Syed S RizviPennsylvania State University | Penn State · College of Information Sciences and Technology
Syed S Rizvi
PhD., Computer Science & Engin
About
159
Publications
72,902
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,421
Citations
Introduction
Syed Rizvi is an Associate Professor in the College of Information Sciences and Technology at Penn State University. He received his doctorate in Modeling and Simulation from the University of Bridgeport. His research interests lie at the intersection of computer networking, network security, and modeling/simulation. Recently, he has been working on security issues in cloud computing, IoT, and cognitive radios for wireless communications. He has published over 70 research papers.
Additional affiliations
August 2006 - December 2009
Publications
Publications (159)
The development of the Internet of Things (IoT) has been at the forefront of progressing societal functionality. However, the addition of IoT devices in conventional information technology (IT) infrastructure has raised and prioritized the concern of information security and data privacy. The Common Vulnerability Scoring System (CVSS) is a framewor...
Purchasing items on the Internet with a credit card can be extremely risky. To mitigate this risk, we propose a new Multi-Layer Defense (MLD) scheme which uses two-factor authentication by instituting a random number generator that is only valid for a preset amount of time. For two-factor authentication, we use an eight-digit code that serves as a...
Abstract Cloud computing is a model for on-demand delivery of IT resources (e.g., servers, storage, databases, etc.) over the Internet with pay-as-you-go pricing. Although it provides numerous benefits to cloud service users (CSUs) such as flexibility, elasticity, scalability, and economies of scale, there is a large trust deficit between CSUs and...
The Internet of Things (IoT) creates a theoretical bridge between end users and the digital world. The IoT embodies a massive group of interconnected computing devices embedded with software, processors, and sensors capable of exchanging and transmitting data over network infrastructure. IoT technology has become prevalent among central domains suc...
The cloud computing environment provides easy-to-access service for private and confidential data. However, there are many threats to the leakage of private data. This paper focuses on investigating the vulnerabilities of cloud service providers (CSPs) from three risk aspects: management risks, law risks, and technology risks. Additionally, this pa...
For this research, our primary goal is to define an attack surface for networks utilizing the IoT (Internet of Things) devices. The IoT consists of systems of integrated objects, computing devices, digital, or mechanical machines that are given the ability to transmit and receive the data over a network without the need for human interaction. Each...
With the development of information society and network technology, people increasingly depend on information found on the Internet. At the same time, the models of information diffusion on the Internet are changing as well. However, these models experience the problem due to the fast development of network technologies. There is no thorough resear...
Cloud computing is clearly one of today’s most enticing technologies due to its scalable, flexible, and cost-efficient access to infrastructure and application services. Despite these benefits, cloud service users (CSUs) have serious concerns about the data security and privacy. Currently, there are several cloud service providers (CSPs) offering a...
Machine Learning(ML) has shown enormous potential in various domains with the wide variations of underlying data types. Because of the miscellany in the datasets and the features, ML classifiers often suffer from challenges such as feature miss-classification, unfit algorithms, low accuracy, overfitting, underfitting, extreme bias, and high predict...
Machine Learning (ML) requires a certain number of features (i.e., attributes) to train the model. One of the main challenges is to determine the right number and the type of such features out of the given dataset's attributes. It is not uncommon for theML process to use dataset of available features without computing the predictive value of each....
The internet of things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer interconnection over a network. IOT has the potential to provide unlimited benefits in daily life and the number of IOT devices is grow...
Identity theft is a very scary and real threat to everyone. In an attempt to give people peace of mind a new algorithm of mitigating risk is presented, the Secure Online Transaction Algorithm (SOTA). The proposed SOTA seeks to use two-factor authentication with the random codes. This form of user authentication has become widely accepted and many c...
In the past decade, technologies in vehicles have been rapidly advancing creating both a new type of “on the road” entertainment and safer environment while driving. Technologies such as anti-lock brake systems, steering assist, and in some cases autonomous driving, manufactures nearly eliminated the dangers of driving. To maintain the advances in...
Cloud computing is a rapidly evolving service for potential clients who wish to outsource their data storage or subscribe to cloud services. In a data-driven society, every company needs to make cost-effective and responsible decisions in terms of how they handle their sensitive data. Should a company make the decision to use cloud services, they m...
The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce the secure data aggregation using the access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect two sever...
The Cloud computing paradigm provides numerous attractive services to customers such as the provision of the on-demand self-service, usage-based pricing, ubiquitous network access, transference of risk, and location independent resource sharing. However, the security of cloud computing, especially its data privacy, is a highly challengeable task. T...
Cloud computing is a revolutionary breakthrough in computing technology. It allows businesses to supply their customers with a seemingly endless amount of resources on demand, so long as they are willing to pay for it. From a business perspective, cloud computing is revolutionizing profitability. From a security standpoint, cloud computing presents...
As the automobile industry continues to incorporate more technology into cars, the security of the "automobile network" portion of that technology is in need of tremendous improvement. The communications between the in-vehicle infotainment (IVI) systems and the essential safety systems (e.g., anti-lock brake systems) should remain secure. However,...
Mobile Cloud Computing (MCC) combines the features of mobile computing, cloud computing, and wireless networks to create the healthy computational resources to mobile cloud users. The MCC aims is to execute the highly attractive mobile applications on a plethora of mobile cellular telephones, with highly rich user experience. From perspective of mo...
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometric...
In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and e...
The network systems of the world are fragile, and can come under attack from any source. The attack can be a denial-of-service (DoS) state or another type of threat. What keep the networks safe are the intrusion detection and prevention systems (IDPS). They constantly monitor network traffic and if a malicious threat is detected, the threat is bloc...
The amount of valuable data pertaining to users, such as digital documents, images, and various other important files, has grown exceedingly and needs to be backed up safely. The two most widely used existing backup solutions are the removable devices and the online storage. Problems can arise in the external device backups, for example it takes a...
A wireless modem is a device which is used to transmit and receive data over a network. Power consumption for wireless devices becomes a challenge for researchers, causing the entire research environment to shift their focus to the power usage of wireless devices. Presently, by using a class A power amplifier, a power efficient wireless modem can b...
With emergence of the latest technology, need for digital documents, images and medias has greatly increased. On the other hand, there has been great demand of protecting those documents. The researchers proposed several approaches to protect those valuable documents. The two most exciting available approaches are to remove the devices and online s...
This paper investigates the identity theft and how to effectively use the biometric technology in order to prevent it from happening. Over the past few years, identity theft has become one of the most serious financial threats to corporations in the United States. Identity theft is when a thief steals sensitive information in order to engage in lar...
Cloud computing is a relatively new paradigm that provides numerous advantages to service providers, developers, and customers with respect to flexibility, scalability, and availability at a lower cost. Motivated by these technical and economical advantages, many data owners outsource their data to centralized large data centers where the data is n...
Recent trends within the IT industry have led to a tectonic shift in the way organizations utilize information systems to yield maximum efficiency. Cloud computing is the cornerstone of the aforementioned paradigm permutation. Information security, however, continues to dominate discussion on how organizations can utilize the efficiency of the clou...
The focus of this research paper is twofold: First, we discuss some of the critical issues and challenges currently inhibiting the realization of a cognitive radio network (CRN). Those problems include the utilization of jammers to prevent the spectrum sensing and communication. Primary User Emulation (PUE) still pose a significant mitigation chall...
Self-organization of distributed wireless sensor nodes is a critical issue in wireless sensor networks (WSNs), since each sensor node has limited energy, bandwidth, and scalability. These issues prevent sensor nodes from actively collaborating with the other types of sensor nodes deployed in a typical heterogeneous and somewhat hostile environment....
While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision...
Cloud computing represents the next evolutionary step in the realm of IT and offers a multitude of advantages over traditional computing models. However, there is a large trust deficit between cloud service users (CSUs) and cloud service providers (CSPs) that prevents the widespread adoption of the cloud among business professionals. Businesses are...
Cloud computing is an emerging computing model that provides numerous advantages to organizations (both service providers and customers) in terms of massive scalability, lower cost, and flexibility, to name a few. Despite these technical and economical advantages of cloud computing, many potential cloud consumers are still hesitant to adopt cloud c...
Recent trends within the IT industry have led to a tectonic shift in the way organisations utilise information systems to yield maximum efficiency. Cloud services are the cornerstone of the aforementioned paradigm permutation. The advent of cloud computing has brought with it a multitude of new and exciting concepts that can complicate security dem...
Cloud computing is an emerging paradigm that affects a large part of the IT industry by offering dynamically scalable resources (e.g., hardware and software) that are provisioned as a service over the Internet. Cloud computing provides numerous advantages to organizations in terms of improved scalability, lower cost, and flexibility, to name a few....
Cognitive Radio (CR) is a promising solution to solve the problem of limited spectrum and poor bandwidth utilization in wireless networks by opportunistically exploiting the available wireless spectrum. Despite the numerous advantages of CR technology, it imposes unique challenges for modeling and simulation due to dynamic spectrum sensing and the...
IT auditors collect information on an organization's information systems, practices, and operations and critically analyze the information for improvement. One of the primary goals of an IT audit is to determine if the information system and its maintainers are meeting both the legal expectations of protecting customer data and the company standard...
In the IT world of corporate networking, how businesses store and compute data is starting to shift from in-house servers to the cloud. However, some enterprises are still hesitant to make this leap to the cloud because of their information security and data privacy concerns. Enterprises that want to invest into this service need to feel confident...
With the rapid development of cloud computing, more users are attracted by its powerful and cost-efficient computation capability. However, whether CSPs can effectively protect CSUs’ data confidentiality remains a challenging issue. In this work, we aim at ensuring data confidentiality in the cloud environment by enabling CSUs to (1) encrypt their...
This paper presents a solution to resolve the interference problems between the Wi-FiTM and BluetoothTM wireless technologies. A new channel selecting approach is being used to select the frequency channel. The signal strength in a channel is assessed, and that value is used to select the channels to send data without interference. Thus we are tryi...
In this paper, we present different components necessary for a design of a typical cognitive radio (CR) and classify them in the context of modeling and simulation. A design of a CR network (CRN) includes the software defined radio (SDR), spectrum sensing, and communication channels. We construct a theoretical representation of a CR by specifying i...
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometric...
In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and e...
This paper presents a new logical process (LP) simulation model for distributed simulation systems where Null Message Algorithm (NMA) is used as an underlying time management algorithm (TMA) to provide synchronization among LPs. To extend the proposed simulation model for n number of LPs, this paper provides a detailed overview of the internal arch...
Next generation wireless receivers demand low computational complexity algorithms with high computing power in order to perform fast signal detections and error estimations. Several signal detection and estimation algorithms have been proposed for next generation wireless receivers which are primarily designed to provide reasonable performance in t...
A wireless sensor network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the nodes into sleep mode...
One of the most common optimistic synchronization protocols for parallel simulation is the Time Warp algorithm proposed by Jefferson [12]. Time Warp algorithm is based on the virtual time paradigm that has the potential for greater exploitation of parallelism and, perhaps more importantly, greater transparency of the synchronization mechanism to th...
Recent evolutions in wireless networks will require more efficient use of the underlying parallel discrete-event simulation (PDES) synchronization protocols to accommodate the demand for large-scale network simulation. In this dissertation, we investigate underlying synchronization protocols to improve the performance of large-scale network simulat...
Time Wrap algorithm is a well-known mechanism of optimistic synchronization in a parallel discrete-event simulation (PDES) system. It offers a run time recovery mechanism that deals with the causality errors. For an efficient use of rollback, the global virtual time (GVT) computation is performed to reclaim the memory, commit the output, detect the...
A mobile sensor network is a distributed collection of nodes, each of which hassensing, computing, communicating, and locomotion capabilities. This paperpresents a self-deployment obstacle avoidance (SOA) algorithm for mobilesensor networks. The proposed SOA algorithm provides full coverage and canbe efficiently used in a complex, unstable, and unk...
Multiuser detection is an important technology in wireless CDMA systems for improving both data rate as well as user capacity. However, the computational complexity of multiuser detection prevents the widespread use of this technique. Most of the CDMA systems today and in the near future will continue to use the conventional matched filter with its...
A conservative distributed simulation requires all logical processes (LPs) to follow the causality constraint requirement. This implies that all event-messages are processed in strictly timestamp order. Apart from the timestamp of each event generated by LPs, synchronization between all LPs is the second most important requirements. Finally, there...
The capacity of mobile ad hoc network (MANET) is typically determined by the size of network, routing protocol, mobility and the interactions that occur between the nodes. Moreover, these critical parameters cause the loss rate that has severed impact on the performance of the MANET. This situation even becomes worst when these critical parameters...
Though we already had a standardized way (from Oracle) for Disaster Recovery policy, a major crash of the PLMdatabase made our DBAs to come up with a proposal to execute a procedure using Data Guard together withOracle Transportable Tablespace which resulted in the successful and timely migration of the PLM Productionfrom Oracle 9.2.0.3 on HP N-Cla...
In the present scenario, improvement in the data rate, network capacity, scalability, and the network throughput are some of the most serious issues in wireless mesh networks (WMN). Specifically, a major obstacle that hinders the widespread adoption of WMN is the severe limits on throughput and the network capacity. This chapter presents a discussi...
This paper presents a new scheme for the Distance Source Routing (DSR) protocol which shows the improvement over the two major metrics of the DSR protocol: Route Discovery and Route Maintenance. In addition, we present a mathematical model that includes probability density function for these two observed metrics. Our simulation results demonstrate...
This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide atechnical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric...
End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposedfor implementing multicast routing in the application layer as a practical alternative to the IPmulticasting. Moreover, ESM is an efficient application layer solution where all the multicastfunctionality is shifted to the end users. However, the lim...