Al‐Sakib Khan Pathan

ORCID: 0000-0001-6572-3451
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Security in Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Mobile Ad Hoc Networks
  • IoT and Edge/Fog Computing
  • Opportunistic and Delay-Tolerant Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Authentication Protocols Security
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Blockchain Technology Applications and Security
  • Distributed systems and fault tolerance
  • Cryptography and Data Security
  • Smart Grid Security and Resilience
  • Security and Verification in Computing
  • Anomaly Detection Techniques and Applications
  • Vehicular Ad Hoc Networks (VANETs)
  • Chaos-based Image/Signal Encryption
  • Cloud Data Security Solutions
  • Cloud Computing and Resource Management
  • Spam and Phishing Detection
  • Access Control and Trust
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Agent-Based Network Management
  • Energy Harvesting in Wireless Networks

United International University
2021-2025

New Jersey City University
2020-2024

Gelişim Üniversitesi
2023

Maulana Azad Medical College
2006-2023

International Islamic University Malaysia
2011-2022

Southeast University
2016-2022

Independent University
2019-2022

University of Johannesburg
2022

Manchester Metropolitan University
2022

Melbourne School of Theology
2021

Wireless sensor network (WSN) is an emerging technology that shows great promise for various futuristic applications both mass public and military. The sensing combined with processing power wireless communication makes it lucrative being exploited in abundance future. inclusion of also incurs types security threats. intent this paper to investigate the related issues challenges networks. We identify threats, review proposed mechanisms discuss holistic view ensuring layered robust networks

10.1109/icact.2006.206151 article EN 2006 8th International Conference Advanced Communication Technology 2006-01-01

This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored this are anomaly detection, misuse specification-based protocols. We give description existing security attacks WSNs the corresponding protocols tackle those attacks. analyze with respect network structure WSNs. In addition, we highlight critical...

10.1109/surv.2012.121912.00006 article EN IEEE Communications Surveys & Tutorials 2013-01-01

Wireless body area sensor network is a sub-field of wireless network. has come into existence after the development reached some level maturity. This become possible due to tremendous technological advancement leading easy-to-use wearable technologies and electronic components that are small in size. Indeed, this field gained significant attention recent time its applications which mostly toward healthcare sector. Today, tiny-sized sensors could be placed on human record various...

10.1177/1550147718768994 article EN cc-by International Journal of Distributed Sensor Networks 2018-04-01

The Internet of Things (IoT) is a technologyof connecting billions devices with heterogeneous types and capabilities. Even though it an attractive environment that could change the way we interact devices, real-life large-scale implementation greatly impeded by potential security risks susceptible to. While IoT significant, challenges faces are equally formidable. can be addressed from different angles, but one key issues access control model because among many challenges, pivotal concern...

10.3390/iot6010009 article EN cc-by IoT 2025-01-24

Abstract The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While term sounds common, it specifically means case when an attacker compromises sensor readings such tricky way that undetected errors are into calculations state variables and values. Due to rapid growth Internet associated complex adaptive systems, cyber attackers interested exploiting similar attacks other application domains as healthcare, finance, defense, governance, etc. In...

10.1186/s40294-020-00070-w article EN cc-by Complex Adaptive Systems Modeling 2020-04-23

The Internet of Medical Things (IoMT) has become a strategic priority for future e-healthcare because its ability to improve patient care and scope providing more reliable clinical data, increasing efficiency, reducing costs. It is no wonder that many healthcare institutions nowadays like harness the benefits offered by IoMT. In fact, it an infrastructure with connected medical devices, software applications, systems services. However, accelerated adoption devices also serious side effect:...

10.3390/jcp2030033 article EN cc-by Journal of Cybersecurity and Privacy 2022-08-17

Cracks in concrete surfaces are one of the most prominent causes degradation structures such as bridges, roads, buildings, etc. Hence, it is very crucial to detect cracks at an early stage inspect structural health structure. To solve drawbacks manual inspection, Image Processing Techniques (IPTs), especially those based on Deep Learning (DL) methods, have been investigated for past few years. Due groundbreaking development this field, researchers devoted their endeavors detecting using...

10.3390/rs15092400 article EN cc-by Remote Sensing 2023-05-04

In this paper, we present a detailed review on various types of SQL injection attacks, vulnerabilities, and prevention techniques. Alongside presenting our findings from the survey, also note down future expectations possible development countermeasures against attacks.

10.1109/isce.2011.5973873 article EN 2011-06-01

Examines the market for wireless sensor networks in era and expansion of Internet Things. Over past decade, fast Things (IoT) paradigm communication technologies has raised many scientific engineering challenges that call ingenious research efforts from both academia industry. The IoT now covers several beyond RFID (WSNs). In fact, number potential application fields already exceeded expectations. According to Cisco IBSG, more than 50 billion devices are expected be connected by 2020, with...

10.1109/mcom.2018.8291108 article EN IEEE Communications Magazine 2018-02-01

With the increasing integration of location-based services (LBSs) into various societal domains, location privacy preservation has emerged as a pivotal concern. In most continuous LBS protection approaches, user needs to send query an untrusted service provider (LSP) request corresponding results, and these results are discarded immediately after being used. This leads similar queries in future having be sent LSP again, which increases risk leakage when facing LSP. To solve issues, caching...

10.1109/jiot.2023.3308073 article EN IEEE Internet of Things Journal 2023-08-23

In recent years, reputation management schemes have been proposed as promising solutions to alleviate the blindness during peer selection in distributed P2P environment where malicious peers coexist with honest ones. They indeed provide incentives for contribute more resources system and thus promote whole performance. But few of them implemented practically since they still suffer from various security threats, such collusion, Sybil attack so on. Therefore, how detect plays a critical role...

10.17762/ijcnis.v5i1.199 article EN International Journal of Communication Networks and Information Security (IJCNIS) 2022-04-17

The importance of reading in learning a new language is unquestionable. Someone who wants to master language, s/he must read lot that as one the two means input; other listening. Reading not only helps students learn words and expressions target but also makes them familiar with varieties sentence structures their uses various contexts. Unfortunately, EFL learners Bangladesh do usually non-academic texts written English like newspapers, magazines, novels, stories, among others. This hinders...

10.52589/ijlll-e4pzveu3 article EN cc-by-nc-nd International Journal of Literature Language and Linguistics 2025-02-10

10.1080/1206212x.2025.2474330 article EN other-oa International Journal of Computers and Applications 2025-03-06
Coming Soon ...