

Research / Programming
Experiences
In my pioneering research, "Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol," I developed a novel trust evaluation framework that significantly enhances IoT security and reliability. Leveraging game theory and Bayesian inference, the framework introduces a "Second Chance Protocol" to accurately identify and reintegrate temporarily malfunctioning devices, thereby optimizing network resource utilization and trustworthiness. My work not only demonstrates a detection rate of 97.99% for low noise levels but also sets new benchmarks in IoT security research, showcasing my deep analytical abilities, innovative problem-solving skills, and my commitment to advancing cybersecurity in smart environments.
My Role and Contributions:
As a lead researcher, I spearheaded the development of a hierarchical trust evaluation framework for IoT devices, incorporating innovative strategies such as the "Second Chance Protocol." This protocol uniquely identifies and rehabilitates temporarily malfunctioning nodes, optimizing resource utilization and trustworthiness across the network. Through meticulous experimentation and synthetic data analysis, my team and I demonstrated significant improvements in trust evaluation accuracy and device utilization, setting new benchmarks in IoT security research.
Model Detection accuracy of different approaches and the average trust with noise.

Proposed Platform for the IoT Network

Correlation matrix for selected features from A-scan GPR

Real and simulated enviorments
Phantom Tumor Tracking in Dual-Energy Fluoroscopy using a Kalman Filter

Tumor visibility in different noise

Floroscopy image containing tumor
Soilx: Estimating Soil moisture and layer profile using GPR data and ML

SFCW radar data collection campaign
