Tanveer A. Zia

Learn More
Wireless Body Area Networks (WBAN) have emerged as an extension to conventional wireless sensor networks in recent years to comply with the needs in providing timely and effective response in healthcare as one of the many target applications such networks have. The traffic of a WBAN is diverse due to different monitoring tasks carried on by sensor nodes. It(More)
Wireless sensor networks are a promising future of many commercial and military applications. However, these networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional(More)
Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key management is challenging. In this paper we present a Novel Secure Key Management (NSKM) module providing an efficient(More)
Key management is critical to meet the security goals to prevent the sensor networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sensor networks, providing a right key management is challenging. Traditional key management schemes based on trusted third parties like a certification authority are impractical due to(More)
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security(More)
Inherent resource limitation nature of wireless sensor networks poses unique security challenges. Cryptography is not enough and efficient to secure wireless sensor networks; it can not prevent malicious nodes and tunneling of messages to wormholes and sinkholes. In this paper we propose a monitoring mechanism to detect malicious nodes; the proposed(More)
Wireless Sensor Networks (WSN) have become promising future for many applications. The development of WSN was originally motivated by military applications; however, these networks have drawn attention from many civilian applications ranging from environment and habitat monitoring, home automation, traffic control to health care applications. One of the(More)
Data aggregation in wireless sensor networks (WSN) is a rapidly emerging research area. It can greatly help conserve the scarce energy resources by eliminating redundant data thus achieving a longer network lifetime. However , securing data aggregation in WSN is made even more challenging, by the fact that the sensor nodes and aggregators deployed in(More)