Post Job Free

Resume

Sign in

Security Software

Location:
Milwaukee, WI
Posted:
November 09, 2012

Contact this candidate

Resume:

Dept. of Mathematics, Statistics and Computer Science

(MSCS) Cell Phone: 414-***-****

Marquette University Email: abo8z8@r.postjobfree.com

**** *. ********* *** ***: http://www.mscs.mu.edu/~frahman/

Milwaukee, WI 53233, USA

EDUCATION

Marquette University, Milwaukee, WI, USA

PhD Candidate in Computational Sciences (Fall 2010 - at present)

Dissertation Title: Ensuring Application Specific Security and Privacy Requirements for Current and

Next Generation RFID Systems

Advisor: Dr. Sheikh Iqbal Ahamed (http://www.mscs.mu.edu/~iq/)

Current CGPA: 4.00/4.00

Expected Graduation: Fall 2012

Marquette University, Milwaukee, WI, USA

Masters of Science in Computer Science (Fall 2008 - Summer 2010)

Thesis Title: Towards Secure And Scalable Tag Search Approaches for Current and Next

Generation RFID Systems

Advisor: Dr. Sheikh Iqbal Ahamed (http://www.mscs.mu.edu/~iq/)

CGPA: 4.00/4.00

Bangladesh University of Engineering and Technology, Dhaka, Bangladesh

B.Sc. in Computer Science and Engineering (2008)

Thesis Title: Minimizing Broadcast Redundancy for Ad-hoc Wireless Network

Advisor: Dr. A.K.M. Ashikur Rahman

CGPA: 3.63/4.00

RESEARCH INTERESTS

My primary research area is Security and Privacy of RFID and Computational RFID systems and

Security of Mobile Systems in general.

My research focuses on devising security protocols to prevent various attacks of RFID systems.

Over the last four years, I have worked on various research challenges related to the security and

privacy vulnerabilities of current and next generation RFID systems (Computational RFID Systems).

My research proposals span various authentication protocols to solve the DoS attack in

Computational RFID and general RFID networks, increasing efficiency in RFID based supply

chains, improving reliability and security issues in Computational RFID based environments,

preserving user privacy and maintaining scalability issues in RFID based healthcare systems, and

developing secure distributed architecture for RFID based track and trace systems.

I have research experience with Security, Trust and Privacy issues of Mobile and Pervasive

Computing, Security of Wireless Sensor Networks, and Green Computing.

Recently I have started to explore Security of Mobile Applications. My goal is to use my expertise in

information security to investigate the Security of Android Applications or Android Malware.

I also work on designing Secure Healthcare Systems for Pervasive environments and developing

mobile healthcare applications (especially in Android platform).

I am also fascinated by Online Social Networks and currently I am developing a tool for

investigating user psychology using various Communication and Interaction patterns of users in

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

different social networks.

HONORS AND AWARDS

2012

Grace Hopper Scholarship funded by Twitter to attend Grace Hopper Conference 2012, to be held in

Maryland, USA

Travel and accommodation grant award to attend IEEE Pervasive Computing and Communication

(PerCom 2012) Conference, held in Switzerland. It was funded by National Science Foundation

Computational Sciences Summer Research Program (CSSRP) Fellowship for summer 2012, funded

by Marquette University

Conference Travel Grant Recipient. Awarded by Dept. of MSCS at Marquette University to attend

PerCom 2012 held in Lugano, Switzerland

2011

Grace Hopper Scholarship by National Science Foundation to attend Grace Hopper Conference

2011, held in Oregon, USA

Travel and accommodation grant to attend ACM Conference on Computer and Communications

Security (CCS 2011), held in Chicago. It was funded by National Science Foundation

Travel and accommodation grant award to attend IEEE Pervasive Computing and Communication

(PerCom 2011) Conference, held in Washington. It was funded by National Science Foundation

Computational Sciences Summer Research Program (CSSRP) Fellowship for summer 2011, funded

by Marquette University

Conference Travel Grant Recipient. Awarded by Dept. of MSCS at Marquette University to attend

PerCom 2011 held in WA, USA

Computing Research Association (CRA) scholarship recipient to attend Grad Cohort Workshop

2011, held in Massachusetts, USA

Travel and accommodation grant award to attend Richard Tapia Conference 2011, held in CA, USA

2010

Grace Hopper Scholarship by National Science Foundation to attend Grace Hopper Conference

2010, held in Georgia, USA

Google Anita Borg Scholarship finalist during 2010

All expense paid travel and accommodation grant award,

held in Mountain View, CA, USA

Computational Sciences Summer Research Program (CSSRP) Fellowship for summer 2010, funded

by Marquette University

Conference Travel Grant Recipient. Awarded by Dept. of MSCS at Marquette University to attend

First International Green Computing Conference (IGCC'10), held in Chicago, USA

Conference Travel Grant Recipient. Awarded by Dept. of MSCS at Marquette University to attend

IEEE International Conference on Social Computing (SocialCom 2010), held in MN, USA

2009

Travel and accommodation grant to attend ACM Conference on Computer and Communications

Security (CCS 2009) Conference held in Chicago. It was funded by National Science Foundation

Travel and accommodation grant from University of Illinois (Urbana-Champaign) to attend Illinois

Wireless Summer School 2009

Other

Marquette University Research/Teaching Assistantship (Fall 2008 Spring 2013)

RESEARCH EXPERIENCE

Research Assistant (Fall 2008 - at present)

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

Advisor: Sheikh Iqbal Ahamed (Ubicomp Lab, URL: http://www.mscs.mu.edu/~ubicomp/)

R Worked on security and privacy issues of RFID systems, preserving privacy and maintaining

scalability of RFID systems, efficient detection of counterfeit RFID tags in large scale RFID systems

(ex. supply chain), ensuring robustness and survivability of critical computational RFID systems,

missing tag detection in computational RFID tag based smart environments. Developed theoretical

models and implemented secure, attack resistant authentication protocols to maximize the

application specific requirements of different RFID systems. This resulted in publications [CF1,

CF2, CF3, CF4 and CF6].

R Designed and developed a Robust Authentication Protocol (RoAP) that supports not only

security and privacy, but also recovery in RFID systems. The protocol can get back the

desynchronized tags and readers to their normal state, and thus provides robustness. Evaluated the

protocol using a prototype RFID system. Performed further development of a hexagonal cell based

distributed architecture which ensures improved scalability while maintaining privacy in RFID

systems. The hexagonal architecture allows readers to co-operate with one another to identify tags

without compromising scalability. This resulted in publications [CF13 and CF19].

R RFID tag searching is an extension of authentication. We developed a lightweight tag searching

protocol. The protocol can search a particular tag efficiently as the approach is not based on

exhaustive search and it does not employ extreme cryptographic functions. As a further extension of

this project, we developed a scalable and secure search (S-Search) protocol for searching RFID tags.

This protocol uses slotted ALOHA technique for reply transmission that reduces server computation

load in large scale RFID systems. This resulted in publications [JL4, JL7, CF11, and CF18].

R Since RFID tags are extremely resource constrained, in order to relieve tags from responsibility,

privacy protection and security assurance was guaranteed by central server. We designed and

developed serverless RFID authentication protocol. This protocol safeguards both tag and reader

against almost all major attacks (such as: Eavesdropping, Tracking, Cloning, Physical attacks, De-

synchronization and Denial of Service) without the intervention of server. We also developed a

secure ownership transfer technique for the serverless RFID systems. This resulted in publications

[JL4, CF16, and CF17].

R Designed and developed a novel Privacy-sensitive architecture for Context Obfuscation (PCO)

and privacy preservation in pervasive online community based applications. To support multiple

levels of granularity for the released contextual data, the obfuscation process uses an ontological

description that states the granularity of object type instances. We developed and evaluated a

contextual instant messaging application that incorporates level-

contextual information. This resulted in publications [JL2 and CF8].

R Worked on the design and development of a carbon footprint calculation framework that can

serve as a platform for various carbon footprint calculator applications. OCFF maintains a clouded

knowledge base that gives developers access to a dynamic source of computational information that

can be brought to bear on real-time sensor data. Based on the OCFF platform, we developed a

Ubiquitous Carbon Footprint Calculator application (UCFC) that allows the user to be aware of their

personal carbon footprint based on their ubiquitous activity and act accordingly. Using OCFF, we

have also developed a mobile GPS application, EcoDrive, for iPhone platform that suggests the most

fuel efficient route to the user. This resulted in publications [JL1, CF5, CF9, and CF10].

R Designed and developed initial trust model called ICSTB (Integration of Context Security in

Trust Bootstrapping). The model categorizes services or contexts in different security levels based

on their security needs, and these security needs are considered in trust bootstrapping. As an

extension of this project we also developed Adaptive Initial trust and Demand aware Secure

Resource Discovery (AID-SRD) model for pervasive environment. Another extension of this project

is development of a context specific and reputation based trust model. This model uses multihop

recommendation and a flexible behavioral model to handle interactions. This resulted in publications

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

[JL6, CF12, CF14, and CF15].

URL: http://www.mscs.mu.edu/~frahman/Publication.html

Webmaster and Assistant of System Administrator (Spring 2011)

Dept. of MSCS, Marquette University

Duties: Maintained the website of MSCS dept. of Marquette University. I have developed tutorials

on different basic programming language (C, C++, JAVA, and Python), network programming,

JavaScript, Servlet, SQL, MPI, OpenMP, HTML, XML, software tools, and IDE usage. I have also

created presentation illustrating setup, installation and troubleshooting of different software used by

computer science students, for example, Matlab, SSH, PUTTY, Eclipse, and Netbeans.

URL: http://www.mscs.mu.edu/~frahman/Resource.html

TEACHING EXPERIENCE

Teaching Assistant (Spring 2011)

Course: Elements of Software Development (MSCS 6050), Dept. of MSCS, Marquette University

Duties: Developed and graded assignments and exams on advanced software development related

concepts, maintained weekly office hours and delivered lectures in couple of classes.

URL: http://www.mscs.mu.edu/~frahman/MSCS_6050.html

Teaching Assistant (Fall 2008-Fall 2010)

Course: Object Oriented Programming Language (COSC 1010), Dept. of MSCS, Marquette

University

Duties: Developed detailed lesson plans, handouts, homework, assignments, quiz, and lab projects.

Graded lab projects, assignments, homework and exams. I also conducted lab discussion every week

for 5 hours in total. Maintained course website and held weekly office hours. I helped the instructor

to prepare lecture materials. I have also delivered lectures very often during each semester. I have

used Piazza where students can ask questions and participate in discussion related to the course.

URL: http://www.mscs.mu.edu/~frahman/cosc60/cosc60.html

Teaching Assistant (Fall 2008-Fall 2010)

Course: Object Oriented Software Design with JAVA (COSC 1020), Dept. of MSCS, Marquette

University

Duties: Designed term projects. Developed assignments, quiz, and lab projects. Graded lab projects,

assignments, and exams. I also conducted lab discussion every week for 3 hours in total. Maintained

course website and held weekly office hours. Conducted presentations and demonstration of term

projects. I have also delivered lectures very often during each semester. I have used Piazza where

students can ask questions, explore new ideas and participate in various discussion related to the

course and term projects.

URL: http://www.mscs.mu.edu/~frahman/cosc61/cosc61.html

Lecturer (Jan 2008 - May 2008)

Dept. of Computer Science and Engineering, State University of Bangladesh (SUBD), Bangladesh

Courses: Database, Introduction to Programming Language, Computer Architecture, Computer

Interfacing, Operating Systems

Duties: I worked as a full time instructor for several courses. My works included preparing lecture

materials, handouts, detailed lesson plans and delivering them, preparing homework, lab

assignments, quiz and exam questions. I taught 3 undergraduate level courses totaling 42 hours in

each semester. Coordinated with faculty members and administrative personnel. Conducted labs and

held weekly office hours. I also graded exams, quiz, and assignments. Total class size was 35.

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

PUBLICATION LIST

Journal Papers

[JL1]. F arzana Rahman Design and

implementation of an open framework for ubiquitous carbon footprint calculator applications

Journal of Sustainable Computing: Informatics and Systems, Volume 1, Issue 4, December 2011. pp.

2210-5379. http://dx.doi.org/10.1016/j.suscom.2011.06.001

[JL2]. F arzana Rahman User

privacy protection in pervasive social networking applications using PCO

Social Computing and Cyber-Physical Systems, In Press.

http://www.inderscience.com/browse/index.php?journalID=349&action=coming

[JL3]. F arzana Rahman P reserving privacy in wireless

sensor networks using reliable data aggregation SIGAPP Applied Computing Review, Volume 11,

Issue 3, August 2011. pp. 52-62. http://doi.acm.org/10.1145/2034594.2034599

[JL4]. Md. Endadul Hoque, Farzana Rahman Enhancing

Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive

Environments of Wireless Personal Communication, Springer, Volume 55, Issue 1, 2009. pp.

65-79. http://dx.doi.org/10.1007/s11277-009-9786-0

[JL5]. Ashikur Rahman, Md. Endadul Hoque, Farzana Rahman, Sabuj K. Kundu, and Powel

Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless

Networks November 2009. pp. 895-904.

http://dx.doi.org/10.4304/jnw.4.9.895-904

[JL6]. Sheikh I. Ahamed, Munirul M. Haque, Md. Endadul Hoque, Farzana Rahman, and Nilothpal

Design, Analysis, and Deployment of Omnipresent Formal Trust Model (FTM) with Trust

Bootstrapping for Pervasive Environments

Volume 83, Issue 2, February 2010. pp. 253-270. http://dx.doi.org/10.1016/j.jss.2009.09.040

[JL7]. Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, and Tatsuo Nakajima,

Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol International

Journal of Security and Its Applications (IJSIA), Volume 2, No 4, October 2008. pp. 57-66.

Peer Reviewed Conference/Workshop Papers

[CF1]. F arzana Rahman I a m not a goldfish in a bowl: A Privacy

Preserving Framework for RFID based Healthcare Systems, to appear in Proc. of IEEE 14th

International Conference on e-Health Networking, Applications and Services (IEEE Healthcom 2012).

Beijing, China, October, 2012.

[CF2]. F arzana Rahman MonAC: Detecting Missing Tags for Improved

Accuracy in Computational RFID based Assisted Environments, to appear in Proc. of the ACM

Symposium on Research in Applied Computation (ACM RACS 2012). Texas, USA, October, 2012.

[CF3]. F arzana Rahman Looking for needles in a haystack: Detecting

Counterfeits in Large Scale RFID Systems using Batch Authentication Protocol Proc. of IEEE

PerCom Workshop on Pervasive Wireless Networking (PWN12). Switzerland, March, 2012.

[Acceptance rate: 20%]

[CF4]. F arzana Rahman DRAP: A Robust Authentication Protocol to

Ensure Survivability of Computational RFID Networks Proc. of ACM Symposium on Applied

Computing (ACM SAC 2012). Italy, March, 2012. [Acceptance rate: 24%]

[CF5]. F arzana Rahman Let

EcoDrive be Your Guide: Development of a Mobile Tool to Reduce Carbon Footprint and Promote

Green Transport Proc. of ACM Symposium on Applied Computing (ACM SAC 2012). Italy, 2012.

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

[ Acceptance rate: 24%]

[CF6]. Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "AnonPri: An Efficient

Anonymous Private Authentication Protocol", in Proc. of the IEEE International Conference on

Pervasive Computing and Communications (PerCom 2011), WA, USA, March 2011. pp. 102-110.

[Acceptance rate: 11%].

[CF7]. F arzana Rahman, Md. Endadul Hoque, and Sheikh I. Ahamed, "REBIVE: A Reliable Private

Data Aggregation Scheme for Wireless Sensor Networks", in Proc. of the ACM Symposium on Applied

Computing (ACM SAC 2011), Taiwan, March 2011. pp. 439-444. [Acceptance rate: 26%]

[CF8]. F arzana Rahman P reserve

Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-

Community based applications Proc. of the IEEE International Conference on Social Computing

(SocialCom 2010), MN, USA, 2010. pp. 41-48. [Acceptance rate: 13%].

[CF9]. F arzana Rahman, Sheikh Iqbal Ahamed, Md. Endadul Hoque, Casey O Brian, Lin Liu, He

UCFC Ubiquitous Personal Carbon Footprint Calculation Platform Proc. of the Workshop

for The Work in Progress in Green Computing (WIPGC 2010), Chicago, IL, USA, 2010.

[CF10]. He Zhang, Lin Liu, Sheikh Iqbal Ahamed, and Farzana Rahman Open Carbon Footprint

Calculation Platform for Personal Users Proc. of the Second International Workshop on Software

Research and Climate Change (ICSE 2010), South Africa, 2010.

[CF11]. Md. Endadul Hoque, Farzana Rahman S-Search: Finding RFID Tags

using Scalable and Secure Search Protocol Proc. of the ACM Symposium on Applied Computing

(ACM SAC 2010), Switzerland, March, 2010. pp. 439-443.

[CF12]. Md. Endadul Hoque, Farzana Rahman Trust Based Security

Auto-Configuration for Smart Assisted Living Environments Proc. of the ACM Workshop on

Assurable & Usable Security Configuration (SafeConfig 2009) collocated with ACM CCS 09, Chicago,

USA, November, 2009, pp. 7-11.

[CF13]. Md. Endadul Hoque, Farzana Rahman, and Sheikh Ahamed, "Supporting Recovery, Privacy

and Security in RFID Systems Using a Robust Authentication Protocol", in Proc. of the 24th ACM

Symposium on Applied Computing (ACM SAC 2009), Hawaii, USA, March, 2009. pp. 1062-1066.

[CF14]. Md. Endadul Hoque, Farzana Rahman, and Sheikh Iqbal Ahamed, "An Adaptive Initial Trust

and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments", in

Proc. of the IEEE International Workshop on Web and Pervasive Security (WPS 2009) in conjunction

with PerCom 2009, Texas, USA, March, 2009. pp. 1-6.

[CF15]. Sheikh I. Ahamed, Endadul Hoque, Farzana Rahman, and Mohammad Zulkernine, "Towards

Secured Trust Bootstrapping in Pervasive Computing Environment", in Proc. of the IEEE High

Assurance Systems Engineering Symposium (HASE 2008), China, December, 2008. pp.89-96.

[Acceptance rate 22%]

[CF16]. Sheikh Iqbal Ahamed, Farzana Rahman, and Md. Endadul Hoque, "ERAP: ECC based RFID

Authentication Protocol", in Proc. of the IEEE International Workshop on Future Trends of Distributed

Computing Systems (FTDCS 2008), Kunming, China, October 21-23, 2008, pp.219-225.

[CF17]. Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, Tatsuo Nakajima;

"YA-SRAP: Yet Another Serverless RFID Authentication Protocol", in Proc. of the IET International

Conference on Intelligent Environment (IE08), Seattle, USA, July, 2008, pp. 640--.

[CF18]. Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, and Tatsuo Nakajima,

"S3PR: Secure Serverless Search Protocols for RFID", in Proc. of the IEEE International Conference on

Information Security and Assurance (ISA 2008), Korea, April, 2008, pp.187-192.

[CF19]. Sheikh Iqbal Ahamed, Farzana Rahman Secured Tag

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

Identification Using EDSA (Enhanced Distributed Scalable Architecture) Proc. of the ACM

Symposium on Applied Computing (ACM SAC 2008), Brazil, March, 2008. pp. 1902-1907.

[CF20]. Endadul Hoque, Farzana Rahman, Sabuj Kundu, Ashikur Rahman and Pawel Gburzynski,

"Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks", in

Proc. of the International Symposium on Performance Evaluation of Computer and Telecommunication, Edinburgh, UK, June, 2008.

Book Chapter

[BC1]. Farzana Rahman

in Handbook of

energy aware and green computing, CRC Press, 2011.

Posters

[PS1]. Big Brother is watching you: Preserving Privacy in RFID Based Ubiquitous Healthcare

Day at Marquette University, April, 2012.

[PS2]. Healthcare Privacy for the People by the People: Investigation of practices and attitudes to

Healthcare Data Privacy in Rural Countries P roc. of the Forward Thinking Poster

Session/Colloquy Presentation, Marquette University, December 2011.

[PS3]. F arzana Rahman, Md. Endadul Hoque, and Sheikh I. Ahamed, "ProQuPri: Towards Anonymity

Protection with Privacy Quantification for Context-aware Applications", in Proc. of the ACM

Symposium on Applied Computing (ACM SAC 2011), Taiwan, March 2011.

[PS4]. Towards a Lightweight Security Solution for Computational RFID (CRFID), at the 2010 Anita

Borg Institute Grace Hopper Celebration of Women in Computing. Atlanta, GA, USA, September 2010.

[PS5]. MonAC : A batch-mode search technique for computational RFID tags, in Proc. of the

Forward Thinking Poster Session/Colloquy Presentation, Marquette University, December 2010, pp. 5.

[PS6]. Towards Green Software Infrastructure Proc. of the Forward Thinking Poster

Session/Colloquy Presentation, Marquette University, December 2009, pp. 5.

[PS7]. IMPriv: A Context Aware Privacy Sensitive Instant Messaging (IM) Technique, in Proc. of

Computational Sciences Symposium, Marquette University, April 2009.

[PS8]. Measuring Privacy in Pervasive Computing Environment Proc. of ORSP Forward

Thinking Poster Session/Colloquy, Marquette University, November 2008.

Conference/Journal Papers under submission

[1] F arzana Rahman Hey, Its Private: Protecting User Anonymity and

Privacy in Context Aware Healthcare Systems

[2] F arzana Rahman, Osman Gani, a Seeing beyond visibility: A Four

Way Fusion of User Authentication Techniques for Efficient Usable Security on Mobile Devices

submission in a conference.

[3] F arzana Rahman AnonPri: An Efficient Anonymous Private

Authentication Protocol for RFID Systems

[4] F arzana Rahman Big Brother is Watching Us: A Privacy Preserving

Framework for RFID based Healthcare Systems

[5] F arzana Rahman Efficient Detection of Counterfeit Products in

Large Scale RFID Systems using Batch Authentication Protocols

[6] Ferdous kawser, Farzana Rahman Healthcare Privacy for the People

by the People: Investigation of Practices and Attitudes to Healthcare Privacy in Developing Countries

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

under submission in a conference.

Please visit DBLP: http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/r/Rahman:Farzana.html

TECHNICAL SKILLS

P rogramming Language: C/C++, JAVA, 80x86 Assembly Language, Shell Script, PL/SQL,

PROLOG, HTML, PHP, Verilog HDL

Mobile Platform: Android

F ramework: Jakarta Struts, JavaServer Faces, JAVA Persistence API

Database: Oracle 9i, MySQL

Web Server: ApacheWeb Server, Tomcat, Sun Java Application Server

Modeling Language: Unified Modeling Language (UML) and ER Diagram (ERD)

Operating System: Linux/Unix, Windows

Tools and Software: MPI, OpenMP, RMI, JBuilder, JCreator, Sun Java Studio Creator, NetBeans,

LaTeX, Microsoft Visio, PSPICE, CircuitMaker, Router Simulator, MATLAB, Lex/Yacc

ONGOING RESEARCH PROJECTS

Investigating Android application security:

have increased the diffusion of mobile malware, especially on popular platforms like Android.

However, there remains little insight into broader security characteristics of smartphone applications.

In this context, the Android application security issues that I would like to investigate are: 1) to

understand the vulnerability that is exploited by the application to compromise the entire system. 2)

to study the severity of the attack and combat measures. 3) to penetrate into the compromised data in

order to investigate its origin and to obtain information about other compromised applications.

Social Isolation Detection using Mobile Technology: Since modern smartphone are now capable

this information rich data to detect the onset of social isolation in a human being.

Secret sharing based lightweight batch authentication for RFID systems: Our goal is to develop

a lightweight batch authentication protocol based on key transportation and authentication using

threshold secret sharing scheme which provides strong security on low-cost RFID tags.

Healthcare Epidemic Outbreak Prediction using Social Networks: In this project, our main goal

is to find out a temporal timeline of tweets for specific disease related keywords for a geographical

location. We would also like to predict disease outbreak for various locations of the world, ex. Asia,

Africa or more specific to countries, like USA, China, Bangladesh, and India.

SELECTED GRADUATE AND UNDERGRADUATE PROJECTS

Selected Graduate level Projects

1. Automated Transportation System Using Location Based Services: A prototype is developed to

automate the traditional student transportation system of Marquette University within the campus.

PriLoc can automate as well as reduce the complexity of the existing manual system. This project is

Distributed Computing

2. Being Green with Real Time Carbon Footprint Calculators: In an attempt to develop various carbon

footprint calculators, in this project, we first developed Open Carbon Footprint Framework (OCFF) that

maintains a clouded knowledge base and provides the necessary interfaces for software developers to

incorporate the latest scientific knowledge regarding climate change into their applications. Based on the

OCFF platform, we developed a Ubiquitous Carbon Footprint Calculator application (UCFC) that allows

user to be aware of their personal carbon footprint. We used low cost sensors to collect environment

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

parameters and used a mathematical model to determine carbon footprint of a person in small room/lab.

3. Development of a Mobile Tool to Reduce Carbon Footprint and Promote Green Transport: In this

project, we developed a mobile GPS application, EcoDrive, for iPhone that suggests the fuel efficient

route to the user. The EcoDrive application runs on Apple iPhone running the iOS operating system and

resolve location using the built in geocodi

4. A simulator for predicting ecological transition of lakes: Eutrophication is an increase in the

concentration of chemical nutrients in an ecosystem to an extent that increases the primary productivity

of the ecosystem. Though any exact model of eutrophication is unknown, increased variance of water

phosphorus level is an important clue of regime shift (a state when lake approaches a transition from

oligotrophic to eutrophic). In this project, we developed a software or simulator to predict the timing and

progression of Lake Eutrophication using a simulated model. Using Gaussian distribution as initial soil

phosphorus level, this simulator can predict the timing in years for a lake to turn from oligotrophic to

eutrophic state.

5. P erformance analyzer tool for parallel sorting algorithms: Developed an MPI based tool that can

take list of integers as input. The tool includes parallel implementation of Mergesort, Quicksort,

Bubblesort, Bucketsort, and Insertionsort algorithms. The tool allows users to select more than 1 sorting

algorithm (up to 5 different algorithms) and sorts the input list of integers. The tool also allows users to

enter number of processors that will be used for parallel algorithms. Finally, the tool displays graphs that

illustrate the comparison relationship between different parallel execution time for different sorting

algorithms. The tool can also display graphs that illustrate timing comparison between serial execution

and different parallel executions for varying data set sizes and varying processing speed.

6. A Reliable Private Data Aggregation technique for Wireless Sensor Networks: In WSNs, achieving

ideal data accuracy is complicated due to collision, heavy network traffic, processing delays and/or

several attacks. The problem of gathering accurate integrated data is further intensified if the

environment is adverse. Hence how to attain data privacy and perfect data accuracy are two major

challenges for data aggregation in wireless sensor networks. To address this problem, we designed a new

privacy preserving data aggregation scheme, REBIVE (REliaBle prIVate data aggrEgation scheme). In

REBIVE data accuracy maintenance and data privacy protection mechanisms work cooperatively.

Different from past research, our proposal have the following features: providing privacy preservation

technique for individual sensor data and aggregated sensor data; maintaining perfect data accuracy for

realistic environments; being highly efficient; and being robust to popular attacks launched in WSNs.

Selected Undergraduate level Projects

1. Automobile Service Center Management System: It is web based software that is used for the

maintenance of internal transaction of an automobile service center. Different phases of software

development such as analysis, design, prototyping, coding, and testing have been followed during its

development. Platform: J2EE, Framework: JavaServer Faces, Database: MySQL.

2. Department Resource Management System: A large scale web based software that is used to manage

resources of a university department. Platform: J2EE Framework: Jakarta Struts 1.1 Database:

Oracle 9i, Software tool used: JBuilder, Dreamweaver.

3. Client-Server Based Interactive Application with Thin Client:

parallel port, which acts as the server and accepts user response from the remote client. Server and client

can communicate both by wired and wireless (RF) Technology. Platform: Server side is built using

JAVA COMM API in J2SE and Client side software is written in C and then converted to

4. Simulator for Analyzing Results of Broadcasting Algorithms in MANET: A GUI based MANET

broadcasting simulator, accepting a graph as input and providing simulation result of PDP, DPDP and

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

EPDP algorithms. Platform: J2SE.

5. Implementation of File System: A File system for UNIX operating system is implemented in C.

For a complete list, please visit http://www.mscs.mu.edu/~frahman/Farzana_Rahman_Project.pdf

PROFESSIONAL ACTIVITIES

Paper Reviewer (through adviser)

R IEEE Transactions on Information Forensics & Security (2012)

R IEEE International Conference on e-Health Networking, Application & Services (2012)

R ACM Conference on Human Factors in Computing Systems, CHI (2011, 2012)

R IEEE Computer Software and Applications Conference (2009, 2010, 2011, 2012)

R IEEE Transactions on Services Computing (2008, 2009)

R Journal of Wireless Comm. & Mobile Computing, Wiley InterScience (2008, 2009, 2011)

Student Volunteer

R IEEE Conference on Pervasive Computing and Communications (PerCom 2011), USA, 2011

RELATED COURSEWORK

Major Graduate Level Courses

R Network Infrastructure, Network Applications, Component Architecture, Probability,

Simulation, Applied Mathematical Analysis, Distributed Computing, Elements of Software

Engineering, Parallel & Distributed Computing, Applied Linear Algebra, Pervasive Computing

Graduate Level Independent Study Courses

R Security, Trust and Privacy in Pervasive Computing, RFID Systems and Software,

Computational RFID, Green Computing Using Pervasive Computing Technologies, Privacy in

Assistive Rehabilitation, Secure Human Computer Interaction

Major Undergraduate Level Courses

R Object Oriented Programming Language (C++, Java), Data Structures, Compiler, Data

Communication, Operating System, Microprocessors and Microcontrollers, Artificial

Intelligence, Pattern Recognition, Database, Computer Networks, Digital Logic Design,

Algorithms, Theory of Computation, System Analysis and Design, Computer Interfacing,

Machine Learning, Computer Graphics, Computer Architecture

PRESENTATIONS AND TALKS

March 24, 2012

R

Batch Authentication Protocol In IEEE PerCom Workshop on Pervasive Wireless Networking

(PWN12). Lugano, Switzerland.

April 2, 2012

R Design, Development and Deployment of Mobile Computing in Healthcare

Computational Sciences Day, Dept. of MSCS, Marquette University, WI, USA.

November 4, 2011

R

Batch Authentication Protocol

WI, USA.

April 18, 2011

R

Networks USA.

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

March 23, 2011

", In IEEE International

R

Conference on Pervasive Computing and Communications (PerCom 2011)

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

Mobile Computing in Healthcare. The workshop was held during Computational Sciences day at

Marquette University in 2012.

Speaker in seminar on Research and Professional Development, Marquette University (May 2012)

Volunteer of Marquette University International Office activities (2008 - current)

R Participating and organizing international student orientation

R Assisting international TAs to learn about US culture

Mentor for International Incoming Students of Marquette University. (2008-2012)

Member of Preparing Future Faculty (PFF), Marquette University (2011 - current)

Speaker in Assistive Technology Panel of CTSI Rehabilitation Collaborative Research Workshop,

Marquette University (August 2010)

Speaker in seminar on Teaching and Learning, Marquette University (2009, 2010)

Speaker in Community Engagement Workshop, Marquette University (February 2012)

Member of Teach for America [TFA is an American non-profit organization that aims to eliminate

educational inequity with the help of recent college graduates who commit two years to teach in

under-resourced urban and rural public schools]

REFERENCES

Sheikh Iqbal Ahamed Mohammad Zulkernine

Associate Professor Associate Professor

Dept. of MSCS School of Computing

Marquette University, Milwaukee, WI, USA Queens University, Ontario, Canada.

Phone: 414-***-**** Phone: 613-***-****

Email: abo8z8@r.postjobfree.com Email: abo8z8@r.postjobfree.com

Web: http://www.mscs.mu.edu/~iq/ Web: http://research.cs.queensu.ca/~mzulker/

Dennis Brylow Lin Liu

Associate Professor Associate Professor

Dept. of MSCS School of Software

Marquette University, Milwaukee, WI, USA Tsinghua University, 100084 Beijing, China

Phone: 414-***-**** Phone: +86-10-627*-****

Email: abo8z8@r.postjobfree.com Email: abo8z8@r.postjobfree.com

Web: http://www.mscs.mu.edu/~brylow/

Rumi Ahmed Khan, MD, FCCP

Praveen Madiraju

Associate Professor

Associate Professor

Department of Medicine

Dept. of MSCS

University of Central Florida, College of

Marquette University, Milwaukee, WI, USA

Medicine

Phone: 414-***-****

4000 Central Florida Blvd. Orlando, FL 32816,

Email: abo8z8@r.postjobfree.com

Phone: 414-***-****

Web: http://www.mscs.mu.edu/~praveen/

Email: abo8z8@r.postjobfree.com

Douglas Harris

Professor

Dept. of MSCS

Marquette University, Milwaukee, WI, USA

Phone: 414-***-****

Email: abo8z8@r.postjobfree.com

Web: http://www.marquette.edu/mscs/facstaff-harris.shtml

Farzana Rahman (http://www.mscs.mu.edu/~frahman/)

Curriculum Vitae

,

DP FXUUHQWO\ KROGLQJ ) YLVD DQG QHHG VSRQVRUVKLS WR ZRUN +RZHYHU , KDYH PRQWKV RI 2SWLRQDO

3UDFWLFDO 7UDLQLQJ 237 SHULRG OHIW WR EH XVHG



Contact this candidate