Nauman Abdullah Shah

Learn More
Growth of Internet and its usage has made web services prone to malicious threats by automated scripts or bots. "Completely Automated Public Turing Test to tell Computers and Humans Apart", commonly abbreviated as CAPTCHA, is a technique used by web services to differentiate between humans and bots. [1] Most of these techniques are based on recognizing the(More)
WSN technology holds lot of promise in developing sensing and monitoring applications for both terrestrial as well as underground environment. The data thus acquired could be transmitted wirelessly even to remote locations for processing and further analysis thereby helping the decision makers to take appropriate measures. This paper discusses the(More)
Wireless Sensor based network do not have a global view of network topology. The communication pattern is many-to-one routed at base station. The routing is mostly based on least cost forwarding method. In this scenario, the resource constraint nodes become quite vulnerable to different kinds of Layer 3 attacks. In this paper, we simulate and analyze Black(More)
Radio Frequency Identification (RFID) tags possess the ability to uniquely identify every individual item at low cost. This emerging RF technology is well suited for supply chain management and is expected to replace barcodes in the near future. However, unlike barcodes, these tags have an extended range in which they are allowed to be queried by a reader.(More)
  • 1