Admission Help Line

18900 00888

Admissions 2026 Open — Apply!

Faculty Dr Mohammad Abdussami

Dr Mohammad Abdussami

Assistant Professor

Department of Computer Science and Engineering

Contact Details

abdussami.m@srmap.edu.in

Office Location

Homi J Bhabha Block, Level 4, Cubicle No: 3

Education

2024
IIIT Naya Raipur
India
2015
MTech
Kakatiya Institute of Technology and Sciences, Kakatiya University Warangal
India
2013
BTech
Vaagdevi College of Engineering JNTU-Hyderabad
India

Experience

  • July 2016 – April 2019 - Assistant Professor- Vaagdevi Engineering College, Warangal
  • December 2015 – July 2016 - Assistant Professor - SVS Group of Institutions, Warangal

Research Interest

  • Designing handover, failover authentication protocols for application areas such as the Internet of Things (IoT), the Internet of Drones (IoD), and the Internet of Vehicles (IoVs)
  • Designing robust authentication and key agreement protocols for intelligent applications by leveraging blockchain features
  • Design of lattice-based post-quantum cryptographic protocols

Awards

  • 2019 – Junior Research Fellowship – University Grants Commission

Memberships

  • IEEE Member

Publications

  • Secure and Dynamic Route Navigation through RSU-based Authentication in IoV for Smart City

    Dr Mohammad Abdussami, Bimal Kumar Meher., Ruhul Amin., Muhammad Khurram Khan., Md Abdul Saifulla., Sanjeev Kumar Dwivedi

    Source Title: IEEE Transactions on Network Science and Engineering, Quartile: Q1, DOI Link

    View abstract ⏷

    One of the significant services provided by IoV in Smart cities is vehicular navigation. Drivers often find it difficult and time-consuming to complete their trip in a crowded city without real-time knowledge about the traffic and road conditions. So, a proper routing mechanism can help drivers reach their destination in minimum time and with less fuel consumption. However, it has been found that such protocols often face security challenges. In this paper, we have proposed an authenticated navigation scheme with the help of pseudonym-based asymmetric-key cryptography that discovers and secures the route to the destination in real time. The architecture embodies a geolocation provider (GLP) to get the possible static routes to a particular destination. Further, it uses the message-forwarding capability of RSUs to develop a dynamic route, after receiving feedback from the respective RSUs about the traffic conditions. While doing so, this protocol ensures proper message integrity, anonymity, unlinkability and robust protection from important security threats. Our approach ensures minimal end-to-end delay and efficient real-time route finding from a source to a destination with no extra overhead on the vehicles. We have simulated our authentication protocol using the Scyther simulator and found it safe from various adversarial attacks
  • LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment

    Dr Mohammad Abdussami, Sanjeev Kumar Dwivedi|Ruhul Amin|Cheng-Chi Lee|Taher Al-Shehari|Taha Alfakih|Hussain Alsalman

    Source Title: Peer-to-Peer Networking and Applications, Quartile: Q1, DOI Link

    View abstract ⏷

    The integration of the Internet of Things (IoT) with fog computing has significantly enhanced the capabilities of IoT applications by extending their reach and reducing latency. Fog nodes, being transient and authorized service providers, necessitate reauthentication of IoT end devices when contact is lost, requiring the device to connect to a new fog node. In this research, we propose an innovative security protocol designed to ensure seamless failover among fog nodes. This protocol facilitates quick and easy failover authentication among IoT devices and fognodes using the key agreement among fog nodes. LEFAM overcomes the requirement for the end device to communicate with the fog node atleast once to get the security token in order to execute failover authentication. This work proposes efficient, scalable and robust scheme required for fog-IoT environment to provide solution in case of failure of the primary fognodes. Our approach effectively mitigates various security threats, as demonstrated through informal analysis. Furthermore, simulation results obtained using the Scyther tool confirm the robustness of our protocol in terms of security. A formal analysis conducted using the RoR model further substantiates the reliability of our protocol. Notably, our protocol involves fewer message exchanges, indicating a lower communication overhead compared to other existing schemes. The key finding indicates that the LEFAM scheme offers an average improvement of 76% and 1188 bits for computation and communication overheads, respectively. Overall, our protocol not only enhances security but also offers superior performance relative to existing protocols
  • DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation

    Dr Mohammad Abdussami, Dwivedi S K., Al-shehari T., Saravanan P., Kadrie M., Alfakih T., Alsalman H., Amin R

    Source Title: Computers and Electrical Engineering, Quartile: Q1, DOI Link

    View abstract ⏷

    The growing reliance on wireless communication in Internet-of-Things (IoT) devices highlights the critical need for secure and efficient communication protocols, especially in environments vulnerable to cyber threats. Existing IoT protocols often lack sufficient security, creating a need for robust authentication and key exchange mechanisms that can resist attacks while maintaining low computational overhead. In this paper, we propose a fog-enabled network architecture integrated with IoT devices (Intra and Inter IoT device) and develop the DEAC-IoT scheme using Elliptic Curve Cryptography (ECC) for secure authentication and key agreement. Our protocol is designed to protect device-to-device communication from security threats in resource-constrained IoT environments. We validate DEAC-IoT's security through both informal analysis and formal verification using the Real-Or-Random (RoR) model, demonstrating its resistance to major attacks. Simulation via the Scyther tool confirms that private parameters remain secure throughout the protocol's execution. For practical feasibility, we implement DEAC-IoT on a Field Programmable Gate Array (FPGA) and conduct performance evaluations. The results show that our protocol surpasses existing protocols in both computational and communication efficiency, making it highly suitable for real-world IoT applications. © 2024 Elsevier Ltd
  • Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle systems

    Dr Mohammad Abdussami, Mohd Shariq., Mauro Conti., Karan Singh., Sanjeev Kumar Dwivedi., Ruhul Amin., Mehedi Masud

    Source Title: Computer Communications, Quartile: Q1, DOI Link

    View abstract ⏷

    Drones also called Unmanned Aerial Vehicles (UAVs) have become more prominent in several applications such as package delivery, real-time object detection, tracking, traffic monitoring, security surveillance systems, and many others. As a key member of IoT, the group of Radio Frequency IDentification (RFID) technologies is referred to as Automatic Identification and Data Capturing (AIDC). In particular, RFID technology is becoming a contactless and wireless technique used to automatically identify and track the tagged objects via radio frequency signals. It also has drawn a lot of attention among researchers, scientists, industries, and practitioners due to its broad range of real-world applications in various fields. However, RFID systems face two key concerns related to security and privacy, where an adversary performs eavesdropping, tampering, modification, and even interception of the secret information of the RFID tags, which may cause forgery and privacy problems. In contrast to security and privacy, RFID tags have very limited computational power capability. To deal with these issues, this paper puts forward an RFID-based Lightweight and Provably Secure Authentication Protocol (LPSAP) for Unmanned Aerial Vehicle Systems. The proposed protocol uses secure Physically Unclonable Functions (PUFs), Elliptic-Curve Cryptography (ECC), secure one-way hash, bitwise XOR, and concatenation operations. We use Ouafi and Phan’s formal security model for analyzing security and privacy features such as traceability and mutual authentication. The rigorous informal analysis is carried out which ensures that our proposed protocol achieves various security and privacy features as well as resists various known security attacks. The performance analysis demonstrates that our proposed protocol outperforms other existing protocols. In addition, Scyther and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool simulation results demonstrates that there is no security attack possible within bounds. Therefore, our proposed LPSAP protocol achieves an acceptable high level of security with the least computational, communication, and storage costs on passive RFID tags

Patents

Projects

Scholars

Interests

  • Ad Hoc Networks
  • Artificial Intelligence
  • Biometric Authentication
  • Blockchain
  • Cyber Security
  • Deep Learning
  • Information Security
  • LOT
  • Machine Learning
  • Network Security

Thought Leaderships

There are no Thought Leaderships associated with this faculty.

Top Achievements

Education
2013
BTech
Vaagdevi College of Engineering JNTU-Hyderabad
India
2015
MTech
Kakatiya Institute of Technology and Sciences, Kakatiya University Warangal
India
2024
IIIT Naya Raipur
India
Experience
  • July 2016 – April 2019 - Assistant Professor- Vaagdevi Engineering College, Warangal
  • December 2015 – July 2016 - Assistant Professor - SVS Group of Institutions, Warangal
Research Interests
  • Designing handover, failover authentication protocols for application areas such as the Internet of Things (IoT), the Internet of Drones (IoD), and the Internet of Vehicles (IoVs)
  • Designing robust authentication and key agreement protocols for intelligent applications by leveraging blockchain features
  • Design of lattice-based post-quantum cryptographic protocols
Awards & Fellowships
  • 2019 – Junior Research Fellowship – University Grants Commission
Memberships
  • IEEE Member
Publications
  • Secure and Dynamic Route Navigation through RSU-based Authentication in IoV for Smart City

    Dr Mohammad Abdussami, Bimal Kumar Meher., Ruhul Amin., Muhammad Khurram Khan., Md Abdul Saifulla., Sanjeev Kumar Dwivedi

    Source Title: IEEE Transactions on Network Science and Engineering, Quartile: Q1, DOI Link

    View abstract ⏷

    One of the significant services provided by IoV in Smart cities is vehicular navigation. Drivers often find it difficult and time-consuming to complete their trip in a crowded city without real-time knowledge about the traffic and road conditions. So, a proper routing mechanism can help drivers reach their destination in minimum time and with less fuel consumption. However, it has been found that such protocols often face security challenges. In this paper, we have proposed an authenticated navigation scheme with the help of pseudonym-based asymmetric-key cryptography that discovers and secures the route to the destination in real time. The architecture embodies a geolocation provider (GLP) to get the possible static routes to a particular destination. Further, it uses the message-forwarding capability of RSUs to develop a dynamic route, after receiving feedback from the respective RSUs about the traffic conditions. While doing so, this protocol ensures proper message integrity, anonymity, unlinkability and robust protection from important security threats. Our approach ensures minimal end-to-end delay and efficient real-time route finding from a source to a destination with no extra overhead on the vehicles. We have simulated our authentication protocol using the Scyther simulator and found it safe from various adversarial attacks
  • LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment

    Dr Mohammad Abdussami, Sanjeev Kumar Dwivedi|Ruhul Amin|Cheng-Chi Lee|Taher Al-Shehari|Taha Alfakih|Hussain Alsalman

    Source Title: Peer-to-Peer Networking and Applications, Quartile: Q1, DOI Link

    View abstract ⏷

    The integration of the Internet of Things (IoT) with fog computing has significantly enhanced the capabilities of IoT applications by extending their reach and reducing latency. Fog nodes, being transient and authorized service providers, necessitate reauthentication of IoT end devices when contact is lost, requiring the device to connect to a new fog node. In this research, we propose an innovative security protocol designed to ensure seamless failover among fog nodes. This protocol facilitates quick and easy failover authentication among IoT devices and fognodes using the key agreement among fog nodes. LEFAM overcomes the requirement for the end device to communicate with the fog node atleast once to get the security token in order to execute failover authentication. This work proposes efficient, scalable and robust scheme required for fog-IoT environment to provide solution in case of failure of the primary fognodes. Our approach effectively mitigates various security threats, as demonstrated through informal analysis. Furthermore, simulation results obtained using the Scyther tool confirm the robustness of our protocol in terms of security. A formal analysis conducted using the RoR model further substantiates the reliability of our protocol. Notably, our protocol involves fewer message exchanges, indicating a lower communication overhead compared to other existing schemes. The key finding indicates that the LEFAM scheme offers an average improvement of 76% and 1188 bits for computation and communication overheads, respectively. Overall, our protocol not only enhances security but also offers superior performance relative to existing protocols
  • DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation

    Dr Mohammad Abdussami, Dwivedi S K., Al-shehari T., Saravanan P., Kadrie M., Alfakih T., Alsalman H., Amin R

    Source Title: Computers and Electrical Engineering, Quartile: Q1, DOI Link

    View abstract ⏷

    The growing reliance on wireless communication in Internet-of-Things (IoT) devices highlights the critical need for secure and efficient communication protocols, especially in environments vulnerable to cyber threats. Existing IoT protocols often lack sufficient security, creating a need for robust authentication and key exchange mechanisms that can resist attacks while maintaining low computational overhead. In this paper, we propose a fog-enabled network architecture integrated with IoT devices (Intra and Inter IoT device) and develop the DEAC-IoT scheme using Elliptic Curve Cryptography (ECC) for secure authentication and key agreement. Our protocol is designed to protect device-to-device communication from security threats in resource-constrained IoT environments. We validate DEAC-IoT's security through both informal analysis and formal verification using the Real-Or-Random (RoR) model, demonstrating its resistance to major attacks. Simulation via the Scyther tool confirms that private parameters remain secure throughout the protocol's execution. For practical feasibility, we implement DEAC-IoT on a Field Programmable Gate Array (FPGA) and conduct performance evaluations. The results show that our protocol surpasses existing protocols in both computational and communication efficiency, making it highly suitable for real-world IoT applications. © 2024 Elsevier Ltd
  • Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle systems

    Dr Mohammad Abdussami, Mohd Shariq., Mauro Conti., Karan Singh., Sanjeev Kumar Dwivedi., Ruhul Amin., Mehedi Masud

    Source Title: Computer Communications, Quartile: Q1, DOI Link

    View abstract ⏷

    Drones also called Unmanned Aerial Vehicles (UAVs) have become more prominent in several applications such as package delivery, real-time object detection, tracking, traffic monitoring, security surveillance systems, and many others. As a key member of IoT, the group of Radio Frequency IDentification (RFID) technologies is referred to as Automatic Identification and Data Capturing (AIDC). In particular, RFID technology is becoming a contactless and wireless technique used to automatically identify and track the tagged objects via radio frequency signals. It also has drawn a lot of attention among researchers, scientists, industries, and practitioners due to its broad range of real-world applications in various fields. However, RFID systems face two key concerns related to security and privacy, where an adversary performs eavesdropping, tampering, modification, and even interception of the secret information of the RFID tags, which may cause forgery and privacy problems. In contrast to security and privacy, RFID tags have very limited computational power capability. To deal with these issues, this paper puts forward an RFID-based Lightweight and Provably Secure Authentication Protocol (LPSAP) for Unmanned Aerial Vehicle Systems. The proposed protocol uses secure Physically Unclonable Functions (PUFs), Elliptic-Curve Cryptography (ECC), secure one-way hash, bitwise XOR, and concatenation operations. We use Ouafi and Phan’s formal security model for analyzing security and privacy features such as traceability and mutual authentication. The rigorous informal analysis is carried out which ensures that our proposed protocol achieves various security and privacy features as well as resists various known security attacks. The performance analysis demonstrates that our proposed protocol outperforms other existing protocols. In addition, Scyther and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool simulation results demonstrates that there is no security attack possible within bounds. Therefore, our proposed LPSAP protocol achieves an acceptable high level of security with the least computational, communication, and storage costs on passive RFID tags
Contact Details

abdussami.m@srmap.edu.in

Scholars
Interests

  • Ad Hoc Networks
  • Artificial Intelligence
  • Biometric Authentication
  • Blockchain
  • Cyber Security
  • Deep Learning
  • Information Security
  • LOT
  • Machine Learning
  • Network Security

Education
2013
BTech
Vaagdevi College of Engineering JNTU-Hyderabad
India
2015
MTech
Kakatiya Institute of Technology and Sciences, Kakatiya University Warangal
India
2024
IIIT Naya Raipur
India
Experience
  • July 2016 – April 2019 - Assistant Professor- Vaagdevi Engineering College, Warangal
  • December 2015 – July 2016 - Assistant Professor - SVS Group of Institutions, Warangal
Research Interests
  • Designing handover, failover authentication protocols for application areas such as the Internet of Things (IoT), the Internet of Drones (IoD), and the Internet of Vehicles (IoVs)
  • Designing robust authentication and key agreement protocols for intelligent applications by leveraging blockchain features
  • Design of lattice-based post-quantum cryptographic protocols
Awards & Fellowships
  • 2019 – Junior Research Fellowship – University Grants Commission
Memberships
  • IEEE Member
Publications
  • Secure and Dynamic Route Navigation through RSU-based Authentication in IoV for Smart City

    Dr Mohammad Abdussami, Bimal Kumar Meher., Ruhul Amin., Muhammad Khurram Khan., Md Abdul Saifulla., Sanjeev Kumar Dwivedi

    Source Title: IEEE Transactions on Network Science and Engineering, Quartile: Q1, DOI Link

    View abstract ⏷

    One of the significant services provided by IoV in Smart cities is vehicular navigation. Drivers often find it difficult and time-consuming to complete their trip in a crowded city without real-time knowledge about the traffic and road conditions. So, a proper routing mechanism can help drivers reach their destination in minimum time and with less fuel consumption. However, it has been found that such protocols often face security challenges. In this paper, we have proposed an authenticated navigation scheme with the help of pseudonym-based asymmetric-key cryptography that discovers and secures the route to the destination in real time. The architecture embodies a geolocation provider (GLP) to get the possible static routes to a particular destination. Further, it uses the message-forwarding capability of RSUs to develop a dynamic route, after receiving feedback from the respective RSUs about the traffic conditions. While doing so, this protocol ensures proper message integrity, anonymity, unlinkability and robust protection from important security threats. Our approach ensures minimal end-to-end delay and efficient real-time route finding from a source to a destination with no extra overhead on the vehicles. We have simulated our authentication protocol using the Scyther simulator and found it safe from various adversarial attacks
  • LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment

    Dr Mohammad Abdussami, Sanjeev Kumar Dwivedi|Ruhul Amin|Cheng-Chi Lee|Taher Al-Shehari|Taha Alfakih|Hussain Alsalman

    Source Title: Peer-to-Peer Networking and Applications, Quartile: Q1, DOI Link

    View abstract ⏷

    The integration of the Internet of Things (IoT) with fog computing has significantly enhanced the capabilities of IoT applications by extending their reach and reducing latency. Fog nodes, being transient and authorized service providers, necessitate reauthentication of IoT end devices when contact is lost, requiring the device to connect to a new fog node. In this research, we propose an innovative security protocol designed to ensure seamless failover among fog nodes. This protocol facilitates quick and easy failover authentication among IoT devices and fognodes using the key agreement among fog nodes. LEFAM overcomes the requirement for the end device to communicate with the fog node atleast once to get the security token in order to execute failover authentication. This work proposes efficient, scalable and robust scheme required for fog-IoT environment to provide solution in case of failure of the primary fognodes. Our approach effectively mitigates various security threats, as demonstrated through informal analysis. Furthermore, simulation results obtained using the Scyther tool confirm the robustness of our protocol in terms of security. A formal analysis conducted using the RoR model further substantiates the reliability of our protocol. Notably, our protocol involves fewer message exchanges, indicating a lower communication overhead compared to other existing schemes. The key finding indicates that the LEFAM scheme offers an average improvement of 76% and 1188 bits for computation and communication overheads, respectively. Overall, our protocol not only enhances security but also offers superior performance relative to existing protocols
  • DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation

    Dr Mohammad Abdussami, Dwivedi S K., Al-shehari T., Saravanan P., Kadrie M., Alfakih T., Alsalman H., Amin R

    Source Title: Computers and Electrical Engineering, Quartile: Q1, DOI Link

    View abstract ⏷

    The growing reliance on wireless communication in Internet-of-Things (IoT) devices highlights the critical need for secure and efficient communication protocols, especially in environments vulnerable to cyber threats. Existing IoT protocols often lack sufficient security, creating a need for robust authentication and key exchange mechanisms that can resist attacks while maintaining low computational overhead. In this paper, we propose a fog-enabled network architecture integrated with IoT devices (Intra and Inter IoT device) and develop the DEAC-IoT scheme using Elliptic Curve Cryptography (ECC) for secure authentication and key agreement. Our protocol is designed to protect device-to-device communication from security threats in resource-constrained IoT environments. We validate DEAC-IoT's security through both informal analysis and formal verification using the Real-Or-Random (RoR) model, demonstrating its resistance to major attacks. Simulation via the Scyther tool confirms that private parameters remain secure throughout the protocol's execution. For practical feasibility, we implement DEAC-IoT on a Field Programmable Gate Array (FPGA) and conduct performance evaluations. The results show that our protocol surpasses existing protocols in both computational and communication efficiency, making it highly suitable for real-world IoT applications. © 2024 Elsevier Ltd
  • Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle systems

    Dr Mohammad Abdussami, Mohd Shariq., Mauro Conti., Karan Singh., Sanjeev Kumar Dwivedi., Ruhul Amin., Mehedi Masud

    Source Title: Computer Communications, Quartile: Q1, DOI Link

    View abstract ⏷

    Drones also called Unmanned Aerial Vehicles (UAVs) have become more prominent in several applications such as package delivery, real-time object detection, tracking, traffic monitoring, security surveillance systems, and many others. As a key member of IoT, the group of Radio Frequency IDentification (RFID) technologies is referred to as Automatic Identification and Data Capturing (AIDC). In particular, RFID technology is becoming a contactless and wireless technique used to automatically identify and track the tagged objects via radio frequency signals. It also has drawn a lot of attention among researchers, scientists, industries, and practitioners due to its broad range of real-world applications in various fields. However, RFID systems face two key concerns related to security and privacy, where an adversary performs eavesdropping, tampering, modification, and even interception of the secret information of the RFID tags, which may cause forgery and privacy problems. In contrast to security and privacy, RFID tags have very limited computational power capability. To deal with these issues, this paper puts forward an RFID-based Lightweight and Provably Secure Authentication Protocol (LPSAP) for Unmanned Aerial Vehicle Systems. The proposed protocol uses secure Physically Unclonable Functions (PUFs), Elliptic-Curve Cryptography (ECC), secure one-way hash, bitwise XOR, and concatenation operations. We use Ouafi and Phan’s formal security model for analyzing security and privacy features such as traceability and mutual authentication. The rigorous informal analysis is carried out which ensures that our proposed protocol achieves various security and privacy features as well as resists various known security attacks. The performance analysis demonstrates that our proposed protocol outperforms other existing protocols. In addition, Scyther and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool simulation results demonstrates that there is no security attack possible within bounds. Therefore, our proposed LPSAP protocol achieves an acceptable high level of security with the least computational, communication, and storage costs on passive RFID tags
Contact Details

abdussami.m@srmap.edu.in

Scholars