Tanveer A. Zia

Learn More
Vehicu lar ad-hoc networks (VANETs) technology has emerged as an important research area over the last few years. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication(More)
Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key management is challenging. In this paper we present a Novel Secure Key Management (NSKM) module providing an efficient(More)
Wireless sensor networks have very promising future to many applications. Ensuring that sensor nodes locations are verified and are protected from malicious attacks will enable sensor networks deployment in mission critical applications. Due to the deployment nature, sensor nodes are highly vulnerable to localization attacks where an adversary can capture(More)
Key management is critical to meet the security goals to prevent the sensor networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sensor networks, providing a right key management is challenging. Traditional key management schemes based on trusted third parties like a certification authority are impractical due to(More)
Deployment of wireless sensor networks in sensitive applications such as healthcare, defence, habitat monitoring and early bushfire detection requires a careful consideration. These networks are prone to security attacks due to their wireless and deployment nature. It is very likely that after deployment of the network, sensor nodes are left unattended(More)
The existing digital watermarking schemes use a digital pattern like pseudorandom number sequence, a logo image or a digital signature as the watermark. Use of such watermarks is not convincing as the ownership of such a watermark is not clear for ownership claims. This paper proposes an efficient digital watermark generation technique from biometric iris(More)
Wireless sensor networks are being used in many commercial and military applications to collect real time and event driven data. Deployment nature of sensor networks makes them vulnerable to security threats. Due to the resource limitations traditional security measures are not enough to protect sensor nodes. Research in sensor network security domains has(More)
Wireless Sensor Networks (WSN) have become promising future for many applications. The development of WSN was originally motivated by military applications; however, these networks have drawn attention from many civilian applications ranging from environment and habitat monitoring, home automation, traffic control to health care applications. One of the(More)