An authentication protocol based on chaos and zero knowledge proof
Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...
Detection and prevention of Black Hole Attacks in IOT & WSN
Conference Proceeding
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018)
Detection and prevention of Black Hole Attacks in IOT & WSN. In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC)https://doi.org/10.1109/fmec.2018.8364068
Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sen...