گلِ امید
الفاظ کے نشتر میری سماعتوں کو چیرتے ہوئے
میرے دل میں پیوست ہو رہے تھے
یوں لگ رہا تھا جیسے
میرے احساسات کسی راہِ پُر خار سے گزر رہے ہوں
میری تھر تھراتی ہوئی زبان کچھ بھی کہنے سے قاصر تھی
نجانے کتنے ہی جملے زباں کی نوک تک آتے آتے دم توڑ گئے
میں حواس باختہ یوں بیٹھا تھا
جیسے کوئی بہرا…صدائوں سے بہت دور
خیالات نے ہر چیز کو ’’لا‘‘ کے پیمانے پر رکھ دیا تھا
There are many beliefs in the sects that are common, while the differences are very small and minor. The differences are usually of a sectarian, ijtihad and preferential nature. But the false powers are using these sectarian differences to spread extremist thinking, which is a poison for the Muslim Ummah.
Closeness is essential for the survival of the Muslim faith. This unity should not be temporary but should be a message of intellectual and spiritual, material well-being, spiritual maturity and evolution of mental development and unity should be universal. No matter how much the two groups disagree, there are many commonalities. It is important for convergent beliefs to cultivate commonalities rather than divisive ones. So that the atmosphere of hatred is reduced and an atmosphere of unity is created.
The history of Islam bears witness to the fact that the Imams, jurists, narrators and commentators have differed on a number of issues. Despite this difference, love, goodwill, brotherhood and unity prevailed. For such interfaith tolerance and harmony, mutual respect is also necessary.
Key words: Convergence of beliefs, Unity and solidarity, Interdisciplinary, Shared, Sub-differences, Universal
During the last decade, authentication of sensor node and secure routing of data been remained an open challenges in Wireless Networks due to their applications in various vulnerable environments. These challenges become more signi cant when Wireless Sensor Networks (WSN) composed of tiny inexpensive nodes are consid- ered. This is due to the fact that the solutions proposed for the similar purposes in conventional wireless networks cannot be exploited for sensor networks because of high complexities and power consumptions involved in their algorithms. This thesis proposes a two-fold solution for the issues of node authentication and secure routing in Wireless Sensor Networks. In therst part of the thesis, a low complexity Sybil attack detection mechanism for Wireless Sensor Networks is pro- posed; while in the second part, a Secure Energy E cient Routing scheme called SEER is presented for the data security. Both of the proposed schemes are based on the Signed Response (SRes) authentication and voice encryption mechanism developed for Global System for Mobile (GSM) communications. The proposed Sybil attack detection scheme use pre-distributed key embedded in the sensor nodes. A modi ed version of A3 algorithm used in node authentication produces a SRes with the help of pre-distributed keys against a random challenge number sent by the sink or Cluster Head (CH). The 32 bit SRes is sent back to the sink or CH by the node to prove its legitimacy. The design of node authentication scheme is made exible so that it can be implemented in both hierarchical and centralized Wireless Sensor Networks. The scheme is analyzed for its performance under var- ious Sybil attacks. The scheme is evaluated for its probability of detecting Sybil nodes when di erent authentication key pool sizes are utilized. After extensive simulations, it is observed that the proposed scheme is able to counter Sybil at- tacks with higher probability as compared to notable existing schemes. Moreover, it has also been observed that the proposed Sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same Sybil attack detection performance.In the second part of the thesis, a secure mechanism for routing of data in Wire- less Sensor Networks; SEER is proposed. The proposed protocol is based on A5 encryption scheme developed for voice encryption in GSM. After successful au- thentication, a modi ed version of A5 algorithm is used to encrypt data during its routing from source to the sink or relay node. SEER uses GRACE (GRAdient Cost Establishment) routing protocol for transmission. For this purpose, a 64-bit ciphering key is used which is produced through a complicated process of pertur- bation in order to make it harder to be traced. SEER has been tested through simulations in MATLAB R by setting up hostile and vulnerable Wireless Sensor Network scenarios with respect to data integrity. The results obtained are then compared with two notable existing secure routing protocols. It is proved that the proposed mechanism SEER helps achieve the desired performance under dy- namically changing network conditions with various numbers of malicious nodes. Due to its linear complexity, lesser power consumption and more dynamic route updation, the proposed Sybil detection and SEER schemes can be easily extended to cater to the needs of emerging industrial wireless sensor networks, Dust Sen- sor Networks and IoT. Emerged from the conventional Wireless Sensor Networks, all the aforementioned networks have got the same nature of vulnerabilities and threats along with the inherited limitations with respect to their hardware and processing capabilities.