Skip to main content

Showing 1–13 of 13 results for author: Badrudduza, A S M

.
  1. arXiv:2304.04314  [pdf, ps, other

    cs.IT eess.SP

    RIS-aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis with Simultaneous Eavesdrop**

    Authors: Md. Mijanur Rahman, A. S. M. Badrudduza, Noor Ahmad Sarker, Md. Ibrahim, Imran Shafique Ansari

    Abstract: The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to the receiver. In this paper, we present a comprehen… ▽ More

    Submitted 9 April, 2023; originally announced April 2023.

    Comments: No comments

  2. arXiv:2302.10876  [pdf, ps, other

    cs.IT

    Effects of Co-channel Interference on RIS Empowered Wireless Networks amid Multiple Eavesdrop** Attempts

    Authors: Md. Roisul Ajom Ruku, Md. Ibrahim, A. S. M. Badrudduza, Imran Shafique Ansari

    Abstract: This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wireless networks? 2) Which of the two groups of eavesdr… ▽ More

    Submitted 21 February, 2023; originally announced February 2023.

    Comments: No

  3. arXiv:2302.10257  [pdf, other

    cs.IT eess.SP

    Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers

    Authors: Moloy Kumar Ghosh, Milton Kumar Kundu, Md Ibrahim, A. S. M. Badrudduza, Md. Shamim Anower, Imran Shafique Ansari, Ali A. Shaikhi, Mohammed A. Mohandes

    Abstract: This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: No

  4. arXiv:2112.06487  [pdf, other

    cs.IT

    On the Physical Layer Security Performance over RIS-aided Dual-hop RF-UOWC Mixed Network

    Authors: T. Hossain, S. Shabab, A. S. M. Badrudduza, M. K. Kundu, I. S. Ansari

    Abstract: Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

  5. arXiv:2112.04392  [pdf, other

    cs.IT

    Opportunistic Relay Selection over Generalized Fading and Inverse Gamma Composite Fading Mixed Multicast Channels: A Secrecy Tradeoff

    Authors: MD. Shakhawat Hossen, A. S. M. Badrudduza, S. M. Riazul Islam, Abu Hanif, Milton Kumar Kundu, Kyung-Sup Kwak

    Abstract: The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

  6. arXiv:2111.06574  [pdf, other

    cs.IT eess.SP

    On Effective Secrecy Throughput of Underlay Spectrum Sharing $α$-$μ$/ Málaga Hybrid Model under Interference-and-Transmit Power Constraints

    Authors: Md. Ibrahim, A. S. M. Badrudduza, Md. Shakhawat Hossen, M. K. Kundu, Imran Shafique Ansari

    Abstract: The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a seconda… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

  7. arXiv:2109.05171  [pdf, other

    cs.IT eess.SP

    On the Intercept Probability and Secure Outage Analysis of Mixed ($α$-$κ$-$μ$)-shadowed and Málaga Turbulent Model

    Authors: N. A. Sarker, A. S. M. Badrudduza, S. M. R. Islam, S. H. Islam, M. K. Kundu, I. S. Ansari, K. -S. Kwak

    Abstract: This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

  8. arXiv:2109.01407  [pdf, other

    cs.IT

    Secrecy Performance of α-κ-μ Shadowed Fading Channel

    Authors: A. S. M. Badrudduza, S. H. Islam, M. K. Kundu, I. S. Ansari

    Abstract: In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  9. arXiv:2106.08810  [pdf, other

    cs.IT

    Opportunistic Relay in Multicast Channels with Generalized Shadowed Fading Effects: A Physical Layer Security Perspective

    Authors: S. M. S. Shahriyer, A. S. M. Badrudduza, S. Shabab, M. K. Kundu, H. Yu

    Abstract: Through ordinary transmissions over wireless multicast networks are greatly hampered due to the simultaneous presence of fading and shadowing of wireless channels, secure transmissions can be enhanced by properly exploiting random attributes of the propagation medium. This study focuses on the utilization of those attributes to enhance the physical layer security (PLS) performance of a dual-hop wi… ▽ More

    Submitted 14 November, 2021; v1 submitted 16 June, 2021; originally announced June 2021.

  10. arXiv:2106.06951  [pdf, other

    cs.IT eess.SP

    Effects of Eavesdropper on the Performance of Mixed η-μ and DGG Cooperative Relaying System

    Authors: Noor Ahmed Sarker, A. S. M. Badrudduza, Milton Kumar Kundu, Imran Shafique Ansari

    Abstract: Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days.… ▽ More

    Submitted 13 June, 2021; originally announced June 2021.

  11. arXiv:2105.12265  [pdf, other

    cs.IT eess.SP

    On Secrecy Performance of Mixed α-η-μ and Malaga RF-FSO Variable Gain Relaying Channel

    Authors: Nandita Swanan Mandira, Milton Kumar Kundu, Sheikh Habibul Islam, A. S. M. Badrudduza, Imran Shafique Ansari

    Abstract: With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we p… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  12. arXiv:2105.12071  [pdf, other

    cs.IT

    Security Analysis in Multicasting over Shadowed Rician and α-μ Fading Channels: A Dual-hop Hybrid Satellite Terrestrial Relaying Network

    Authors: Abida Sultana Sumona, Milton Kumar Kundu, A. S. M. Badrudduza

    Abstract: In this era of 5G technology, the ever-increasing demands for high data rates lead researchers to develop hybrid satellite-terrestrial (HST) networks as a substitution to the conventional cellular terrestrial systems. Since an HST network suffers from a masking effect which can be mitigated by adopting the terrestrial relaying strategy, in this work, we focus on wireless multicasting through an HS… ▽ More

    Submitted 3 July, 2021; v1 submitted 25 May, 2021; originally announced May 2021.

  13. Enhancing Security of TAS/MRC Based Mixed RF-UOWC System with Induced Underwater Turbulence Effect

    Authors: Md. Ibrahim, A. S. M. Badrudduza, Md. Shakhawat Hossen, Milton Kumar Kundu, Imran Shafique Ansari

    Abstract: Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques… ▽ More

    Submitted 21 November, 2021; v1 submitted 19 May, 2021; originally announced May 2021.