IoT smart health security threats

SA Butt, JL Diaz-Martinez, T Jamal, A Ali… - … science and its …, 2019 - ieeexplore.ieee.org
The Internet of things (IoT) is an active area in the current research community due to the
improvement in mobile computing and wireless networks. Currently, the IoT is involved in …

A multivariant secure framework for smart mobile health application

SA Butt, T Jamal, MA Azad, A Ali… - Transactions on …, 2022 - Wiley Online Library
Wireless sensor network enables remote connectivity of technological devices such as smart
mobile with the internet. Due to its low cost as well as easy availability of data sharing and …

MAC protocols for cooperative diversity in wireless LANs and wireless sensor networks

RAM Khan, H Karl - IEEE Communications Surveys & Tutorials, 2013 - ieeexplore.ieee.org
In this paper, we present a survey of cooperative diversity-enabled Medium Access Control
(MAC) protocols for Wireless LANs (WLANs) and Wireless Sensor Networks (WSNs) …

Security Issues in WBANs

M Asam, T Jamal, A Ajaz, Z Haider, SA Butt - arXiv preprint arXiv …, 2019 - arxiv.org
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or
inside a human body. WBAN is emerging solution to cater the needs of local and remote …

Cooperative relaying in user-centric networking under interference conditions

T Jamal, P Mendes - IEEE Communications Magazine, 2014 - ieeexplore.ieee.org
An ever-growing demand for pervasive Internet access has boosted the deployment of
wireless local networks in recent decades. Nevertheless, wireless technologies face …

[PDF][PDF] Cooperative cloudlet for pervasive networks

T Jamal, SA Butt - Proc. of Asia Pacific Journal of Multidisciplinary …, 2017 - academia.edu
The notion of cooperation in wireless communication has got significant attention from both
academia and industrial persons towards to address the performance drawbacks of wireless …

Denial of service attack in cooperative networks

T Jamal, Z Haider, SA Butt, A Chohan - arXiv preprint arXiv:1810.11070, 2018 - arxiv.org
In Denial of Service (DoS) attack the network resources are either delayed or refused to be
assigned to the requested user [1]. This may occurs due to verity of reasons, could be …

Novel relay selection protocol for cooperative networks

M Asam, Z Haider, T Jamal, K Ghuman… - arXiv preprint arXiv …, 2019 - arxiv.org
Extensive research has been done to achieve better throughput and reliability in wireless
networks, with focus on multiple-input multiple-output systems. Recently, cooperative …

[PDF][PDF] Flow Table Congestion in Software Defined Networks

T Jamal, P Amaral, K Abbas - ICDS, 2018 - researchgate.net
Security is a major concern for today's networks and network applications. Denial of Service
(DoS) is major threat to availability of service. DoS is easy to detect but hard to mitigate …

[PDF][PDF] Wireless cooperative relaying based on opportunistic relay selection

T Jamal, P Mendes, A Zúquete - … Journal on Advances in Networks and …, 2012 - Citeseer
Advances in wireless technologies, including more powerful devices and low cost radio
technologies, have potential to drive an ubiquitous utilization of Internet services …