Obaid ur Rehman

Learn More
In recent few years Wireless Sensor Networks (WSNs) have seen an increased interest in various applications like border field security, disaster management and medical applications. So large number of sensor nodes are deployed for such applications, which can work autonomously. Due to small power batteries in WSNs, efficient utilization of battery power is(More)
Wireless Sensor Networks (WSNs) with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network lifetime as much as one could, for efficient and optimal utilization of resources. Different approaches(More)
One of the major issues in Wireless Body Area Sensor Networks (WBASNs) is efficient localization. There are various techniques for indoor and outdoor environments to locate a person. This study evaluating and compares performance of optimization schemes in indoor environments for optimal placement of wireless sensors, where patients can perform their daily(More)
Message Authentication Codes (MACs) are very sensitive to any modification in the message. The verification fails even if there is a slight change in the message. However, special algorithms have been introduced that tolerate a small amount of noise in messages as required by some applications. Noise Tolerant Message Authentication Code (NTMAC) is an(More)
One of the major challenges in Wireless Body Area Networks (WBANs) is to prolong the lifetime of network. Traditional research work focuses on minimizing transmit power; however, in the case of short range communication the consumption power in decoding is significantly larger than transmit power. This paper investigates the minimization of total power(More)
Wireless communication systems are under heavy investigations by the research community, especially since the past decade. Many popular applications over the wireless communication networks have emerged recently including, cellular telephony, SMS, MMS, web browsing and video conferencing, to name a few. Communication over wireless channel, however, is(More)
Wireless communication systems and the applications developed for it are increasing day by day, mainly due to the inherent mobility that it offers. Amongst the most popular applications over the wireless communication networks are cellular telephony, web browsing, Simple Messaging Service, Multimedia Messaging Service and video conferencing. Communication(More)
Images transmitted over insecure communication channels are protected using a message authentication code (MAC) for authenticity and integrity. Conventional MAC algorithms are in particular not suitable for image authentication over a noisy channel. Even a single bit error will render the image unauthentic and therefore being rejected. Retransmissions might(More)