Browsing by Author "Refaey A."
Now showing items 1-7 of 7
-
3-D Stochastic Geometry-based Modeling and Performance Analysis of Efficient Security Enhancement scheme for IoT Systems
Chamkhia H.; Erbad A.; Al-Ali A.; Mohamed A.; Refaey A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day’s life. The heterogeneous nature of IoT devices and the complex use scenarios make it ... -
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core
Bello Y.; Allahham M.S.; Refaey A.; Erbad A.; Mohamed A.; Abdennadher N.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The increase in mobile traffic which is accompanied by a random workload, variations necessitate an upgrade of mobile network infrastructure to maintain acceptable network performance. Scaling the mobile core network ... -
Navigation and Obstacle Avoidance System in Unknown Environment
Singh J.; Dhuheir M.; Refaey A.; Erbad A.; Mohamed A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Recently, drones have been used in many different applications such as search and rescue operations, extinguishing fires, and environment mapping. As the number of moving drones increases in the sky, the collisions risk ... -
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
Chamkhia H.; Al-Ali A.; Mohamed A.; Guizani M.; Erbad A.; Refaey A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ... -
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
Chamkhia H.; Al-Ali A.; Mohamed A.; Guizani M.; Erbad A.; Refaey A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ... -
Proportionally fair approach for tor's circuits scheduling
Basyoni L.; Erbad A.; Mohamed A.; Refaey A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ... -
SsHealth: Toward secure, blockchain-enabled healthcare systems
Abdellatif A.A.; Al-Marridi A.Z.; Mohamed A.; Erbad A.; Chiasserini C.F.; Refaey A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The future of healthcare systems is being shaped by incorporating emerged technological innovations to drive new models for patient care. By acquiring, integrating, analyzing, and exchanging medical data at different system ...