Syed Muhammad Khaliq-ur-Rahman Raazi

Learn More
Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key(More)
In many of the sensor network applications like natural habitat monitoring and international border monitoring, sensor networks are deployed in areas, where there is a high possibility of node capture and network level attacks. Specifically in such applications, the sensor nodes are severely limited in resources. We propose MUQAMI, a locally distributed key(More)
In recent years, use of sensors to measure the biometrics and movements of human body have resulted in the design of wireless body area networks (WBAN). Although WBANs consist of resource constrained sensing devices just like other wireless sensor networks (WSN), they differ from WSNs in topology, scale and security requirements. Due to these differences,(More)
Wireless Sensor Networks (WSN) are worthy to use in ubiquitous healthcare environments. They provide comfort to patients and make patient monitoring systems more efficient. WSN, when applied in ubiquitous healthcare environments, have different characteristics and security requirements. Number of sensors is very small as compared to other WSN applications(More)
In humanware applications, resource constrained sensor devices are tactically placed on human body to form Wireless Body Area Networks (WBAN). Then the WBAN is used for monitoring biometrics and movements of human body. Keeping in mind the resource constrained devices, WBANs are treated just like wireless sensor networks when considering a solution for key(More)
Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues,(More)
Recent research on ubiquitous computing has introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous computing environment. Existing access control approaches such as RBAC, became inappropriate to support this concept because they do not consider human activities. In this paper, we propose(More)