Skip to main content

Showing 1–11 of 11 results for author: Al-Kuwari, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02885  [pdf, other

    eess.SP cs.ET

    Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers

    Authors: Waqas Aman, Saif Al-Kuwari, Marwa Qaraqe

    Abstract: Underwater communication networks are increasingly popularized by various important maritime applications. However, this also leads to an increased threat landscape. This letter presents the first study that considers jamming attacks by random jammers present in the surroundings of legitimate transceivers in underwater acoustic communication systems. We investigate the impact of jamming attacks on… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  2. arXiv:2405.00426  [pdf, other

    cs.CR cs.DC eess.SP

    On the Potential of Re-configurable Intelligent Surface (RIS)-assisted Physical Layer Authentication (PLA)

    Authors: Hala Amin, Waqas Aman, Saif Al-Kuwari

    Abstract: Re-configurable Intelligent Surfaces (RIS) technology is increasingly becoming a potential component for next-generation wireless networks, offering enhanced performance in terms of throughput, spectral, and energy efficiency. However, the broadcast nature of RIS-assisted wireless communication makes it vulnerable to malicious attacks at the physical layer. At the same time, physical layer authent… ▽ More

    Submitted 2 May, 2024; v1 submitted 1 May, 2024; originally announced May 2024.

  3. arXiv:2402.02089  [pdf, other

    cs.CR

    Recent Advances in Digital Image and Video Forensics, Anti-forensics and Counter Anti-forensics

    Authors: Maryam Al-Fehani, Saif Al-Kuwari

    Abstract: Image and video forensics have recently gained increasing attention due to the proliferation of manipulated images and videos, especially on social media platforms, such as Twitter and Instagram, which spread disinformation and fake news. This survey explores image and video identification and forgery detection covering both manipulated digital media and generative media. However, media forgery de… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

  4. arXiv:2308.14693  [pdf, other

    eess.SP cs.CR cs.LG

    Hybrid PLS-ML Authentication Scheme for V2I Communication Networks

    Authors: Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari

    Abstract: Vehicular communication networks are rapidly emerging as vehicles become smarter. However, these networks are increasingly susceptible to various attacks. The situation is exacerbated by the rise in automated vehicles complicates, emphasizing the need for security and authentication measures to ensure safe and effective traffic management. In this paper, we propose a novel hybrid physical layer se… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: Accepted for Publication following Presentation at IEEE ISNCC-23

  5. arXiv:2307.12643  [pdf, other

    cs.NI cs.ET eess.SP

    Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication

    Authors: Waqas Aman, Flavio Giorgi, Giulio Attenni, Saif Al-Kuwari, Elmehdi Illi, Marwa Qaraqe, Gaia Maselli, Roberto Di Pietro

    Abstract: The colossal evolution of wireless communication technologies over the past few years has driven increased interest in its integration in a variety of less-explored environments, such as the underwater medium. In this magazine paper, we present a comprehensive discussion on a novel concept of routing protocol known as cross-media routing, incorporating the marine and aerial interfaces. In this reg… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: Submitted to IEEE Communications Magazine

  6. arXiv:2305.12950  [pdf, other

    cs.CR

    FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning

    Authors: Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan

    Abstract: Federated learning (FL) allows a large number of clients to collaboratively train machine learning (ML) models by sending only their local gradients to a central server for aggregation in each training iteration, without sending their raw training data. Unfortunately, recent attacks on FL demonstrate that local gradients may leak information about local training data. In response to such attacks,… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  7. arXiv:2208.01726  [pdf, other

    cs.IT

    Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?

    Authors: Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari

    Abstract: In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination commu… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  8. arXiv:2205.08587  [pdf, other

    cs.CR

    Physical Unclonable Functions (PUF) for IoT Devices

    Authors: Abdulaziz Al-Meer, Saif Al-Kuwari

    Abstract: Physical Unclonable Function (PUF) has recently attracted interested from both industry and academia as a potential alternative approach to secure Internet of Things (IoT) devices from the more traditional computational based approach using conventional cryptography. PUF is promising solution for lightweight security, where the manufacturing fluctuation process of IC is used to improve the securit… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 21 pages, 6 figures

  9. arXiv:2205.07231  [pdf, other

    cs.IT

    On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdrop** and Imperfect CSI

    Authors: Elmehdi Illi, Marwa K. Qaraqe, F. El Bouanani, Saif M. Al-Kuwari

    Abstract: In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to co… ▽ More

    Submitted 15 May, 2022; originally announced May 2022.

  10. arXiv:2203.02667  [pdf, other

    eess.SP cs.CR cs.ET cs.IT

    Underwater and Air-Water Wireless Communication: State-of-the-art, Channel Characteristics, Security, and Open Problems

    Authors: Waqas Aman, Saif Al-Kuwari, Ambrish Kumar, Muhammad Mahboob Ur Rahman, Muhammad Muzzammil

    Abstract: We present a first detailed survey on underwater and air-water (A-W) wireless communication networks (WCNs) that mainly focuses on the security challenges and the countermeasures proposed to date. For clarity of exposition, this survey paper is mainly divided into two parts. The first part of the paper focuses on the state-of-the-art underwater and A-W WCNs whereby we outline the benefits and draw… ▽ More

    Submitted 3 September, 2022; v1 submitted 5 March, 2022; originally announced March 2022.

  11. arXiv:2202.00050  [pdf, other

    cs.CV

    Deep-Disaster: Unsupervised Disaster Detection and Localization Using Visual Data

    Authors: Soroor Shekarizadeh, Razieh Rastgoo, Saif Al-Kuwari, Mohammad Sabokrou

    Abstract: Social media plays a significant role in sharing essential information, which helps humanitarian organizations in rescue operations during and after disaster incidents. However, develo** an efficient method that can provide rapid analysis of social media images in the early hours of disasters is still largely an open problem, mainly due to the lack of suitable datasets and the sheer complexity o… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.