scispace - formally typeset
M

Mohammad Faisal

Researcher at University of Malakand

Publications -  22
Citations -  279

Mohammad Faisal is an academic researcher from University of Malakand. The author has contributed to research in topics: Big data & Wireless network. The author has an hindex of 7, co-authored 22 publications receiving 110 citations. Previous affiliations of Mohammad Faisal include Information Technology University.

Papers
More filters
Journal ArticleDOI

An Energy-Efficient and Cooperative Fault- Tolerant Communication Approach for Wireless Body Area Network

TL;DR: The proposed scheme adopted the cooperative communication and network coding strategy to minimize channel impairment and body fading effect and hence reduces the ensued faults, bit error rate, and energy consumption, thereby increasing the throughput and reliability in WBAN.
Journal ArticleDOI

An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks

TL;DR: A new Energy-Efficient and Reliable Routing Scheme (ERRS) is proposed to enhance the stability period and reliability for resource-constrained WBANs and takes advantage of the adaptive static clustering routing technique.
Journal ArticleDOI

Identity attack detection system for 802.11-based ad hoc networks

TL;DR: The obtained results demonstrate that it is possible to detect identity attacks with considerable accuracy without causing extra overhead in the form of extra hardware, periodic beacons or expensive localization operations in the wireless ad hoc networks.
Journal ArticleDOI

Masquerading Attacks Detection in Mobile Ad Hoc Networks

TL;DR: This paper proposes the received signal-strength-based masquerading attack detection scheme, which is carried out first by each node in its one-hop vicinity and then extended to five-hop proximity for broader detection scope and improved accuracy.
Journal ArticleDOI

A Survey on Lightweight Authentication Schemes in Vertical Handoff

TL;DR: A comparative study of different lightweight authentication methods is presented but the main focus of this work is one of the different implementations of lightweight authentication in the vertical handoff.