2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 2019
Most of the proposed security algorithms for wireless networks consider only securing scalar data... more Most of the proposed security algorithms for wireless networks consider only securing scalar data, which are not suitable for other data types, e.g., digital images. In addition, many methods add noticeable overhead in securing such data types hence affecting the provided security level and network performance. In this paper, we propose an efficient security scheme based on chaotic algorithm to efficiently encrypt the digital images over wireless network applications while taking into consideration the processing capability and time constrains of most wireless networks. Our proposed security algorithm processes the digital images in three phases: security key generation, pixel permutation, and substitution. The 2D Logistic chaotic map is used in permutation and substitution stages for image pixel shuffling and transposition in order to enhance the required level of security and resist against various security attacks. Security performance analysis based on standard test images shows that our proposed scheme satisfies the needed security requirements and has better performance compared with other proposed techniques.
International Journal of Interactive Mobile Technologies (iJIM), 2021
The continuous advancements in wireless network systems have reshaped the healthcare systems towa... more The continuous advancements in wireless network systems have reshaped the healthcare systems towards using emerging communication technologies at different levels. This paper makes two major contributions. Firstly, a new monitoring and tracking wireless system is developed to handle the COVID-19 spread problem. Unmanned aerial vehicles (UAVs), i.e., drones, are used as base stations as well as data collection points from Internet of Things (IoT) devices on the ground. These UAVs are also able to exchange data with other UAVs and cloud servers. Secondly, this paper introduces a new reinforcement learning (RL) framework for learning the optimal signal-aware UAV trajectories under quality of service constraints. The proposed RL algorithm is instrumental in making the UAV movement decisions that maximize the signal power at the receiver and the data collected from the ground agents. Simulation experiments confirm that the system overcomes conventional wireless monitoring systems and dem...
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019
Most of the security algorithms proposed for the sensor networks such as secure routing, data enc... more Most of the security algorithms proposed for the sensor networks such as secure routing, data encryption and authentication, and intrusion detection target protecting the content of the collected data from being exposed to different types of attacks. However, the context of the collected data, such as event occurrence, event time, and event location, is not addressed by these security mechanisms and can still be leaked to the adversaries. Therefore, we propose in this paper a novel and efficient unobservability scheme for source/sink location privacy for wireless multimedia sensor networks. The proposed privacy scheme is based on a cross-layer design between the application and routing layers in order to exploit the multimedia processing technique with multipath routing to hide the event occurrences and locations of important nodes without degrading the network performance. Simulation analysis shows that our proposed scheme satisfies the privacy requirements and has better performance compared to other existing techniques.
International Journal of Interactive Mobile Technologies (iJIM), 2021
Even though many security schemes proposed for wireless sensor networks protect transmitted data ... more Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the privacy of the contextual information. Contextual information such as event occurrence, event time, and event location can be exposed to an adversary by just monitoring network packet transmission. This kind of information is very important because it can leak location information of key nodes or even detected events themselves. Therefore, proposing a contextual unobservability scheme is a challenging task in sensor networks considering many issues: the broadcast nature of the wireless channel, the different attacker models, the network resource constraints, and the overhead on system performance. Most of the existing location privacy schemes are not addressing all these issues and are either not efficient against global adversaries or de...
2018 Fifth International Conference on Software Defined Systems (SDS), 2018
In this paper we introduce a novel collaborative spectrum sensing/resource sharing scheme that is... more In this paper we introduce a novel collaborative spectrum sensing/resource sharing scheme that is employed in resource-constrained cognitive radio networks (CRNs) where there is a limited resource budget, and in the meanwhile each secondary user (SU) has a certain transmission cost. The problem is to decide the SUs that are allowed to transmit without exceeding the resource budget constraint. The proposed scheme fits well in the Software Defined Networking (SDN) paradigm as it can be reconfigured/reprogrammed to support a wide variety of (limited) resources, such as limited data rate, limited tolerable interference, etc. The proposed platform is based on modeling the CRN as a normal graph over which the belief propagation algorithm is run. Simulation results demonstrate many advantageous features such as high accuracy and minimal amount of message exchange.
International Journal of Electrical and Computer Engineering (IJECE), 2022
Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wirel... more Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wireless devices and many other applications. However, one of the most challenging problems when building an amplifier circuit is the noise, since it affects the quality of the intended received signal in most wireless applications. Therefore, a preamplifier is usually placed close to the main sensor to reduce the effects of interferences and to amplify the received signal without degrading the signal-to-noise ratio. Although different designs have been optimized and tested in the literature, all of them are using larger than 100 nm technologies which have led to a modest performance in terms of equivalent noise charge (ENC), gain, power consumption, and response time. In contrast, we consider in this paper a new amplifier design technology trend and move towards sub 100 nm to enhance its performance. In this work, we use a pre-well-known design of a preamplifier circuit and rebuild it using ...
2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 2019
Most of the proposed security algorithms for wireless networks consider only securing scalar data... more Most of the proposed security algorithms for wireless networks consider only securing scalar data, which are not suitable for other data types, e.g., digital images. In addition, many methods add noticeable overhead in securing such data types hence affecting the provided security level and network performance. In this paper, we propose an efficient security scheme based on chaotic algorithm to efficiently encrypt the digital images over wireless network applications while taking into consideration the processing capability and time constrains of most wireless networks. Our proposed security algorithm processes the digital images in three phases: security key generation, pixel permutation, and substitution. The 2D Logistic chaotic map is used in permutation and substitution stages for image pixel shuffling and transposition in order to enhance the required level of security and resist against various security attacks. Security performance analysis based on standard test images shows that our proposed scheme satisfies the needed security requirements and has better performance compared with other proposed techniques.
International Journal of Interactive Mobile Technologies (iJIM), 2021
The continuous advancements in wireless network systems have reshaped the healthcare systems towa... more The continuous advancements in wireless network systems have reshaped the healthcare systems towards using emerging communication technologies at different levels. This paper makes two major contributions. Firstly, a new monitoring and tracking wireless system is developed to handle the COVID-19 spread problem. Unmanned aerial vehicles (UAVs), i.e., drones, are used as base stations as well as data collection points from Internet of Things (IoT) devices on the ground. These UAVs are also able to exchange data with other UAVs and cloud servers. Secondly, this paper introduces a new reinforcement learning (RL) framework for learning the optimal signal-aware UAV trajectories under quality of service constraints. The proposed RL algorithm is instrumental in making the UAV movement decisions that maximize the signal power at the receiver and the data collected from the ground agents. Simulation experiments confirm that the system overcomes conventional wireless monitoring systems and dem...
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019
Most of the security algorithms proposed for the sensor networks such as secure routing, data enc... more Most of the security algorithms proposed for the sensor networks such as secure routing, data encryption and authentication, and intrusion detection target protecting the content of the collected data from being exposed to different types of attacks. However, the context of the collected data, such as event occurrence, event time, and event location, is not addressed by these security mechanisms and can still be leaked to the adversaries. Therefore, we propose in this paper a novel and efficient unobservability scheme for source/sink location privacy for wireless multimedia sensor networks. The proposed privacy scheme is based on a cross-layer design between the application and routing layers in order to exploit the multimedia processing technique with multipath routing to hide the event occurrences and locations of important nodes without degrading the network performance. Simulation analysis shows that our proposed scheme satisfies the privacy requirements and has better performance compared to other existing techniques.
International Journal of Interactive Mobile Technologies (iJIM), 2021
Even though many security schemes proposed for wireless sensor networks protect transmitted data ... more Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the privacy of the contextual information. Contextual information such as event occurrence, event time, and event location can be exposed to an adversary by just monitoring network packet transmission. This kind of information is very important because it can leak location information of key nodes or even detected events themselves. Therefore, proposing a contextual unobservability scheme is a challenging task in sensor networks considering many issues: the broadcast nature of the wireless channel, the different attacker models, the network resource constraints, and the overhead on system performance. Most of the existing location privacy schemes are not addressing all these issues and are either not efficient against global adversaries or de...
2018 Fifth International Conference on Software Defined Systems (SDS), 2018
In this paper we introduce a novel collaborative spectrum sensing/resource sharing scheme that is... more In this paper we introduce a novel collaborative spectrum sensing/resource sharing scheme that is employed in resource-constrained cognitive radio networks (CRNs) where there is a limited resource budget, and in the meanwhile each secondary user (SU) has a certain transmission cost. The problem is to decide the SUs that are allowed to transmit without exceeding the resource budget constraint. The proposed scheme fits well in the Software Defined Networking (SDN) paradigm as it can be reconfigured/reprogrammed to support a wide variety of (limited) resources, such as limited data rate, limited tolerable interference, etc. The proposed platform is based on modeling the CRN as a normal graph over which the belief propagation algorithm is run. Simulation results demonstrate many advantageous features such as high accuracy and minimal amount of message exchange.
International Journal of Electrical and Computer Engineering (IJECE), 2022
Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wirel... more Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wireless devices and many other applications. However, one of the most challenging problems when building an amplifier circuit is the noise, since it affects the quality of the intended received signal in most wireless applications. Therefore, a preamplifier is usually placed close to the main sensor to reduce the effects of interferences and to amplify the received signal without degrading the signal-to-noise ratio. Although different designs have been optimized and tested in the literature, all of them are using larger than 100 nm technologies which have led to a modest performance in terms of equivalent noise charge (ENC), gain, power consumption, and response time. In contrast, we consider in this paper a new amplifier design technology trend and move towards sub 100 nm to enhance its performance. In this work, we use a pre-well-known design of a preamplifier circuit and rebuild it using ...
Uploads
Papers by Eslam Malkawi