Ahmed Refaey

Learn More
—A novel physical layer authentication scheme is proposed in this paper by exploiting the time-varying carrier frequency offset (CFO) associated with each pair of wireless communications devices. In realistic scenarios, radio frequency oscillators in each transmitter-and-receiver pair always present device-dependent biases to the nominal oscillating(More)
Many wireless communication systems such as IS-54, enhanced data rates for the GSM evolution (EDGE), worldwide interoperability for microwave access (WiMAX) and long term evolution (LTE) have adopted low-density parity-check (LDPC), tail-biting convolutional, and turbo codes as the forward error correcting codes (FEC) scheme for data and overhead channels.(More)
In a non-cooperative context such as military or spectrum surveillance application, a passive adversary has to solve the problem of estimating the transmitter parameters. In addition, wireless systems cause signaling overhead since their transmitter must inform the receiver about the chosen bit allocation table or the Forward Error Correction (FEC) scheme.(More)
Recently physical layer attributes and statistics have been exploited in securing wireless communications. However, one major obstacle of physical layer security techniques is that not all of these attributes are accessible in practical wireless communication platforms. More precisely, once the hardware of a physical transceiver is implemented, most of the(More)
Among emergent applications of digital watermarking, owner identification, proof of ownership and transaction tracking are applications that protect data by embedding the owner's information (watermark) in it. Recently, a robust image watermarking scheme based on discrete wavelet transform, discrete cosine transform and singular value decomposition was(More)
The dynamic nature of traffic over Internet protocol (IP) networks often induce high end-to-end latency and packet loss rate. These problems hamper the Quality of Service (QoS) of various conventional and emerging applications over Internet. In order to mitigate these challenges and improve the network efficiency, an adaptive compression technique (ACT) is(More)