Browsing by Author "Chamkhia H."
Now showing items 1-9 of 9
-
3-D Stochastic Geometry-based Modeling and Performance Analysis of Efficient Security Enhancement scheme for IoT Systems
Chamkhia H.; Erbad A.; Al-Ali A.; Mohamed A.; Refaey A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day’s life. The heterogeneous nature of IoT devices and the complex use scenarios make it ... -
Capacity analysis of cognitive wireless networks with dynamic spectrum access
Chamkhia H.; Hasna , Mazen ( IEEE Computer Society , 2015 , Conference Paper)Cognitive radio (CR) is a promising technology based on spectrum sharing where the secondary unlicensed users can access the licensed frequency bands in the primary system without any modification to the devices, services ... -
Capacity enhancement in cognitive radio wireless network with dynamic spectrum access
Chamkhia H.; Hasna , Mazen; Bouallegue R. ( IEEE Computer Society , 2014 , Conference Paper)Deployment of femto-cells underlaying the macro-cell has been proven to greatly improve the system capacity and the indoor coverage. However, to successfully deploy this heterogeneous network, the interference among the ... -
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
Chamkhia H.; Al-Ali A.; Mohamed A.; Guizani M.; Erbad A.; Refaey A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ... -
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
Chamkhia H.; Al-Ali A.; Mohamed A.; Guizani M.; Erbad A.; Refaey A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ... -
Performance analysis of relay selection schemes in OFDM-based underlay cognitive networks
Chamkhia H.; Hasna , Mazen ( IEEE , 2013 , Conference Paper)Cognitive radio (CR) is a promising technology that allows wireless systems to sense the environment and learn from previous experience to improve the communication quality. However, CR needs a flexible and adaptive physical ... -
Performance analysis of relay selection schemes in underlay cognitive networks with Decode and Forward relaying
Chamkhia H.; Hasna , Mazen; Hamila R.; Hussain S.I. ( IEEE , 2012 , Conference Paper)In underlay cognitive networks with regenerative relaying, secondary users operating with primary user are adhering to stringent interference constraint which limits their transmission power and coverage area. In order not ... -
Performance analysis of relay selection schemes in underlay cognitive networks with imperfect channel state information
Chamkhia H.; Hasna , Mazen ( IEEE Computer Society , 2013 , Conference Paper)Cognitive Radio (CR) aims to improve spectrum utilization by allowing unlicensed users to access the licensed spectrum and to coexist with primary user (PU) while respecting the PU's restrictions. An interesting case to ... -
Performances analysis of SEC based transmit diversity systems with MRC receivers
Chamkhia H.; Hasna , Mazen; Hamila R. ( IEEE , 2012 , Conference Paper)Switch and Examine combining (SEC) diversity scheme is one of the simplest yet efficient diversity schemes. Earlier in [1] and [2], we proposed sequential power loading algorithm to reduce the average power used at the ...