Ahmed Refaey

Learn More
—A novel physical layer authentication scheme is proposed in this paper by exploiting the time-varying carrier frequency offset (CFO) associated with each pair of wireless communications devices. In realistic scenarios, radio frequency oscillators in each transmitter-and-receiver pair always present device-dependent biases to the nominal oscillating(More)
Many wireless communication systems such as IS-54, enhanced data rates for the GSM evolution (EDGE), worldwide interoperability for microwave access (WiMAX) and long term evolution (LTE) have adopted low-density parity-check (LDPC), tail-biting convolutional, and turbo codes as the forward error correcting codes (FEC) scheme for data and overhead channels.(More)
Recently physical layer attributes and statistics have been exploited in securing wireless communications. However, one major obstacle of physical layer security techniques is that not all of these attributes are accessible in practical wireless communication platforms. More precisely, once the hardware of a physical transceiver is implemented, most of the(More)
In a non-cooperative context such as military or spectrum surveillance application, a passive adversary has to solve the problem of estimating the transmitter parameters. In addition, wireless systems cause signaling overhead since their transmitter must inform the receiver about the chosen bit allocation table or the Forward Error Correction (FEC) scheme.(More)
Among emergent applications of digital watermarking, owner identification, proof of ownership and transaction tracking are applications that protect data by embedding the owner's information (watermark) in it. Recently, a robust image watermarking scheme based on discrete wavelet transform, discrete cosine transform and singular value decomposition was(More)
In this paper, a fingerprint image encryption algorithm is proposed in order to enhance the protection of fingerprint-based systems against replay attacks. The proposed algorithm is consisting of permutation and diffusion operations in wavelet domain, whereas, one-level Lifting Wavelet Transform Integer-to-Integer is performed to the original fingerprint(More)
IoT tends to focus on a variety of wireless technologies and approaches to enable communication over the air, however, powerline networking may also be considered as an alternative reliable and robust signaling option. Methods and devices described in this letter form the basis of modern communication system. A powerline alternative deployment covering(More)