Skip to main content

Research Repository

Advanced Search

An authentication protocol based on chaos and zero knowledge proof (2020)
Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3

Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocki... Read More about An authentication protocol based on chaos and zero knowledge proof.

Detection and prevention of Black Hole Attacks in IOT & WSN (2018)
Presentation / Conference Contribution
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018, April). Detection and prevention of Black Hole Attacks in IOT & WSN. Presented at 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain

Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two typ... Read More about Detection and prevention of Black Hole Attacks in IOT & WSN.