Rahamatullah Khondoker

Rahamatullah Khondoker
Mittelhessen University of Applied Sciences | THM · MND

Dr.-Ing.

About

83
Publications
28,642
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
993
Citations
Introduction
A German Cyber Security Professor
Additional affiliations
January 2013 - present
Fraunhofer Institute for Secure Information Technology
Position
  • Researcher
January 2010 - November 2012
Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau
Position
  • Wissenschaftlicher Mitarbeitetr

Publications

Publications (83)
Article
Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter these cyberattacks, policymakers have made strong guidelines, and various security provisions like secure authentication and encryption mechanisms as effective countermeasures...
Article
Full-text available
In modern automobiles, the infotainment system is crucial for enhancing driver and passenger capabilities, offering advanced features such as music, navigation, communication, and entertainment. Leveraging Wi-Fi, cellular networks, NFC, and Bluetooth, the system ensures continuous internet connectivity, providing seamless access to information. How...
Preprint
Full-text available
In modern automobiles, Infotainment High-Performance Computing (HPC) systems play a vital role in enhancing the capabilities of drivers and passengers by providing advanced features consisting of music, navigation, communication, entertainment, etc. However, as the use of information technology in vehicles increases, it results in cybersecurity thr...
Article
Full-text available
The increasing usage of autonomous and automatic systems within the automotive industry is steering us towards a more interconnected world. This enhanced interconnectivity fosters a more streamlined driving experience, reduces costs, and provides timely driver assistance. The electric/electronic (EE) architectures of modern vehicles are inherently...
Chapter
Industrial Cyber Physical Systems (CPS) are large-scale critical infrastructures that are vulnerable to cyberattacks with wide-ranging consequences. Being a combination of heterogeneous devices and protocols, the large-scale CPS anomaly is also exposed to critical vulnerabilities. These vulnerabilities are treated in terms of anomalies and cyberatt...
Chapter
As a result of quick transformation to digitalization for providing the employees teleworking/home office services with the capabilities to access company resources from outside the company over Internet using remote desktop and virtual private network (VPN) applications and the increase in digital activity during COVID-19 such as the usage of audi...
Conference Paper
Full-text available
The main objective of this study is to find the challenges and opportunities for the adoption of 5G technology for the development and growth of the business environment in Bangladesh. An online survey based on an opinion poll (questionnaire) has been selected as the research method due to the short turnaround time, quick delivery, and simple retur...
Article
Full-text available
Modern autonomous vehicles with an electric/electronic (E/E) architecture represent the next big step in the automation and evolution of smart and self-driving vehicles. This technology is of significant interest nowadays and humans are currently witnessing the development of the different levels of automation for their vehicles. According to recen...
Preprint
In the recent years, Distributed Denial of Service (DDoS) attacks on Internet of Things (IoT) devices have become one of the prime concerns to Internet users around the world. One of the sources of the attacks on IoT ecosystems are botnets. Intruders force IoT devices to become unavailable for its legitimate users by sending large number of message...
Preprint
Full-text available
In the recent years, we have witnessed a huge growth in the number of Internet of Things (IoT) and edge devices being used in our everyday activities. This demands the security of these devices from cyber attacks to be improved to protect its users. For years, Machine Learning (ML) techniques have been used to develop Network Intrusion Detection Sy...
Conference Paper
Full-text available
The concept of traditional farming is changing rapidly with the introduction of smart technologies like the Internet of Things (IoT). Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity to e...
Preprint
Full-text available
The concept of traditional farming is changing rapidly with the introduction of smart technologies like the Internet of Things (IoT). Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity to e...
Presentation
Full-text available
The concept of traditional farming is changing rapidly with the introduction of smart technologies like the Internet of Things (IoT). Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity to e...
Conference Paper
Telesurgery allows surgeons to perform surgery on patients remotely with the advancement of surgical robots and network communication technologies. But there are potential issues such as communication latency and cyber security. Researchers found that the use of fifth generation of mobile communication technologies (5G) is a radical change in reduc...
Chapter
Full-text available
Software defined applications for WAN (Wide Area Network) are primarily designed to manage and deploy enterprise WAN infrastructure. SDN controller feature helps an organization to automate complex WAN configuration and route data efficiently among its remote sites from a centralized point. Recently various vendors have stepped in this market and c...
Chapter
Software-defined networking (SDN) has major advantages over traditional network setups. The SDN paradigm decreases management complexity of computer networks by separating the control layer from network devices, thereby centralizing management functionalities for easier administration of the network. Due to the nature of being a massively decentral...
Chapter
Big Data is a term that describes structured and unstructured large data sets. One of the frameworks to store , process and analyze this data is Apache Hadoop . Software Defined Networking (SDN) enhances the performance aspects of Hadoop by optimizing bandwidth utilization and improving network management. Security attacks on the SDN controller and...
Chapter
With the steady increase in the information and high network resource sharing, organizations require big data centers. To control the workload in the data centers and minimize the response time, effective load-balancing systems are necessary. The routing applications play an important role here. Some routing applications based on Software Defined N...
Chapter
Middleware assurance substrate (MIDAS) is a state-of-the-art approach for Distributed Real-Time and Embedded (DRE) systems, which enables a Data Distribution Service (DDS) with Quality of Service (QoS) properties to provide performance guarantees in the system. MIDAS is based on the OpenFlow protocol for Software-defined Networking (SDN) by McKeown...
Chapter
Mobile devices like smartphones, tablets and laptops demand highly-available and ubiquitous wireless networks, also named as Wireless Fidelity (WiFi) or Wireless Local Area Network (WLAN). The steadily rising amount of mobile devices implies new requirements claimed by administrators of enterprise wireless networks and owners of guest WiFi spots, s...
Chapter
Software-defined network (SDN) is an emerging approach to replace legacy network’s (coupled software and hardware) control and management by decoupling the control plane (software) from the data plane (hardware). SDN provides flexibility to the developers by making the central control plane directly programmable. Some new challenges, such as single...
Chapter
Recently with the emergence of Software Defined Networking (SDN), cloud environments have gone through modifications as traditional data centers adopt SDN as a network management solution. As cloud networking platform provides great power to configure networks in cloud, there is also a downside that intruders and hackers may control the network fun...
Book
This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoft’s threat modeling framework STRIDE. Before deploying new technologies in the production environment, their security aspects must be considered. Software Defined Networking (SDN) and Network Functi...
Chapter
Preceded by three industrial evolutions with the virtue of innovation in basic technologies such as mechanics (first evolution, beginning in the 1780s), electricity (second evolution, beginning from the 1870s), and electronics and computation (third evolution, starting from the 1970s), the vision for the fourth industrial evolution (in German calle...
Article
Software‐Defined Networks (SDNs) are emerging as one of the most promising new era network technologies with its centralized and easily programmable nature. Many security issues with legacy networks could easily be resolved using SDNs central management and control; at the same time, security vulnerabilities of this technology are still the biggest...
Chapter
Full-text available
Everything of our life is migrating into virtualization and we are depending on information technology. We are using information and program extensively day by day. To access data globally and timely we are storing data into Cloud Storage Space. Cloud service providers maintain authentication and authorization mechanism but there are no mechanisms...
Conference Paper
There is an immense expectation on Software-Defined Networking (SDN) in industry as a novel approach towards potentially replacing conventional network management and control. However, SDN is not immune to security vulnerabilities which currently exist in the legacy systems or which may newly arise due to change in the network design. Since the beg...
Conference Paper
Software-defined Networking (SDN) is a novel approach to manage enterprise and data center networks easily. Integration of middleboxes, which provides Network Functions (NF)s that are crucial for network security, performance and reliability, raises new challenges, for example, traversing middle-boxes in a given order makes routing more complex. Re...
Article
Full-text available
With the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control...
Conference Paper
The complexity of modern communication networks and innovative cyber-attacking methods make it difficult to automatically detect and prevent attacks. Software-Defined Networking (SDN) separates the forwarding of network traffic from the decision plane of the network and offers a central and programmable interface for the configuration of the networ...
Chapter
Driven by future Internet projects such as GENI and FIND, the worldwide research of future network architectures results in several architectural approaches such as NENA, XIA, SONATE, RINA, and ANA, to name a few. Even though the same service with different qualities of attributes can be offered by the same architecture, the probability of having s...
Chapter
Using different selection and composition approaches in the same architecture such as SONATE, the possibility of offering many similar coarse-grained services (e.g., protocol graphs) with different qualities of service is increasing. Such a case can be even higher when many different future network architectural approaches (e.g., NENA, RBA, RNA) co...
Chapter
Most of the issues in the Internet arise because of inflexibility and rigidness attributes of the network architecture, which is built upon a protocol stack. The problem that is faced by the Internet is that it is hard to integrate new functionalities in it and to remove existing functionalities from it. The reason is that protocols and layers are...
Chapter
A communication service (in short, a service), a set of effects provided by an execution of an implementation of protocol(s) or mechanism(s), is described by its “Service Description”. Existing web service description languages such as WSDL [139], which are used to describe web services, are not suitable for describing communication services as the...
Conference Paper
Software Defined Networking (SDN) enables the use of programmable networking devices including switches and routers. As with other software, bugs are inevitable in SDN and ruin software quality. To ensure good quality SDN software, programmable devices and components in a SDN environment must be continuously checked and improved. To achieve this, t...
Book
The research focus of Rahamatullah Khondoker is on Future Internet Architectures, Network Security, Software-Defined Networking, and Network Function Virtualization. In his PhD thesis, the author tackles challenges of today’s layered network architecture (such as TCP/IP protocol stack) which is inflexible. He proposes that the evolution of the netw...
Presentation
Full-text available
The aim of Future Internet is to provide 24/7/365 satisfactory secure connectivity for everyone and everything which will bring changes in the society and industry. To achieve this goal, researchers are working to improve existing Radio, Core, and Management technologies and adding new concepts and technologies like Software Defined Networking (SDN...
Conference Paper
Full-text available
The field of mobile communication is a fast evolving area. New protocols and technologies are developed, for example, LTE or MIMO. However, problems arise in implementing and managing these technologies, for example, today a Radio Access Network (RAN) provider buys new hardware for each new standard. For speeding up this process and generating new...
Conference Paper
Full-text available
Security is one of the most important aspects in networks which sometimes need network monitoring and measurement tools to identify the source of misbehavior and performance degradation. Monitoring and measurement tools promise to provide critical functions including an early detection of a Denial of Service (DoS) attack. To ensure the internal sec...
Conference Paper
Full-text available
Software Defined Networking (SDN) is a novel approach to allow configuration of networks in real time and a centralized manner. Likewise to legacy network architectures, security mechanisms are used to protect the network and the end-hosts within the network against attacks. While the properties of SDN allow to implement sophisticated security mech...
Conference Paper
Full-text available
Today’s data networks are steadily growing in size and complexity. Especially in enterprise networks, these development lead to the requirement of a central network administration. With Software Defined Networking (SDN), this requirement can be fulfilled. However, new security considerations such as the protection of the central component must be tak...
Conference Paper
Full-text available
Size as well as complexity of communication networks (e.g. enterprise, backbone, data center) are increasing dayby-day. Software-Defined Networking (SDN) promises to enhance manageability of such networks by decoupling control plan of a switch/router from its data plane. However, SDN itself could also introducesecuritythreatse.g.DenialofService(DoS)...
Conference Paper
Full-text available
Several Future Internet (FI) architectures have been pro-posed to address the problems of the Internet including flexibility (so called IP bottleneck), host-based address-ing (addressing a host rather than the content itself), and security. In this paper, we focus on eXpressive Internet Ar-chitecture (XIA) as it is the most secure and open-source C...
Conference Paper
Full-text available
The original design of the Internet did not take network security aspects into consideration, instead it aimed to facilitate the process of information exchange between endhosts. Consequently, many protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers. To reduce these vulnerabiliti...
Article
Full-text available
The Internet’s infrastructure shows severe limitations when an optimal end user experience for multimedia applications should be achieved in a resource-efficiently way. In order to realize truly user-centric networking, an information exchange between applications and networks is required. To this end, network-application interfaces need to be depl...
Article
Full-text available
The implementation of communication protocols in the current Internetarchitectureistightly-coupledwhichhinderstheevolutionoftheInternet.Thisarticle describes how the principles of Service Oriented Architecture (SOA)can be employed to develop a flexible network architecture. The prototypeof the concept has been developed and demonstrated in the EuroV...
Conference Paper
Full-text available
Software Defined Networking (SDN) is seen as one way to solve some problems of the Internet including security, managing complexity, multi-casting, load balancing, and energy efficiency. SDN is an architectural paradigm that separates the control plane of a networking device (e.g., a switch / router) from its data plane, making it feasible to contr...
Conference Paper
Full-text available
As the number of future network architectural approaches in-creases, the possibility of offering many similar services with different qualities of service is increasing. Therefore, it will be required to select a suitable, or the best, service from the set of alternative services. This paper proposes a matching process and an adapted analytic hiera...
Conference Paper
Full-text available
The modularizing of the functionalities from a network stack and then to compose a desirable service on demand is relatively new in the network architecture however the modularizing is being practiced in the software engineering since few decades now. The composition of functionalities to achieve a desired result can be performed at various time-ph...
Conference Paper
Full-text available
Nowadays, Internet applications have reached such a high complexity that the network stack concept developed decades ago is not suitable anymore. In the beginning, it was basically a simple data network. Today, many activities have moved onto the Internet, such as communication (e.g., VoIP), entertainment (e.g., podcast, webradio, TV) and education...
Conference Paper
Full-text available
The Internet can not keep up with changing application requirements and new network technologies as its network architecture makes it hard to introduce new functionality because existing functionalities in the Architecture are inherently tightly coupled. This article describes how the principles of Service Oriented Architecture (SOA) can help to de...
Conference Paper
Full-text available
Several current (e.g. TCP/IP, UDP/IP, SCTP/IP) and fu- ture (SONATE, NENA) service providers o�er similar com- munication functionality but di�er in quality on a variety of important criteria. As the number of service providers in- creases, the need to select the best service based on criteria for certain application requirements is increasing. How...
Conference Paper
Full-text available
Several current (e.g. TCP/IP, UDP/IP, SCTP/IP) and fu-ture (SONATE, NENA) service providers offer similar communication functionality but differ in quality on a variety of important criteria. As the number of service providers increases, the need to select the best service based on criteria for certain application requirements is increasing. Howeve...
Article
Full-text available
For selecting and composing communication ser-vices to create a networking stack in a flexible future network architecture, service descriptions are required. In this paper, we propose a language for describing communication services. The language has been implemented by using the Resource Description Framework (RDF) and evaluated by describing a s...
Conference Paper
Full-text available
The number of applications which use the Internet such as Skype, Flickr, YouTube, Facebook, VoIP (Voice over IP) and IPTV (IP Television) is increasing day by day. Each application has its own specific requirements. According to ITUT Recommendation Y.1541, VoIP and video teleconferences should have a maximum IP packet transfer delay of 100 ms where...
Conference Paper
Full-text available
The Future Internet Assembly (FIA) roadmap working group has recently published the first version of the research roadmap for the future Internet. They described the research challenges and the demands of solutions considering business, economy, people/users/social, and technology. Though they described some of the required capabilities of future I...
Book
From the economical and technical point of view, it is necessary to develop a spectrum sharing algorithm so that IEEE 802.11 networks can coexist with competing systems of the same or different technologies. A suitable way to maintain the coexistence is the centralized HCCA channel access method defined in IEEE 802.11e. This standard, however, only...
Conference Paper
Full-text available
The current Internet architecture was designed decades ago. Back then the main goals of the architecture were stability, performance and of course its functionality. Current trends, e.g. mobile devices, cloud computing, energy efficiency pose new requirements that the current Internet architecture cannot fulfill. Rather than building new functional...
Conference Paper
Full-text available
Future Internet research yields an increasing number of frameworks for new protocol stacks. Each of them defines its own API in order to reduce the networking know-how an application needs for communicating with others. Thus, networking functionality, today done by the applications themselves, is pushed down below the API. This comprises in particu...
Conference Paper
Full-text available
Today's Internet has a static architecture that makes introducing new functionality a complex and costly task, so the Internet can not keep pace with rising demands and new network capabilities. Therefore, evolvability and flexibility are the keys to a future Internet architecture. In this paper we propose a building block interaction model that ca...
Conference Paper
Full-text available
Functional composition is an approach for a flexible network architecture which enables a customized combination of functionality with respect to application requirements. Functional composition overcomes the inflexibility of the current Internet architecture and facilitates the management of functionality within the network. Several projects have...
Conference Paper
Full-text available
Adding new functionality into the current Internet architecture is difficult because of the tight-coupling in network protocol stacks. One method of creating loosely-coupled network stacks is to split the functionality of the entire stack into a set of services. Each service provides a specific function known as a capability. Creating a network sta...
Article
Full-text available
Network Functional Composition is an approach for a flexible Internet architecture which decomposes the layered network stack in functional building blocks which can be loosely coupled. Functional Composition therefore enables a customized composition of functionality at the edges and in the network in respect to application specific requirements....
Conference Paper
Full-text available
Today networks offer few communication services provided by their associated protocols for communicating on the network. In the future, it is expected that networks will offer a large number of different communication services. With so many services available, determining which service to select and use will become much more difficult. Here we prop...
Article
Full-text available
— Finding an appropriate tool to develop ontology is the first step towards ontology development. A lot of ontology development tools are available in the market, however, some are free and some are commercial. Which tools are mostly used by users? Are there any drawbacks using the tools? And if any, then what? The answers of these questions are hi...
Article
Full-text available
Today networks offer communication services ranging from a rather simple and unsecure one to secure and reliable data transmission for communicating on the network. In the future, it is expected that networks will offer a large number of different communication services. With so many services available, determining which service to select and use b...
Article
Full-text available
The combination of the logistical networks simulation and the communication networks simulation is analyzed taking the suitable OOP languages features and design patterns. In this paper we present a simulator for logistic processes and the way how it is extended to enable combined simulation of logistical and communication networks. The aim of this...
Book
Regular attendance tracking and recording the performance are considered as the precondition of improving the students quality in learning, but can today only be tracked with high effort in both German and International schools in Germany. The MTT project aims at teachers giving them a tool at hand that enables gathering valuable attendance and gra...

Network