Skip to main content

Showing 1–25 of 25 results for author: Khandaker, M R A

.
  1. arXiv:2203.02791  [pdf, ps, other

    cs.NI

    Deep Q-Learning Based Resource Allocation in Interference Systems With Outage Constraint

    Authors: Saniul Alam, Sadia Islam, Muhammad R. A. Khandaker, Risala T. Khan, Faisal Tariq, Apriana Toding

    Abstract: This correspondence considers the resource allocation problem in wireless interference channel (IC) under link outage constraints. Since the optimization problem is non-convex in nature, existing approaches to find the optimal power allocation are computationally intensive and thus practically infeasible. Recently, deep reinforcement learning has shown promising outcome in solving non-convex optim… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: Submitted to IEEE TVT

  2. arXiv:2103.01322  [pdf, ps, other

    cs.CR

    Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare

    Authors: Shakila Zaman, Muhammad R. A. Khandaker, Risala T. Khan, Faisal Tariq, Kai-Kit Wong

    Abstract: The Internet-of-Things (IoT) is an emerging and cognitive technology which connects a massive number of smart physical devices with virtual objects operating in diverse platforms through the internet. IoT is increasingly being implemented in distributed settings, making footprints in almost every sector of our life. Unfortunately, for healthcare systems, the entities connected to the IoT networks… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Comments: Submitted to IEEE

  3. arXiv:2102.03428  [pdf, ps, other

    cs.IT

    Gridded UAV Swarm for Secrecy Rate Maximization with Unknown Eavesdropper

    Authors: Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai

    Abstract: This paper considers grid formation of an unmanned aerial vehicle (UAV) swarm for maximizing the secrecy rate in the presence of an unknown eavesdropper. In particular, the UAV swarm performs coordinated beamforming onto the null space of the legitimate channel to jam the eavesdropper located at an unknown location. By nulling the channel between the legitimate receiver and the UAV swarm, we obtai… ▽ More

    Submitted 5 February, 2021; originally announced February 2021.

    Comments: Copyright belongs to IEEE

  4. arXiv:2101.06565  [pdf, ps, other

    cs.IT cs.CR

    Joint Beamforming and Location Optimization for Secure Data Collection in Wireless Sensor Networks with UAV-Carried Intelligent Reflecting Surface

    Authors: Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai

    Abstract: This paper considers unmanned aerial vehicle (UAV)-carried intelligent reflecting surface (IRS) for secure data collection in wireless sensor networks. An eavesdropper (Eve) lurks within the vicinity of the main receiver (Bob) while several randomly placed sensor nodes beamform collaboratively to the UAV-carried IRS that reflects the signal to the main receiver (Bob). The design objective is to ma… ▽ More

    Submitted 16 January, 2021; originally announced January 2021.

    Comments: Submitted to IEEE Transactions on Communications

  5. arXiv:2007.02661  [pdf

    cs.CY cs.CR

    An Automated Contact Tracing Approach for Controlling Covid-19 Spread Based on Geolocation Data from Mobile Cellular Networks

    Authors: Md. Tanvir Rahman, Risala T. Khan, Muhammad R. A. Khandaker, Md. Sifat Ar Salan

    Abstract: The coronavirus (COVID-19) has appeared as the greatest challenge due to its continuous structural evolution as well as the absence of proper antidotes for this particular virus. The virus mainly spreads and replicates itself among mass people through close contact which unfortunately can happen in many unpredictable ways. Therefore, to slow down the spread of this novel virus, the only relevant i… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: Submitted to IEEE Access

  6. arXiv:2006.13813  [pdf

    cs.CR

    Lightweight Cryptography for IoT: A State-of-the-Art

    Authors: Vishal A. Thakor, M. A. Razzaque, Muhammad R. A. Khandaker

    Abstract: With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for almost all industries due to its wide range of applications from various domains. The explosive growth of industrial control processes and the industrial IoT, imposes unprecedented vulnerability to cyber threats in critical infrastructure through the interconnected systems. This new security threats could be m… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: This paper has beend submitted to IEEE Access Journal

  7. arXiv:2004.03056  [pdf, ps, other

    eess.SP cs.LG

    Truly Intelligent Reflecting Surface-Aided Secure Communication Using Deep Learning

    Authors: Yizhuo Song, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Apriana Toding

    Abstract: This paper considers machine learning for physical layer security design for communication in a challenging wireless environment. The radio environment is assumed to be programmable with the aid of a meta material-based intelligent reflecting surface (IRS) allowing customisable path loss, multi-path fading and interference effects. In particular, the fine-grained reflections from the IRS elements… ▽ More

    Submitted 20 February, 2021; v1 submitted 6 April, 2020; originally announced April 2020.

    Comments: Submitted to IEEE

  8. UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location

    Authors: Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai

    Abstract: This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Comments: Submitted to IEEE Access. Contents may be subject to copyright to IEEE

    Journal ref: in IEEE Access, vol. 8, pp. 72881-72892, 2020

  9. arXiv:1907.04831  [pdf, other

    eess.SP cs.IT cs.LG stat.ML

    Learning the Wireless V2I Channels Using Deep Neural Networks

    Authors: Tian-Hao Li, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Risala T. Khan

    Abstract: For high data rate wireless communication systems, develo** an efficient channel estimation approach is extremely vital for channel detection and signal recovery. With the trend of high-mobility wireless communications between vehicles and vehicles-to-infrastructure (V2I), V2I communications pose additional challenges to obtaining real-time channel measurements. Deep learning (DL) techniques, in… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

  10. arXiv:1906.10194  [pdf, ps, other

    eess.SP cs.IT

    Deep Neural Network Based Resource Allocation for V2X Communications

    Authors: ** Gao, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Risala T. Khan

    Abstract: This paper focuses on optimal transmit power allocation to maximize the overall system throughput in a vehicle-to-everything (V2X) communication system. We propose two methods for solving the power allocation problem namely the weighted minimum mean square error (WMMSE) algorithm and the deep learning-based method. In the WMMSE algorithm, we solve the problem using block coordinate descent (BCD) m… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

    Comments: Submitted to IEEE VTC 2019-Fall, Honolulu, Hawaii, USA

  11. arXiv:1709.08237  [pdf, ps, other

    cs.IT

    Secure Full-Duplex Two-Way Relaying for SWIPT

    Authors: Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng, Yangyang Zhang, Zhongbin Zheng

    Abstract: This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. Specifically, we assume a zeroforcing (ZF) solution constraint to eliminate the res… ▽ More

    Submitted 24 September, 2017; originally announced September 2017.

    Comments: Submitted to IEEE Wireless Communications Letters

  12. arXiv:1709.02340  [pdf, ps, other

    cs.IT cs.CR

    Secure Full-Duplex Device-to-Device Communication

    Authors: Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong

    Abstract: This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to li… ▽ More

    Submitted 7 September, 2017; originally announced September 2017.

    Comments: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 2017

  13. arXiv:1709.01334  [pdf, ps, other

    cs.CR cs.IT

    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

    Authors: Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad Ruhul Amin Khandaker

    Abstract: By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA)… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

    Comments: 29 pages, 7 figures, Submitted to IEEE Transactions on Wireless Communications

  14. arXiv:1704.02907  [pdf, ps, other

    cs.IT

    Energy Harvesting Enabled MIMO Relaying through Time Switching

    Authors: Jialing Liao, Muhammad R. A. Khandaker, Kai-Kit Wong

    Abstract: This letter considers simultaneous wireless information and power transfer (SWIPT) for a multiple-input multiple-output (MIMO) relay system. The relay is powered by harvesting energy from the source via time switching (TS) and utilizes the harvested energy to forward the information signal. Our aim is to maximize the rate of the system subject to the power constraints at both the source and relay… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

  15. Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications

    Authors: Amrita Mukherjee, Tamaghna Acharya, Muhammad R. A. Khandaker

    Abstract: In this paper, we study a cooperative cognitive radio network (CCRN) where the secondary user-transmitter (SU-Tx) assists bi-directional communication between a pair of primary users (PUs) following the principle of two-way relaying. In return, it gets access to the spectrum of the PUs to enable its own transmission to SU-receiver (SU-Rx). Further, in order to support sustainable operation of the… ▽ More

    Submitted 5 April, 2017; originally announced April 2017.

    Comments: 15 pages, 5 figures, Submitted to IEEE Transactions on Vehicular Technology

  16. arXiv:1703.10666  [pdf, ps, other

    cs.IT

    Interference Exploitation in Full Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings

    Authors: Mahmoud T. Kabir, Muhammad R. A. Khandaker, Christos Masouros

    Abstract: This paper considers a multiuser full-duplex (FD) wireless communication system, where a FD radio base station (BS) serves multiple single-antenna half-duplex (HD) uplink and downlink users simultaneously. Unlike conventional interference mitigation approaches, we propose to use the knowledge of the data symbols and the channel state information (CSI) at the FD radio BS to exploit the multi-user i… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

    Comments: Submitted to IEEE Transactions on Signal Processing, March 2017

  17. Energy Harvesting Enabled MIMO Relaying through PS

    Authors: Jialing Liao, Muhammad R. A. Khandaker, Kai-Kit Wong

    Abstract: This paper considers a multiple-input multiple-output (MIMO) relay system with an energy harvesting relay node. All nodes are equipped with multiple antennas, and the relay node depends on the harvested energy from the received signal to support information forwarding. In particular, the relay node deploys power splitting based energy harvesting scheme. The capacity maximization problem subject to… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

    Comments: Presented in IEEE SPAWC 2016

    Journal ref: Proc. 17th IEEE Int. Workshop Signal Process. Adv. Wireless Commun., SPAWC 2016, Edinburgh, Scottland, UK, July 3 - 6, 2016

  18. One- and Two-Way Relay Optimization for MIMO Interference Networks

    Authors: Muhammad R A Khandaker, Kai-Kit Wong

    Abstract: This paper considers multiple-input multiple-output (MIMO) relay communication in multi-cellular (interference) systems in which MIMO source-destination pairs communicate simultaneously. It is assumed that due to severe attenuation and/or shadowing effects, communication links can be established only with the aid of a relay node. The aim is to minimize the maximal mean-square-error (MSE) among all… ▽ More

    Submitted 27 March, 2017; originally announced March 2017.

    Comments: Accepted in EURASIP Journal on Advances in Signal Processing

    Journal ref: EURASIP J. Adv. Signal Process., 2017:24

  19. arXiv:1703.06547  [pdf, ps, other

    cs.IT

    Truth-Telling Mechanism for Secure Two-Way Relay Communications with Energy-Harvesting Revenue

    Authors: Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng

    Abstract: This paper brings the novel idea of paying the utility to the winning agents in terms of some physical entity in cooperative communications. Our setting is a secret two-way communication channel where two transmitters exchange information in the presence of an eavesdropper. The relays are selected from a set of interested parties such that the secrecy sum rate is maximized. In return, the selected… ▽ More

    Submitted 21 March, 2017; v1 submitted 19 March, 2017; originally announced March 2017.

    Comments: Accepted in IEEE Transactions on Wireless Communications

  20. arXiv:1703.05752  [pdf, ps, other

    cs.IT

    Simultaneous Wireless Information and Power Transfer in MISO Full-Duplex Systems

    Authors: Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng, Yangyang Zhang, Zhongbin Zheng

    Abstract: This paper investigates a multiuser multiple-input single-output (MISO) full-duplex (FD) system for simultaneous wireless information and power transfer (SWIPT), in which a multi-antenna base station (BS) simultaneously sends wirelessly information and power to a set of single-antenna mobile stations (MSs) using power splitters (PSs) in the downlink and receives information in the uplink in FD mod… ▽ More

    Submitted 16 March, 2017; originally announced March 2017.

  21. arXiv:1612.08465  [pdf, ps, other

    cs.IT

    Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security

    Authors: Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong

    Abstract: Conventionally, interference and noise are treated as catastrophic elements in wireless communications. However, it has been shown recently that exploiting known interference constructively can even contribute to signal detection ability at the receiving end. This paper exploits this concept to design artificial noise (AN) beamformers constructive to the intended receiver (IR) yet kee** AN disru… ▽ More

    Submitted 26 December, 2016; originally announced December 2016.

    Comments: To be submitted to the IEEE Transactions on Signal Processing

  22. arXiv:1610.04644  [pdf, ps, other

    cs.IT cs.NI

    Joint Transmit Power and Relay Two-Way Beamforming Optimization for Energy-Harvesting Full-Duplex Communications

    Authors: Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Zhongbin Zheng

    Abstract: This paper studies the joint optimization problem of two-way relay beamforming, the receiver power splitting (PS) ratio as well as the transmit power at the sources to maximize the achievable sum-rate of a simultaneous wireless information and power transfer (SWIPT) system with a full-duplex (FD) multiple-input multiple-output (MIMO) amplify and forward (AF) relay, assuming perfect channel state i… ▽ More

    Submitted 17 October, 2016; v1 submitted 12 October, 2016; originally announced October 2016.

    Comments: Accepted for Publication. International Workshop on Full Duplex Radio, Globecom 2016. arXiv admin note: text overlap with arXiv:1606.08651

  23. Probabilistically Robust SWIPT for Secrecy MISOME Systems

    Authors: Muhammad R. A. Khandaker, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng

    Abstract: This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver (IR), multiple multi-antenna eavesdroppers (Eves) and multiple single-antenna energy-harvesting receivers (ERs). The main objective is to keep the probability of the legitimate… ▽ More

    Submitted 30 August, 2016; originally announced August 2016.

    Comments: This is an open access article accepted for publication as a regular paper in the IEEE Transactions on Information Forensics & Security. Copyright (c) 2016 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]

    Journal ref: IEEE Trans. Inf. Forensics & Security, 2016

  24. arXiv:1606.08651  [pdf, ps, other

    cs.IT

    Two-way relay beamforming optimization for full-duplex SWIPT systems

    Authors: Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong

    Abstract: In this paper, we investigate the problem of two-way relay beamforming optimization to maximize the achievable sum-rate of a simultaneous wireless information and power transfer (SWIPT) system with a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. In particular, we address the optimal joint design of the receiver power splitting (PS) ratio and the beamforming… ▽ More

    Submitted 21 March, 2017; v1 submitted 28 June, 2016; originally announced June 2016.

    Comments: Invited paper presented in the European Signal Processing Conference (EUSIPCO 2016). arXiv admin note: text overlap with arXiv:1411.6021 by other authors

  25. Wireless Information and Power Transfer in Full-Duplex Communication Systems

    Authors: Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong

    Abstract: This paper considers the problem of maximizing the sum-rate for simultaneous wireless information and power transfer (SWIPT) in a full-duplex bi-directional communication system subject to energy harvesting and transmit power constraints at both nodes. We investigate the optimum design of the receive power splitters and transmit powers for SWIPT in full-duplex mode. Exploiting rate-split method, a… ▽ More

    Submitted 7 March, 2016; originally announced March 2016.

    Comments: Accepted in IEEE ICC 2016