Skip to main content

Showing 1–40 of 40 results for author: Hamdaoui, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.04036  [pdf, other

    cs.LG cs.AI eess.SP

    Unsupervised Contrastive Learning for Robust RF Device Fingerprinting Under Time-Domain Shift

    Authors: Jun Chen, Weng-Keen Wong, Bechir Hamdaoui

    Abstract: Radio Frequency (RF) device fingerprinting has been recognized as a potential technology for enabling automated wireless device identification and classification. However, it faces a key challenge due to the domain shift that could arise from variations in the channel conditions and environmental settings, potentially degrading the accuracy of RF-based device classification when testing and traini… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 6 pages, 5 figures, accepted by 2024 IEEE International Conference on Communications (ICC)

  2. On the Domain Generalizability of RF Fingerprints Through Multifractal Dimension Representation

    Authors: Benjamin Johnson, Bechir Hamdaoui

    Abstract: RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a possible method for enabling secure device identification and authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data collected under one domain performs badly when tested on data collected under a different domain. Some examples of… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

    Comments: 2023 IEEE Conference on Communications and Network Security (CNS). arXiv admin note: substantial text overlap with arXiv:2308.07925

  3. arXiv:2402.05332  [pdf, other

    cs.CR cs.NI eess.SP

    Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security

    Authors: Abdurrahman Elmaghbub, Bechir Hamdaoui

    Abstract: Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly. This interconnectivity raises concerns about privacy and security, given the potential network-wide impact of a single compromise. To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality.… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: This paper to be published in IEEE Wireless Communications Magazine 2024. arXiv admin note: substantial text overlap with arXiv:2308.04467

  4. arXiv:2308.07925  [pdf, ps, other

    cs.CR

    Domain-Adaptive Device Fingerprints for Network Access Authentication Through Multifractal Dimension Representation

    Authors: Benjamin Johnson, Bechir Hamdaoui

    Abstract: RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a potential solution for automated network access authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data from one domain performs badly when tested on data from a different domain. Some examples of a domain change include varying the… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  5. arXiv:2308.04467  [pdf, other

    cs.CR

    EPS: Distinguishable IQ Data Representation for Domain-Adaptation Learning of Device Fingerprints

    Authors: Abdurrahman Elmaghbub, Bechir Hamdaoui

    Abstract: Deep learning (DL)-based RF fingerprinting (RFFP) technology has emerged as a powerful physical-layer security mechanism, enabling device identification and authentication based on unique device-specific signatures that can be extracted from the received RF signals. However, DL-based RFFP methods face major challenges concerning their ability to adapt to domain (e.g., day/time, location, channel,… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  6. arXiv:2308.00156  [pdf, other

    cs.CR

    On the Impact of the Hardware Warm-Up Time on Deep Learning-Based RF Fingerprinting

    Authors: Abdurrahman Elmaghbub, Bechir Hamdaoui

    Abstract: Deep learning-based RF fingerprinting offers great potential for improving the security robustness of various emerging wireless networks. Although much progress has been done in enhancing fingerprinting methods, the impact of device hardware stabilization and warm-up time on the achievable fingerprinting performances has not received adequate attention. As such, this paper focuses on addressing th… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

  7. arXiv:2305.09594  [pdf, other

    cs.CR cs.LG eess.SP

    HiNoVa: A Novel Open-Set Detection Method for Automating RF Device Authentication

    Authors: Luke Puppo, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub

    Abstract: New capabilities in wireless network security have been enabled by deep learning, which leverages patterns in radio frequency (RF) data to identify and authenticate devices. Open-set detection is an area of deep learning that identifies samples captured from new devices during deployment that were not part of the training set. Past work in open-set detection has mostly been applied to independent… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  8. arXiv:2305.05040  [pdf, other

    cs.NI

    A Survey on AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: Techniques, Challenges and Opportunities

    Authors: Opeyemi Ajibuwa, Bechir Hamdaoui, Attila A. Yavuz

    Abstract: AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs) have shown great potential in identifying anomalies in the network traffic of networked autonomous systems. Despite the vast research efforts, practical deployments of such systems in the real world have been limited. Although the safety-critical nature of autonomous systems and the vulnerability of learning-ba… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

  9. arXiv:2301.12360  [pdf, other

    cs.LG cs.CR eess.SP

    ADL-ID: Adversarial Disentanglement Learning for Wireless Device Fingerprinting Temporal Domain Adaptation

    Authors: Abdurrahman Elmaghbub, Bechir Hamdaoui, Weng-Keen Wong

    Abstract: As the journey of 5G standardization is coming to an end, academia and industry have already begun to consider the sixth-generation (6G) wireless networks, with an aim to meet the service demands for the next decade. Deep learning-based RF fingerprinting (DL-RFFP) has recently been recognized as a potential solution for enabling key wireless network applications and services, such as spectrum poli… ▽ More

    Submitted 28 January, 2023; originally announced January 2023.

    Comments: The paper has been accepted at IEEE ICC'23 - MWN Symposium

  10. arXiv:2211.07687  [pdf, ps, other

    cs.LG eess.SP

    Uncovering the Portability Limitation of Deep Learning-Based Wireless Device Fingerprints

    Authors: Bechir Hamdaoui, Abdurrahman Elmaghbub

    Abstract: Recent device fingerprinting approaches rely on deep learning to extract device-specific features solely from raw RF signals to identify, classify and authenticate wireless devices. One widely known issue lies in the inability of these approaches to maintain good performances when the training data and testing data are collected under varying deployment domains. For example, when the learning mode… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: This article has also been accepted to 6G Summit, Abu Dhabi, UAE, Nov. 2022

  11. arXiv:2209.00786  [pdf, ps, other

    cs.CR

    Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication

    Authors: Jared Gaskin, Bechir Hamdaoui, Weng-Keen Wong

    Abstract: Deep learning based device fingerprinting has emerged as a key method of identifying and authenticating devices solely via their captured RF transmissions. Conventional approaches are not portable to different domains in that if a model is trained on data from one domain, it will not perform well on data from a different but related domain. Examples of such domains include the receiver hardware us… ▽ More

    Submitted 1 September, 2022; originally announced September 2022.

  12. Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes

    Authors: Bechir Hamdaoui, Abdurrahman Elmaghbub

    Abstract: Deep-learning-based device fingerprinting has recently been recognized as a key enabler for automated network access authentication. Its robustness to impersonation attacks due to the inherent difficulty of replicating physical features is what distinguishes it from conventional cryptographic solutions. Although device fingerprinting has shown promising performances, its sensitivity to changes in… ▽ More

    Submitted 31 August, 2022; originally announced August 2022.

  13. arXiv:2202.09777  [pdf, other

    cs.LG cs.IT eess.SP

    An Analysis of Complex-Valued CNNs for RF Data-Driven Wireless Device Classification

    Authors: Jun Chen, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub, Kathiravetpillai Sivanesan, Richard Dorrance, Lily L. Yang

    Abstract: Recent deep neural network-based device classification studies show that complex-valued neural networks (CVNNs) yield higher classification accuracy than real-valued neural networks (RVNNs). Although this improvement is (intuitively) attributed to the complex nature of the input RF data (i.e., IQ symbols), no prior work has taken a closer look into analyzing such a trend in the context of wireless… ▽ More

    Submitted 20 February, 2022; originally announced February 2022.

    Comments: 7 pages, 9 figures, accepted by 2022 IEEE International Conference on Communications (ICC)

  14. arXiv:2201.02213  [pdf, other

    eess.SP cs.LG

    Comprehensive RF Dataset Collection and Release: A Deep Learning-Based Device Fingerprinting Use Case

    Authors: Abdurrahman Elmaghbub, Bechir Hamdaoui

    Abstract: Deep learning-based RF fingerprinting has recently been recognized as a potential solution for enabling newly emerging wireless network applications, such as spectrum access policy enforcement, automated network device authentication, and unauthorized network access monitoring and control. Real, comprehensive RF datasets are now needed more than ever to enable the study, assessment, and validation… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

    Comments: This paper has been presented in IEEE GLOBECOM Workshop 2021

  15. arXiv:2105.02755  [pdf, ps, other

    eess.SP cs.LG cs.NI

    Deep Neural Network Feature Designs for RF Data-Driven Wireless Device Classification

    Authors: Bechir Hamdaoui, Abdurrahman Elmaghbub, Seifeddine Mejri

    Abstract: Most prior works on deep learning-based wireless device classification using radio frequency (RF) data apply off-the-shelf deep neural network (DNN) models, which were matured mainly for domains like vision and language. However, wireless RF data possesses unique characteristics that differentiate it from these other domains. For instance, RF data encompasses intermingled time and frequency featur… ▽ More

    Submitted 2 March, 2021; originally announced May 2021.

  16. arXiv:2010.00720  [pdf, other

    cs.NI

    CAFT: Congestion-Aware Fault-Tolerant Load Balancing for Three-Tier Clos Data Centers

    Authors: Sultan Alanazi, Bechir Hamdaoui

    Abstract: Production data centers operate under various workload sizes ranging from latency-sensitive mice flows to long-lived elephant flows. However, the predominant load balancing scheme in data center networks, equal-cost multi-path (ECMP), is agnostic to path conditions and performs poorly in asymmetric topologies, resulting in low throughput and high latencies. In this paper, we propose CAFT, a distri… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

  17. arXiv:2010.00713  [pdf, other

    cs.NI

    Traffic Behavior in Cloud Data Centers: A Survey

    Authors: Jarallah Alqahtani, Sultan Alanazi, Bechir Hamdaoui

    Abstract: Data centers (DCs) nowadays house tens of thousands of servers and switches, interconnected by high-speed communication links. With the rapid growth of cloud DCs, in both size and number, tremendous efforts have been undertaken to efficiently design the network and manage the traffic within these DCs. However, little effort has been made toward measuring, understanding and chattelizing how the net… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

    Journal ref: 2020 International Wireless Communications and Mobile Computing (IWCMC) Pages 2106-2111

  18. arXiv:2008.04454  [pdf, other

    cs.NI

    Bert: Scalable Source Routed Multicast for Cloud Data Centers

    Authors: Jarallah Alqahtani, Bechir Hamdaoui

    Abstract: Traditional IP multicast routing is not suitable for cloud data center (DC) networks due to the need for supporting large numbers of groups with large group sizes. State-of-the-art DC multicast routing approaches aim to overcome the scalability issues by, for instance, taking advantage of the symmetry of DC topologies and the programmability of DC switches to compactly encode multicast group infor… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Journal ref: IEEE IWCMC 1752--1757 (2020)

  19. Dynamic Spectrum Sharing in the Age of Millimeter Wave Spectrum Access

    Authors: Bechir Hamdaoui, Bassem Khalfi, Nizar Zorba

    Abstract: Next-generation wireless networks are facing spectrum shortage challenges, mainly due to, among other factors, the projected massive numbers of IoT connections and the emerging bandwidth-hungry applications that such networks ought to serve. Spectrum is scarce and expensive, and therefore, it is of crucial importance to devise dynamic and flexible spectrum access policies and techniques that yield… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

  20. Peak Power Shaving for Reduced Electricity Costs in Cloud Data Centers: Opportunities and Challenges

    Authors: Mehiar Dabbagh, Bechir Hamdaoui, Ammar Rayes

    Abstract: An electricity bill of a data center (DC) is determined not only by how much energy the DC consumes, but especially by how the consumed energy is spread over time during the billing cycle. More specifically, these electricity costs are essentially made up of two major charges: Energy Charge, a cost based on the amount of consumed energy (in kWh), and Peak Charge, a cost based on the maximum power… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

  21. Unleashing the Power of Participatory IoT with Blockchains for Increased Safety and Situation Awareness of Smart Cities

    Authors: Bechir Hamdaoui, Mohamed Alkalbani, Taieb Znati, Ammar Rayes

    Abstract: IoT emerges as an unprecedented paradigm with great potential for changing how people interact, think and live. It is making existing Internet services feasible in ways that were previously impossible, as well as paving the way for new situation-awareness applications suitable for smart cities, such as realtime video surveillance, traffic control, and emergency management. These applications will… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Journal ref: Published in IEEE Network (Early Access), Oct. 2019

  22. TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band

    Authors: Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui

    Abstract: As part of its ongoing efforts to meet the increased spectrum demand, the Federal Communications Commission (FCC) has recently opened up 150 MHz in the 3.5 GHz band for shared wireless broadband use. Access and operations in this band, aka Citizens Broadband Radio Service (CBRS), will be managed by a dynamic spectrum access system (SAS) to enable seamless spectrum sharing between secondary users (… ▽ More

    Submitted 6 July, 2019; originally announced July 2019.

    Comments: 9 pages, 2 Figures, 5 tables

    Journal ref: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, Paris, France, 2019, pp. 1495-1503

  23. Location Privacy in Cognitive Radios with Multi-Server Private Information Retrieval

    Authors: Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui

    Abstract: Spectrum database-based cognitive radio networks (CRNs) have become the de facto approach for enabling unlicensed secondary users (SUs) to identify spectrum vacancies in channels owned by licensed primary users (PUs). Despite its merits, the use of spectrum databases incurs privacy concerns for both SUs and PUs. Single-server private information retrieval (PIR) has been used as the main tool to ad… ▽ More

    Submitted 3 July, 2019; originally announced July 2019.

    Comments: 14 pages, 12 Figures, this article is a journal extension of arXiv:1705.01085 and draws heavily from it

    Journal ref: IEEE Transactions on Cognitive Communications and Networking. 2019 Jun 12

  24. An Efficient Technique for Protecting Location Privacy of Cooperative Spectrum Sensing Users

    Authors: Mohamed Grissa, Attila Yavuz, Bechir Hamdaoui

    Abstract: Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered wi… ▽ More

    Submitted 15 July, 2018; originally announced July 2018.

    Comments: Published in: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 7 pages, 1 figure. arXiv admin note: text overlap with arXiv:1806.00916

  25. LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks

    Authors: Mohamed Grissa, Attila Yavuz, Bechir Hamdaoui

    Abstract: Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channel resources by allowing unlicensed users to exploit vacant channel opportunities. One effective technique through which unlicensed users, often referred to as Secondary Users (SUs), acquire whether a channel is vacant is cooperative spectrum sensing. Despite its effectiveness in enabling CRN access, cooperative sensi… ▽ More

    Submitted 9 June, 2018; originally announced June 2018.

    Comments: Published in Global Communications Conference (GLOBECOM), 2015 IEEE, 7 pages, 2 figures

  26. Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures

    Authors: Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui

    Abstract: In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks that protect secondary users' (SUs) location privacy while allowing them to learn spectrum availability in their vicinity. Our schemes harness probabilistic set membership data structures to exploit the structured nature of spectrum databases (DBs) and SUs' queries. This enables us to cre… ▽ More

    Submitted 9 June, 2018; originally announced June 2018.

    Comments: Published in IEEE Transactions on Cognitive Communications and Networking, 12 pages, 7 figures

    Journal ref: IEEE Transactions On Cognitive Communications and Networking, Vol. 3, No. 2, June 2017

  27. Exploiting wideband spectrum occupancy heterogeneity for weighted compressive spectrum sensing

    Authors: Bassem Khalfi, Bechir Hamdaoui, Mohsen Guizani, Nizar Zorba

    Abstract: Compressive sampling has shown great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that aimed to develop techniques that leverage compressive sampling to enable compressed wideband spectrum sensing. These techniques consider homogeneous wideband spectrum where all bands are assumed to have similar PU tr… ▽ More

    Submitted 4 June, 2018; originally announced June 2018.

    Comments: 6 pages, 5 figures, IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)

    Journal ref: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, 2017, pp. 613-618

  28. Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing

    Authors: Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui

    Abstract: Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered wi… ▽ More

    Submitted 3 June, 2018; originally announced June 2018.

    Comments: Published in IEEE Transactions on Information Forensics and Security, 14 pages, 7 figures

    Journal ref: IEEE Transactions On Information Forensics and Security, Vol. 12, No. 2, February 2017

  29. Location Privacy in Cognitive Radio Networks: A Survey

    Authors: Mohamed Grissa, Bechir Hamdaoui, Attila A. Yavuz

    Abstract: Cognitive radio networks (CRNs) have emerged as an essential technology to enable dynamic and opportunistic spectrum access which aims to exploit underutilized licensed channels to solve the spectrum scarcity problem. Despite the great benefits that CRNs offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues. Knowing that their whe… ▽ More

    Submitted 3 June, 2018; originally announced June 2018.

    Comments: Published in IEEE Communications Surveys and Tutorials

    Journal ref: IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1726-1760, thirdquarter 2017

  30. Responsive Content-Centric Delivery in Large Urban Communication Networks: A LinkNYC Use-Case

    Authors: Hassan Sinky, Bassem Khalfi, Bechir Hamdaoui, Ammar Rayes

    Abstract: Large urban communication networks such as smart cities are an ecosystem of devices and services cooperating to address multiple issues that greatly benefit end users, cities and the environment. LinkNYC is a first-of-its-kind urban communications network aiming to replace all payphones in the five boroughs of New York City (NYC) with kiosk-like structures providing free public Wi-Fi. We consolida… ▽ More

    Submitted 30 May, 2018; originally announced May 2018.

    Comments: 12 pages, 9 figures

    Journal ref: IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 1688-1699, March 2018

  31. Compressed Wideband Spectrum Sensing: Concept, Challenges and Enablers

    Authors: Bechir Hamdaoui, Bassem Khalfi, Mohsen Guizani

    Abstract: Spectrum sensing research has mostly been focusing on narrowband access, and not until recently have researchers started looking at wideband spectrum. Broadly speaking, wideband spectrum sensing approaches can be categorized into two classes: Nyquist-rate and sub-Nyquist-rate sampling approaches. Nyquist-rate approaches have major practical issues that question their suitability for realtime appli… ▽ More

    Submitted 10 May, 2018; originally announced May 2018.

    Comments: 6 pages, 5 figures, and 1 table

    Journal ref: B. Hamdaoui, B. Khalfi and M. Guizani, "Compressed Wideband Spectrum Sensing: Concept, Challenges, and Enablers," in IEEE Communications Magazine, vol. 56, no. 4, pp. 136-141, APRIL 2018

  32. arXiv:1710.06540  [pdf, ps, other

    cs.NI

    A Particle Filtering Approach for Enabling Distributed and Scalable Sharing of DSA Network Resources

    Authors: Bassem Khalfi, Mahdi Ben Ghorbel, Bechir Hamdaoui, Mohsen Guizani, Nizar Zorba

    Abstract: Handling the massive number of devices needed in numerous applications such as smart cities is a major challenge given the scarcity of spectrum resources. Dynamic spectrum access (DSA) is seen as a potential candidate to support the connectivity and spectrum access of these devices. We propose an efficient technique that relies on particle filtering to enable distributed resource allocation and sh… ▽ More

    Submitted 17 October, 2017; originally announced October 2017.

  33. arXiv:1707.06983  [pdf, ps, other

    cs.NI

    Extracting and Exploiting Inherent Sparsity for Efficient IoT Support in 5G: Challenges and Potential Solutions

    Authors: Bassem Khalfi, Bechir Hamdaoui, Mohsen Guizani

    Abstract: Besides enabling an enhanced mobile broadband, next generation of mobile networks (5G) are envisioned for the support of massive connectivity of heterogeneous Internet of Things (IoT)s. These IoTs are envisioned for a large number of use-cases including smart cities, environment monitoring, smart vehicles, etc. Unfortunately, most IoTs have very limited computing and storage capabilities and need… ▽ More

    Submitted 21 July, 2017; originally announced July 2017.

    Comments: Accepted for publication in IEEE Wireless Communications Magazine

  34. Optimizing Joint Data and Power Transfer in Energy Harvesting Multiuser Wireless Networks

    Authors: Bassem Khalfi, Bechir Hamdaoui, Mahdi Ben Ghorbel, Mohsen Guizani, Xi Zhang, Nizar Zorba

    Abstract: Energy harvesting emerges as a potential solution for prolonging the lifetime of the energy-constrained mobile wireless devices. In this paper, we focus on Radio Frequency (RF) energy harvesting for multiuser multicarrier mobile wireless networks. Specifically, we propose joint data and energy transfer optimization frameworks for powering mobile wireless devices through RF energy harvesting. We in… ▽ More

    Submitted 21 July, 2017; originally announced July 2017.

    Comments: Accepted for publication in IEEE Transactions on Vehicular Technology

  35. arXiv:1707.00324  [pdf, ps, other

    cs.IT

    Efficient Spectrum Availability Information Recovery for Wideband DSA Networks: A Weighted Compressive Sampling Approach

    Authors: Bassem Khalfi, Bechir Hamdaoui, Mohsen Guizani, Nizar Zorba

    Abstract: Compressive sampling has great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that leverage compressive sampling to enable efficient wideband spectrum sensing. These efforts consider homogenous wideband spectrum, where all bands are assumed to have similar PU traffic characteristics. In practice, however… ▽ More

    Submitted 20 July, 2017; v1 submitted 2 July, 2017; originally announced July 2017.

  36. When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance

    Authors: Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui

    Abstract: We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communicati… ▽ More

    Submitted 2 May, 2017; originally announced May 2017.

    Comments: 10 pages, double column

    Journal ref: IEEE Conference on Communications and Network Security (CNS), Oct 2017, pp. 1-9

  37. arXiv:1610.00620  [pdf, ps, other

    cs.NI cs.DC

    FogMQ: A Message Broker System for Enabling Distributed, Internet-Scale IoT Applications over Heterogeneous Cloud Platforms

    Authors: Sherif Abdelwahab, Bechir Hamdaoui

    Abstract: Excessive tail end-to-end latency occurs with conventional message brokers as a result of having massive numbers of geographically distributed devices communicate through a message broker. On the other hand, broker-less messaging systems, though ensure low latency, are highly dependent on the limitation of direct device-to-device (D2D) communication technologies, and cannot scale well as large num… ▽ More

    Submitted 3 October, 2016; originally announced October 2016.

  38. arXiv:1610.00289  [pdf, ps, other

    cs.NI cs.DC

    Flocking Virtual Machines in Quest for Responsive IoT Cloud Services

    Authors: Sherif Abdelwahab, Bechir Hamdaoui

    Abstract: We propose Flock; a simple and scalable protocol that enables live migration of Virtual Machines (VMs) across heterogeneous edge and conventional cloud platforms to improve the responsiveness of cloud services. Flock is designed with properties that are suitable for the use cases of the Internet of Things (IoT). We describe the properties of regularized latency measurements that Flock can use for… ▽ More

    Submitted 2 October, 2016; originally announced October 2016.

  39. arXiv:1508.06967  [pdf, ps, other

    cs.DM

    A Simple Algorithm for Coloring m-Clique Holes

    Authors: Bechir Hamdaoui

    Abstract: An m-clique hole is a sequence $φ=(Φ_1,Φ_2,\dots,Φ_m)$ of $m$ distinct cliques such that $|Φ_i| \leq m$ for all $i=1,2,\ldots,m$, and whose clique graph is a hole on $m$ vertices. That is, $φ$ is an m-clique hole if for all $i\neq j$, $i,j=1,2,\ldots,m$, $Φ_i \cap Φ_{j} \neq \emptyset$ if and only if $(j-1)~\mbox{mod}~m = (j+1)~\mbox{mod}~m = i~\mbox{mod}~m$. This paper derives a sufficient and ne… ▽ More

    Submitted 27 August, 2015; originally announced August 2015.

  40. arXiv:1501.03547  [pdf, ps, other

    cs.NI

    Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus Estimation

    Authors: Sherif Abdelwahab, Bechir Hamdaoui, Mohsen Guizani

    Abstract: We develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. We first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The algorithm converges in linearithmic time for large-scale… ▽ More

    Submitted 14 January, 2015; originally announced January 2015.

    Comments: 11 pages, double column, pre-submission