5G for Vehicular Communications
- Authors: Shah, Syed , Ahmed, Ejaz , Imran, Muhammad , Zeadally, Sherali
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 56, no. 1 (2018), p. 111-117
- Full Text: false
- Reviewed:
- Description: 5G is ongoing, and it is an emerging platform that not only aims to augment existing but also introduce a plethora of novel applications that require ultra-reliable low-latency communication. It is a new radio access technology that provides building blocks to retrofit existing platforms (e.g., 2G, 3G, 4G, and WiFi) for greater coverage, accessibility, and higher network density with respect to cells and devices. It implies that 5G aims to satisfy a diverse set of communication requirements of the various stakeholders. Among the stakeholders, vehicles, in particular, will benefit from 5G at both the system and application levels. The authors present a tutorial perspective on vehicular communications using the building blocks provided by 5G. First, we identify and describe key requirements of emerging vehicular communications and assess existing standards to determine their limitations. Then we provide a glimpse of the adopted 5G architecture and identify some of its promising salient features for vehicular communications. Finally, key 5G building blocks (i.e., proximity services, mobile edge computing and network slicing) are explored in the context of vehicular communications, and associated design challenges are highlighted. © 1979-2012 IEEE.
6G wireless systems : a vision, architectural elements, and future directions
- Authors: Khan, Latif , Yaqoob, Ibrar , Imran, Muhammad , Han, Zhu , Hong, Choong
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 147029-147044
- Full Text:
- Reviewed:
- Description: Internet of everything (IoE)-based smart services are expected to gain immense popularity in the future, which raises the need for next-generation wireless networks. Although fifth-generation (5G) networks can support various IoE services, they might not be able to completely fulfill the requirements of novel applications. Sixth-generation (6G) wireless systems are envisioned to overcome 5G network limitations. In this article, we explore recent advances made toward enabling 6G systems. We devise a taxonomy based on key enabling technologies, use cases, emerging machine learning schemes, communication technologies, networking technologies, and computing technologies. Furthermore, we identify and discuss open research challenges, such as artificial-intelligence-based adaptive transceivers, intelligent wireless energy harvesting, decentralized and secure business models, intelligent cell-less architecture, and distributed security models. We propose practical guidelines including deep Q-learning and federated learning-based transceivers, blockchain-based secure business models, homomorphic encryption, and distributed-ledger-based authentication schemes to cope with these challenges. Finally, we outline and recommend several future directions. © 2013 IEEE.
A blockchain based privacy-preserving system for electric vehicles through local communication
- Authors: Yahaya, Adamu , Javaid, Nadeem , Khalid, Rabiya , Imran, Muhammad , Naseer, Nidal
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: In this study, we propose a privacy preservation and efficient distributed searching and matching of Electric Vehicles (EVs) charging demander with suppliers based on reputation. Partially homomorphic encryption-based on reputation computation using local communication is used in the implementation, while hiding EVs users' location. A private blockchain is incorporated in the system to verify and permit secure trading of energy among the EVs' demander and suppliers. The results of the simulation show that the proposed privacy preserved algorithm converges more faster as compared to Bichromatic Mutual Nearest Neighbor (BMNN) algorithm. © 2020 IEEE.
A blockchain model for fair data sharing in deregulated smart grids
- Authors: Samuel, Omaji , Javaid, Nadeem , Awais, Muhammad , Ahmed, Zeeshan , Imran, Muhammad , Guizani, Mohsen
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa 9-13 December 2019
- Full Text: false
- Reviewed:
- Description: The emergence of smart home appliances has generated a high volume of data on smart meters belonging to different customers. However, customers can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage the customers' participation, this paper proposes an access control mechanism by fairly compensating customers for their participation in data sharing via blockchain using the concept of differential privacy. We addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores. Experimental results show the efficiency of the proposed model to minimize privacy risk, and maximize aggregator's profit. In addition, gas consumption, as well as the cost of the computational resources, is reduced. © 2019 IEEE.
A blockchain-based decentralized energy management in a P2P trading system
- Authors: Khalid, Rabiya , Javaid, Nadeem , Javaid, Sakeena , Imran, Muhammad , Naseer, Nidal
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: Local energy generation and peer to peer (P2P) energy trading in the local market can reduce energy consumption cost, emission of harmful gases (as renewable energy sources (RESs) are used to generate energy at user's premises) and increase smart grid resilience. In this paper, to implement a hybrid P2P energy trading market, a blockchain-based solution is proposed. A blockchain-based system is fully decentralized and it allows the market members to interact with each other and trade energy without involving any third party. Smart contracts play a very important role in the blockchain-based energy trading market. They contain all the necessary rules for energy trading. We have proposed three smart contracts to implement the hybrid electricity trading market. The market members interact with main smart contract which requests P2P smart contract and prosumer to grid (P2G) smart contract for further processing. The main objectives of this paper are to propose a model to implement an efficient hybrid energy trading market while reducing cost and peak to average ratio (PAR) of electricity. © 2020 IEEE.
A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks
- Authors: Khan, Zahoor , Amjad, Sana , Ahmed, Farwa , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 31036-31051
- Full Text:
- Reviewed:
- Description: Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities. © 2013 IEEE.
A blockchain-based privacy-preserving mechanism with aggregator as common communication point
- Authors: Yahaya, Adamu , Javaid, Nadeem , Khalid, Rabiya , Imran, Muhammad , Guizani, Mohsen
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: The high penetration of renewable energy resources into the distributed system and their intermittent behavior of the non-dispatchable generation causes issues of demand supply mismatch and serious security and privacy concerned in the system. It is believed that incorporating blockchain will reduce costs, enhance data security, and improve the system efficiency. However, privacy issues are not completely eliminated and can hinder the wide applications of blockchain. In the study, we present a Reputation Based Starvation Free Energy Allocation Policy (Reputation-SFEAP) in a decentralized and distributed blockchain-based energy trading; while keeping Aggregator as Common Communication Point. In addition, Identity-Based encryption (ID-Based encryption) technique is added that improves transactional information privacy. According to the research analysis, it is observed that the proposed system model has optimal and fair energy allocation algorithms, which prevent all the energy users from energy starvation and share the available energy accordingly. Moreover, the incorporated encryption system has greater security-privacy level, which protects passive attacker and disguises attacker from penetration. © 2020 IEEE.
A blockchain-based solution for enhancing security and privacy in smart factory
- Authors: Wan, Jafu , Li, Jiapeng , Imran, Muhammad , Li, Di
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 15, no. 6 (2019), p. 3652-3660
- Full Text: false
- Reviewed:
- Description: Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture. First, the major problems of the traditional IIoT architecture are analyzed, and the existing improvements are summarized. Second, we introduce a security and privacy model to help design the Blockchain-based architecture. On this basis, we decompose and reorganize the original IIoT architecture to form a new multicenter partially decentralized architecture. Then, we introduce some relative security technologies to improve and optimize the new architecture. After that we design the data interaction process and the algorithms of the architecture. Finally, we use an automatic production platform to discuss the specific implementation. The experimental results show that the proposed architecture provides better security and privacy protection than the traditional architecture. Thus, the proposed architecture represents a significant improvement of the original architecture, which provides a new direction for the IIoT development. © 2005-2012 IEEE.
A cloud-based IoMT data sharing scheme with conditional anonymous source authentication
- Authors: Wang, Yan-Ping , Wang, Xiao-Fen , Dai, Hong-Ning , Zhang, Xiao-Song , Su, Yu , Imran, Muhammad , Nasser, Nidal
- Date: 2022
- Type: Text , Conference paper
- Relation: 2022 IEEE Global Communications Conference, GLOBECOM 2022, Virtual, online, 4-8 December 2022, 2022 IEEE Global Communications Conference, GLOBECOM 2022 - Proceedings p. 2915-2920
- Full Text: false
- Reviewed:
- Description: As a rapidly growing subset of the Internet of Thing (IoT), the cloud-based Internet of Medical Thing (IoMT) has been widely applied in remote healthcare industries, which allows the physicians to monitor patients' body parameters remotely to offer continuous and timely healthcare. These healthcare parameters usually contain sensitive information, such as heart rates, glucose levels and etc., and the exposure of them may pose serious threats to the patients' health and lives. To guarantee security and privacy, many IoMT data sharing schemes have been proposed. However, most of these schemes either exhibit a one-to-one data sharing structure or fail to protect the patients' privacy. Since the data usually needs to be shared to different physicians, patients may want to be assisted without revealing their identities. To meet these requirements in healthcare systems, we propose a multi-receiver secure healthcare data sharing scheme, in which the patients are allowed to share their IoMT data to multiple physicians simultaneously for a multidisciplinary treatment, and the conditional anonymity is achieved where data source authentication is provided without revealing the patient's identity. When the patient health condition is abnormal, the hospital can correctly and quickly trace the patient's identity and inform him/her immediately. Our scheme is formally proved to achieve multiple security properties including confidentiality, unforgeability and anonymity. Simulation results demonstrate that the proposed scheme is efficient and practical. © 2022 IEEE.
A cooperative crowdsensing system based on flying and ground vehicles to control respiratory viral disease outbreaks
- Authors: Sahraoui, Yesin , Kerrache, Chaker , Amadeo, Marica , Vegni, Anna , Korichi, Ahmed , Nebhen, Jamel , Imran, Muhammad
- Date: 2022
- Type: Text , Journal article
- Relation: Ad Hoc Networks Vol. 124, no. (2022), p.
- Full Text: false
- Reviewed:
- Description: The massive increase in population density in cities has led to several urban problems, such as an increment of air pollution, traffic congestion, and a faster spread of infectious diseases. With the rapid innovation in the intelligent sensors technology, and its integration into smart vehicles and Unmanned Aerial Vehicles (UAVs), a novel sensing paradigm has been promoted, namely vehicular crowdsensing, which leverages on-board sensors to capture information from the surrounding environment. Collected data are then analyzed to take proper countermeasures. In this paper, we present a smart coordination mechanism between UAVs and ground vehicles (GVs), which sense information like body temperature and breathing rate of people, in order to support a variety of monitoring applications, including discovering the presence of infectious diseases. In our framework, namely GUAVA, aerial and ground vehicles are equipped with GPS devices and thermal cameras to monitor specific geographic areas, detect humans’ vital parameters and, at the same time, discover duplicate data by identifying matching faces in thermal video sequences with the GaussianFace algorithm. The sensing tasks in hard-to-reach places are assigned to UAVs, with the ability to power up wirelessly from the nearest GV and offload the collected monitoring images to it. Simulation results have assessed our proposed framework, showing good performance in terms of distinct Quality of Service (QoS) metrics. © 2021
A cooperative heterogeneous vehicular clustering mechanism for road traffic management
- Authors: Ahmad, Iftikhar , Noor, Rafidah , Zaba, Muhammad , Qureshi, Muhammad , Imran, Muhammad , Shoaib, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: International Journal of Parallel Programming Vol. 48, no. 5 (2020), p. 870-889
- Full Text: false
- Reviewed:
- Description: The vehicular ad-hoc networks integrates with long-term evolution (LTE) forming a heterogeneous network, capable of providing seamless connectivity, which meets the communication requirements of intelligent transportation systems. However, heterogeneous network-based applications involve LTE resource (data and spectrum) usage cost and must be taken care while developing such a solution. One of the scenarios is the access of the information to/from remote server over the internet via LTE for road traffic management applications. Although clustering of the vehicle is significant to minimize the data and LTE network usage, however, the problem of non-cooperation of the vehicles in clustering process and within a cluster are major issues in sharing costly data acquired from the internet. Because, who and why one (vehicle) should pay the cost is the big question, proliferating the non-cooperative behavior among the cluster members. To solve these issues, strategic game-theoretic based clustering mechanism named as cooperative interest-aware clustering (CIAC) is developed. The proposed CIAC not only balance the cost of usage by controlling non-cooperative behavior among the vehicles within the cluster but at the same time motivate vehicles to participate in the clustering process to share the data and cost as well. It consists of a cluster head selection process based on the strategic game-theoretic approach and a fair-use policy. The implementation results show superiority in performance of our protocol over the existing approaches. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.
A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems
- Authors: Al-Muhtadi, Jalal , Qiang, Ma , Zeb, Khan , Chaudhry, Junaid , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 16363-16376
- Full Text:
- Reviewed:
- Description: Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
A data reporting protocol with revocable anonymous authentication for edge-assisted intelligent transport systems
- Authors: Wang, Yanping , Wang, Xiaofen , Dai, Hong-Ning , Zhang, Xiaosong , Imran, Muhammad
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 19, no. 6 (2023), p. 7835-7847
- Full Text: false
- Reviewed:
- Description: Intelligent Transport Systems (ITS) have received growing attention recently driven by technical advances in Industrial Internet of Vehicles (IIoV). In IIoV, vehicles report traffic data to management infrastructures to achieve better ITS services. To ensure security and privacy, many anonymous authentication-enabled data reporting protocols are proposed. However, these protocols usually require a large number of preloaded pseudonyms or involve a costly and irrevocable group signature. Thus, they are not ready for realistic deployment due to large storage overhead, expensive computation costs, or absence of malicious users' revocation. To address these issues, we present a novel data reporting protocol for edge-assisted ITS in this paper, where the traffic data is sent to distributed edge nodes for local processing. Specifically, we propose a new anonymous authentication scheme fine-tuned to fulfill the needs of vehicular data reporting, which allows authenticated vehicles to report unlimited unlinkable messages to edge nodes without huge pseudonyms download and storage costs. Moreover, we designed an efficient certificate update scheme based on a bivariate polynomial function. In this way, malicious vehicles can be revoked with time complexity O(1). The security analysis demonstrates that our protocol satisfies source authentication, anonymity, unlinkability, traceability, revocability, nonframeability, and nonrepudiation. Further, extensive simulation results show that the performance of our protocol is greatly improved since the signature size is reduced by at least 8%, the computation costs in message signing and verification are reduced by at least 56% and 67%, respectively, and the packet loss rate is reduced by at least 14%. © 2005-2012 IEEE.
A deep learning model based on concatenation approach for the diagnosis of brain tumor
- Authors: Noreen, Neelum , Palaniappan, Sellappan , Qayyum, Abdul , Ahmad, Iftikhar , Imran, Muhammad , Shoaib, M.uhammad
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 55135-55144
- Full Text:
- Reviewed:
- Description: Brain tumor is a deadly disease and its classification is a challenging task for radiologists because of the heterogeneous nature of the tumor cells. Recently, computer-aided diagnosis-based systems have promised, as an assistive technology, to diagnose the brain tumor, through magnetic resonance imaging (MRI). In recent applications of pre-trained models, normally features are extracted from bottom layers which are different from natural images to medical images. To overcome this problem, this study proposes a method of multi-level features extraction and concatenation for early diagnosis of brain tumor. Two pre-trained deep learning models i.e. Inception-v3 and DensNet201 make this model valid. With the help of these two models, two different scenarios of brain tumor detection and its classification were evaluated. First, the features from different Inception modules were extracted from pre-trained Inception-v3 model and concatenated these features for brain tumor classification. Then, these features were passed to softmax classifier to classify the brain tumor. Second, pre-trained DensNet201 was used to extract features from various DensNet blocks. Then, these features were concatenated and passed to softmax classifier to classify the brain tumor. Both scenarios were evaluated with the help of three-class brain tumor dataset that is available publicly. The proposed method produced 99.34 %, and 99.51% testing accuracies respectively with Inception-v3 and DensNet201 on testing samples and achieved highest performance in the detection of brain tumor. As results indicated, the proposed method based on features concatenation using pre-trained models outperformed as compared to existing state-of-the-art deep learning and machine learning based methods for brain tumor classification. © 2013 IEEE.
A framework and mathematical modeling for the vehicular delay tolerant network routing
- Authors: Nasir, Mostofa , Noor, Rafidah , Iftikhar, Mohsin , Imran, Muhammad , Abdul Wahab, Ainuddin , Jabbarpour, Mohammad , Khokhar, R.
- Date: 2016
- Type: Text , Journal article
- Relation: Mobile Information Systems Vol. 2016, no. (2016), p.
- Full Text:
- Reviewed:
- Description: Vehicular ad hoc networks (VANETs) are getting growing interest as they are expected to play crucial role in making safer, smarter, and more efficient transportation networks. Due to unique characteristics such as sparse topology and intermittent connectivity, Delay Tolerant Network (DTN) routing in VANET becomes an inherent choice and is challenging. However, most of the existing DTN protocols do not accurately discover potential neighbors and, hence, appropriate intermediate nodes for packet transmission. Moreover, these protocols cause unnecessary overhead due to excessive beacon messages. To cope with these challenges, this paper presents a novel framework and an Adaptive Geographical DTN Routing (AGDR) for vehicular DTNs. AGDR exploits node position, current direction, speed, and the predicted direction to carefully select an appropriate intermediate node. Direction indicator light is employed to accurately predict the vehicle future direction so that the forwarding node can relay packets to the desired destination. Simulation experiments confirm the performance supremacy of AGDR compared to contemporary schemes in terms of packet delivery ratio, overhead, and end-to-end delay. Simulation results demonstrate that AGDR improves the packet delivery ratio (5-7%), reduces the overhead (1-5%), and decreases the delay (up to 0.02 ms). Therefore, AGDR improves route stability by reducing the frequency of route failures. © 2016 Mostofa Kamal Nasir et al.
A hybrid computing solution and resource scheduling strategy for edge computing in smart manufacturing
- Authors: Li, Xiaomin , Wan, Jiafu , Dai, Hong-Ning , Imran, Muhammad , Xia, Min , Celesti, Antonio
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 15, no. 7 (2019), p. 4225-4234
- Full Text: false
- Reviewed:
- Description: At present, smart manufacturing computing framework has faced many challenges such as the lack of an effective framework of fusing computing historical heritages and resource scheduling strategy to guarantee the low-latency requirement. In this paper, we propose a hybrid computing framework and design an intelligent resource scheduling strategy to fulfill the real-time requirement in smart manufacturing with edge computing support. First, a four-layer computing system in a smart manufacturing environment is provided to support the artificial intelligence task operation with the network perspective. Then, a two-phase algorithm for scheduling the computing resources in the edge layer is designed based on greedy and threshold strategies with latency constraints. Finally, a prototype platform was developed. We conducted experiments on the prototype to evaluate the performance of the proposed framework with a comparison of the traditionally-used methods. The proposed strategies have demonstrated the excellent real-time, satisfaction degree (SD), and energy consumption performance of computing services in smart manufacturing with edge computing. © 2005-2012 IEEE.
A hybrid precoding- and filtering-based uplink MC-LNOMA scheme for 5G cellular networks with reduced PAPR
- Authors: Baig, Imran , Farooq, Umer , Ahmed, Ejaz , Imran, Muhammad , Shoaib, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: Transactions on Emerging Telecommunications Technologies Vol. 29, no. 10 (2018), p.
- Full Text: false
- Reviewed:
- Description: Uplink multicarrier localized nonorthogonal multiple access (MC-LNOMA) is a variant of hybrid nonorthogonal multiple access, where subcarrier mapping is performed in localized mode. MC-LNOMA is one of the most prominent emerging schemes and likely to be employed in the forthcoming fifth-generation cellular networks due to its massive connectivity, spectral efficiency, better cell coverage capability, and higher data rate. It may employ orthogonal frequency-division multiple access due to the technical ripeness. However, schemes based on orthogonal frequency-division multiple access all suffer from the high peak-to-average power ratio problem. Therefore, in this paper, a new finite impulse response filter–based discrete cosine transform–precoded uplink MC-LNOMA scheme is presented for peak-to-average power ratio reduction. MATLAB simulations demonstrate the performance supremacy of the proposed scheme compared to contemporary schemes such as discrete cosine transform–precoded uplink MC-LNOMA and nonprecoded uplink MC-LNOMA. © 2018 John Wiley & Sons, Ltd.
A Joint Filtering and Precoding Based Uplink MC-NOMA
- Authors: Baig, Imran , Farooq, U. , Ul Hasan, N. , Zghaibeh, M. , Imran, Muhammad
- Date: 2018
- Type: Text , Conference paper
- Relation: 2018 International Symposium on Networks, Computers and Communications, ISNCC 2018, Rome, 19-21 June 2018
- Full Text: false
- Reviewed:
- Description: Non Orthogonal Multiple Access (NOMA) has become one of the prospective candidates for upcoming 5 th generation Cellular network standard. Multicarrier NOMA (MC-NOMA) is a kind of hybrid NOMA, where, Orthogonal Frequency Division Multiple Access (OFDMA) may be employed to achieve higher capacity. However, MC-NOMA scheme based on OFDMA face the problem of higher Peak-to-Average Power Ratio (PAPR). The high PAPR reduces both energy and spectral efficiency of the MC-NOMA scheme. Therefore, in this paper, a new Finite Impulse Response (FIR) filtering based Zadoff-Chu Matrix Transform (ZCMT) precoded uplink MC-NOMA scheme is presented to reduce higher PAPR. MATLAB® simulations demonstrate that, the proposed filter based ZCMT precoded uplink MC-NOMA scheme outperform the ZCMT precoded uplink MC-NOMA schemes without filtering, uplink Single Carrier NOMA (SC-NOMA) schemes and conventional uplink MC-NOMA schemes available in the literature. © 2018 IEEE.
A joint SLM and precoding based PAPR reduction scheme for 5G UFMC cellular networks
- Authors: Baig, Imran , Farooq, Umer , Hasan, Najam , Zghaibeh, Manaf , Arshad, Muhammad , Imran, Muhammad
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 International Conference on Computing and Information Technology, ICCIT 2020, Tabuk, Saudi Arabia, 9 September to 10 September 2020, 2020 International Conference on Computing and Information Technology, ICCIT 2020
- Full Text: false
- Reviewed:
- Description: Universal Filtered Multi Carrier (UFMC) waveform has been recommended for 5th Generation (5G) cellular networks due to its robustness against synchronization errors and short-packet burst support. However, the UFMC suffers from high Peak-to-Average Power Ratio (PAPR) problem. The high PAPR degrades the efficiency of High Power Amplifier (HPA) and makes the UFMC transmitter inefficient. This paper combines Selective-Mapping (SLM) and Generalized Chirp-Like (GCL) Precoding to minimize the high PAPR of UFMC system. Simulations in MATLAB ® have been carried out to analyze the both parameters PAPR and Symbol Error Rate (SER). Computer simulation results show that the proposed SLM based GCL precoded UFMC (SLM-GCL-UFMC) scheme outperform the GCL precoded UFMC scheme, conventional UFMC scheme and conventional OFDM scheme, respectively available in the literature. © 2020 IEEE.
A lightweight cyber security framework with context-awareness for pervasive computing environments
- Authors: Al-Muhtadi, Jalal , Saleem, Kashif , Al-Rabiaah, Sumaya , Imran, Muhammad , Gawanmeh, Amjad , Rodrigues, Joel
- Date: 2021
- Type: Text , Journal article
- Relation: Sustainable Cities and Society Vol. 66, no. (2021), p.
- Full Text: false
- Reviewed:
- Description: Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing over the IoT platform makes life more convenient by embedding sensors based on context-aware computing devices in the physical environment for the ubiquitous availability of computing resources. The sensors gather contextual information from the physical world and transmit it to receivers as per requirements or in case of environmental changes, such as temperature and humidity. However, the combination of dynamic operation and the need to handle sensitive and private data make the pervasive computing environment and IoT devices vulnerable to numerous attacks. Smart environments require a maximum level of safety assurance, such as trusted context producers and customers, which should protect sensitive information from exposure or monitoring. This paper discusses the major cyber threats in smart environments and proposes a novel lightweight security framework that authenticates and maintains the context providers and receivers. The cloud environment is adopted for user authentication at the user layer to implement access control and role assignment. Finally, the proposed security framework is implemented in the IBM cloud platform with six devices to evaluate its efficiency, sustainability, and secure communication. © 2020 Elsevier Ltd