Chowdhury Shahriar

Learn More
This paper presents a new concept of device fingerprinting (or profiling) to enhance wireless security using Infinite Hidden Markov Random Field (iHMRF). Wireless device fingerprinting is an emerging approach for detecting spoofing attacks in wireless network. Existing methods utilize either time-independent features or time-dependent features, but not both(More)
This paper explores a collocated overlapped-multiple-input multiple-output (MIMO) antenna architecture and a spectrum sharing algorithm via null space projection (NSP) for radar-communications coexistence. In the overlapped-MIMO architecture, the transmit array of a collocated MIMO radar is partitioned into a number of subarrays that are allowed to overlap.(More)
With the now widespread availability of software-defined radio technology for wireless networks, the distinction between jamming in the original electronic warfare sense and wireless cybersecurity attacks becomes hazy. A taxonomy delineates these concepts in the rapidly expanding field of wireless security, classifying communication jammers' theoretical(More)
The Time-Division mode for Long Term Evolution (TD-LTE) is viewed by many as the first waveform that will be enabled by Dynamic Spectrum Access (DSA) and see widespread adoption in both the commercial and public safety arena. The Third Generation Partnership Project (3GPP) is developing standards for DSA-enabling TD-LTE. In this paper we take an initial(More)
Orthogonal Frequency Division Multiplexing (OFDM) uses pilot tones to estimate and equalize the channel's frequency response whose locations and values are known. This makes OFDM prone to pilot tone based jamming attacks. Our previous research analyzed such jamming attacks. This paper builds on this idea and proposes approaches to mitigate the effect by(More)
  • 1