no code implementations • 5 May 2024 • Waqas Aman, Saif Al-Kuwari, Marwa Qaraqe
We investigate the impact of jamming attacks on various performance parameters of the legitimate underwater acoustic communication link.
no code implementations • 28 Aug 2023 • Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari
We also compare our scheme with a baseline scheme that exploits the angle of arrival at RSUs for authentication.
no code implementations • 29 Jul 2023 • Muhammad Asim, Muhammad Ozair Iqbal, Waqas Aman, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi
It turns out that the performance of the ML algorithms is only slightly superior to the Neyman-Pearson-based binary hypothesis test (BHT).
no code implementations • 12 Mar 2023 • Waqas Aman, Saif Al-Kuwari, Marwa Qaraqe
In this paper, we propose a novel physical layer authentication (PLA) mechanism in underwater acoustic communication networks where we exploit the position/location of the transmitter nodes to achieve authentication.
no code implementations • 5 Feb 2023 • Waqas Aman, Nour Kouzayha, Muhammad Mahboob Ur Rahman, Tareq Y. Al-Naffouri
This letter provides a stochastic geometry (SG)-based coverage probability (CP) analysis of an indoor terahertz (THz) downlink assisted by a single reconfigurable intelligent surface (RIS) panel.
no code implementations • 8 Jan 2023 • M. Hashim Shahab, Hasan Mujtaba Buttar, Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Haris Pervaiz, Qammer H. Abbasi
Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home.
no code implementations • 12 Dec 2022 • Kawish Pervez, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Qammer H. Abbasi
In post-covid19 world, radio frequency (RF)-based non-contact methods, e. g., software-defined radios (SDR)-based methods have emerged as promising candidates for intelligent remote sensing of human vitals, and could help in containment of contagious viruses like covid19.
no code implementations • 2 Apr 2022 • Hasan Mujtaba Buttar, Waqas Aman, M. Mahboob Ur Rahman, Qammer H. Abbasi
When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closed-form expressions for the coverage probabilities for both uplink and downlink IoT transmissions.
no code implementations • 5 Mar 2022 • Waqas Aman, Saif Al-Kuwari, Ambrish Kumar, Muhammad Mahboob Ur Rahman, Muhammad Muzzammil
The first part of the paper focuses on the state-of-the-art underwater and A-W WCNs whereby we outline the benefits and drawbacks of the four promising underwater and A-W candidate technologies: radio frequency (RF), acoustic, optical and magnetic induction (MI), along with their channel characteristics.
no code implementations • 1 Sep 2020 • Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. A. Imran, Qammer H. Abbasi
This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system.
no code implementations • 14 Jul 2020 • Waqas Aman, M. Mahboob Ur Rahman, Hassan T. Abbas, Muhammad Arslan Khalid, Muhammad A. Imran, Akram Alomainy, Qammer H. Abbasi
Nanoscale communication systems operating in Ter-ahertz (THz) band are anticipated to revolutionise the healthcaresystems of the future.