scispace - formally typeset
H

Hossen Asiful Mustafa

Researcher at Bangladesh University of Engineering and Technology

Publications -  20
Citations -  828

Hossen Asiful Mustafa is an academic researcher from Bangladesh University of Engineering and Technology. The author has contributed to research in topics: Wireless network & Spoofing attack. The author has an hindex of 10, co-authored 19 publications receiving 741 citations. Previous affiliations of Hossen Asiful Mustafa include University of South Carolina.

Papers
More filters
Proceedings Article

Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study

TL;DR: It is shown that eavesdropping is easily possible at a distance of roughly 40m from a passing vehicle and that messages can be easily triggered remotely, which raises privacy concerns as vehicles can be tracked through these identifiers.
Proceedings ArticleDOI

Neighborhood watch: security and privacy analysis of automatic meter reading systems

TL;DR: A security and privacy analysis of Automatic Meter Reading technology finds that the technology lacks basic security measures to ensure privacy, integrity, and authenticity of the data and recommends security remedies including a solution based on defensive jamming that may be easier to deploy than upgrading the meters themselves.
Book ChapterDOI

Current events: Identifying webpages by tapping the electrical outlet

TL;DR: This work constructs a classifier that correctly identifies unlabeled power traces of webpage activity from a set of 51 candidates with 99% precision and 99% recall, and identifies the AC power side channel that leaks private information about web browsing to an observer taking measurements at the power outlet.
Journal ArticleDOI

Jamming-Resilient Multipath Routing

TL;DR: This paper addresses jamming at the network level and focus on restoring the end-to-end data delivery through multipath routing by presenting a centralized AHV-based algorithm to select fault-independent paths, and a distributed AHV based routing protocol built on top of a classic routing algorithm in ad hoc networks.
Proceedings ArticleDOI

CETAD: Detecting evil twin access point attacks in wireless hotspots

TL;DR: This paper proposes a mechanism CETAD leveraging public servers to detect evil twin AP attacks, which only requires installing an app at the client device and does not require to change the hotspot APs.