Now showing items 2130-2149 of 2495

    • Secure AF Relaying in Power-Constrained UAV Networks 

      Samara, Lutfi; AlAbbasi, Abubakr O.; El Shafie, Ahmed; Hamila, Ridha; Al-Dhahir, Naofal ( IEEE , 2021 , Conference Paper)
      This paper proposes a secure amplify-and-forward (AF) relaying scheme in unmanned aerial vehicle (UAV) networks while accounting for the power consumption limitations of UAVs. Since a UAV's battery life is limited, we ...
    • Secure Communications Using Directional Modulation 

      Hafez, Mohammed; Khattab, Tamer; El-Fouly, Tarek; Arslan, Hüseyin ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Conference Paper)
      Limitations on the wireless communication resources (i.e., time and frequency) introduces the need for another domain that can help communication systems to match the increasing demand on high data transfer rates and quality ...
    • Secure compressive sensing for ECG monitoring 

      Djelouat, Hamza; Amira, Abbes; Bensaali, Faycal; Boukhennoufa, Issam ( Elsevier , 2020 , Article)
      With the proliferation of wearable wireless sensors and adequate communication protocols, the internet of things (IoT) started to shape the healthcare sector into a new frame of connection between patients with health ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • Secure half-duplex dual-hop AF relaying networks with partial relay selection 

      Mallat, Walid; Alouane, Wided Hadj; Boujemaa, Hatem; Touati, Farid ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In this paper, we focus on the half-duplex (HD) relaying with partial relay selection (PRS) scheme using destination-assisted jamming (DAJ). We consider one source (S), one destination (D), one passive eavesdropper and ...
    • Secure Medical Data Sharing for Healthcare System 

      Chkirbene, Zina; Hamila, Ridha; Erbad, Aiman ( IEEE , 2022 , Conference Paper)
      A new generation of advanced information technologies are used nowadays by healthcare systems to provide access to affordable and high-quality healthcare services. However, such services, generally require a large amount ...
    • Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach 

      Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
    • Secure multiple-users transmission using multi-path directional modulation 

      Hafez, Mohammed; Khattab, Tamer; Elfouly, Tarek; Arslan, Huseyin ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
    • Secure Performance Analysis for Full-Duplex Cooperative NOMA System in the Presence of Multiple Eavesdroppers 

      Zaghdoud N.; Mnaouer A.B.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward (DF) NOMA network assumed to undergo independent and identically distributed Nakagami-m fading. Herein, we provide a secrecy ...
    • Secure Performance of AF and DF Relaying in Cooperative Noma Systems 

      Zaghdoud N.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capacity (SPSC)of cooperative non-orthogonal multiple access (NOMA)system with a single antenna over Rayleigh fading channel in ...
    • Secure Performance of DF Relaying in Cooperative NOMA over Rician Fading Channels 

      Zaghdoud N.; Mnaouer A.B.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this paper, a Decode-and-Forward (DF) relaying system for Non Orthogonal Multiple Access (NOMA) networks is considered, where the transmitted information between the relay and NOMA users can be overheard by an eavesdropper. ...
    • Secure robust collaborative spectrum sensing in the presence of smart attackers 

      Pourgharehkhan, Zahra; Taherpour, Abbas; Khattab, Tamer ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      In this paper, collaborative spectrum sensing to detect random signals corrupted by Gaussian noise in the presence of smart attackers is studied. Unlike to the most of related works, we consider a blind attacker detection ...
    • Secure smart contract-enabled control of battery energy storage systems against cyber-attacks 

      Mhaisen N.; Fetais N.; Massoud A. ( Elsevier B.V. , 2019 , Article)
      Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ...
    • Secure Spatial Multiple Access Using Directional Modulation 

      Hafez, Mohammed; Yusuf, Marwan; Khattab, Tamer; Elfouly, Tarek; Arslan, Hüseyin ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In this paper, we introduce a secure multiple access scheme, which exploits the multipath structure of the channel to create a multi-user interference environment. The generated interference enables legitimate users to ...
    • Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN 

      Yaacoub, Elias; Abualsaud, Khalid; Khattab, Tamer; Chehab, Ali ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      In remote rural areas without continuous Internet connectivity, it is hard to envisage the use of mHealth applications for remote patient monitoring. In such areas, patients need to travel long distances to reach the nearest ...
    • Secure two-user AF relaying networks using cooperative jamming 

      Mallat W.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In this paper, we investigate secure two-user AF relaying networks based on a destination assisted cooperative jamming (DACJ). We consider two sources, one destination, one eavesdropper and multiple amplify-and-forwards ...
    • Securing IoT Cooperative Networks Using Energy Harvesting. 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...
    • Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals 

      El Shafie, Ahmed; Mabrouk, Asma; Tourki, Kamel; Al-Dhahir, Naofal; Hamila, Ridha ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)
      We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the ...
    • Security Analysis of Merging Control for Connected and Automated Vehicles 

      Jarouf, Abdulah; Meskin, Nader; Al-Kuwari, Saif; Shakerpour, Mohammad; Cassanderas, Christos G. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Securing traffic flows in internet of vehicles (IoV) environments for connected and automated vehicles (CAVs) is a critical task as it should be done in real-time to allow vehicles' controllers engagement on time. In this ...
    • Security Performance Analysis of MISOSE Transmission with Random Unitary Beamforming 

      Bao T.; Yang H.-C.; Hasna M.O. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Random unitary beamforming (RUB) is a multiple antenna transmission scheme requiring limited channel state information (CSI) with low computational complexity. In this paper, we investigate the security performance of RUB ...