Dr. Shafiullah Khan

Assistant Professor and HOD
Kohat University of Science and Technology, Pakistan


Highest Degree
Post Doctoral Fellow in Wireless Networks and Communication Security from Middlesex University, UK

Share this Profile

Biography

Dr. Shafiullah Khan is currently working as Assistant Professor and Director/ HOD of Institute of Information Technology, Kohat University of Science and Technology (KUST) Pakistan. He has completed his PhD from School of Engineering and Information Science Middlesex University, UK. His area of research interest include Wireless Networks (Cellular, MANET, Sensor, Body area Network, Mesh, WLAN, WiMAX, Internet of Things), Computer Networks, Wireless Communication Technologies, and Networks Security. He has published 28 research articles in journals as well as 5 book and 2 book chapters contributed as author/co-author. He has completed 5 research projects. He is editor in chief in International Journal of Communication Networks and Information Security (IJCNIS). He is also serving as reviewer for Elsevier Journal of Parallel and Distributing Computing, Journal of Network and Computer Applications, journal of Multimedia tools and Applications, journal of Wireless Personal Communication, International Journal of Network Security and many others. He also served as guest editor for special issues. Currently he is supervising five PhD and five MS/M.Phil students in different areas of wireless networks in Kohat University of Science and Technology (KUST), Pakistan.

Area of Interest:

Computer Sciences
Wireless Networks
Network Security
Computer Networks
Internet of Things

Selected Publications

  1. Mehmood, A., S. Khan, B. Shams and J. Lloret, 2015. Energy-efficient multi-level and distance-aware clustering mechanism for WSNs. Int. J. Commun. Syst., 28: 972-989.
    CrossRef  |  Direct Link  |  

  2. Khan, S., J. Lloret and M. Lopez, 2015. Bio inspired mechanisms in wireless sensor networks, editorial. Int. J. Distrib. Sens. Netw., 10.1155/2015/173419.
    CrossRef  |  Direct Link  |  

  3. Sendra, S., L. Parra, J. Lloret and S. Khan, 2014. Systems and algorithms for wireless sensor networks based on animal and natural behavior. Int. J. Distrib. Sens. Netw., 10.1155/2015/625972.
    CrossRef  |  Direct Link  |  

  4. Khan, S., J. Lloret and J. Loo, 2014. Intrusion detection and security mechanisms for wireless sensor networks editorial. Int. J. Distrib. Sens. Netw., 10.1155/2014/747483.
    CrossRef  |  Direct Link  |  

  5. Alrajeh, N.A., S. Khan, J. Lloret and J. Loo, 2014. Artificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting. Adhoc Sens. Wireless Netw., 22: 109-133.
    Direct Link  |  

  6. Uddin, Z., S. Kamal, S. Khan and J.A. Nasir, 2013. A fuzzy logic based software cost estimation model. Int. J. Software Eng. Appl., .
    Direct Link  |  

  7. Shah, S.T., B. Shams and S. Khan, 2013. A survey on secure routing in wireless sensor networks. Int. J. Sens. Wireless Commun. Control, 3: 37-44.
    Direct Link  |  

  8. Alrajeh, N.A., S. Khan, J. Lloret and Loo, 2013. Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. Int. J. Distributed Sensor Networks. 10.1155/2013/374796.
    CrossRef  |  Direct Link  |  

  9. Alrajeh, N., S. Khan and B. Shams, 2013. Multi-channel framework for body area network in health monitoring. Appl. Math. Inf. Sci. Int. J., 7: 1743-1747.
    Direct Link  |  

  10. Alrajeh, N., S. Khan and B. Shams, 2013. Intrusion detection systems in wireless sensor networks: A Review. Int. J. Distrib. Sens. Netw., 10.1155/2013/167575.
    CrossRef  |  Direct Link  |  

  11. Khan, S., N.A. Alrajeh and K.K. Loo, 2012. Secure route selection in wireless mesh networks. Elsevier J. Comput. Networks, 56: 491-503.
    CrossRef  |  Direct Link  |  

  12. Khan, S and K.K. Loo, 2012. Cross layer secure and resource aware on demand routing protocol for hybrid wireless mesh networks. Wireless Personal Commun., 62: 201-214.
    CrossRef  |  Direct Link  |  

  13. Roka, R and S. Khan, 2011. The modeling of hybrid passive optical networks using the Int. J. Res. Rev. Comput. Sci., 2: 48-54.

  14. Khan, S., K.K. Loo, R. Comley and A.N. Khwildi, 2011. Surveying ad hoc and secure routing in wireless mesh networks. Int. J. Inf. Assur. Secur., 6: 73-80.

  15. Hashim, A.Y.B and S. Khan, 2011. Mathematical gene expression-the vague expression used for modeling of access system. Int. J. Res. Rev. Inf. Privacy Secur., 1: 11-13.

  16. Campbell, C.E.A., S. Khan, D. Singh and K.K. Loo, 2011. Multi-channel Multi-radio using 802.11 based media access for sink nodes in wireless sensor networks. Sensors, 11: 4917-4942.
    CrossRef  |  Direct Link  |  

  17. Campbell, C.E.A., K.K. Loo, O. Gemikonakli, S. Khan and D. Singh, 2011. Multi-channel distributed coordinated function over single radio in wireless sensor networks. Sens. Int. J., 11: 964-991.
    CrossRef  |  Direct Link  |  

  18. Campbell, C.E.A., K.K. Loo, H.A. Kurdi and S. Khan, 2011. Comparison of IEEE 802.11 and ieee 802.15.4 for future green multichannel multi-radio wireless sensor networks. Int. J. Commun. Networks Inf. Secur., 3: 96-103.
    Direct Link  |  

  19. Khan, S., K.K. Loo, M. Noor and N. Tahir, 2010. SRPM: secure routing protocol for ieee 802.11 infrastructure-based wireless mesh networks. Network Syst. Manag., 18: 190-209.
    CrossRef  |  Direct Link  |  

  20. Wang, W., H. Man and Y. Liu, 2009. A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Secur. Commun. Networks, 2: 669-685.
    CrossRef  |  Direct Link  |  

  21. Khan, S., M. Noor and K.K. Loo, 2009. Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks. Inf. Int. Interdiscip. J., .

  22. Khan, S., K.K. Loo and Z.U. Din, 2009. Flash crowd avoidance mechanism in community based multi-hop ieee 802.11 wireless mesh networks. Int. J. Comput. Inf. Technol., 2: 101-106.

  23. Khan, S., K.K. Loo and Z.U. Din, 2009. Cross layer design for routing and security in multi-hop wireless networks. Int. J. Inf. Assurance Secur., 4: 170-173.
    Direct Link  |  

  24. Khan, S and K.K. Loo, 2009. Real-time cross-layer design for large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks. Network Secur., 2009: 9-16.
    CrossRef  |  Direct Link  |