This page has only limited features, please log in for full access.
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried out that involve the use of, but are not limited to, blockchain, artificial intelligence, and edge/fog computing. Authentication and authorization are crucial aspects of the CIA triad to protect the network from malicious parties. However, existing authorization and authentication schemes are not sufficient for handling security, due to the scale of the IoT networks and the resource-constrained nature of devices. In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process for IoT. In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed. Based on the review, we present a taxonomy of authentication and authorization schemes in IoT focusing on machine learning-based schemes. Using the presented taxonomy, a thorough analysis is provided of the authentication and authorization (AA) security threats and challenges for IoT. Furthermore, various criteria to achieve a high degree of AA resiliency in IoT implementations to enhance IoT security are evaluated. Lastly, a detailed discussion on open issues, challenges, and future research directions is presented for enabling secure communication among IoT nodes.
Kazi Istiaque Ahmed; Mohammad Tahir; Mohamed Hadi Habaebi; Sian Lun Lau; Abdul Ahad. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction. Sensors 2021, 21, 5122 .
AMA StyleKazi Istiaque Ahmed, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, Abdul Ahad. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction. Sensors. 2021; 21 (15):5122.
Chicago/Turabian StyleKazi Istiaque Ahmed; Mohammad Tahir; Mohamed Hadi Habaebi; Sian Lun Lau; Abdul Ahad. 2021. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction." Sensors 21, no. 15: 5122.
As the world pushes toward the use of greener technology and minimizes energy waste, energy efficiency in the wireless network has become more critical than ever. The next-generation networks, such as 5G, are being designed to improve energy efficiency and thus constitute a critical aspect of research and network design. The 5G network is expected to deliver a wide range of services that includes enhanced mobile broadband, massive machine-type communication and ultra-reliability, and low latency. To realize such a diverse set of requirement, 5G network has evolved as a multi-layer network that uses various technological advances to offer an extensive range of wireless services. Several technologies, such as software-defined networking, network function virtualization, edge computing, cloud computing, and small cells, are being integrated into the 5G networks to fulfill the need for diverse requirements. Such a complex network design is going to result in increased power consumption; therefore, energy efficiency becomes of utmost importance. To assist in the task of achieving energy efficiency in the network machine learning technique could play a significant role and hence gained significant interest from the research community. In this paper, we review the state-of-art application of machine learning techniques in the 5G network to enable energy efficiency at the access, edge, and core network. Based on the review, we present a taxonomy of machine learning applications in 5G networks for improving energy efficiency. We discuss several issues that can be solved using machine learning regarding energy efficiency in 5G networks. Finally, we discuss various challenges that need to be addressed to realize the full potential of machine learning to improve energy efficiency in the 5G networks. The survey presents a broad range of ideas related to machine learning in 5G that addresses the issue of energy efficiency in virtualization, resource optimization, power allocation, and incorporating enabling technologies of 5G can enhance energy efficiency.
Amna Mughees; Mohammad Tahir; Muhammad Aman Sheikh; Abdul Ahad. Towards Energy Efficient 5G Networks Using Machine Learning: Taxonomy, Research Challenges, and Future Research Directions. IEEE Access 2020, 8, 187498 -187522.
AMA StyleAmna Mughees, Mohammad Tahir, Muhammad Aman Sheikh, Abdul Ahad. Towards Energy Efficient 5G Networks Using Machine Learning: Taxonomy, Research Challenges, and Future Research Directions. IEEE Access. 2020; 8 (99):187498-187522.
Chicago/Turabian StyleAmna Mughees; Mohammad Tahir; Muhammad Aman Sheikh; Abdul Ahad. 2020. "Towards Energy Efficient 5G Networks Using Machine Learning: Taxonomy, Research Challenges, and Future Research Directions." IEEE Access 8, no. 99: 187498-187522.
Smart health-care is undergoing rapid transformation from the conventional specialist and hospital-focused style to a distributed patient-focused manner. Several technological developments have encouraged this rapid revolution of health-care vertical. Currently, 4G and other communication standards are used in health-care for smart health-care services and applications. These technologies are crucial for the evolution of future smart health-care services. With the growth in the health-care industry, several applications are expected to produce a massive amount of data in different format and size. Such immense and diverse data needs special treatment concerning the end-to-end delay, bandwidth, latency and other attributes. It is difficult for current communication technologies to fulfil the requirements of highly dynamic and time-sensitive health care applications of the future. Therefore, the 5G networks are being designed and developed to tackle the diverse communication needs of health-care applications in Internet of Things (IoT). 5G assisted smart health-care networks are an amalgamation of IoT devices that require improved network performance and enhanced cellular coverage. Current connectivity solutions for IoT face challenges, such as the support for a massive number of devices, standardisation, energy-efficiency, device density, and security. In this paper, we present a comprehensive review of 5G assisted smart health-care solutions in IoT. We present a structure for smart health-care in 5G by categorizing and classifying existing literature. We also present key requirements for successful deployment of smart health-care systems for certain scenarios in 5G. Finally, we discuss several open issues and research challenges in 5G smart health-care solutions in IoT.
Abdul Ahad; Mohammad Tahir; Muhammad Aman Sheikh; Kazi Istiaque Ahmed; Amna Mughees; Abdullah Numani. Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review. Sensors 2020, 20, 4047 .
AMA StyleAbdul Ahad, Mohammad Tahir, Muhammad Aman Sheikh, Kazi Istiaque Ahmed, Amna Mughees, Abdullah Numani. Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review. Sensors. 2020; 20 (14):4047.
Chicago/Turabian StyleAbdul Ahad; Mohammad Tahir; Muhammad Aman Sheikh; Kazi Istiaque Ahmed; Amna Mughees; Abdullah Numani. 2020. "Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review." Sensors 20, no. 14: 4047.
Currently the new state of power system relies on a precise monitoring of electrical quantities such as voltage and current phasors. Occasionally, its operation gets disturbed because of the flicking in load and generation which may result in the interruption of power supply or may cause catastrophic failure. The advanced technology of phasor measurement unit (PMU) is introduced in the late 1990s to measure the behavior of power system more symmetrically, accurately, and precisely. However, the implementation of this device at every busbar in a grid station is not an easy task because of its expensive installation and manufacturing cost. As a result, an optimum placement of PMU is much needed in this case. Therefore, this paper proposes a new symmetry approach of multiple objectives for the optimum placement of PMU problem (OPPP) in order to minimize the installed number of PMUs and maximize the measurement redundancy of the network. To overcome the drawbacks of traditional techniques in the proposed work a reduction and exclusion of pure transit node technique is used in the placement set. In which only the strategic, significant, and the most desirable buses are selected without considering zero injection buses (ZIBs). The fundamental novelty of the proposed work considers most importantly the reduction technique of ZIBs from the optimum PMU locations, as far as the prior approaches concern almost every algorithm have taken ZIBs as their optimal placement sets. Furthermore, a PMUs channel limits and an alternative symmetry location for the PMUs placement are considered when there is an outage or PMUs failure may occur. The performance of the proposed method is verified on different IEEE-standard such as: IEEE-9, IEEE-14, IEEE-24, IEEE-30, IEEE-57, IEEE-118, and a New England-39 bus system. The success of the proposed work was compared with the existing techniques’ outcomes from the literature.
Maveeya Baba; Nursyarizal B. M. Nor; M. Aman.Sheikh; Muhammad Irfan; Mohammad Tahir. A Strategic and Significant Method for the Optimal Placement of Phasor Measurement Unit for Power System Network. Symmetry 2020, 12, 1174 .
AMA StyleMaveeya Baba, Nursyarizal B. M. Nor, M. Aman.Sheikh, Muhammad Irfan, Mohammad Tahir. A Strategic and Significant Method for the Optimal Placement of Phasor Measurement Unit for Power System Network. Symmetry. 2020; 12 (7):1174.
Chicago/Turabian StyleMaveeya Baba; Nursyarizal B. M. Nor; M. Aman.Sheikh; Muhammad Irfan; Mohammad Tahir. 2020. "A Strategic and Significant Method for the Optimal Placement of Phasor Measurement Unit for Power System Network." Symmetry 12, no. 7: 1174.
Until now, every evolution of communication standard was driven by the need for providing high-speed connectivity to the end-user. However, 5G marks a radical shift from this focus as 5G and beyond networks are being designed to be future-proof by catering to diverse requirements of several use cases. These requirements include Ultra-Reliable Low Latency Communications, Massive Machine-Type Communications and Enhanced Mobile Broadband. To realize such features in 5G and beyond, there is a need to rethink how current cellular networks are deployed because designing new radio access technologies and utilizing the new spectrum are not enough. Several technologies, such as software-defined networking, network function virtualization, machine learning and cloud computing, are being integrated into the 5G networks to fulfil the need for diverse requirements. These technologies, however, give rise to several challenges associated with decentralization, transparency, interoperability, privacy and security. To address these issues, Blockchain has emerged as a potential solution due to its capabilities such as transparency, data encryption, auditability, immutability and distributed architecture. In this paper, we review the state-of-art application of Blockchain in 5G network and explore how it can facilitate enabling technologies of 5G and beyond to enable various services at the front-haul, edge and the core. Based on the review, we present a taxonomy of Blockchain application in 5G networks and discuss several issues that can be solved using Blockchain integration. We then present various field-trials and Proof of concept that are using Blockchain to address the challenges faced in the current 5G deployment. Finally, we discuss various challenges that need to be addressed to realize the full potential of Blockchain in beyond 5G networks. The survey presents a broad range of ideas related to Blockchain integration in 5G and beyond networks that address issues such as interoperability, security, mobility, resource allocation, resource sharing and management, energy efficiency and other desirable features.
Mohammad Tahir; Mohamed Hadi Habaebi; Mohammad Dabbagh; Amna Mughees; Abdul Ahad; Kazi Istiaque Ahmed. A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-Trials, Challenges and Opportunities. IEEE Access 2020, 8, 115876 -115904.
AMA StyleMohammad Tahir, Mohamed Hadi Habaebi, Mohammad Dabbagh, Amna Mughees, Abdul Ahad, Kazi Istiaque Ahmed. A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-Trials, Challenges and Opportunities. IEEE Access. 2020; 8 ():115876-115904.
Chicago/Turabian StyleMohammad Tahir; Mohamed Hadi Habaebi; Mohammad Dabbagh; Amna Mughees; Abdul Ahad; Kazi Istiaque Ahmed. 2020. "A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-Trials, Challenges and Opportunities." IEEE Access 8, no. : 115876-115904.
Since its inception, Blockchain has proven itself as an emerging technology that revolutionizes diverse industries. Among others, Internet of Things (IoT) is one of the application domains that reaps large benefits from Blockchain. The Blockchain’s potential to overcome different challenges of IoT services has shifted the research interests of many scientists towards addressing the integration of two disruptive technologies, i.e., IoT and Blockchain. This resulted in publishing more research papers in this emerging field. Thus, there is a need to conduct research studies through which a broad overview of research contributions in this field could be investigated. To respond to this need, a number of review papers have been published recently, each of which has considered the integration of IoT and Blockchain from a different perspective. Nonetheless, none of them has reported a bibliometric analysis of the state-of-the-art in the integration of IoT and Blockchain. This gap stimulated us to investigate a thorough analysis of the current body of knowledge in this field, through a bibliometric study. In this paper, we conducted a bibliometric analysis on the Scopus database to assess all scientific papers that addressed the integration of IoT and Blockchain. We have analyzed those collected papers against four criteria including annual publication and citation patterns, most-cited papers, most frequently used keywords, and most popular publication venues. The results disseminate invaluable insights to the researchers before establishing a research project on IoT and Blockchain integration.
Mohammad Dabbagh; Mohsen Kakavand; Mohammad Tahir. Towards Integration of Blockchain and IoT: A Bibliometric Analysis of State-of-the-Art. Advances in Intelligent Systems and Computing 2019, 27 -35.
AMA StyleMohammad Dabbagh, Mohsen Kakavand, Mohammad Tahir. Towards Integration of Blockchain and IoT: A Bibliometric Analysis of State-of-the-Art. Advances in Intelligent Systems and Computing. 2019; ():27-35.
Chicago/Turabian StyleMohammad Dabbagh; Mohsen Kakavand; Mohammad Tahir. 2019. "Towards Integration of Blockchain and IoT: A Bibliometric Analysis of State-of-the-Art." Advances in Intelligent Systems and Computing , no. : 27-35.
Mohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks. AEU - International Journal of Electronics and Communications 2017, 77, 139 -148.
AMA StyleMohammad Tahir, Mohamed Hadi Habaebi, Rafiqul Islam. Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks. AEU - International Journal of Electronics and Communications. 2017; 77 ():139-148.
Chicago/Turabian StyleMohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. 2017. "Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks." AEU - International Journal of Electronics and Communications 77, no. : 139-148.
In this paper, a novel algorithm is proposed for increasing the throughput in cognitive radio networks by forming coalitions among cognitive radio users in AWGN and fading channel environment. Although there have been numerous studies exploring the benefits of coalition formation in cognitive radio networks from the game theory perspective, there are several limitations in their application. To overcome the limitations of game theory, concepts from matching theory are used. Specifically, the stable marriage problem is used to formulate the interactions among the cognitive radio users as a matching game for collaborative distributed spectrum sensing under target detection probability constraint. The utility function is defined as the average probability of false alarm per cognitive radio user. The advantage of stable marriage is that it always converges to a stable matching and is Pareto optimal when the preferences of cognitive radios are strict. In the proposed model, the stable matching problem is extended to propose a novel algorithm to form coalitions of varying sizes for improving the utility of CR (false alarm and throughput). The coalitions formed using the algorithm are stable and do not deviate from the final matching. Using simulations and mathematical analysis, it is shown that the proposed algorithm leads to stable coalitions and returns significant improvement in terms of reduced probability of false alarm and improved throughput per cognitive radio user as compared to the noncooperative scenario.
Mohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory. International Journal of Communication Systems 2017, 30, e3332 .
AMA StyleMohammad Tahir, Mohamed Hadi Habaebi, Rafiqul Islam. Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory. International Journal of Communication Systems. 2017; 30 (16):e3332.
Chicago/Turabian StyleMohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. 2017. "Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory." International Journal of Communication Systems 30, no. 16: e3332.
We consider the problem of increasing the throughput in cognitive radio networks by forming coalitions among cognitive radio user in additive white Gaussian noise (AWGN) channel. For coalition formation using matching theory, we analyze two algorithms, namely Gale-Shapely algorithm and one-sided stable matching algorithm. For the first algorithm for coalition formation, well-known gale shapely algorithm is used to achieve cooperation among the cognitive radios for spectrum detection and sharing. Each cognitive radio prepares a preference list of other radios in the vicinity for cooperation and hence to form a coalition formation. The second algorithm is based one-sided matching theory which is a variant of the Gale-Shapely algorithm, however, to achieve a stable cooperation, certain criteria must be satisfied. The procedure is similar to the first algorithm (.i.e. formation of preference list and then making offers to other cognitive radio for cooperation) however the difference is in how the coalition formation takes place among the cognitive radios. Finally, using simulations we investigate various aspects of the algorithms and analyse their performance. The proposed algorithms result in improved spectrum detection as well as increasing the spectrum efficiency.
Mohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. Performance analysis of coalition formation algorithms based on matching theory for cognitive radio networks. 2016 IEEE Student Conference on Research and Development (SCOReD) 2016, 1 -6.
AMA StyleMohammad Tahir, Mohamed Hadi Habaebi, Rafiqul Islam. Performance analysis of coalition formation algorithms based on matching theory for cognitive radio networks. 2016 IEEE Student Conference on Research and Development (SCOReD). 2016; ():1-6.
Chicago/Turabian StyleMohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. 2016. "Performance analysis of coalition formation algorithms based on matching theory for cognitive radio networks." 2016 IEEE Student Conference on Research and Development (SCOReD) , no. : 1-6.
Recently there have been numerous studies exploring the benefits of the coalition formation in a cognitive radio network and it has been shown that coalition formation tends to improve the performance of cognitive radio networks. In this paper, we use the concepts from matching theory to form coalitions of varying size among cognitive radio users for cooperative spectrum sensing under target detection probability constraint. In the proposed model, we make use of one-sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying the size to improve their individual gains (.e.g. throughput and the probability of false alarm). We prove that the proposed algorithm leads to stable coalition formation in the cognitive radio network and show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to the non-cooperative scenario.
Mohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. Coalition Formation for Throughput Enhancement via One-Sided Matching Theory. 2016 International Conference on Computer and Communication Engineering (ICCCE) 2016, 343 -348.
AMA StyleMohammad Tahir, Mohamed Hadi Habaebi, Rafiqul Islam. Coalition Formation for Throughput Enhancement via One-Sided Matching Theory. 2016 International Conference on Computer and Communication Engineering (ICCCE). 2016; ():343-348.
Chicago/Turabian StyleMohammad Tahir; Mohamed Hadi Habaebi; Rafiqul Islam. 2016. "Coalition Formation for Throughput Enhancement via One-Sided Matching Theory." 2016 International Conference on Computer and Communication Engineering (ICCCE) , no. : 343-348.
Recently there have been numerous studies exploring the benefits of the coalition formation in a cognitive radio network and it has been shown that coalition formation tends to improve the performance of cognitive radios. In this paper, we use the concepts from matching theory to form coalitions among cognitive radio users for cooperative spectrum sensing under target detection probability constraint. In the proposed model we make use of one sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying size to improve their individual gains (.e.g. throughput and probability of false alarm). We show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to non-cooperative scenario.
Mohammad Tahir; Mohamed Habaebi; Rafiqul Islam. Throughput enhancement in cognitive radio network via coalition formation using matching theory. 2015 IEEE Student Conference on Research and Development (SCOReD) 2015, 545 -550.
AMA StyleMohammad Tahir, Mohamed Habaebi, Rafiqul Islam. Throughput enhancement in cognitive radio network via coalition formation using matching theory. 2015 IEEE Student Conference on Research and Development (SCOReD). 2015; ():545-550.
Chicago/Turabian StyleMohammad Tahir; Mohamed Habaebi; Rafiqul Islam. 2015. "Throughput enhancement in cognitive radio network via coalition formation using matching theory." 2015 IEEE Student Conference on Research and Development (SCOReD) , no. : 545-550.
In this paper we consider the problem of increasing the throughput of cognitive radio in a cognitive radio network by forming coalitions among cognitive radio users. Recently there have been numerous studies exploring the benefits of the cooperation in a cognitive radio network. The cooperation tends to increase the spectrum sensing performance which in turn results in increased transmission opportunities. In this paper we use the concepts from matching theory, specifically we use gale-shapely algorithm, to form the coalition among cognitive radio user for collaborative spectrum sensing under target detection probability constraint. In the proposed model we modify gale-shapely algorithm for the cognitive radio users to form coalitions of varying size to increase their individual gains (.e.g. throughput and probability of false alarm). We show using simulation that using the modified gale shapely algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to non-cooperative cognitive radio user.
Mohammad Tahir; Mohamed Habaebi; M. Rafiqul Islam. Coalition formation for cooperative spectrum sharing in cognitive radio wireless networks using Gale Shapley algorithm. 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC) 2015, 43 -48.
AMA StyleMohammad Tahir, Mohamed Habaebi, M. Rafiqul Islam. Coalition formation for cooperative spectrum sharing in cognitive radio wireless networks using Gale Shapley algorithm. 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC). 2015; ():43-48.
Chicago/Turabian StyleMohammad Tahir; Mohamed Habaebi; M. Rafiqul Islam. 2015. "Coalition formation for cooperative spectrum sharing in cognitive radio wireless networks using Gale Shapley algorithm." 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC) , no. : 43-48.
In this paper, a hybrid scheme to provide wireless physical layer security based on encryption and wireless channel pre-compensation is presented. The physical layer security is provided by converting the signal constellation into a higher order constellation by using conventional encryption (symmetric key encryption) and then using channel state information (i.e. amplitude and phase variation), which is location specific, to further encrypt the constellation before transmission. Since detection and demodulation are based upon the known signal constellation, which is not known in advance in our case, it becomes difficult for the eavesdropper to determine the original signal constellation. The data intercepted by the eavesdropper is unintelligible due to the combined effect of encryption and pre-compensation. Using bit error rate (BER) as performance metric, it is found that the eavesdropper suffers from high BER as compared to its legitimate counterpart hence providing secure communication. The developed scheme was tested with existing wireless communication standard IEEE 802.11 to show the practical application of the scheme.
Mohammad Tahir; Mohammad Umar Siddiqi. A Hybrid Scheme for Wireless Physical Layer Security Based on Encryption and Channel Pre-compensation. IETE Journal of Research 2014, 60, 267 -275.
AMA StyleMohammad Tahir, Mohammad Umar Siddiqi. A Hybrid Scheme for Wireless Physical Layer Security Based on Encryption and Channel Pre-compensation. IETE Journal of Research. 2014; 60 (4):267-275.
Chicago/Turabian StyleMohammad Tahir; Mohammad Umar Siddiqi. 2014. "A Hybrid Scheme for Wireless Physical Layer Security Based on Encryption and Channel Pre-compensation." IETE Journal of Research 60, no. 4: 267-275.
Sensing of spectrum holes constitute the fundamental step to utilize spectral resources efficiently in Cognitive Radio (CR). This new technology trends intends to alleviate the scarce and underutilized spectrum issues occurred in traditional fixed spectrum allotment. CR defined as dynamic spectrum usage of unlicensed (secondary) user in opportunistic manner without causing harmful interference to licensed (primary) user. Much recent works presented as either theoretical or simulation approach. However, this paper presents a design prototype of indirect and non-parametric of spectrum sensing method implemented using low-cost Universal Software-defined radio Platform (USRP™). A spectrum-sensing algorithm designed based on energy detection built on top of Matlab®/Simulink® interfaced with a USRP™ main board and SBX transceiver daughterboard; both are Ettus Research product.
Nuzli Mohamad Anas; Hafizal Mohamad; Mohammad Tahir. Cognitive Radio test bed experimentation using USRP and Matlab®/Simulink®. 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE) 2012, 229 -232.
AMA StyleNuzli Mohamad Anas, Hafizal Mohamad, Mohammad Tahir. Cognitive Radio test bed experimentation using USRP and Matlab®/Simulink®. 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE). 2012; ():229-232.
Chicago/Turabian StyleNuzli Mohamad Anas; Hafizal Mohamad; Mohammad Tahir. 2012. "Cognitive Radio test bed experimentation using USRP and Matlab®/Simulink®." 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE) , no. : 229-232.
Spectrum sensing is one of the critical aspects in cognitive radio (CR). CR user must be able to detect the spectrum opportunity reliably and efficiently in order to use the available spectrum. In spectrum sensing, a local radio might fail to monitor the available spectrum holes due to shadowing and hidden terminal problem. Cooperative spectrum sensing can be employed to combat this problem using two approaches; centralized and decentralized (distributed) system. In this paper, we evaluate the performance of both centralized and decentralized cooperative spectrum sensing under several policies; OR and AND rules based on energy detection. The effectiveness of the both centralized and decentralized techniques were investigated and compared in terms of probability of detection and signal-to-noise ratio (SNR). We observe that the OR rule achieve better performance than AND rule in attaining higher detection probability.
Azila Zakaria; Mohammad Tahir; Nordin Ramli; Hafizal Mohamad; Mahamod Ismail. Performance evaluation of centralized and decentralized cooperative spectrum sensing in cognitive radio networks. 2012 International Conference on Computer and Communication Engineering (ICCCE) 2012, 283 -288.
AMA StyleAzila Zakaria, Mohammad Tahir, Nordin Ramli, Hafizal Mohamad, Mahamod Ismail. Performance evaluation of centralized and decentralized cooperative spectrum sensing in cognitive radio networks. 2012 International Conference on Computer and Communication Engineering (ICCCE). 2012; ():283-288.
Chicago/Turabian StyleAzila Zakaria; Mohammad Tahir; Nordin Ramli; Hafizal Mohamad; Mahamod Ismail. 2012. "Performance evaluation of centralized and decentralized cooperative spectrum sensing in cognitive radio networks." 2012 International Conference on Computer and Communication Engineering (ICCCE) , no. : 283-288.
In this paper we present the experimental implementation of dynamic spectrum access (DSA) algorithm using universal software radio peripheral (USRP) and GNU Radio. The setup contains two primary users and two cognitive radios or secondary users. One primary user is fixed and the other is allowed to change its position randomly. Depending upon the position of the primary user the cognitive user will use the spectrum band where the detected energy is below certain predefined threshold level. The cognitive radio users are also programmed to operate independently without interfering with each other using energy detection algorithm for spectrum sensing. The modulation scheme is set to GMSK for secondary user performing data transmission. This experimental setup is used to analyze the quality of video transmission using DSA which provides the insight regarding the possibility of using free spectrum space to improve the performance of the system and its advantage over a non-DSA system. From the experiment it is shown that under congestion and interference DSA perform better than a non- DSA system.
Mohammad Tahir; Hafizal Mohamad; Nordin Ramli; Sigit P.W. Jarot. Experimental implementation of dynamic spectrum access for video transmission using USRP. 2012 International Conference on Computer and Communication Engineering (ICCCE) 2012, 228 -233.
AMA StyleMohammad Tahir, Hafizal Mohamad, Nordin Ramli, Sigit P.W. Jarot. Experimental implementation of dynamic spectrum access for video transmission using USRP. 2012 International Conference on Computer and Communication Engineering (ICCCE). 2012; ():228-233.
Chicago/Turabian StyleMohammad Tahir; Hafizal Mohamad; Nordin Ramli; Sigit P.W. Jarot. 2012. "Experimental implementation of dynamic spectrum access for video transmission using USRP." 2012 International Conference on Computer and Communication Engineering (ICCCE) , no. : 228-233.
In 802.11s draft standard, Mesh Coordinated Channel Access (MCCA) assumes the use of omnidirectional antenna and it prevents neighbour nodes to the MCCA Opportunity (MCCAOP) owner from transmitting during MCCAOP owner is transmitting, hence leads to interference problem and poor transmission efficiency. In order to overcome these problems, we present a multi-radio system with the implementation of MCCA using multiple sectored antennas. In this system, sectored antenna provides the advantage of reducing interference since its beam is pointing directionally and multi-radio system can provide simultaneous transmissions to improve transmission efficiency. Simulation is conducted to evaluate the network performance using the proposed system and results show that the throughput performance improves as number of radio in the system increases.
Yee Ling Lee; Mohammad Tahir; Nordin Ramli; H. Mohamad. MCCA-assisted multi-radio system using directional antenna. 2012 5th International Symposium on Communications, Control and Signal Processing 2012, 1 -6.
AMA StyleYee Ling Lee, Mohammad Tahir, Nordin Ramli, H. Mohamad. MCCA-assisted multi-radio system using directional antenna. 2012 5th International Symposium on Communications, Control and Signal Processing. 2012; ():1-6.
Chicago/Turabian StyleYee Ling Lee; Mohammad Tahir; Nordin Ramli; H. Mohamad. 2012. "MCCA-assisted multi-radio system using directional antenna." 2012 5th International Symposium on Communications, Control and Signal Processing , no. : 1-6.
In this paper we propose a scheme that provides physical layer security by combining two techniques known as encryption and channel pre-compensation. Encryption transforms the original signal constellation into a higher order constellation based on the key sequence generated by AES in counter-mode. Channel pre-compensation is performed based on the knowledge of channel, which is location specific, at the transmitter. These two techniques distort the original signal constellation which can only be recovered by the intended receiver. The proposed scheme not only makes the estimation of the constellation difficult but also the type of modulation that is used for the adversary. BER (bit error rate) is used as performance metric. We find that the adversary suffers from high BER as compared to the legitimate user; hence providing secure communication.
Mohammad Tahir; Sigit P. W Jarot; Mohammad Umar Siddiqi. Wireless physical layer security using encryption and channel pre-compensation. 2010 International Conference on Computer Applications and Industrial Electronics 2010, 304 -309.
AMA StyleMohammad Tahir, Sigit P. W Jarot, Mohammad Umar Siddiqi. Wireless physical layer security using encryption and channel pre-compensation. 2010 International Conference on Computer Applications and Industrial Electronics. 2010; ():304-309.
Chicago/Turabian StyleMohammad Tahir; Sigit P. W Jarot; Mohammad Umar Siddiqi. 2010. "Wireless physical layer security using encryption and channel pre-compensation." 2010 International Conference on Computer Applications and Industrial Electronics , no. : 304-309.
In this paper we consider the problem of secure communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme that provides security based on transforming the basic signal constellation to a higher order signal constellation with the help of conventional encryption method and then using channel knowledge (i.e. amplitude and phase variation), which is location specific, to distort the constellation of encrypted data. This scheme not only makes the estimation of the constellation difficult but also the type of modulation that is used for the adversary. BER (bit error rate) is used as performance metric. We find that the adversary suffers from high BER as compared to its legitimate counterpart.
Mohammad Tahir; Sigit P.W. Jarot; Mohammad Umar Siddiqi. Wireless physical layer security using channel state information. International Conference on Computer and Communication Engineering (ICCCE'10) 2010, 1 -5.
AMA StyleMohammad Tahir, Sigit P.W. Jarot, Mohammad Umar Siddiqi. Wireless physical layer security using channel state information. International Conference on Computer and Communication Engineering (ICCCE'10). 2010; ():1-5.
Chicago/Turabian StyleMohammad Tahir; Sigit P.W. Jarot; Mohammad Umar Siddiqi. 2010. "Wireless physical layer security using channel state information." International Conference on Computer and Communication Engineering (ICCCE'10) , no. : 1-5.
OFDMA is the preferred multiple access technique to provide high data rate services in mobile environment due its resilience against multipath propagation impairment and flexibility to provide multi-rate data services. However, it also has issue with susceptibility to ICI (inter-carrier interference) caused by frequency offset and Doppler spread due to mobility. Thus, OFDMA with certain number of sub-carriers will only be optimum over a certain range of mobility. Recently, a VSB-OFDMA (variable sub-carrier OFDMA), system has been proposed to relax the effect of ICI. Although it suffers from non-orthogonality caused by different sub-carrier sizes, as ICI is inversely proportional to the sub-carrier bandwidth, it rakes in benefit from reduced ICI in mix-mobility environment. It has been shown to produce higher system capacity under mix-mobility environment. In this paper we have performed comparison based on computer simulation to gauge the advantage offered by VSB-OFDMA in terms of BER.
Mohammad Tahir; Akhmad Unggul Priantoro. BER analysis of variable sub-carrier bandwidth OFDMA systems. International Conference on Computer and Communication Engineering (ICCCE'10) 2010, 1 -5.
AMA StyleMohammad Tahir, Akhmad Unggul Priantoro. BER analysis of variable sub-carrier bandwidth OFDMA systems. International Conference on Computer and Communication Engineering (ICCCE'10). 2010; ():1-5.
Chicago/Turabian StyleMohammad Tahir; Akhmad Unggul Priantoro. 2010. "BER analysis of variable sub-carrier bandwidth OFDMA systems." International Conference on Computer and Communication Engineering (ICCCE'10) , no. : 1-5.