• 3D Beamforming with Massive Cylindrical Arrays for Physical Layer Secure Data Transmission 

      Yaacoub E.; Al-Husseini M.; Chehab A.; Abualsaud K.; Khattab T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      In this letter, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. A part of the arrays is used for transmitting a signal reliably from source to destination using highly ...
    • A secure client-side framework for protecting the privacy of health data stored on the cloud 

      Sakr A.; Yaacoub E.; Noura H.; Al-Husseini M.; Abualsaud K.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ...
    • A Simple Approach for Securing IoT Data Transmitted over Multi-RATs 

      Diba R.; Yaacoub E.; Al-Husseini M.; Noura H.; Abualsaud K.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In an mHealth remote patient monitoring scenario, usually control units/data aggregators receive data from the body area network (BAN) sensors then send it to the network or 'cloud'. The control unit would have to transmit ...
    • Classification for Imperfect EEG Epileptic Seizure in IoT applications: A Comparative Study 

      Abualsaud K.; Mohamed A.; Khattab T.; Yaacoub E.; Hasna M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Epileptic seizure detection could be detected through investigating the electroencephalography (EEG), which is deemed to be very important for IoT wearable sensor-based health systems. EEG-based classification is crucial ...
    • Combating jamming attacks in multi-channel IoT networks using game theory 

      Guizani M.; Gouissem A.; Abualsaud K.; Yaacoub E.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
    • Hybrid Physical Layer Security for Passive RFID Communication 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such ...
    • IoT Anti-Jamming Strategy Using Game Theory and Neural Network 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...
    • On the delay of finite buffered multi-hop relay wireless internet of things 

      Elsamadouny A.; Hasna M.; Khattab T.; Abualsaud K.; Yaacoub E. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      The evolution of Internet of Things (IoT) as a new application in wireless networks mandates the utilization of wireless cooperative relaying to overcome the energy limitations of IoT devices. Multi-hop relaying is a ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach 

      Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
    • Securing IoT Cooperative Networks Using Energy Harvesting. 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...