Efficient and secured mechanisms for data link in IoT WSNs: A literature review

MZ Hasan, Z Mohd Hanapi - Electronics, 2023 - mdpi.com
The Internet of things (IoT) and wireless sensor networks (WSNs) have been rapidly and
tremendously developing recently as computing technologies have brought about a …

[PDF][PDF] Challenges in wireless body area network

M Asam, T Jamal, M Adeel, A Hassan… - … Journal of Advanced …, 2019 - researchgate.net
Wireless Body Area Network (WBAN) refers to a short-range, wireless communications in
the vicinity of, or inside a human body. WBAN is emerging solution to cater the needs of …

Malicious node analysis in MANETS

T Jamal, SA Butt - International Journal of Information Technology, 2019 - Springer
The mobile ad hoc networks (MANETS) are decentralized, multi-hop networks in which the
intermediate nodes play an role of routers to pass data packets to destination. The Routing …

A multivariant secure framework for smart mobile health application

SA Butt, T Jamal, MA Azad, A Ali… - Transactions on …, 2022 - Wiley Online Library
Wireless sensor network enables remote connectivity of technological devices such as smart
mobile with the internet. Due to its low cost as well as easy availability of data sharing and …

Security Issues in WBANs

M Asam, T Jamal, A Ajaz, Z Haider, SA Butt - arXiv preprint arXiv …, 2019 - arxiv.org
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or
inside a human body. WBAN is emerging solution to cater the needs of local and remote …

Denial of service attack in cooperative networks

T Jamal, Z Haider, SA Butt, A Chohan - arXiv preprint arXiv:1810.11070, 2018 - arxiv.org
In Denial of Service (DoS) attack the network resources are either delayed or refused to be
assigned to the requested user [1]. This may occurs due to verity of reasons, could be …

Novel relay selection protocol for cooperative networks

M Asam, Z Haider, T Jamal, K Ghuman… - arXiv preprint arXiv …, 2019 - arxiv.org
Extensive research has been done to achieve better throughput and reliability in wireless
networks, with focus on multiple-input multiple-output systems. Recently, cooperative …

[PDF][PDF] Flow Table Congestion in Software Defined Networks

T Jamal, P Amaral, K Abbas - ICDS, 2018 - researchgate.net
Security is a major concern for today's networks and network applications. Denial of Service
(DoS) is major threat to availability of service. DoS is easy to detect but hard to mitigate …

[PDF][PDF] Denial of service attack in wireless LAN

T Jamal, P Amaral, A Khan, A Zameer, K Ullah, SA Butt - ICDS 2018, 2018 - academia.edu
Physical and Medium Access Control (MAC) layer for implementing wireless Local Area
Network (LAN). In the wireless network, nodes share media elements with each other …

Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains

P Zanna, P Radcliffe, D Kumar - Sensors, 2022 - mdpi.com
Impersonation-based attacks on wireless networks are easy to perform and can significantly
impact network security. Their detection is problematic due to the attacks utilizing legitimate …