Muhammad Bilal Junaid

Learn More
In recent years, we have witnessed the dramatic increase in the volume of mobile SMS (Short Messaging Service) spam. The reason is that operators - owing to fierce market competition - have introduced packages that allow their customers to send unlimited SMS in less than $1 a month. It not only degrades the service of cellular operators but also compromises(More)
Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making(More)
Wireless Networks call for enhanced confidentiality, integrity and authentication services because of their inherent weakness. 'Counter Mode Cipher Block Chaining Message Authentication Code Protocol' (CCMP) has recently been employed to replace flawed 'Wired Equivalent Privacy' (WEP) Protocol for the provision of security to IEEE 802.11 wireless local area(More)
— The security and efficiency in terms of performance are the core requirements of cryptographic based algorithms. Recommendations proposed by the FIPS 140-2 standard emphasis on the correct implementations of the cryptographic algorithms after passing through a number of tests. Performance tests provide more security and efficient implementations on(More)
  • 1