Work place: Department of Computer Science, Virtual University of Pakistan, Lahore, 54000
Research Interests: Software Engineering, Computational Science and Engineering, Management Information System, Electrical Engineering, Mathematics of Computing
M Noman Riaz was born in September, 1982 at Karachi. He completed his B.S. in Electronic Engineering from Sir Syed University of Engineering & Technology, Karachi in 2006. He then joined government owned organization as an engineering officer and since then worked in different capacities that include Simulator Maintenance Manager, Manager (Telecom and Computer Networks), Manager (Training & Development), Senior Technical Manager (Air Field Electronics & Communication). Besides having professional experience in engineering domain, he had been affiliated with National University of Sciences & Technology, Islamabad as an Assistant Professor & Training coordinator from April 2014 till October, 2017. He did his M.E. in Telecomm Engineering in 2010. Also, he completed his M.S. degrees in Project Management and Software Engineering in 2017 and 2018, respectively. Currently, he is pursuing PhD in Computer Software Engineering from National University of Computer & Emerging Sciences, Islamabad, M.S.
in Financial Engineering from World Quant University, Louisiana and MicroMasters in Data, Economics & Development Policy from MITx.
DOI: https://doi.org/10.5815/ijwmt.2018.06.02, Pub. Date: 8 Nov. 2018
Wireless Sensor Networks (WSN) is one of the fastest rising emerging technologies that find widespread use in various applications comprising of military, health, agriculture, habitat etc. Seen as sensor network deployed at sites which can be considered as remote and hostile, the technology is seriously faced with challenges to the network and functional security at the cost of their inherent limitations in energy capacity and computing power. In this paper we have delved upon and summarized earlier research on security challenges poised to WSNs, classified the threats and then presented a generic WSN security model keeping in line with the intended security targets to be met. We have also tried to give a realistic theoretical analysis of our WSN security model against these threats.[...] Read more.
DOI: https://doi.org/10.5815/ijwmt.2018.04.03, Pub. Date: 8 Jul. 2018
In the recent few years the research on Wireless Sensor Networks (WSN) and its variants have risen enormously. The researchers all across the globe are trying to develop a routing protocol that is energy efficient and provides adequate security level in data communication. One of the techniques the researchers use is Clustering of the sensor network. This technique inherently consumes less energy during data communication as the nodes have assigned a dedicated task to perform. A total of 35 clustering algorithms / protocols have been surveyed and comparison of these protocols based on the metrics like heterogeneity, clustering method, size of the cluster etc. have been presented.[...] Read more.
DOI: https://doi.org/10.5815/ijmsc.2018.02.04, Pub. Date: 8 Apr. 2018
When we live in a global village, then maintaining privacy and confidentiality becomes reasonably challenging. Short Message Service (SMS) is the oldest application for exchanging messages between communicating parties in cellular network used by mobile phones. These messages are encrypted over-the-air with A5/1 algorithm and stored as clear text at network operator. Recent developments have shown that this algorithm is not secure any more. Compromising an access to network operator registers gains access to SMS also. Current scenarios of hacks and exploitation demands confidentiality, and encryption is one of the techniques, which is used, in this subsequent project of designing a secure SMS android application. Cryptographic manipulation of the data is performed using AES 128 -bit algorithm to secure the data, which is essential to us and the safe transmission of confidential data over the GSM network. AES (Advanced Encryption Standards) algorithm is the considered impregnable even to super computers brute force attacks. The AES algorithm technique uses very befuddled and sporadic encryption making data impregnable to attackers or hackers. This android app will allow the user to encrypt and decrypt the SMS (Short Message Service) efficiently and just at one click. Subsequent explanation is given afterwards.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals