Ahmed Bendary

ORCID: 0000-0002-6413-3692
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Cooperative Communication and Network Coding
  • Advanced Wireless Communication Technologies
  • Adversarial Robustness in Machine Learning
  • Internet Traffic Analysis and Secure E-voting
  • Antenna Design and Analysis
  • Opportunistic and Delay-Tolerant Networks
  • graph theory and CDMA systems
  • Neuroscience and Neural Engineering
  • Blockchain Technology Applications and Security
  • Distributed Control Multi-Agent Systems
  • UAV Applications and Optimization
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Energy Harvesting in Wireless Networks
  • Advanced MIMO Systems Optimization
  • Cryptography and Data Security
  • Advanced Memory and Neural Computing

Military Technical College
2016-2024

The Ohio State University
2019-2021

We consider covert communication, i.e., hiding the presence of communication from an adversary for multiple-input multiple-output (MIMO) additive white Gaussian noise (AWGN) channels. characterize maximum coding rate under a variety settings, including different regimes where either number transmit antennas or blocklength is scaled up. show that non-zero capacity can be achieved in massive MIMO regime which scales up but specific conditions. Under such conditions, we AWGN channels converges...

10.1109/jsait.2021.3053862 article EN publisher-specific-oa IEEE Journal on Selected Areas in Information Theory 2021-01-26

Currently, intelligent drone technology is seeing significant growth in all sectors, especially within the military sector. In this paper, we use blockchain via Hyperledger Fabric (HLF) platform to enhance security and flexibility dynamic mission problems related Internet of Drones (IoD) systems. Blockchain adds many features our network applications, such as decentralization immutability, data integrity transparency, secure immutable communication, identity access management, audibility,...

10.1109/iceeng58856.2024.10566407 article EN 2024-05-21

Spatial modulation (SM) is a promising solution for simplifying multiple-input multiple-output (MIMO) capabilities in wireless communication systems. In this study, we compare SM with Vertical Bell Laboratories Layered Space-Time (V-BLAST) systems Rayleigh and Rician fading channels. Using our proposed fair comparison methodology, the performance of both explored various system configurations The study reveals that has distinct advantages low-rate scenarios due to its unique antenna index...

10.1109/iceeng58856.2024.10566380 article EN 2024-05-21

We derive an upper bound for the sum secure Degrees of Freedom (sDoF) symmetric K-user MIMO Wiretap Multiple Access channel with full state information at transmitters (CSIT) but without knowledge eavesdroppers (CSI). consider case K each equipped M antennas, a base station N antennas and unknown number eavesdroppers. Without assuming (or location) eavesdroppers, we assume that eavesdropper has maximum <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/cns.2016.7860554 article EN 2016-10-01

Covert communication, i.e., communication with a low probability of detection (LPD), has attracted huge body work. Recent studies have concluded that the maximal covert coding rate discrete memoryless channels and additive white Gaussian noise (AWGN) is diminishing blocklength: maximum information nats can be transmitted covertly reliably over such only on order square root blocklength. In this paper, we study multiple-input multiple-output (MIMO) AWGN channels. We derive order-optimal...

10.1109/cns48642.2020.9162192 article EN 2020-06-01

In this paper, multiple-input-single-output (MISO) point-to-point communication system is considered, in which a multiple-input-multiple-output (MIMO) energy recycling (ER) transmitter designed such that, each antenna can transmit information (multi-input) or recycle (multi-output) at any given point time. The rate by an ER-MISO under average transmission power constraint shown to be achievable. Moreover, the optimal allocation and dynamic selection policies that achieve maximum are derived....

10.1145/3323679.3326531 article EN 2019-06-04

A wide range of emerging devices and applications are delay-and/or resources-constrained but still require fast, lightweight, robust authentication mechanisms. In this paper, we propose an unconditionally secure framework via strong physically unclonable functions (PUFs). Strong PUFs generate a large number challenge-response pairs on demand, which can reduce vulnerability to attacks designed steal secrets stored in non-volatile memory. our framework, the problem is posed as hypothesis test...

10.1109/cns53000.2021.9705035 article EN 2021-10-04
Coming Soon ...