Al-Sakib Khan Pathan

Ph.D.+MS in Comp. Engg. (KHU, South Korea). B.Sc. in CS & IT (IUT, Bangladesh)

IEEE Senior Member

 

Assistant Professor, Department of Computer Science

Kulliyyah [Pronounced: Kool-li-yah] (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Room: C5-02 (Level 5), KICT Building

Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +603-61964000 Ext. 5653, Cell: +60163910754

    

 

E-Mails: sakib @ iium.edu.my, spathan @ ieee.org, sakib.pathan @ gmail.com

 

Founding Director, NDC Research Group, KICT, IIUM


Al-Qur'an in 57:5 - For HIM (Allah) is the Kingdom of the heavens and the earth. And towards Allah is the return of all affairs. [Translated Meaning]


 

** This website may not be updated anymore as I've accepted another offer and relocating insha-Allah (God-willing) ...

** For my new affiliation, kindly check: https://sites.google.com/site/spathansite/

 

After being a Muslim, always Seek refuge in Allah from 8 things,

 

It is narrated in many ahadeeth that the Prophet (sallallahu 'alayhi wa sallam) would consistently make this du'aa, and many of the Companions heard him repeat it over and over.

 

اللهم إني أعوذ بك من الهم والحزن ، والعجز والكسل والبخل والجبن ، وضلع الدين وغلبة الرجال

 

Transliteration: Allahumma inni a’udhu bika minal-hammi wal-huzni wal-’ajazi wal-kasli wal-bukhli wal-jubni wa dala’id-dayni wa ghalabatir-rijal.

 

English Translation: O Allah, I take refuge in You from (1) anxiety and (2) sorrow, (3) weakness and (4) laziness, (5) miserliness and (6) cowardice, (7) the burden of debts and (8) from being overpowered by men.

 

(1) anxiety (Arabic: Al-Hamm) - to be worried about the future

(2) sorrow (Arabic: Al-Hazan) - to be in grief about the past

(3) weakness (Arabic: Al-'Ajaz) - incapability in doing something good

(4) laziness (Arabic: Al-Kasl) - being lackadaisical

(5) miserliness (Arabic: Al-Bukhl) - being stingy in spending in good

(6) cowardice (Arabic: Al-Jubn) - being afraid of standing for the truth

(7) the burden of debt (Arabic: Dala'a ad-dayn) - tendency for debt to sway people from righteousness or being heavily in debt and unable to pay back

(8) from being overpowered by men (Arabic: Ghalabah - to be overpowered) - (ghalabatir-rijal) being overpowered by someone unjustly

 

Some Recent and Upcoming events that I am involved in ...

 

Guest Editor, CFP - SI on: "RFID Applications in the Internet of Things", IJES, Inderscience [Submission Deadline: October 30, 2015]

Guest Editor, CFP - SI on: "Wireless Network Technologies and Applications", IJHPCN, Inderscience [Submission Deadline: October 20, 2015]

Guest Editor, CFP - SI on: "Advances in Wireless Networks Technologies", EAI Transactions on Industrial Networks and Intelligent Systems [Submission Deadline: October 15, 2015]

 

Guest Editor, CFP - SI on: "Advances in Vehicular and Underwater Communication Networks", IJAHUC, Inderscience

Editor, Call for Book Chapters: - "Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications", CRC Press, USA

 

Book: "Securing Cyber Physical Systems", CRC Press, USA [To Appear]

Special Issue on "Security and Trust Issues in Peer-to-Peer Networks", IJCSE, Inderscience [To Appear]

 

Conferences, Workshops
 

General Chair, AWICT 2015, 20-23 September, 2015 - Tunisia

 

Program Co-Chair, DependSys 2015, 18-20 November, 2015 - Zhangjiajie, China [Submission Deadline: July 15, 2015]

Program Chair, NetSID 2015, with EUSPN 2015, 27-30 September, 2015, Berlin, Germany

Program Chair, SPINS-2015 with ANT 2015, 02-05 June, 2015 - London, UK

Program Co-Chair, MCSMS-2015 with ANT 2015, 02-05 June, 2015 - London, UK

 

International Journals Chair, ANT 2015, 2-5 June, 2015 - London, United Kingdom

 

Workshop Chair, MobiSPC 2015, 17-20 August, 2015 - Belfort, France

Workshop Co-Chair, FNC 2015, 17-20 August, 2015 - Belfort, France

 

Publicity Co-Chair, CCSNA 2015 with GLOBECOM 2015, 6-10 December, 2015 - San Diego, CA, USA [Submission Deadline (Firm): July 01, 2015]

Publicity Co-Chair, SDRANCAN-2015 with GLOBECOM 2015, 6-10 December, 2015 - San Diego, CA, USA [Submission Deadline (Firm): July 01, 2015]

Publicity Co-Chair, IOT 2015, 2-4 November, 2015 - Shenzhen, China [Submission Deadline: August 15, 2015]

Publicity Chair, FCST 2015, 26-28 August, 2015 - Dalian, China

Publicity Co-Chair, UbiSafe 2015, 20-22 August, 2015 - Helsinki, Finland

Publicity Co-Chair, UIC 2015, 10-14 August, 2015 - Beijing, China

Publicity Co-Chair, SCAN 2015 with ICC 2015, 8-12 June, 2015 - London, UK

Publicity Co-Chair, CCSNA 2015 with ICC 2015, 8-12 June, 2015 - London, UK

 

Symposium Program Co-Chair, EICM 2015 with MobiSPC 2015, August 17-20, 2015 - Belfort, France

 

Track Chair for "Mobile Networks, Protocols and Applications", ANT 2015, 2-5 June - London, United Kingdom

 

Program Committee Member in:

 

GLOBECOM 2015 (Adhoc and Sensor Networks), 6-10 December, 2015 - San Diego, CA, USA

ICT-DM’2015, 30 November-02 December, 2015 - Rennes, France

CivicTech 2015, 13 October, 2015 - Bratislava, Slovakia

EMERGING TECHNOLOGIES: Cloud Computing track with VTC2015-Fall, 6–9 September 2015 - Boston, USA

IWCMC 2015 (Wireless Networking Symposium), 24-27 August, 2015 - Dubrovnik, Croatia
WINSYS 2015, 20-22 July, 2015 - Colmar, Alsace, France

SWANSITY 2015 with SECON 2015, 22 June, 2015 - Seattle, USA

SSPA 2015, 23-25 June, 2015. Novi Sad, Serbia

ICIW 2015, 21-26 June, 2015 - Brussels, Belgium

ICIEV 2015, 15-17 June, 2015 - Fukuoka, Japan

IoT/CPS-Security 2015 with ICC 2015, 8-12 June, 2015 - London, UK

SCPA 2015 with ICC 2015, 8-12 June 2015 - London, UK

 

BOOKS [Authored/Edited/(Authored + Edited) volumes]

 

 

    

 

 

For some books published by CRC press, USA, please check the CRC author profile: http://www.crcpress.com/authors/i5998-al-sakib-khan-pathan/linkedin/1090

_________________________________________________________________________________________________________________________________________________________________

 

** SPECIAL  NOTE **

 

For free download of the SOURCE CODES of the book, Practical Cryptography: Algorithms and Implementations Using C++, kindly check:

http://staff.iium.edu.my/sakib/praccrypt

Or,

https://sites.google.com/site/spathansite/praccrypt

_________________________________________________________________________________________________________________________________________________________________

 

Biography

 

Al-Sakib Khan Pathan received Ph.D. degree (MS leading to Ph.D.) in Computer Engineering in 2009 from Kyung Hee University, South Korea. He received B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. He is currently an Assistant Professor at Computer Science department in International Islamic University Malaysia (IIUM), Malaysia. Till June 2010, he served as an Assistant Professor at Computer Science and Engineering department in BRAC University, Bangladesh. Prior to holding this position, he worked as a Researcher at Networking Lab, Kyung Hee University, South Korea till August 2009. His research interest includes wireless sensor networks, network security, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several publications in these areas. He has served as a Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous international conferences/workshops like GLOBECOM, ICC, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, etc. He was awarded the IEEE Outstanding Leadership Award and Certificate of Appreciation for his role in IEEE GreenCom’13 conference. He is currently serving in various editorial positions like as an Associate Technical Editor of IEEE Communications Magazine, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, and International Journal of Sensor Networks, Inderscience Publishers, Area Editor of International Journal of Communication Networks and Information Security; Associate Editor of International Journal of Computational Science and Engineering, Inderscience; Guest Editor of many special issues of top-ranked journals, and Editor/Author of 12 published books. One of his books was included twice in Intel Corporation's Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, 2 other books were indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, in February 2015 and a seventh book is in process of being translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper are included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of numerous renowned journals. He received some awards for his reviewing activities like: one of the most active reviewers of the International Arab Journal of Information Technology twice for 2012 and 2014, recognized reviewer status of Elsevier Computers & Electrical Engineering journal (March 2014) and Elsevier Ad Hoc Networks journal (April 2014). He has so far successfully supervised two PhD students to completion. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.

 

Research Interests

Journal Editorial Services (Partial list - Present and Past)

Reviewer/Referee for Journals (Partial list - Past and Present)

Notable Awards and Recognitions

Current Research Activities

 

Please visit my research group site: NDC Lab ( Networking and Distributed Computing Laboratory ) .

 

Sample Publications

  1. Imran Yusof and Al-Sakib Khan Pathan, “Mitigating Cross-Site Scripting Attack by Implementing Content Security Policy”, Computer, IEEE. [SCI-Indexed] (To Appear)

  2. Al-Sakib Khan Pathan and Mohssen M. Z. E. Mohammed, “Building Customer Trust in Cloud Computing with an ICT-enabled Global Regulatory Body”, Wireless Personal Communications, Springer, DOI 10.1007/s11277-015-2729-z. [SCIE-Indexed]

  3. Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, "Key Revocation in Wireless Sensor Networks – A Survey on a Less-addressed yet Vital Issue", International Journal of Ad Hoc and Ubiquitous Computing, Inderscience Publishers, Vol. 18, Nos. 1/2, 2015, pp. 3-22. [SCIE-Indexed]

  4. Al-kindy Athman Abdalla and Al-Sakib Khan Pathan, “On Protecting Data Storage in Mobile Cloud Computing Paradigm”, IETE Technical Review, Volume 31, Issue 1, 2014, DOI:10.1080/02564602.2014.891382, pp. 82-91. [SCIE-Indexed]

  5. Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, DOI: 10.1109/SURV.2012.121912.00006, Volume: 15, Issue: 3, Third Quarter 2013, pp. 1223-1237. [SCI-Indexed]

  6. Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C. Ramírez Pacheco, "Accurate Modeling of VoIP Traffic QoS Parameters in Current and Future Networks with Multifractal and Markov Models", Mathematical and Computer Modelling Journal, Elsevier, 10.1016/j.mcm.2011.12.007, Volume 57, Issues 11-12, June 2013, pp. 2832-2845. [SCI-Indexed]

  7. Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla Khanam, and Habibullah Yusuf Saleem, "A Pay-and-Stay Model for Tackling Intruders in Hybrid Wireless Mesh Networks", SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712467827, Volume 89, Issue 5 May 2013, pp. 616-633. [SCIE-Indexed]

  8. Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Efficient and Effective Automated Surveillance Agents using Kernel Tricks", SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712460908, Volume 89, Issue 5, May 2013, pp. 562-577. [SCIE-Indexed]

  9. Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, and Mohamad Badra, "Towards Privacy Protection in Smart Grid", Wireless Personal Communications, Springer, DOI 10.1007/s11277-012-0939-1,  Volume 73, Issue 1, November 2013, pp 23-50. [SCIE-Indexed]

  10. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu, and Guangjie Han, "An Efficient Approach of Secure Group Association Management in Densely Deployed Heterogeneous Distributed Sensor Network", Security and Communication Networks, Wiley InterScience, DOI: 10.1002/sec.277, Volume 4, Issue 9, August 2011, pp. 1013–1026. [SCIE-Indexed]

  11. Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan, "ViSim: A User-Friendly Graphical Simulation Tool for Performance Analysis of MANET Routing Protocols", Mathematical and Computer Modelling Journal, Elsevier, Volume 53, Issues 11-12, June 2011, pp. 2204-2218. [SCI-Indexed]

  12. Al-Sakib Khan Pathan and Choong Seon Hong, “SERP: Secure Energy-efficient Routing Protocol for Densely Deployed Wireless Sensor Networks”, Annals of Telecommunications, DOI: 10.1007/s12243-008-0042-5, Volume 63, Numbers 9-10, October 2008, pp. 529–541. [SCI-Indexed]

  13. Al-Sakib Khan Pathan and Choong Seon Hong, “A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards”, IEICE Transactions on Information and Systems, Volume E90-D, No. 11, November, 2007, pp. 1885-1888. [SCIE-Indexed]

  14. Al-Sakib Khan Pathan and Choong Seon Hong, “A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN”, Lecture Notes in Computer Science (LNCS), Volume 4208, Springer-Verlag 2006, pp. 270-279. (acceptance rate: 29%) [SCIE-Indexed]

  15. Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon Hong, “A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks”, Lecture Notes in Computer Science (LNCS), Volume 4317, Springer-Verlag 2006, pp. 102-115. (acceptance rate: 12%)

  16. Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong, "Security in Wireless Sensor Networks: Issues and Challenges", Proceedings of the 8th International Conference on Advanced Communication Technology (IEEE ICACT 2006), Volume II, 20-22 February, Phoenix Park, Korea, 2006, pp. 1043-1048.

Click Here for Full List of Publications

 

 

Sample Talks/Presentations

 

- Keynote Speech: "Building Customer Trust in Cloud Computing Model", ICACCE-2015, Dehradun, India, 1-2 May, 2015. PPT

- Paper Presentation: "A Neighbour Discovery Approach for Cognitive Radio Network Using Tower of Hanoi (ToH) Sequence Based Channel Rendezvous", ICT4M 2014, Kuching, Malaysia, 17-18 November, 2014. PPT

- Paper Presentation: "SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks", ISBAST 2014, Kuala Lumpur, Malaysia, 26 August, 2014. PPT

- Keynote Speech: "Computer Science and IT Today: Research Issues and Publication Tips", ICIECC 2014, Madurai, India, 10 April, 2014. PPT

- Keynote Speech: "Wireless Sensor Network Security: Current Status and Future Trends", Thapar University, Patiala, Punjab, India, 4 October, 2013. PPT

- Seminar Presentation: "The Need-to-Know Issues for Publishing Books and Book Chapters", Springer eBooks Seminar, IIUM, Kuala Lumpur, Malaysia, 20 September 2013. PPT

- Paper Presentation: "On the Key Revocation Schemes in Wireless Sensor Networks", IEEE GreenCom 2013, Beijing, China, 21 August 2013. PPT

- Paper Presentation: "Usability Improvements for Touch-Screen Mobile Flight Booking Application: A Case Study", ACSAT 2012, Kuala Lumpur, Malaysia, 27 November 2012. PPT

- Paper Presentation: "An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks", 5th IDCS 2012, Wu Yi Shan, China, 21 November 2012. PPT

- Guest Lecture: "Wireless Network Security: 3G, 4G, Wireless PAN/LAN/MAN", CICT, Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia, 23 May 2012. PPT

 

Courses for Semester II, 2014/2015

 

Networks & System Administration (CSC 4201)
Wireless Communication (CSC 4204)

Network Programming (CSC 4205)

 

Some useful links I am/was associated with ...

 

Qur'anic Word-a-Day link where you could subscribe only with email address to get periodic email,

Learn Qur'anic words based on the contexts with examples - Part of Saad Matin's Ph.D. Work:

 

http://qwad.80percentwords.com/

 

Standalone prototype software could be downloaded from: http://staff.iium.edu.my/sakib/ndclab/soft/80percent_proto.html

 

WSN Security and Security Map for Wireless Sensor Networks:

 

http://www.wsn-security.info/index.htm

http://www.wsn-security.info/Security_Map.htm

http://www.wsn-security.info/About_us.htm

 

 

Frequently Asked Questions (FAQs) to me ...

 

Question: Why do you bring your religious views with your academic identity?

 

Answer: Because, that view regulates my conducts be that in an academic task, in personal task, or whatever in life. If you are the scrutinizer of me, you can question my action based on those rules that I claim to follow. The rules are fixed with evidences and records and I, as a son of Adam am faulty, often prone to violating rules. Every person is a slave (required to give service) in earth: either to his own desire, or to his wife, or to his "love", or to his family, or to his job, or to his business, or to someone else whose views would seem to be better (that go with own sense and intellect) in setting own moral compass. When one may choose to be subordinate to any of these things and thinks that he is self-respecting himself, I decided to be a slave of Allah, The Most High, The Only One Unique Almighty, before whom there is none and after whom there is none. There is nothing like unto Him and He is self-sufficient - yes, that's the limit of the intellect to describe Him but He is only known in the way of revelation how He revealed Himself to the righteous human beings. My academic identity comes under the identity of being a Muslim (who submits his will to the Will of Allah).

 

Question: Those who follow Islam or any other religion and a set of rules and regulations are nitwits and disrespect themselves. Don't you think so?

 

Answer: Islam is not like "any other religion". Learn it in better way. Time may permit you or not to learn and that "time" (which is also a creation), none does control except Allah, who has full control to stop the lifetime of you or me or whoever the creation is, at any time. There is no exact measuring scale of your and my wit but if you compare the earthy accomplishments to judge it, I may not score less! Self-respect is a part of Islamic faith and pride is not. Those who follow only own desires disrespect many others; those who follow only others' views often disrespect themselves; those who respect both own and others' views based on a particular issue, may find a fine line to respect themselves and respect others. Your way of life is for you, and my way of life is for me.

 

Question: Where's the proof of your Allah's existence?

 

Answer: The proof is in the core of my heart (intellect) - I am convinced fully with the proof. This does not need to be proved to others and cannot be proven. I am convinced that Allah created me and I will rise after death for judgment of my deeds just like you are convinced that you need a proof to accept this kind of matter where you can neither disprove you will rise after death On the Day of Judgment to answer to Almighty about all your deeds. If this is no valid answer to your query, then the question is also not a valid question to me. People willingly believe what they want to believe.

 

------------------------------------------------------------------

Last Updated: July 05, 2015 by Al-Sakib Khan Pathan