Attaullah Buriro

Work place: Department of Computer Science, Khwaja Fareed University of Engineering & Information Technology Rahim Yar Khan, 64200

E-mail:

Website:

Research Interests: Artificial Intelligence, Computational Learning Theory, Computer Architecture and Organization, Network Security, Data Mining, Data Structures and Algorithms

Biography

Engr. Dr. Attaullah Buriro is presently affiliated with Khawaja Fareed University of Engineering & Information Technology, Rahim Yar Khan and performing his duties as HoD Information Securty Department. He completed his PhD and Post Doctorate in Informationan & Communication Technologies from University of Trento, Itlay. I was also associated wtih Mohammad Ali Jinnah University, Karachi, and Federal Urdu University of Science, Arts and Technology, Karachi , as visiting faculty.He has published 20 research papers in reputable internanational conferences and journals. His research interests include behavioral biometrics, machine learning, smartphones user authentication, artificial intelligence, network security and data mining.

Author Articles
Classification of Attacks on Wireless Sensor Networks: A Survey

By Muhammad Noman Riaz Attaullah Buriro Athar Mahboob

DOI: https://doi.org/10.5815/ijwmt.2018.06.02, Pub. Date: 8 Nov. 2018

Wireless Sensor Networks (WSN) is one of the fastest rising emerging technologies that find widespread use in various applications comprising of military, health, agriculture, habitat etc. Seen as sensor network deployed at sites which can be considered as remote and hostile, the technology is seriously faced with challenges to the network and functional security at the cost of their inherent limitations in energy capacity and computing power. In this paper we have delved upon and summarized earlier research on security challenges poised to WSNs, classified the threats and then presented a generic WSN security model keeping in line with the intended security targets to be met. We have also tried to give a realistic theoretical analysis of our WSN security model against these threats.

[...] Read more.
Other Articles