مجال
التميز
|
تميز دراسي و بحثي + إبداع علمي
|
|
|
البحوث المنشورة
|
|
البحث (1):
|
|
عنوان البحث:
|
Optimal
Cooperative Relaying and Jamming for Secure Communication
|
رابط إلى البحث:
|
Click here
|
تاريخ النشر:
|
29/09/2015
|
موجز عن البحث:
|
This journal
considers joint cooperative beamforming and jamming schemes in a cooperative
relay network where distributed relay nodes perform cooperative beamforming.
The problem of interest is to keep the eavesdropper’s signal to interference
and noise ratio (SINR) as low as possible while maintaining the legitimate
receiver’s SINR requirement. Applying semidefinite relaxation (SDR)
technique, it is shown that a rank one optimal solution always exists if
perfect channel information is available. An optimal relay beamforming scheme
has also been proposed for the scenario where only the second-order
statistics of the eavesdropper’s channel is available.
|
|
|
البحث (2):
|
|
عنوان البحث:
|
Secure
Relaying in Multihop Communication Systems
|
رابط إلى البحث:
|
Click here
|
تاريخ النشر:
|
04/04/2016
|
موجز عن البحث:
|
This letter
considers improving end-to-end secrecy capacity of a multihop
decode-and-forward (DF) relaying system. Firstly, a secrecy rate maximization
problem without transmitting artificial noise (AN), is considered, following
which AN-aided secrecy schemes are proposed. Assuming that global channel
state information (CSI) is available, an optimal power splitting solution is
proposed. Furthermore, an iterative joint optimization of transmit power and
power splitting coefficient has also been considered. For the scenario of no
eavesdropper’s CSI, we provide a sub-optimal solution. The simulation results
demonstrate that the AN-aided optimal scheme outperforms other schemes.
|
|
|
المؤتمرات العلمية:
|
|
المؤتمر (1):
|
|
عنوان المؤتمر:
|
IEEE Vehicular
Technology Conference
|
تاريخ الإنعقاد:
|
14/09/2014
|
مكان
الإنعقاد:
|
Vancouver, Canada
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Relay
Selection for Multi-Destination in Cooperative Networks with Secrecy
Constraints
|
ملخص المشاركة:
|
Most of the prior
researches in the field of relay selection techniques under security
constraints for cooperative networks have only concentrated on single
destination, although the factual communication environment comprehends
multiple transmitters and receivers. This paper proposes relay selection for
multi-destinations in cooperative networks. The study is implemented under a
security constraint whereby an eavesdropper tries to eavesdrop on information
sent from the sender Hence, we investigate an optimal relay selection
technique, in order to improve the level of security in the network by
securing information sent to multi-destinations and thereby confusing the
eavesdropper. The performance of the proposed system scheme is analysed using
average secrecy capacity and outage probability, which are confirmed by
numerical results based on simulations.
|
|
|
المؤتمر (2):
|
|
عنوان المؤتمر:
|
IEEE
International Symposium in Indoor and Mobile Radio Communications
|
تاريخ الإنعقاد:
|
30/08/2015
|
مكان
الإنعقاد:
|
Hong Kong, China
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Secrecy outage
probability of cooperative network through distributed Alamouti code
|
ملخص المشاركة:
|
The cooperative
diversity technique, combined with distributed space-time coding (DSTC), can
efficiently improve the secrecy capacity and transmission reliability of
wireless communication systems. In this paper, a multicast cooperative
relaying system, based on distributed Alamouti space-time coding, is
proposed, as a method of preventing an eavesdropper from accessing source
data. A maximum likelihood (ML) decoder at the destination was chosen to
receive the data, however, the ML decoder was unable to receive data at the
eavesdropper. An analysis was carried out to synchronize DSTC, a Rayleigh fading
channel, a Rician fading channel, and a combination thereof. It was assumed
that channel state information (CSI) for the relay-destination link was
known, although this was unknown for the relay-eavesdropper link. The
theoretical results for the secrecy outage probability for the proposed
scheme are then compared with existing results.
|
|
|
|
|
المؤتمر (3):
|
|
عنوان المؤتمر:
|
22nd
International Institute of Engineers & Researchers conference 2015
|
تاريخ الإنعقاد:
|
20/04/2015
|
مكان
الإنعقاد:
|
London, UK
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Optimal
Clustering of Jammers with Perfect Channel
State Information
|
ملخص المشاركة:
|
In this paper, we will present cooperative
jamming techniques for wireless channels to enhance physical layer security
for wireless communication networks. Emphasis will be placed on the impact of
channel state information, the position of the attackers as well as optimal
signal techniques. We will also define the different metrics to be considered
such as capacity and mutual information under a given constellation. In this
poster, we assume that the jammers have no CSI at all. The problem in this
case is a min-max problem based on convex optimisation to derive an optimal
strategy. The analytical and theoretical results for the secrecy rate for the
proposed scheme were compared with another system models.
|
|
|
المؤتمر (4):
|
|
عنوان المؤتمر:
|
International conference sustainable
development in sciences and technology 2014
|
تاريخ الإنعقاد:
|
27/11/2014
|
مكان
الإنعقاد:
|
London, UK
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Secrecy
Outage Probability of Multicast Cooperative Relay Networking
|
ملخص المشاركة:
|
In this paper, a cooperative DF system
model was proposed based on realistic scenarios and practical applications.
Secrecy outage capacity was analysed and compared with a Monte- Carlo
simulation over a Rayleigh fading channel. The Rayleigh fading channel in
turn was compared with a Rician fading channel. The proposed system model was
also compared with other possible cooperative system models through
simulation. The other cooperative system model can be inherited easily by
dropping a destination or an eavesdropper. Thus, our proposed model is a
generalised form of cooperative communication.
|
|
|
المؤتمر (5):
|
|
عنوان المؤتمر:
|
IEEE Wireless Communications and Networks
Conference WCNC 2014
|
تاريخ الإنعقاد:
|
06/04/ 2014
|
مكان
الإنعقاد:
|
Istanbul, Turkey
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Secrecy
Outage Probability of Relay Networking in Multiple Destination and
Eavesdropper Scenarios
|
ملخص المشاركة:
|
This paper investigates the secrecy outage
probability of multicast cooperative relay networking in the presence of
multi-destination and multi eavesdropper nodes. The study is carried out in a
multicast relay communication scenario whereby multi-eavesdropper nodes
attempt to overhear the source message. Most of the previous studies in the
field of cooperative communications and relay selection have considered the
presence of either a single eavesdropper or a single destination environment.
However, in the actual multicast communication scenario, multi-destination
and multi-eavesdropper are presented. We therefore consider an optimal relay
selection scheme in order to increase secrecy capacity for multi-destinations
and to decrease it for eavesdroppers.
|
|
|
المؤتمر (6):
|
|
عنوان المؤتمر:
|
7th Saudi
students’ conference
|
تاريخ الإنعقاد:
|
01/02/2014
|
مكان
الإنعقاد:
|
Edinburgh, UK
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Physical
Layer Security in Wireless Networks
|
ملخص المشاركة:
|
As wireless networks play a demanding role
in modern-day communication, it has become essential to provide secure
communication between a sender and a receiver. Wireless networks provide a
convenient and easy mode of communication compared to wired communication
networks. Unlike traditional security solutions on the application and
presentation layers, this paper focuses on physical layer characteristics for
achieving security in wireless networks. The main reason for studying
security for physical layers is the emergence of ad hoc and decentralized
networks, in which encryption techniques are difficult to use and implement.
The main aim of this paper is to explore ways of providing keyless security
solutions for wireless communication networks based on physical layer
properties. This paper provides a literature survey on state-of-the-art
physical layer security. At the end of the paper we explain future work in
physical layer security in wireless networks.
|
|
|
المؤتمر (7):
|
|
عنوان المؤتمر:
|
8th Saudi
students’ conference
|
تاريخ الإنعقاد:
|
31/01/ 2015
|
مكان
الإنعقاد:
|
London, UK
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Cooperative
Jamming Techniques for Physical Layer Security
|
ملخص المشاركة:
|
In this article, we concentrate on ensuring
the secrecy of the network against an eavesdropper posing as a network user
trying to interrupt an existing wireless communication, and we also present
an extensive summary of recent advances in the field of cooperative jamming
techniques for physical layer security that assure secrecy in wireless
communication networks. These cooperative jamming methods include coding and
signalling techniques that are able to utilize the characteristics of the
physical layer and guarantee a high level of confidentiality for wireless
communication networks.
|
|
|
المؤتمر (8):
|
|
عنوان المؤتمر:
|
IEEE Wireless Communications and Networks
Conference WCNC 2016
|
تاريخ الإنعقاد:
|
03/04/2016
|
مكان
الإنعقاد:
|
Doha, Qatar
|
طبيعة المشاركة:
|
Conference Paper
|
عنوان المشاركة:
|
Secrecy
Outage Probability Analysis for Cooperative Communication with Relay
Selection Under Non-Identical Distribution
|
ملخص المشاركة:
|
In this paper, secrecy outage probability
is analysed in a cooperative network for an independent but non-identically
distributed (i.n.i.d) Rayleigh fading channel. By using multi-trusted decode
and forward relays, the model assumes direct links between a sender (Alice)
and receiver nodes (Bob and an eavesdropper). The protocol employed herein
selects the best relay with the highest signal-to-noise ratio (SNR) in
relation to the destination (Bob). The eavesdropper’s channel state
information (CSI) is neither available to the sender nor to the best relay,
while maximum ratio combining (MRC) is employed at Bob and the eavesdropper.
Finally, the theoretical analysis is validated through simulation, and the
results show that performance is enhanced with an increasing number of relays
in the event of a direct link between the sender and the receiver’s terminals.
|
|
|
المؤتمرات العلمية:
|
|
المؤتمر (9):
|
|
عنوان المؤتمر:
|
IEEE International Conference on Communications
|
تاريخ الإنعقاد:
|
23-27/05/2016
|
مكان
الإنعقاد:
|
Kuala Lumpur, Malaysia
|
طبيعة المشاركة:
|
Paper presentation
|
عنوان المشاركة:
|
Ergodic Secrecy Capacity Analysis for Cooperative
Communication with Relay Selection Under Non-Identical Distribution
|
ملخص المشاركة:
|
In this paper, ergodic secrecy capacity is analyzed
in a cooperative communication network, for an independent but
non-identically distributed (i.n.i.d) Rayleigh fading channel. By using
multi-trusted decode and forward relays, the model assumes direct links
between a sender (Alice) and receiver nodes (Bob and an eavesdropper), in
addition both Alice and the relay have perfect knowledge about the eavesdropper’s
channel state information (CSI). The protocol employed herein selects the
best relay with the highest signal-to-noise ratio (SNR) in relation to the
destination (Bob), while maximum ratio combining (MRC) is employed at Bob and
the eavesdropper’s terminals. Finally, the theoretical analysis is validated
through simulation, and the results show that performance is enhanced with an
increasing number of relays, in the event of a direct link between the sender
and the receiver’s terminals.
|
رابط المشاركة
|
Click here
|
|
|
جوائز التكريم:
|
|
الجائزة (1):
|
|
مسمى الجائزة:
|
Award
Certificate
|
الجهة المانحة:
|
Seventh Saudi Students Conference Committee
|
تاريخ منح الجائزة:
|
02/02/2014
|
مجال التكريم:
|
Distinguished Participation at the Seventh
Saudi Students Conference
|