Browsing Faculty Contributions by Subject "Network layers"
Now showing items 1-20 of 24
-
A Matlab/Simulink-Based Average-Value Model of Multi-Terminal HVDC Network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Multi-terminal High-Voltage Direct Current (MTDC) networks are emerging as the promising technology in modern transmission systems for efficient and bulky renewable energy sources transfer over long distances. Nonetheless, ... -
Channel secondary random process for robust secret key generation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ... -
Comparative simulation for physical layer key generation methods
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ... -
Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed pv generators: Detection and protection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this work, we study the effect of cyber-attacks on voltage regulation in smart grids with highly dispersed photovoltaic (PV) power generators. We picture how the cyberattacks in the distribution network with the existence ... -
Distributed cross-layer optimization for healthcare monitoring applications
( IEEE Computer Society , 2014 , Conference Paper)Mobile Health (mHealth) systems leverage wireless and mobile communication technologies to provide healthcare stakeholders with innovative tools and solutions that can revolutionize healthcare provisioning. Body Area Sensor ... -
Doppler compensation for AF two way relaying over time varying UWA channels
( IEEE , 2014 , Conference Paper)In this paper, we consider Doppler compensation for time varying underwater acoustic channels. The underlying system model comprises two sources, S1 and S2, communicating with each other through a relay, R. The transmission ... -
Efficient online WiFi delivery of layered-coding media using inter-layer network coding
( IEEE , 2011 , Conference Paper)A primary challenge in multicasting video in a wireless LAN to multiple clients is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions ... -
Energy-aware cross-layer optimization for EEG-based wireless monitoring applications
( IEEE Computer Society , 2013 , Conference Paper)Body Area Sensor Networks (BASNs) for healthcare applications have gained significant research interests recently due to the growing number of patients with chronic diseases requiring constant monitoring. Because of the ... -
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ... -
Joint physical-application layer security for wireless multimedia delivery
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless networks, compared to traditional wired networks, are more likely to suffer from malicious ... -
On the Performance of Tactical Communication Interception Using Military Full Duplex Radios
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Advances in the design of Full-Duplex (FD) transceivers with low residual Self-Interference (SI) levels has led to their deployment in various wireless communication applications. One promising field that FD transceivers ... -
Performance analysis of relay selection schemes in OFDM-based underlay cognitive networks
( IEEE , 2013 , Conference Paper)Cognitive radio (CR) is a promising technology that allows wireless systems to sense the environment and learn from previous experience to improve the communication quality. However, CR needs a flexible and adaptive physical ... -
Physical layer secrecy performance of multiple antennas transmission with partial legitimate user CSI
( Institution of Engineering and Technology , 2019 , Article)Conventional beamforming transmission techniques can enhance physical layer secrecy performance while requiring the full channel state information (CSI) of legitimate users and even that of eavesdroppers at the transmitter. ... -
Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming
( Hindawi Limited , 2018 , Article)We propose in this paper a physical-layer security (PLS) scheme for dual-hop cooperative networks in an effort to enhance the communications secrecy. The underlying model comprises a transmitting node (Alice), a legitimate ... -
Progressive Operational Perceptrons with Memory
( Elsevier B.V. , 2020 , Article)Generalized Operational Perceptron (GOP) was proposed to generalize the linear neuron model used in the traditional Multilayer Perceptron (MLP) by mimicking the synaptic connections of biological neurons showing nonlinear ... -
Robust secret key extraction from channel secondary random process
( John Wiley and Sons Ltd , 2016 , Conference Paper)The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ... -
Secrecy performance analysis of half/full duplex AF/DF relaying in NOMA systems over κ−μ fading channels
( Springer , 2022 , Article)Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Access (NOMA) and full-duplex techniques has been overwhelming, still analyzing the security aspects of such systems under ... -
Secret key generation based on channel and distance measurements
( IEEE Computer Society , 2014 , Conference Paper)Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ... -
Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ... -
Secure multiple-users transmission using multi-path directional modulation
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...