- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Advanced Wireless Communication Technologies
- Adversarial Robustness in Machine Learning
- Internet Traffic Analysis and Secure E-voting
- Antenna Design and Analysis
- Opportunistic and Delay-Tolerant Networks
- graph theory and CDMA systems
- Neuroscience and Neural Engineering
- Blockchain Technology Applications and Security
- Distributed Control Multi-Agent Systems
- UAV Applications and Optimization
- Physical Unclonable Functions (PUFs) and Hardware Security
- Energy Harvesting in Wireless Networks
- Advanced MIMO Systems Optimization
- Cryptography and Data Security
- Advanced Memory and Neural Computing
Military Technical College
2016-2024
The Ohio State University
2019-2021
We consider covert communication, i.e., hiding the presence of communication from an adversary for multiple-input multiple-output (MIMO) additive white Gaussian noise (AWGN) channels. characterize maximum coding rate under a variety settings, including different regimes where either number transmit antennas or blocklength is scaled up. show that non-zero capacity can be achieved in massive MIMO regime which scales up but specific conditions. Under such conditions, we AWGN channels converges...
Currently, intelligent drone technology is seeing significant growth in all sectors, especially within the military sector. In this paper, we use blockchain via Hyperledger Fabric (HLF) platform to enhance security and flexibility dynamic mission problems related Internet of Drones (IoD) systems. Blockchain adds many features our network applications, such as decentralization immutability, data integrity transparency, secure immutable communication, identity access management, audibility,...
Spatial modulation (SM) is a promising solution for simplifying multiple-input multiple-output (MIMO) capabilities in wireless communication systems. In this study, we compare SM with Vertical Bell Laboratories Layered Space-Time (V-BLAST) systems Rayleigh and Rician fading channels. Using our proposed fair comparison methodology, the performance of both explored various system configurations The study reveals that has distinct advantages low-rate scenarios due to its unique antenna index...
We derive an upper bound for the sum secure Degrees of Freedom (sDoF) symmetric K-user MIMO Wiretap Multiple Access channel with full state information at transmitters (CSIT) but without knowledge eavesdroppers (CSI). consider case K each equipped M antennas, a base station N antennas and unknown number eavesdroppers. Without assuming (or location) eavesdroppers, we assume that eavesdropper has maximum <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Covert communication, i.e., communication with a low probability of detection (LPD), has attracted huge body work. Recent studies have concluded that the maximal covert coding rate discrete memoryless channels and additive white Gaussian noise (AWGN) is diminishing blocklength: maximum information nats can be transmitted covertly reliably over such only on order square root blocklength. In this paper, we study multiple-input multiple-output (MIMO) AWGN channels. We derive order-optimal...
In this paper, multiple-input-single-output (MISO) point-to-point communication system is considered, in which a multiple-input-multiple-output (MIMO) energy recycling (ER) transmitter designed such that, each antenna can transmit information (multi-input) or recycle (multi-output) at any given point time. The rate by an ER-MISO under average transmission power constraint shown to be achievable. Moreover, the optimal allocation and dynamic selection policies that achieve maximum are derived....
A wide range of emerging devices and applications are delay-and/or resources-constrained but still require fast, lightweight, robust authentication mechanisms. In this paper, we propose an unconditionally secure framework via strong physically unclonable functions (PUFs). Strong PUFs generate a large number challenge-response pairs on demand, which can reduce vulnerability to attacks designed steal secrets stored in non-volatile memory. our framework, the problem is posed as hypothesis test...