardware for each new standard. For speeding up this process and generating new...
Security is one of the most important aspects in networks which sometimes need network monitoring and measurement tools to identify the source of misbehavior and performance degradation. Monitoring and measurement tools promise to provide critical functions including an early detection of a Denial of Service (DoS) attack. To ensure the internal sec...
Software Defined Networking (SDN) is a novel approach to allow configuration of networks in real time and a centralized manner. Likewise to legacy network architectures, security mechanisms are used to protect the network and the end-hosts within the network against attacks. While the properties of SDN allow to implement sophisticated security mech...
Today’s data networks are steadily growing in size and complexity. Especially in enterprise networks, these development lead to the requirement of a central network administration. With Software Defined Networking (SDN), this requirement can be fulfilled. However, new security considerations such as the protection of the central component must be tak...
Size as well as complexity of communication networks (e.g. enterprise, backbone, data center) are increasing dayby-day. Software-Defined Networking (SDN) promises to enhance manageability of such networks by decoupling control plan of a switch/router from its data plane. However, SDN itself could also introducesecuritythreatse.g.DenialofService(DoS)...
Several Future Internet (FI) architectures have been pro-posed to address the problems of the Internet including flexibility (so called IP bottleneck), host-based address-ing (addressing a host rather than the content itself), and security. In this paper, we focus on eXpressive Internet Ar-chitecture (XIA) as it is the most secure and open-source C...
The original design of the Internet did not take
network security aspects into consideration, instead it aimed
to facilitate the process of information exchange between endhosts.
Consequently, many protocols that are part of the Internet
infrastructure expose a set of vulnerabilities that can be exploited
by attackers. To reduce these vulnerabiliti...
The Internet’s infrastructure shows severe limitations when an optimal end user
experience for multimedia applications should be achieved in a resource-efficiently way.
In order to realize truly user-centric networking, an information exchange between applications
and networks is required. To this end, network-application interfaces need to be
depl...
The implementation of communication protocols in the current Internetarchitectureistightly-coupledwhichhinderstheevolutionoftheInternet.Thisarticle describes how the principles of Service Oriented Architecture (SOA)can be employed to develop a flexible network architecture. The prototypeof the concept has been developed and demonstrated in the EuroV...
Software Defined Networking (SDN) is seen as one way to solve some problems of the Internet including security, managing complexity, multi-casting, load balancing, and energy efficiency. SDN is an architectural paradigm that separates the control plane of a networking device (e.g., a switch / router) from its data plane, making it feasible to contr...
As the number of future network architectural approaches in-creases, the possibility of offering many similar services with different qualities of service is increasing. Therefore, it will be required to select a suitable, or the best, service from the set of alternative services. This paper proposes a matching process and an adapted analytic hiera...
The modularizing of the functionalities from a network stack and then to compose a desirable service on demand is relatively new in the network architecture however the modularizing is being practiced in the software engineering since few decades now. The composition of functionalities to achieve a desired result can be performed at various time-ph...
Nowadays, Internet applications have reached such a high
complexity that the network stack concept developed decades
ago is not suitable anymore. In the beginning, it was basically
a simple data network. Today, many activities have moved onto
the Internet, such as communication (e.g., VoIP), entertainment
(e.g., podcast, webradio, TV) and education...
The Internet can not keep up with changing application requirements and new network technologies as its network architecture makes it hard to introduce new functionality because existing functionalities in the Architecture are inherently tightly coupled. This article describes how the principles of Service Oriented Architecture (SOA) can help to de...
Several current (e.g. TCP/IP, UDP/IP, SCTP/IP) and fu-
ture (SONATE, NENA) service providers o�er similar com-
munication functionality but di�er in quality on a variety of
important criteria. As the number of service providers in-
creases, the need to select the best service based on criteria
for certain application requirements is increasing. How...
Several current (e.g. TCP/IP, UDP/IP, SCTP/IP) and fu-ture (SONATE, NENA) service providers offer similar communication functionality but differ in quality on a variety of important criteria. As the number of service providers increases, the need to select the best service based on criteria for certain application requirements is increasing. Howeve...
For selecting and composing communication ser-vices to create a networking stack in a flexible future network architecture, service descriptions are required. In this paper, we propose a language for describing communication services. The language has been implemented by using the Resource Description Framework (RDF) and evaluated by describing a s...
The number of applications which use the Internet such
as Skype, Flickr, YouTube, Facebook, VoIP (Voice over IP)
and IPTV (IP Television) is increasing day by day. Each
application has its own specific requirements. According to ITUT
Recommendation Y.1541, VoIP and video teleconferences
should have a maximum IP packet transfer delay of 100 ms
where...
The Future Internet Assembly (FIA) roadmap working group has recently published the first version of the research roadmap for the future Internet. They described the research challenges and the demands of solutions considering business, economy, people/users/social, and technology. Though they described some of the required capabilities of future I...
From the economical and technical point of view, it is necessary to develop a spectrum sharing algorithm so that IEEE 802.11 networks can coexist with competing systems of the same or different technologies. A suitable way to maintain the coexistence is the centralized HCCA channel access method defined in IEEE 802.11e. This standard, however, only...
The current Internet architecture was designed decades ago.
Back then the main goals of the architecture were stability,
performance and of course its functionality. Current trends,
e.g. mobile devices, cloud computing, energy efficiency pose
new requirements that the current Internet architecture cannot
fulfill. Rather than building new functional...
Future Internet research yields an increasing number
of frameworks for new protocol stacks. Each of them
defines its own API in order to reduce the networking
know-how an application needs for communicating with
others. Thus, networking functionality, today done by the
applications themselves, is pushed down below the API.
This comprises in particu...
Today's Internet has a static architecture that makes introducing new functionality a complex and costly task, so the Internet can not keep pace with rising demands and new network capabilities. Therefore, evolvability and flexibility are the keys to a future Internet architecture. In this paper we propose a building block interaction model that ca...
Functional composition is an approach for a flexible network architecture which enables a customized combination of functionality with respect to application requirements. Functional composition overcomes the inflexibility of the current Internet architecture and facilitates the management of functionality within the network. Several projects have...
Adding new functionality into the current Internet architecture
is difficult because of the tight-coupling in network
protocol stacks. One method of creating loosely-coupled
network stacks is to split the functionality of the entire stack
into a set of services. Each service provides a specific function
known as a capability. Creating a network sta...
Network Functional Composition is an approach for a flexible Internet architecture which decomposes the layered network stack in functional building blocks which can be loosely coupled. Functional Composition therefore enables a customized composition of functionality at the edges and in the network in respect to application specific requirements....
Today networks offer few communication services provided by their associated protocols for communicating on the network. In the future, it is expected that networks will offer a large number of different communication services. With so many services available, determining which service to select and use will become much more difficult. Here we prop...
— Finding an appropriate tool to develop ontology is the first step towards ontology development. A lot of ontology development tools are available in the market, however, some are free and some are commercial. Which tools are mostly used by users? Are there any drawbacks using the tools? And if any, then what? The answers of these questions are hi...
Today networks offer communication services ranging from a rather simple and unsecure one to secure and reliable data transmission for communicating on the network. In the future, it is expected that networks will offer a large number of different communication services. With so many services available, determining which service to select and use b...
The combination of the logistical networks simulation and the communication networks simulation is analyzed taking the suitable OOP languages features and design patterns. In this paper we present a simulator for logistic processes and the way how it is extended to enable combined simulation of logistical and communication networks. The aim of this...
Regular attendance tracking and recording the performance are considered as the precondition of improving the students quality in learning, but can today only be tracked with high effort in both German and International schools in Germany. The MTT project aims at teachers giving them a tool at hand that enables gathering valuable attendance and gra...
Network
Cited