Skip to main content

Showing 1–11 of 11 results for author: Reaz, K

.
  1. arXiv:2501.13716  [pdf, other

    cs.NI cs.CR

    A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: The rapid expansion of connected devices has amplified the need for robust and scalable security frameworks. This paper proposes a holistic approach to securing network-connected devices, covering essential layers: hardware, firmware, communication, and application. At the hardware level, we focus on secure key management, reliable random number generation, and protecting critical assets. Firmware… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  2. arXiv:2501.04401  [pdf, other

    cs.LG cs.IT cs.NI

    Tracking UWB Devices Through Radio Frequency Fingerprinting Is Possible

    Authors: Thibaud Ardoin, Niklas Pauli, Benedikt Groß, Mahsa Kholghi, Khan Reaz, Gerhard Wunder

    Abstract: Ultra-wideband (UWB) is a state-of-the-art technology designed for applications requiring centimeter-level localization. Its widespread adoption by smartphone manufacturer naturally raises security and privacy concerns. Successfully implementing Radio Frequency Fingerprinting (RFF) to UWB could enable physical layer security, but might also allow undesired tracking of the devices. The scope of thi… ▽ More

    Submitted 8 January, 2025; originally announced January 2025.

    Comments: conference ICNC'25, 7 pages, 7 figures

  3. arXiv:2412.16224  [pdf, other

    cs.CR

    Formal Verification of Permission Voucher

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: Formal verification is a critical process in ensuring the security and correctness of cryptographic protocols, particularly in high-assurance domains. This paper presents a comprehensive formal analysis of the Permission Voucher Protocol, a system designed for secure and authenticated access control in distributed environments. The analysis employs the Tamarin Prover, a state-of-the-art tool for s… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

  4. arXiv:2411.15135  [pdf, other

    quant-ph

    Continuous Automatic Polarization Channel Stabilization from Heterodyne Detection of Coexisting Dim Reference Signals

    Authors: Joseph C. Chapman, Muneer Alshowkan, Kazi Reaz, Tian Li, Mariam Kiran

    Abstract: Quantum networking continues to encode information in polarization states due to ease and precision. The variable environmental polarization transformations induced by deployed fiber need correction for deployed quantum networking. Here we present a new method for automatic polarization compensation (APC) and demonstrate its performance on a metropolitan quantum network. Designing an APC involves… ▽ More

    Submitted 22 November, 2024; originally announced November 2024.

    Comments: 31 pages, 14 figures, 1 table

  5. Advancements in UWB: Paving the Way for Sovereign Data Networks in Healthcare Facilities

    Authors: Khan Reaz, Thibaud Ardoin, Lea Muth, Marian Margraf, Gerhard Wunder, Mahsa Kholghi, Kai Jansen, Christian Zenger, Julian Schmidt, Enrico Köppe, Zoran Utkovski, Igor Bjelakovic, Mathis Schmieder, Olaf Dressel

    Abstract: Ultra-Wideband (UWB) technology re-emerges as a groundbreaking ranging technology with its precise micro-location capabilities and robustness. This paper highlights the security dimensions of UWB technology, focusing in particular on the intricacies of device fingerprinting for authentication, examined through the lens of state-of-the-art deep learning techniques. Furthermore, we explore various p… ▽ More

    Submitted 8 August, 2024; originally announced August 2024.

    Comments: NetAISys Workshop at ACM Mobisys 2024

  6. Expectation Entropy as a Password Strength Metric

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: The classical combinatorics-based password strength formula provides a result in tens of bits, whereas the NIST Entropy Estimation Suite give a result between 0 and 1 for Min-entropy. In this work, we present a newly developed metric -- Expectation entropy that can be applied to estimate the strength of any random or random-like password. Expectation entropy provides the strength of a password on… ▽ More

    Submitted 18 March, 2024; originally announced April 2024.

  7. arXiv:2403.13020  [pdf, other

    cs.CR cs.NI

    ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT Services

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: The existing high-friction device onboarding process hinders the promise and potentiality of Internet of Things (IoT). Even after several attempts by various device manufacturers and working groups, no widely adopted standard solution came to fruition. The latest attempt by Fast Identity Online (FIDO) Alliance promises a zero touch solution for mass market IoT customers, but the burden is transfer… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  8. arXiv:2311.04334  [pdf, other

    quant-ph

    Experimental decoy-state asymmetric measurement-device-independent quantum key distribution over a turbulent high-loss channel

    Authors: Kazi Reaz, Md Mehdi Hassan, Adrien Green, Noah Crum, George Siopsis

    Abstract: Real-world BB84 Quantum Key Distribution (QKD) systems utilize imperfect devices that introduce vulnerabilities to their security, known as side-channel attacks. Measurement-Device-Independent (MDI) QKD authorizes an untrusted third party to make measurements and removes all side-channel attacks. The typical implementations of MDI-QKD employ near symmetric channels which are difficult to realize p… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: 10 pages, 5 figures

  9. arXiv:2305.01345  [pdf, other

    quant-ph

    Experimental free-space quantum key distribution over a turbulent high-loss channel

    Authors: Md Mehdi Hassan, Kazi Reaz, Adrien Green, Noah Crum, George Siopsis

    Abstract: Free-space quantum cryptography plays an integral role in realizing a global-scale quantum internet system. Compared to fiber-based communication networks, free-space networks experience significantly less decoherence and photon loss due to the absence of birefringent effects in the atmosphere. However, the atmospheric turbulence contributes to deviation in transmittance distribution, which introd… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: 6 pages, 3 figures

  10. arXiv:2103.06763  [pdf, other

    cs.CR

    ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi devices Using Physical Layer Security

    Authors: Khan Reaz, Gerhard Wunder

    Abstract: Secure and scalable device provisioning is a notorious challenge in Wi-Fi. WPA2/WPA3 solutions take user interaction and a strong passphrase for granted. However, the often weak passphrases are subject to guessing attacks. Notably, there has been a significant rise of cyberattacks on Wi-Fi home or small office networks during the COVID-19 pandemic. This paper addresses the device provisioning prob… ▽ More

    Submitted 27 April, 2021; v1 submitted 11 March, 2021; originally announced March 2021.

    Comments: Accepted in IMIS-2021

  11. arXiv:1412.6436  [pdf, other

    cond-mat.mes-hall cond-mat.mtrl-sci

    The Effect of Varying Co layer thickness on the Time-Temperature Characteristics of Co/Sb Semimetal Embedded Magnetic Nanoparticles

    Authors: M. R. Madden, T. Alshammary, B. Grove, J. Phillips, K. Reaz, S. Hensley, G. G. Kenning

    Abstract: We report the effect of varying cobalt thickness on the temperature-dependent time decay of the electrical resistance of Co/Sb multilayer samples. We find that for a given temperature, a five fold change in the Co thickness produces a 100 fold change in the characteristic decay time of the resistance. We find that the characteristic decay time, as a function of temperature, follows an Arrhenius la… ▽ More

    Submitted 19 December, 2014; originally announced December 2014.

    Comments: 9 pages, 10 figures

    Journal ref: Journal of Applied Physics, Volume 117, Issue 10, 2015