Now showing items 2067-2086 of 2424

    • Secrecy performance analysis of half/full duplex AF/DF relaying in NOMA systems over κ−μ fading channels 

      Zaghdoud N.; Mnaouer A.B.; Boujemaa H.; Touati F. ( Springer , 2022 , Article)
      Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Access (NOMA) and full-duplex techniques has been overwhelming, still analyzing the security aspects of such systems under ...
    • Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios 

      Zaghdoud N.; Mnaouer A.B.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the same resource bloc. As a result, NOMA technique ...
    • Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems 

      Yang L.; Yang J.; Xie W.; Hasna , Mazen; Tsiftsis T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      In this work, we study the secrecy performance of a reconfigurable intelligent surfaces (RIS)-aided wireless communication system in the presence of an eavesdropping user. Specifically, we assume that the RIS is placed ...
    • Secrecy performance of AF relaying in cooperative NOMA over rician channel 

      Zaghdoud N.; Alouane W.H.; Boujemaa H.; Mnaouer A.B.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In this paper, we investigate the secrecy performance of an Amplify-and-Forward (AF) relay in a cooperative NOMA system. The AF relay ensures the transmission of the signal in the presence of one passive eavesdropper where ...
    • Secrecy Performance of Cooperative NOMA System with Multiple Full-Duplex Relays against Non-Colluding/Colluding Eavesdroppers 

      Zaghdoud N.; Mnaouer A.B.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Duplex (FD) techniques are considered as promising key techniques. However, the secrecy in NOMA systems has proven to be ...
    • Secrecy Performance of Full-Duplex Jamming and Reception under I/Q Imbalance 

      Samara, Lutfi; Hamila, Ridha; Al-Dhahir, Naofal ( IEEE , 2021 , Article)
      Investigating the physical layer security performance of full-duplex (FD) radio transceivers has been the subject of numerous research studies. However, self-interference cancellation that enables full exploitation of FD ...
    • Secret communication on the Z-Channel with cooperative receivers 

      Fayed, Abdallah; Khattab, Tamer; Lai, Lifeng ( IEEE Computer Society , 2017 , Conference Paper)
      The discrete memoryless Z-Channel with a confidential message and a cooperative receiver (DM-ZC-CMCR) is considered. A noiseless one-sided rate-limited cooperation link exists between the two receivers. The secrecy level ...
    • Secure AF Relaying in Power-Constrained UAV Networks 

      Samara, Lutfi; AlAbbasi, Abubakr O.; El Shafie, Ahmed; Hamila, Ridha; Al-Dhahir, Naofal ( IEEE , 2021 , Conference Paper)
      This paper proposes a secure amplify-and-forward (AF) relaying scheme in unmanned aerial vehicle (UAV) networks while accounting for the power consumption limitations of UAVs. Since a UAV's battery life is limited, we ...
    • Secure Communications Using Directional Modulation 

      Hafez, Mohammed; Khattab, Tamer; El-Fouly, Tarek; Arslan, Hüseyin ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Conference Paper)
      Limitations on the wireless communication resources (i.e., time and frequency) introduces the need for another domain that can help communication systems to match the increasing demand on high data transfer rates and quality ...
    • Secure compressive sensing for ECG monitoring 

      Djelouat, Hamza; Amira, Abbes; Bensaali, Faycal; Boukhennoufa, Issam ( Elsevier , 2020 , Article)
      With the proliferation of wearable wireless sensors and adequate communication protocols, the internet of things (IoT) started to shape the healthcare sector into a new frame of connection between patients with health ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • Secure half-duplex dual-hop AF relaying networks with partial relay selection 

      Mallat, Walid; Alouane, Wided Hadj; Boujemaa, Hatem; Touati, Farid ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In this paper, we focus on the half-duplex (HD) relaying with partial relay selection (PRS) scheme using destination-assisted jamming (DAJ). We consider one source (S), one destination (D), one passive eavesdropper and ...
    • Secure Medical Data Sharing for Healthcare System 

      Chkirbene, Zina; Hamila, Ridha; Erbad, Aiman ( IEEE , 2022 , Conference Paper)
      A new generation of advanced information technologies are used nowadays by healthcare systems to provide access to affordable and high-quality healthcare services. However, such services, generally require a large amount ...
    • Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach 

      Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
    • Secure multiple-users transmission using multi-path directional modulation 

      Hafez, Mohammed; Khattab, Tamer; Elfouly, Tarek; Arslan, Huseyin ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
    • Secure Performance Analysis for Full-Duplex Cooperative NOMA System in the Presence of Multiple Eavesdroppers 

      Zaghdoud N.; Mnaouer A.B.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward (DF) NOMA network assumed to undergo independent and identically distributed Nakagami-m fading. Herein, we provide a secrecy ...
    • Secure Performance of AF and DF Relaying in Cooperative Noma Systems 

      Zaghdoud N.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capacity (SPSC)of cooperative non-orthogonal multiple access (NOMA)system with a single antenna over Rayleigh fading channel in ...
    • Secure Performance of DF Relaying in Cooperative NOMA over Rician Fading Channels 

      Zaghdoud N.; Mnaouer A.B.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this paper, a Decode-and-Forward (DF) relaying system for Non Orthogonal Multiple Access (NOMA) networks is considered, where the transmitted information between the relay and NOMA users can be overheard by an eavesdropper. ...
    • Secure robust collaborative spectrum sensing in the presence of smart attackers 

      Pourgharehkhan, Zahra; Taherpour, Abbas; Khattab, Tamer ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      In this paper, collaborative spectrum sensing to detect random signals corrupted by Gaussian noise in the presence of smart attackers is studied. Unlike to the most of related works, we consider a blind attacker detection ...
    • Secure smart contract-enabled control of battery energy storage systems against cyber-attacks 

      Mhaisen N.; Fetais N.; Massoud A. ( Elsevier B.V. , 2019 , Article)
      Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ...