scispace - formally typeset
Search or ask a question
Author

Hussain Ben-Azza

Bio: Hussain Ben-Azza is an academic researcher from Arts et Métiers ParisTech. The author has contributed to research in topics: Fading & Multipath propagation. The author has an hindex of 7, co-authored 34 publications receiving 199 citations.

Papers
More filters
Journal ArticleDOI
01 Feb 2018
TL;DR: This paper classifies and gives an overview of attacks that target the network layer functionalities of cognitive radio networks and discusses the existing detection techniques and countermeasures and highlights the main security challenges for such networks.
Abstract: Spectrum scarcity is the principal motivation behind the development of cognitive radio. This technology introduces new functionalities at the physical, medium access control, and network layers of the TCP/IP protocol stack. These functionalities can be subject to new security threats. Most of the existing works in cognitive radio focused on the security issues in both the physical and medium access control layers. However, threats related to the network layer have not been studied despite its importance in establishing communication between different users in cognitive radio networks. In this paper, we classify and give an overview of attacks that target the network layer functionalities of cognitive radio networks. We discuss the existing detection techniques and countermeasures and highlight the main security challenges for such networks.

46 citations

Journal ArticleDOI
TL;DR: The physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions is investigated and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs.
Abstract: Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that needs to be maintained within sustainable levels. In the present contribution, we investigate the physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions. Assuming a spectrum sharing scenario, our analysis assumes that a source S communicates with a destination D with the aid of a multi-antenna relay R and in the presence of an eavesdropper E who is attempting to overhear the communication of both S-R and R-D links. The involved relay is powered by the renewable energy harvested from the signal sent by the source based on the power-splitting energy harvesting strategy. Furthermore, the relay uses a maximum ratio combining technique to process effectively the received signals. In addition, owing to the underlying strategy, both S and R adjust their respective transmit powers in order to avoid causing interference to the primary network. By considering both the independent identically distributed and the independent but not necessarily identically distributed flat Rayleigh fading channels, closed-form expressions for the secrecy outage probability are derived, based on which an asymptotic analysis is carried out. Our results quantify the impact of the main key system parameters and point out the optimal values ensuring a high-security performance of such a communication system. The validity of the derived results is verified extensively through comparisons with respective Monte Carlo simulation results and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs.

21 citations

Book ChapterDOI
21 Apr 2015
TL;DR: This work results in a new simple approximate closed-form of the SNR PDF at the output of three types of receivers over Weibull multipath fading channels, derived in terms of only one particular hypergeometric function, known as Fox-H function.
Abstract: The probability density function (PDF) of the output SNR (Signal to Noise Ratio) at a receiver operating under Weibull fading multipath channel is unknown in closed form and exists only as a complicated multiple integrals or approximated by a series of functions, or recently, by a single function whose evaluation time is not negligible. Our main result is a new simple approximate closed-form of the SNR PDF at the output of three types of receivers over Weibull multipath fading channels. The advantage of this new expression is that its evaluation time is less compared to all previous results. Based on this expression, approximate analytical expressions of the outage probability (OP), the average bit error rate (BER) for several M-ary modulation techniques, and the average channel capacity (CC) are derived in terms of only one particular hypergeometric function, known as Fox-H function. Numerical results have been validated by simulation and compared with recent results.

21 citations

Proceedings ArticleDOI
01 Oct 2016
TL;DR: A trust cooperative transmission protocol for multiple-hops broadcast in VANET which selects among all relays only the best ones minimizing a function of finite number of metrics and uses cryptography to ensure a confidential communication between the source and the destination.
Abstract: Cooperative transmission in vehicular ad-hoc networks (VANET) seems to be an efficient solution when no direct transmission between the source and the destination is possible. However, secure reception of the message at the destination through not necessarily honest relays remains a crucial problem to solve in VANET. In this paper, we propose a trust cooperative transmission protocol for multiple-hops broadcast in VANET which selects among all relays only the best ones minimizing a function of finite number of metrics. Our proposed protocol uses cryptography to ensure a confidential communication between the source and the destination. As the vehicle broadcast the safety message thus, the primitive of cryptography which can be used is Ciphertext-policy attribute based encryption (CP-ABE), because this primitive provides an encrypted access control mechanism for broadcasting messages.

16 citations

Journal ArticleDOI
TL;DR: The Shannon capacity for L-branch maximal combining ratio over generalized multipath fading channel is investigated and it is shown that the more the number L increases, the larger the Shannon capacity is.
Abstract: In this article, we investigate the Shannon capacity for L-branch maximal combining ratio (MRC) over generalized multipath fading channel. We derive closed-form expressions of the maximal spectral efficiency over Rayleigh, Rician, Nakagami-m, and Weibull multipath fading channel under flat fading conditions. The results are expressed in terms of Meijer G-functions, which can be evaluated numerically using mathematical tools such as Mathematica and Maple. We show, in particular, that the more the number L increases, the larger the Shannon capacity is. We deduce that four branches are sufficient in several cases to mitigate the fading effect and the channel model will approaches the one of AWGN.

16 citations


Cited by
More filters
01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Book ChapterDOI
27 Jan 2005
TL;DR: This chapter will focus on evaluating the pairwise error probability with and without CSI, and how the results of these evaluations can be used via the transfer bound approach to evaluate average BEP of coded modulation transmitted over the fading channel.
Abstract: In studying the performance of coded communications over memoryless channels (with or without fading), the results are given as upper bounds on the average bit error probability (BEP). In principle, there are three different approaches to arriving at these bounds, all of which employ obtaining the so-called pairwise error probability , or the probability of choosing one symbol sequence over another for a given pair of possible transmitted symbol sequences, followed by a weighted summation over all pairwise events. In this chapter, we will focus on the results obtained from the third approach since these provide the tightest upper bounds on the true performance. The first emphasis will be placed on evaluating the pairwise error probability with and without CSI, following which we shall discuss how the results of these evaluations can be used via the transfer bound approach to evaluate average BEP of coded modulation transmitted over the fading channel.

648 citations

Journal ArticleDOI
TL;DR: An attending dermatologist, with decades under his belt, whose love of dermatology was palpable and relentless, whose desire to teach was similarly consuming.
Abstract: M any years ago, when I was a medical student, I met a great teacher. He was an attending dermatologist, with decades under his belt, whose love of dermatology was palpable and relentless. He sought out consultse literally went looking for them when roundingeto the great chagrin of countless weary residents and medical students under his slight but seasoned wing. His charges occasionally half-protested, undercaffeinated and unaware, but none could sway him. He was hungry for a challenge. Unlike any other teacher I’ve ever known (I have been fortunate enough to have had some exceptional ones), he knew how to bring out the best in every student. But he always demanded more and somehow his bleary-eyed prot eg es never failed him. In my fledgling years as a teaching attending, now finally on the other side of the smoke screen of doctoring, I occasionally think of him. I think of how he set examples for us, how he incessantly sought to push himself. Although I knew of his strengths, at the time, I didn’t know just how hard-fought they were. I thought, naively, that his skills were inherent. But just as his devotion to dermatology had demanded endless hours of scrupulous study, his desire to teach was similarly consuming. It was a skill he cultivated, like everything else. As I reflect on my own teaching, of course I take pride in my efforts, but I can’t avert my eyes from my shortcomings. Indeed, they are painfully conspicuous. I make excuses, some of which are true. Very few have my mentor’s eagle eye or his ability to talk for hours about key details most people won’t ever see. And trainees want to know the tested material, the solitary answer. They want to know they are correct, or in the very least on the right track. Foolishly, I deliver. I congratulate them for their thought processes. I applaud their propitious efforts. But I fear in doing so I do them a great disservice. In

287 citations

Journal ArticleDOI
TL;DR: The security requirements are reviewed, descriptions of several severe cyber-attacks are provided, and a cyber-security strategy to detect and counter these attacks are proposed.

283 citations

Journal ArticleDOI
TL;DR: A new Mixed Integer Linear Programming (MILP) for the proposed network is developed minimizing the overall costs of the walnut industry and its applicability and efficiency is illustrated.
Abstract: In the history of sustainable development, logistics has been thought of as one of the key factors in the supply chain network. In the meantime, the issue of Closed-loop Supply Chain (CLSC) has received considerable attention as it ensures many diverse industries toward sustainability. But many industries including agricultural section often fail to address and fulfill these requirements. In this study, a new CLSC network is designed for the walnut industry as a part of agricultural crop by conducting a complete review of the past studies. Therefore, a new Mixed Integer Linear Programming (MILP) for the proposed network is developed minimizing the overall costs of the walnut industry. The designed network considers both forward and reverse flow not only to meet the demands of various markets, but also to prepare the returned products for the second use. In order to solve the proposed model, a set of exact, metaheuristics, and hybrid metaheuristics are employed. Finally, the best solutions are obtained by assessing the finest initial answers using Taguchi method. The results notoriously illustrated the excellent consistency between the proposed network and the employed algorithms along with its applicability and efficiency.

86 citations