- Optical Wireless Communication Technologies
- Advanced Wireless Communication Technologies
- Cooperative Communication and Network Coding
- Network Traffic and Congestion Control
- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- UAV Applications and Optimization
- Advanced Wireless Network Optimization
- Underwater Vehicles and Communication Systems
- Optical Network Technologies
- Advanced Photonic Communication Systems
- Satellite Communication Systems
- Wireless Networks and Protocols
- Software-Defined Networks and 5G
- Wireless Communication Networks Research
- Full-Duplex Wireless Communications
- Network Security and Intrusion Detection
- Mobile Ad Hoc Networks
- Image Enhancement Techniques
- Advanced Optical Network Technologies
- Energy Harvesting in Wireless Networks
- Advanced Surface Polishing Techniques
- Advanced Wireless Communication Techniques
- Peer-to-Peer Network Technologies
- Video Surveillance and Tracking Methods
King Abdullah University of Science and Technology
2016-2025
Hongik University
2024
Sungkyunkwan University
2016-2023
University of Glasgow
2018-2022
Chongqing University of Posts and Telecommunications
2020-2022
Xi’an University of Posts and Telecommunications
2020-2022
Stellenbosch University
2022
Hawassa University
2022
China Mobile (China)
2020-2022
University of Ghana
2022
Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), novel approach to DoS (DDoS) prevention. We show that DPF achieves proactiveness scalability, there is an intimate relationship between effectiveness at mitigating DDoS power-law network topology.The salient features work are two-fold. First, able proactively filter out significant fraction spoofed flows prevent packets from...
Measurements of LAN and WAN traffic show that network exhibits variability on different scales. We examine a mechanism gives rise to self-similar discuss performance. The we study is the transfer files or messages whose size drawn from heavy-tailed distribution. In realistic client/server degree which file sizes are can directly determine self-similarity at link level. This causal relationship robust relative changes in resources, topology, influence cross-traffic, distribution interarrival...
Effective mitigation of denial service (DoS) attack is a pressing problem on the Internet. In many instances, DoS attacks can be prevented if spoofed source IP address traced back to its origin which allows assigning penalties offending party or isolating compromised hosts and domains from rest network. traceback mechanisms based probabilistic packet marking (PPM) have been proposed for achieving attacks. We show that marking-of interest due efficiency implementability vis-a-vis...
The video streaming, data transmission, and remote control in underwater call for high speed (Gbps) communication link with a long channel length (~10 meters). We present compact low power consumption wireless optical (UWOC) system utilizing 450-nm laser diode (LD) Si avalanche photodetector. With the LD operating at driving current of 80 mA an 51.3 mW, we demonstrated high-speed UWOC offering rate up to 2 Gbps over 12-meter-long, 1.5 record 20-meter-long channel. measured bit-error (BER)...
We experimentally demonstrate a record high-speed underwater wireless optical communication (UWOC) over 7 m distance using on-off keying non-return-to-zero (OOK-NRZ) modulation scheme. The link uses commercial TO-9 packaged pigtailed 520 nm laser diode (LD) with 1.2 GHz bandwidth as the transmitter and an avalanche photodiode (APD) module receiver. At 2.3 Gbit/s transmission, measured bit error rate of received data is 2.23×10(-4), well below forward correction (FEC) threshold 2×10(-3)...
Time, polarization, and wavelength multiplexing schemes have been used to satisfy the growing need of transmission capacity. Using space as a new dimension for communication systems has recently suggested versatile technique address future bandwidth issues. We review potentials harnessing an additional degree freedom applications including free optics, optical fiber installation, underwater wireless links, on-chip interconnects, data center indoor connections, radio frequency, acoustic...
Surface passivation of unpassivated Al nanoparticles has been realized using self-assembled monolayers (SAMs). Nanoscale particles were prepared in solution by catalytic decomposition H3Al·NMe3 or H3Al·N(Me)Pyr Ti(OiPr)4 and coated situ a perfluoroalkyl carboxylic acid SAM. Because the are wet chemistry techniques solution, they free oxygen passivation. This SAM coating passivates aluminum appears to prevent oxidation air renders composite material, some extent, soluble polar organic...
This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output multiple-input systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether base station has global channel state information both main wiretap channels, exact closed-form expressions for outage probability (SOP) suboptimal optimal schemes obtained compared traditional space-time transmission scheme. To...
In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting source message, destination sends an intended jamming noise to relay, which is referred as cooperative jamming. This helps protecting message being captured reliably at eavesdropper, while cancels its self-intended noise. According channel information available destination, derive three power allocation strategies minimize outage...
Underwater wireless optical communication (UWOC) is a technology that uses visible light to transmit data in underwater environment. Compared radio-frequency (RF) and acoustic techniques, UWOC has many advantages including large information bandwidth, unlicensed spectrum low power requirements. This review paper provides an overview of the latest research. Additionally, we present detailed description transmitter receiver technologies which are key components systems. Moreover, studies...
This paper considers the secrecy outage performance of a multiple-relay assisted non-orthogonal multiple access (NOMA) network over Nakagami-m fading channels. Two time slots are utilized to transmit signals from base station destination. At first slot, broadcasts superposition signal two users all decode-and-forward relays by message mapping strategy. Subsequently, selected relay transmits via power-domain NOMA technology. Three selection schemes, i.e., optimal single (OSRS) scheme,...
In this paper, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and FSO link experiences Gamma-Gamma fading. The effect pointing error two types detection techniques (i.e., heterodyne intensity modulation with direct detection) are considered. We derive closed-form expressions for lower bound outage probability (SOP) exact average capacity (ASC). Furthermore, by utilizing expansion Meijer's...
We experimentally evaluate the performance of underwater wireless optical communication (UWOC) links in presence different air bubbles. Air bubbles sizes and densities are generated by using an pipe conjunction with a submersible water pump variable flow rate that helps break up large into smaller Received signal intensity measurements show significantly degrade UWOC links. Large completely obstruct beam cause deep fade. However, as bubble size decreases, level fade also decreases because is...
We analyze a secure dual-hop mixed radio frequency-free space optical (RF-FSO) downlink simultaneous wireless information and power transfer system. The FSO link all RF links experience Gamma-Gamma, independent, identical Nakagami-m fading, respectively. the effects of atmospheric turbulence, pointing error, detection technology, path loss, energy harvesting on secrecy performance. Signalto-noise ratios at both legitimate illegitimate receivers are not independent since they simultaneously...
We analyze the secrecy outage performance of a mixed radio frequency-free space optical (RF-FSO) transmission system with imperfect channel state information (CSI). deal single-input multiple-output wiretap model, where base station (works as relay) forwards signal transmitted from user (source) to data center destination), while an eavesdropper wiretaps confidential by decoding received signal. Both relay and are armed multiple antennas, maximal ratio combining scheme is utilized improve...
In this work, we analyze the secrecy outage performance of a dual-hop relay system composed multipleinput-multiple-output radio-frequency (RF) links and freespace optical (FSO) link while multiple-antenna eavesdropper wiretaps confidential information by decoding received signals from source node.The channel state (CSI) RF FSO is considered to be outdated imprecise, respectively.We propose four transmit antenna selection (TAS) schemes enhance systems.The with different TAS analyzed effects...
This paper considers a secure nonorthogonal multiple access system, where confidential messages are transmitted from base station to legitimate destinations and wiretapped by illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model nodes equipped with antennas, respectively. Both noncolluding colluding eavesdroppers considered, A max-min (MM) transmit antenna selection (TAS) strategy adopted improve secrecy performance of target in which both users user...
In this paper, we analyze the performance of a dual-hop radio frequency-underwater wireless optical communication (RF-UWOC) transmission systems wherein RF and UWOC links experience Nakagami-m fading mixture Exponential-Generalized Gamma fading, respectively. The location S is uniformly distributed in space hemisphere where relay located center hemisphere. effect bubbles level, temperature gradient, water types, detection techniques are considered. We derive closed-form expressions for...
In this paper, we investigate a mobile relaying system assisted by an unmanned aerial vehicle (UAV) with finite size of the buffer. Under buffer limit and delay constraints at UAV relay, consider dual-hop mixed free-space optical/radio frequency (FSO/RF) (i.e., source-to-relay relay-to-destination links employ FSO RF links, respectively). Taking imbalance in transmission rate between into consideration, address trajectory design relay node to obtain maximum data throughput ground user...
Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), novel approach to DoS (DDoS) prevention. We show that DPF achieves proactiveness scalability, there is an intimate relationship between effectiveness at mitigating DDoS power-law network topology.The salient features work are two-fold. First, able proactively filter out significant fraction spoofed flows prevent packets from...