scispace - formally typeset
F

Faraz Idris Khan

Researcher at Prince Sultan University

Publications -  21
Citations -  562

Faraz Idris Khan is an academic researcher from Prince Sultan University. The author has contributed to research in topics: Routing protocol & Wireless network. The author has an hindex of 8, co-authored 21 publications receiving 467 citations. Previous affiliations of Faraz Idris Khan include National University of Computer and Emerging Sciences & Kyung Hee University.

Papers
More filters
Journal ArticleDOI

Extracellular export of sphingosine kinase-1a contributes to the vascular S1P gradient.

TL;DR: It is shown that among the five Sphk isoforms expressed in endothelial cells, the Sphk-1a isoform is selectively secreted in HEK-293 cells (human embryonic kidney cells) and human umbilical-vein endothelial Cells and in sharp contrast, Sphk2 is not secreted.
Journal ArticleDOI

Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

TL;DR: In this article, the authors identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges in the Internet of Things (IoT).
Posted Content

Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review

TL;DR: This paper has identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges.
Book ChapterDOI

Hybrid intrusion detection system for wireless sensor networks

TL;DR: A hybrid, lightweight intrusion detection system integrated for sensor networks that take advantage of cluster-based protocol to build a hierarchical network and provide an intrusion framework based both on anomaly and misuse techniques that can prevent most of routing attacks on sensor networks.
Proceedings ArticleDOI

Wormhole attack prevention mechanism for RPL based LLN network

TL;DR: An effective tree traversal algorithm which works on the notion of electing nodes as root in a large scale network from where a Merkle tree will be originated will assist in managing the authentication in a huge sized network broken down into many trees avoiding wormhole attacks in the network.