Mahmoud Daneshmand’s research while affiliated with Stevens Institute of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (18)


A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System
  • Article
  • Full-text available

September 2023

·

159 Reads

·

31 Citations

IEEE Internet of Things Journal

·

Sujata Mohanty

·

·

[...]

·

Internet of Things (IoT) is an expanding technology that facilitate physical devices to inter-connect each other over a public channel. Moreover, the security of the next-generation wireless mobile communication technology, namely 5G with IoT, has been a field of much interest among researchers in the last several years. Previously, Sharif et al. had suggested an IoTbased lightweight three-party authentication scheme proclaiming a secured scheme against different threats. However, it was found that the scheme could not achieve user anonymity and guarantee session key security. Additionally, the scheme fails to provide proper authentication in the login phase, and it s unable to update a new password in the password change phase. Thus, we propose an improved three-factor-based data transmission authentication scheme (TDTAS) to address the weaknesses. The formal security analysis has been proved using the Real-or-Random (RoR) model. The informal security analysis demonstrates that the scheme is secure against several known attacks and achieves more security features. In addition, the comparison of the work with other related schemes demonstrates the proposed scheme has less communicational and storage costs.

Download

A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges

August 2023

·

428 Reads

·

707 Citations

IEEE Internet of Things Journal

In recent years, the concept of the Metaverse has attracted considerable attention. This paper provides a comprehensive overview of the Metaverse. First, the development status of the Metaverse is presented. We summarize the policies of various countries, companies, and organizations relevant to the Metaverse, as well as statistics on the number of Metaverse-related publications. Characteristics of the Metaverse are identified: 1) multi-technology convergence; 2) sociality; 3) hyper-spatio-temporality. For the multi-technology convergence of the Metaverse, we divide the technological framework of the Metaverse into five dimensions. For the sociality of the Metaverse, we focus on the Metaverse as a virtual social world. Regarding the characteristic of hyper-spatio-temporality, we introduce the Metaverse as an open, immersive, and interactive 3D virtual world which can break through the constraints of time and space in the real world. The challenges of the Metaverse are also discussed.


Fig. 4. Info stealer created by cyber criminals using ChatGPT [15]
Fig. 6. Simple code that injects a DLL to explorer.exe by ChatGPT [77]
Fig. 9. A phishing email with a malicious Excel attachment [84]
Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations

May 2023

·

509 Reads

·

2 Citations

Chatbots shifted from rule-based to artificial intelligence techniques and gained traction in medicine, shopping, customer services, food delivery, education, and research. OpenAI developed ChatGPT blizzard on the Internet as it crossed one million users within five days of its launch. However, with the enhanced popularity, chatbots experienced cybersecurity threats and vulnerabilities. This paper discussed the relevant literature, reports, and explanatory incident attacks generated against chatbots. Our initial point is to explore the timeline of chatbots from ELIZA (an early natural language processing computer program) to GPT-4 and provide the working mechanism of ChatGPT. Subsequently, we explored the cybersecurity attacks and vulnerabilities in chatbots. Besides, we investigated the ChatGPT, specifically in the context of creating the malware code, phishing emails, undetectable zero-day attacks, and generation of macros and LOLBINs. Furthermore, the history of cyberattacks and vulnerabilities exploited by cybercriminals are discussed, particularly considering the risk and vulnerabilities in ChatGPT. Addressing these threats and vulnerabilities requires specific strategies and measures to reduce the harmful consequences. Therefore, the future directions to address the challenges were presented.


Guest Editorial Special Issue on Empowering the Future Generation Systems: Opportunities by the Convergence of Cloud, Edge, AI, and IoT

March 2023

·

28 Reads

·

7 Citations

IEEE Internet of Things Journal

The future generation of the Internet of Things (IoT) systems is characterized by the fusion of technologies—from edge–fog–cloud computing to artificial intelligence (AI) and blockchain—closing the gap between the physical and digital worlds [A1]. Although these technologies have been developed separately over time, the synergy among them has taken a giant leap. We are witnessing a fast-paced convergence of these technologies resulting in a fundamental paradigm shift unlocking vast benefits and opportunities across vertical markets. However, there are still several barriers, such as a lack of consensus toward any reference models or best practices, hindering the full fusion of these technologies [A1]. To tackle these challenges and facilitate this promising transformation, this special issue was organized to provide a holistic multidisciplinary reference for solutions, architectures, protocols, services, and applications addressing all aspects of the future generation of IoT systems via the fusion of edge, cloud, AI, and blockchain, while considering the corresponding challenges. Thanks to the enormous support from the Editor-in-Chief, Prof. Honggang Wang, and the dedicated work of many reviewers, after a rigorous review process, 27 excellent articles out of 125 submissions were accepted for inclusion in this special issue of the IEEE Internet of Things Journal. We introduce these papers and highlight their key contributions below.



Fig. 1. Block diagram of proposed ACA-R3 protocol.
An Edge-AI-Enabled Autonomous Connected Ambulance-Route Resource Recommendation Protocol (ACA-R3) for eHealth in Smart Cities

February 2023

·

243 Reads

·

17 Citations

IEEE Internet of Things Journal

The Autonomous Connected Ambulance (ACA) has been an unprecedented necessity in the demand-supply management sector of the healthcare sector. However, the traditional prototypes designed for such an un-manned vehicle do not match the demands of the advanced communication technologies incorporated in today’s sophisticated distributed networks. As a result, in the current era of edge computing strengthened by many AI-enabled algorithms, there is an urgent need to design a Route Resource Recommendation Protocol for ACA under Edge-AI. Designing such a protocol requires addressing the major challenges to optimize the routes for ACA and, thereby, enhance the services of emergency eHealth centers through a governing telehealth monitoring administrator. Therefore, in this article, a dedicated and novel “ACA-Route Resource Recommendation (R3)” protocol is proposed to address the issues of connectivity and resource management in ACA to optimize the routes for ACA. The ACA-R3 protocol abides by the operational standards of both the eHealth protocol and governing protocol. The primary objective of the current research work was to reduce the handover time and simplify the patient-information exchange during the time of demanded emergencies. The proposed ACA-R3 protocol can enhance the collaborative distributive resource management for reliable decision-making from the data generated by the GPS tracking unit in ACA and Edge-AI. The experimental results obtained from three different cases of traffic congestion are evaluated, validated, and reported in this article.


A new technology perspective of the Metaverse: its essence, framework and challenges

November 2022

·

548 Reads

The Metaverse depicts a parallel digitalized world where virtuality and reality are fused. It has economic and social systems like those in the real world and provides intelligent services and applications. In this paper, we introduce the Metaverse from a new technology perspective, including its essence, corresponding technical framework, and potential technical challenges. Specifically, we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time, space, and contents of the Metaverse by citing Maslow's Hierarchy of Needs. Subsequently, we conclude four pillars of the Metaverse, named ubiquitous connections, space convergence, virtuality and reality interaction, and human-centered communication, and establish a corresponding technical framework. Additionally, we envision open issues and challenges of the Metaverse in the technical aspect. The work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.


MCDM Based Routing for IoT Enabled Smart Water Distribution Network

October 2022

·

74 Reads

·

21 Citations

IEEE Internet of Things Journal

The work consists of two sub-approaches. In the first approach, an analytical model is developed using trapezium fuzzy numbers in decision-making problems for an IoT-based water distribution network. The second phase explains the integration of the previous phase with the MCDM-based location routing protocol. The water distribution network has three components static water source, the utility center which can be located in the proper position, and the consumer. The objective of this work is to select an optimal route between the utility center and the consumer by considering multiple criteria. The simulation result shows that the proposed MCDM-based routing protocol outperforms both existing MCDM-based and non-MCDM-based routing schemes.


Blockchain Security Using Merkle Hash Zero Correlation Distinguisher for the IoT in Smart Cities

October 2022

·

49 Reads

·

8 Citations

IEEE Internet of Things Journal

Internet of Things (IoT) data is one of the most important assets in business models for offering various ubiquitous and brilliant services. The IoT is provided with the advantage of susceptibility that cybercriminals and other malicious users. Even though smart cities are intended to extend productivity and efficiency, residents and authorities face risks when they avoid cybersecurity. The conventional blockchain methods were introduced to ensure the secure management and examination of the smart city big data. But, the blockchains are found to have computationally high costs, and failed to improve the security, not adequate resource-constrained IoT devices have been designated for smart cities. In order to address these issues, the proposed novel blockchain model called blockchain secured Merkle hash zero correlation distinguisher (BSMH-ZCD) is suitable for IoT devices within the cloud infrastructure. The objective of the BSMH-ZCD method is to enhance security and reduce the run time and computational overhead. Initially, the Merkle hash tree is used to create the hash value with every transaction. Next, the zero correlation distinguisher is applied to perform the data encryption and decryption operation for the ARX block for obtaining proficient secure data access in the IoT devices. Experimental assessment of the proposed BSMH-ZCD method and existing methods are carried out by using the taxi driver data set and Novel Corona Virus 2019 data set with different factors, such as running time, computational complexity, and security with respect to a number of blocks and executions. By using the taxi driver data set, the experimental results reveal that the BSMH-ZCD method performs better with a 19% improvement in security, 20% reduction of computational complexity, and 29% faster running time for IoT compared to existing works.


Cyberology: Cyber-Physical-Social-Thinking Spaces based Discipline and Inter-discipline Hierarchy for Metaverse (General Cyberspace)

September 2022

·

21 Reads

p>It is well known that the metaverse, also named general cyberspace, is virtual-real fusion spaces, consisting of a virtual space namely cyberspace and virtual-real spaces namely cyber-enabled physical, social, and thinking (cyber-enabled) spaces. This paper discusses the open issues of the metaverse in terms of science and technology and proposes a new discipline and inter-discipline hierarchy for the metaverse first. Then, it ex?plores various relevant standards of discipline classification and a discipline and inter-discipline hierarchy based on physical, social and thinking spaces, and investigates the cyberspace and cyber?enabled spaces. On the basis of the above research, this paper proposes the detailed metaverse discipline and inter-discipline hierarchy based on cyber-physical-social-thinking spaces and enriches the content of cyberology from the aspects of cyberspace and cyber-enabled spaces. Finally, this paper predicts the future development of cyberology in terms of society, enterprise and humankind. </p


Citations (12)


... Sin embargo, antes de ello se debe estudiar a fondo la confidencialidad de los datos que asegura el proveedor de la IAG. En este caso se ha utilizado como ejemplo ChatGPT y hasta la fecha se han reportado filtraciones de datos sensibles de grandes empresas debido a que sus trabajadores han utilizado el chat para analizar información privada (Qammar et al., 2023). ...

Reference:

Entrenamiento en Formulación de Casos en Psicoterapia a Través de Inteligencia Artificial Generativa
Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations

... With ongoing technological evolution, various dimensions of the metaverse are being explored, revealing its potential impacts across multiple domains [77]. Of particular significance is the metaverse's influence on transportation, where EVs take center stage. ...

A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges
  • Citing Article
  • August 2023

IEEE Internet of Things Journal

... Its security was confirmed using ProVerif, a formal security analysis tool. The proposed scheme achieved an average computational cost reduction of 985.73% when compared with the latest research [8][9][10][11] in terms of performance. ...

A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System

IEEE Internet of Things Journal

... The Metaverse, a computer-generated universe, was first identified as a virtual environment where users interact through digital avatars parallel to the physical world by Stephenson in his fiction Snow Crash in 1992 (Joshua, 2017). Considered an advanced version of cyberspace, where people can enter the virtual domain through technologies such as Virtual Reality (VR) and Augmented Reality (AR), the Metaverse is a merged and immersive world where virtual and real elements are combined (Shi et al., 2023). It is a shared virtual environment that allows real-time interaction with the physical world, providing immersive, multisensory, and 3D user experiences and information exchange . ...

A new technology perspective of the Metaverse: Its essence, framework and challenges
  • Citing Article
  • March 2023

Digital Communications and Networks

... Citation information: DOI 10.1109/JIOT.2025.3527041 the data source. These systems provide scalable solutions for computationally intensive tasks and highperformance applications [74]. ...

Guest Editorial Special Issue on Empowering the Future Generation Systems: Opportunities by the Convergence of Cloud, Edge, AI, and IoT
  • Citing Article
  • March 2023

IEEE Internet of Things Journal

... By utilizing modern innovation to optimize source use, reduce eco-friendly impact, and advertise renewable energy sources, sustainable cities aim to create eco-friendly city areas. This includes efficient waste tracking, sustainable energy consumption, an environment-friendly framework, administration systems, and intelligent transportation networks, among others (Ahmed et al., 2023). In public safety, smart cities use sophisticated tracking systems, anticipating analytics, and emergency feedback systems to improve security and secure their locals. ...

An Edge-AI-Enabled Autonomous Connected Ambulance-Route Resource Recommendation Protocol (ACA-R3) for eHealth in Smart Cities

IEEE Internet of Things Journal

... This approach achieves a high payload, reversibility, and tamper detection, outperforming state-of-the-art methods. Edge computing, in conjunction with machine learning, enables local decision-making and introduces the concept of edge learning [22], addressing latency and resource challenges. The article also discusses a video data prioritization framework for surveillance networks and evaluates various communication aspects, while recognizing remaining challenges. ...

Communication Technologies for Edge Learning and Inference: A Novel Framework, Open Issues, and Perspectives

IEEE Network

... Initial discussions were rooted in infrastructure networks, including computer communication networks, but have since broadened to include content and services related to virtual reality, such as games and films [7,8]. Recently, these discussions have also linked to the Fourth Industrial Revolution and the mobile ecosystem, highlighting the metaverse's role in shaping future societal structures [9]. The COVID-19 pandemic has accelerated the imaginative applications of the metaverse across various content fields, including film, television, gaming, and entertainment. ...

Cyberology: Cyber–Physical–Social-Thinking Spaces-Based Discipline and Interdiscipline Hierarchy for Metaverse (General Cyberspace)
  • Citing Article
  • January 2022

IEEE Internet of Things Journal

... As shown in Table 2, the error metric scores of the ARIMA-based hybrid models, including ROADAR-1, ROADAR-2, and ROADARIMA, exhibit significant upward trends. Specifically, for RMSE, the averages of the ARIMA-based hybrid models rise to 1 and School datasets, respectively. Similarly, the averages of MAE increase to 1.3763, 1.9939, 2.0434, and 9.8374 across the same datasets. ...

MCDM Based Routing for IoT Enabled Smart Water Distribution Network
  • Citing Article
  • October 2022

IEEE Internet of Things Journal

... Researchers in [27] explores the convergence of IoT, fog/cloud computing, artificial intelligence (AI), and blockchain. It highlights the shift towards integrated nextgeneration systems. ...

Fusion of IoT, AI, Edge-Fog-Cloud, and Blockchain: Challenges, Solutions, and a Case Study in Healthcare and Medicine
  • Citing Article
  • January 2022

IEEE Internet of Things Journal