Nauman Abdullah Shah

Learn More
Growth of Internet and its usage has made web services prone to malicious threats by automated scripts or bots. "Completely Automated Public Turing Test to tell Computers and Humans Apart", commonly abbreviated as CAPTCHA, is a technique used by web services to differentiate between humans and bots. [1] Most of these techniques are based on recognizing the(More)
Wireless Sensor based network do not have a global view of network topology. The communication pattern is many-to-one routed at base station. The routing is mostly based on least cost forwarding method. In this scenario, the resource constraint nodes become quite vulnerable to different kinds of Layer 3 attacks. In this paper, we simulate and analyze Black(More)
WSN technology holds lot of promise in developing sensing and monitoring applications for both terrestrial as well as underground environment. The data thus acquired could be transmitted wirelessly even to remote locations for processing and further analysis thereby helping the decision makers to take appropriate measures. This paper discusses the(More)
  • 1