Work place: School of Computer Science, Jazan University, Saudi Arabia
E-mail: brightsuccess_12@yahoo.com
Website:
Research Interests: Computer systems and computational processes, Computer Vision, Image Compression, Image Manipulation, Network Security, Image Processing
Biography
Quratulain Arshad received her BS in Computer Science from Comsats Institute of Information Technology, Pakistan. Her research interests include network security, trust and reputation in sensor networks and ad hoc networks. Her subjects of interest include Network Security, Digital Image Processing and Computer Vision.
By Yang Xiang Mohammed Y Aalsalem Quratulain Arshad Wazir Zada Khan
DOI: https://doi.org/10.5815/ijwmt.2012.02.06, Pub. Date: 15 Apr. 2012
Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.
[...] Read more.By Wazir Zada Khan Yang Xiang Mohammed Y Aalsalem Quratulain Arshad
DOI: https://doi.org/10.5815/ijcnis.2011.01.01, Pub. Date: 8 Feb. 2011
Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals