Filter by type:

Sort by year:

A Deep Learning Approach for Vital Signs Compression and Energy Efficient Delivery in mhealth Systems

Journal Papers
1. Ahmed Ben Said, Mohamed Fathi AL-SA’D, Mounira Tlili, Alaa Awad Abdellatif, Amr Mohamed, Tarek Elfouly, Khaled Harras, Mark Dennis O’Connor
IEEE Access Volume 6, Issue 1, Pages 2169-3536

Binary consensus in sensor motes

Conferences
Al-Nakhala, N.; Riley, R.; Elfouly, T.M.
2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)

In this work, we adapt the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question and the final decision is based on the majority opinion. Binary consensus can play a basic role in increasing the accuracy of detecting event occurrence. Existing work on the algorithm focuses on simulation of the algorithm in a purely theoretic sense. In this work, we modify the algorithm to function in wireless sensor networks by adding a method for nodes to determine who to communicate with as well as adding a heuristic for nodes to know when the algorithm has completed. We implement and test our algorithm in real wireless sensor motes and further support our results with a wireless mote simulator.

Clustered Binary Consensus in Sensor Motes

Conferences
Al-Nakhala, Noor; Riley, Ryan; ElFouly, Tarek
Proceedings of European Wireless 2014; 20th European Wireless Conference

In this work, we extend and adapt the binary consensus algorithm to operate using clusters in a wireless sensor network. Binary consensus is a decision making algorithm used to cause distributed entities to agree on the majority opinion held by the group when posed with a true or false question. Clustering is a common technique used in WSNs to increase the overall lifetime of the network by reducing energy consumed due to communication. Our clustered binary consensus implementation is tested using a large WSN testbed, and the experimental results show that incorporating clustering into the binary consensus algorithm reduces the time required for motes to reach consensus and lowers the number of packets sent in the network by approximately 94%

Comparative simulation for physical layer key generation methods

Conferences
Saad, A.; Mohamed, A.; Elfouly, T.M.; Khattab, T.; Guizani, M.
2015 International Wireless Communications and Mobile Computing Conference (IWCMC)

The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model of two mobile nodes in the presence of a passive eavesdropper is used to perform the comparison process. Important modifications are proposed to some phases’ techniques in order to increase the performance of the generation process as a whole. Different metrics were used for comparison in each phase, in the distillation phase, we use the Bit Mismatch Rate (BMR) for different SNR values to compare various extracted random strings of the two intended nodes. On the other hand, the messaging rate and process complexity is exploited to estimate the performance of the compared techniques in both reconciliation and privacy amplification phases. The randomness and entropy properties of the keys are verified using the NIST suite, all the generated keys are 128 bits, it is shown that the success rate of the keys passing the randomness tests depends strongly on the techniques that are used through the three generation phases.

Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed

Journal Papers
Noor Al-Nakhala, Ryan Riley and Tarek Elfouly
Computer Networks Journal Elsevier Volume 79, 14 March 2015, Pages 30–38

In this work, we realize the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question and the final decision is based on the majority opinion. Binary consensus can play a basic role in increasing the accuracy of detecting event occurrence. Existing work on the binary consensus algorithm focuses on simulation of the algorithm in a purely theoretical sense. We fill the gap between the theoretical work and real hardware implementation by modifying the algorithm to function in wireless sensor networks. This is achieved by adding a method for nodes to determine who to communicate with as well as adding a heuristic for nodes to know when the algorithm has completed. Our implementation is asynchronous and based on random communication. In this work, we expand our previous implementation to test it on 139 hardware testbed. Moreover, we are able to minimize the convergence time achieving ultimate results. Our implementation show successful results and all the motes are able to converge to the expected value in very short time.

Distributed binary consensus algorithm and wireless sensor network

Conferences
Abdaoui, A.; Elfouly, T.M.; Draief, M.
2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)

We consider the design and implementation of the binary consensus algorithm in wireless sensor networks (WSN) under real life environment. This algorithm is applied for the evaluation of a consensus of a measured values in presence of a faulty/attacked node. As this algorithm has been tested theoretically, we deploy it for real-life environment including distributed and routing features. In this paper, we propose the development and the implementation of the distributed binary consensus algorithm in WSN under Tinyos environment. The implementation was tested on sensor nodes using the TinyOSSimulator for a WSN with a large number of nodes and a testbed with limited number of nodes. We evaluate the performances related to the average convergence time of nodes states to a consensus value. As in analytical results, in the simulations, we applied the distributed algorithm for fully connected, ring, cycle, Erdos Reny random, and star-shaped topologies.

Distributed binary consensus algorithm in wireless sensor networks with faulty nodes

Conferences
Abdaoui, A.; Elfouly, T.
2013 7th IEEE GCC Conference and Exhibition (GCC)

In sensor networks, consensus is a procedure to enhance the local measurements of the sensors with those of the surrounding nodes, and leads to a final agreement about a common value. The question here is how we can achieve the the consensus in a large network containing some faulty nodes. In this paper, we present distributed binary consensus algorithm (BCA) over the wireless sensor networks (WSN) in presence of faulty nodes. With binary consensus, each sensor node, observes one of two states TRUE and FALSE and the aim is to decide which one of the two states was held by the majority of the nodes. We details the implementation of the distributed BCA in WSN when the network contains P faulty nodes. The implementation was tested on sensor nodes using the TinyOS Simulator (TOSSIM) for a WSN with a large number of nodes. Here, TOSSIM guarantees that the code performs correctly when deployed on the physical nodes. In performance evaluation, we consider the analysis of the average convergence time over the simulated environment and considering the presence of P malicious nodes. These results are presented for a WSN with different topologies such as fully connected, path, ring, Erdos Reny random, and star-shaped.

Energy-cost-distortion optimization for delay-sensitive M-health applications

Conferences
Awad, A.; Mohamed, A.; Elfouly, T.
2015 Wireless Telecommunications Symposium (WTS)

Mobile-health (m-health) systems leverage wireless and mobile communication technologies to promote new ways to acquire, process, transport, and secure the raw and processed medical data to provide the scalability needed to cope with the increasing number of elderly and chronic disease patients requiring constant monitoring. However, the design and operation of such health monitoring systems with Body Sensor Networks (BASNs) is challenging in twofold. First, limited power source of the sensor nodes. Second, Quality of Service (QoS) guarantee for the delivery of medical data. Therefore, we propose a cross-layer framework that integrates network particularities and application requirements and constraints to provide a sustainable and high-quality service for health monitoring systems. This framework focuses on energy minimization and EEG signal distortion trade-off for delay sensitive transmission of medical data over heterogeneous wireless environment. Simulation results show that the proposed scheme achieves the optimal tradeoff between energy efficiency and QoS requirements for health monitoring systems.

Estimating the number of sources: An efficient maximization approach

Conferences
Salman, T.; Badawy, A.; Elfouly, T.M.; Mohamed, A.; Khattab, T.
2015 International Wireless Communications and Mobile Computing Conference (IWCMC)

Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that involve prior knowledge of the number of received signals. Information theoretic approaches such as Akaikes information criterion (AIC) and minimum description length (MDL) have been used extensively even though they are complex and show bad performance at some stages. In this paper, a new algorithm for estimating the number of sources is presented. This algorithm exploits the estimated eigenvalues of the auto correlation coefficient matrix rather than the auto covariance matrix, which is conventionally used, to estimate the number of sources. We propose to use either of a two simply estimated decision statistics, which are the moving increment and moving standard deviation as metric to estimate the number of sources. Then process a simple calculation of the increment or standard deviation of eigenvalues to find the number of sources at the location of the maximum value. Results showed that our proposed algorithms have a better performance in comparison to the popular and more computationally expensive AIC and MDL at low SNR values and low number of collected samples.

Impact of Time Synchronization Error on the Mode-shape Calculation in Wireless Sensor Networks for Structural Health Monitoring

Conferences
Abderrazek Abdaoui, Mohamed Hossam Ahmed, Tarek M. Elfouly
Accepted for publication in IEEE Wireless Communications and Networking Conference (WCNC 2016)

Investigation of Vortex Order on Helical-Phased Ring Mode Launch in Multimode Fiber

Journal Papers
Angela Amphawan, Yousef Fazea, Tarek Elfouly, Khalid Abualsaud
Advanced Science Letters, Vol 21, Number 10 Pages 3042-3045,

Optical fiber sensors based on mode division multiplexing (MDM) play an increasingly vital role for real-time multi-parameter measurements. For multimode fibers, the central core region typically has defects in the refractive index profile, thus limiting the stability of lower-order modes for MDM. To avoid the central core region, this paper introduces a new launch based on helical-phased ring modes in multimode fiber using a vertical-cavity surface-emitting laser (VCSEL) array and a vortex lens. A data rate of 14 Gbit/s for a multimode fiber length of 1200 meters is achieved at a wavelength of 1550.12 nm. The transverse electric field, power coupling coefficients and eye diagrams are analyzed.

Multi-objective sensor placement using the effective independence model (SPEM) for wireless sensor networks in structural health monitoring

Conferences
Elsersy, M.; Ahmed, M.H.; Elfouly, T.M.; Abdaoui, A.
2015 International Wireless Communications and Mobile Computing Conference (IWCMC)

This paper studies the optimal placement problem in structural health monitoring (SHM) using wireless sensor networks (WSN). This problem is formulated as a refined multi-objective optimization problem with various constraints of connectivity and flow conservation conditions, while minimizing the energy consumption and maximizing the information quality are the objectives. To perform the multi-objective optimization, we modify the heuristic single objective power-aware sensor placement using the effective independence model (p-SPEM) algorithm introduced in [1]. In this paper, we design and analyze a multi-objective p-SPEM (mop-SPEM) algorithm for sensor node placement. The multi-objective formulation adds more flexibility because the energy consumption and the information quality can be easily traded-off. The mop-SPEM is simulated and compared with p-SPEM for a nine-storey building. Results show that mop-SPEM is able to trade-off the energy with the information quality by adjusting the relative weights of the objective functions.

Non-data-aided SNR estimation for QPSK modulation in AWGN channel

Conferences
Salman, T.; Badawy, A.; Elfouly, T.M.; Khattab, T.; Mohamed, A.
2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob),

Signal-to-noise ratio (SNR) estimation is an important parameter that is required in any receiver or communication systems. It can be computed either by a pilot signal data-aided approach in which the transmitted signal would be known to the receiver, or without any knowledge of the transmitted signal, which is a non-data-aided (NDA) estimation approach. In this paper, a NDA SNR estimation algorithm for QPSK signal is proposed. The proposed algorithm modifies the existing Signal-to-Variation Ratio (SVR) SNR estimation algorithm in the aim to reduce its bias and mean square error in case of negative SNR values at low number of samples of it. We first present the existing SVR algorithm and then show the mathematical derivation of the new NDA algorithm. In addition, we compare our algorithm to two baselines estimation methods, namely the M2M4 and SVR algorithms, using different test cases. Those test cases include low SNR values, extremely high SNR values and low number of samples. Results showed that our algorithm had a better performance compared to second and fourth moment estimation (M2M4) and original SVR algorithms in terms of normalized mean square error (NMSE) and bias estimation while keeping almost the same complexity as the original algorithms

On the Performance of Spectrum Sensing Based on GLR for Full-Duplex Cognitive Radio Networks

Conferences
Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly Carla-Fabiana Chiasserini and Daniele Trinchero
Accepted for publication in IEEE Wireless Communications and Networking Conference (WCNC 2016)

Optical Mode Division Multiplexing for Secure Ro-FSO WLANs

Journal Papers
Angela Amphawan, Sushank Chaudhary, Tarek Elfouly, Khalid Abualsaud
Advanced Science Letters, Volume 21, Number 10, October 2015, pp. 3046-3049

The widespread deployment of various wireless radio access systems in public areas poses acute issues in frequency assignment. Radio-over-free-space-optics (Ro-FSO) technology enhances spectral efficiency and may pave the way towards a ubiquitous platform for radio and optical domains without optical fiber in local area networks. This paper investigates the performance of simultaneous optical mode division multiplexing of a donut mode, a Laguerre-Gaussian (LG) mode and two Hermite-Gaussian (HG) modes to realize 4×20 Gbps transmission in a Ro-FSO system under clear weather conditions. The power coupling coefficients, received power, signal-to-noise ratios and constellations and are analyzed.

QUMESH: Wireless mesh network deployment and configuration in harsh environment

Conferences
Romdhani, L.; Mohamed, A.; Elfouly, T.M.; Raeisi, S.
2012 IEEE Wireless Communications and Networking Conference (WCNC)

The link delivery probability in a wireless mesh network is most accurately determined only by experiment, as it depends on many factors, including environment characteristics, transmission power, distance between transmitter and receiver, channel fading, and background noise. This paper provides an insightful framework for characterizing link performance results produced at Qatar University (QU) wireless mesh test-bed under harsh environmental conditions, including heavy buildings structure, mixed indoor/outdoor architecture, weather conditions, and coexistence with high interfering wireless transmission. Indeed, we are interested in looking at the link quality behavior for indoor and outdoor environments. In the outdoor environment, the effect of different weather conditions such as high humidity and sandstorms, which are typical in the Qatari weather, will be analyzed. Regarding the indoor environment, we investigate the effect of unique cell structure, and heavy lab machinery of the engineering building on the link performance. Furthermore, we study different wireless mesh node configurations and equipments’ effect on performance and network connectivity. The causes behind link instability and performance shortcoming of the QU wireless mesh network (QUMESH) are identified. Thus, the content of this paper provides an input for developing the criteria for the test-bed and performing the evaluation of new proposed adaptive mechanisms.

Routing and flow rate assignment using multi-objective optimization in wireless sensor networks

Conferences
Elsersy, M.; Ahmed, M.H.; Abderrazak, A.; Elfouly, T.M.
2015 IEEE Wireless Communications and Networking Conference (WCNC)

Wireless sensor networks (WSNs) have shown to be an efficient solution for physical parameters monitoring and activity detection. WSNs are usually designed using single optimization by optimizing one objective function such as energy consumption taking some constraints into consideration. In multi-objective optimization (MOPT) multiple and often conflicting objectives need to be optimized while satisfying some constraints. This paper proposes MOPT-based routing and flow rate assignment methodologies for WSNs. The first methodology employs Karush-Kuhn-Tucker (KKT) conditions to find the optimal solution, while the second one is based on genetic algorithms (GA). A new formulation is introduced jointly minimize the energy and the delay. Performance metrics such as the average end-to-end delay and energy consumption are evaluated and compared with those of previous work, namely the hybrid geographical routing (HGR) algorithm. The proposed work helps network designers to address design procedures efficiently and increase the flexibility in the energy delay tradeoff for communications in WSNs.

Secret Key Generation Based on Channel and Distance Measurement

Conferences
Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Amr Mohamed, Daniele Trinchero
6th International Congress on Ultra Modern Telecommunications and Control Systems ICUMT, St.Petersburg, Russia on October 6th, 2014, Page(s): 136 – 142

Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key generation algorithm based on two reciprocal physical layer parameters; the channel measurements and the distances between the two communicating nodes. The two parameters are estimated experimentally using implementations of our algorithm on three FPGA-based WARP kits emulating the two communicating nodes and the eavesdropper. The parameters are used as common sources of randomness to generate the secret key. We evaluate the performance of our algorithm through extensive iterations. We compare the bit mismatch rate as well as the entropy of the generated secret key of our algorithm versus classical channel only and distance only based algorithms. Our results reveal that even in the worst case scenarios, our algorithm outperforms the two other algorithms and overcomes their vulnerabilities.

Secret key generation based on channel and distance measurements

Conferences
Badawy, A.; Khattab, T.; Elfouly, T.; Mohamed, A.; Trinchero, D.
2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)

Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key generation algorithm based on two reciprocal physical layer parameters; the channel measurements and the distances between the two communicating nodes. The two parameters are estimated experimentally using implementations of our algorithm on three FPGA-based WARP kits emulating the two communicating nodes and the eavesdropper. The parameters are used as common sources of randomness to generate the secret key. We evaluate the performance of our algorithm through extensive iterations. We compare the bit mismatch rate as well as the entropy of the generated secret key of our algorithm versus classical channel only and distance only based algorithms. Our results reveal that even in the worst case scenarios, our algorithm outperforms the two other algorithms and overcomes their vulnerabilities.

Secure Multiple-Users Transmission Using Multi-Path Directional Modulation

Conferences
Mohammed A. Hafez, Tamer Khattab , Tarek M. Elfouly, Huseyin Arslan
Accepted for publication in IEEE ICC 2016 - Wireless Communications Symposium

Secure Spatial Multiple Access Using Directional Modulation

Journal Papers
2. Mohammed Hafez, Marwan Yusuf, Tamer Khattab, Tarek Elfouly, Hüseyin Arslan
IEEE Transactions on Wireless Communications, Volume 17, issue 1 pages 563-573 January 2018

In this paper, we introduce a secure multiple access scheme, which exploits the multipath structure of the channel to create a multi-user interference environment. The generated interference enables legitimate users to share time and frequency resources over spatially secure communication links. Utilizing directional modulation, we ensure secrecy for legitimate users against eavesdropping while preserving mutual confidentiality between the legitimate users themselves. Moreover, we introduce a complementary scheme for covering the non-selective channel case. The scheme uses directional modulation in coordinated multi-point transmission to provide location-specific secure communication to legitimate users. We characterize the achievable performance using a newly defined metric called vulnerable region. We provide analysis for the achievable secrecy rate, secrecy outage probability, and channel correlation effect on the secrecy performance for the proposed scheme. Furthermore, the effect of the channel spatial diversity, channel estimation error, and the number of legitimate users on the secrecy performance is studied.

TOSSIM and distributed binary consensus algorithm in wireless sensor networks

Journal Papers
Abderrazak Abdaoui, Tarek El-Fouly
Journal of Network and Computer Applications, Volume 41 pages 451 – 458

In this paper, we present distributed binary consensus algorithm over the wireless sensor networks (WSN) in the presence of faulty nodes. We assume that each fault occurs during the execution of an algorithm on a sensor node. With binary consensus, each sensor node, initially, observes one of two states TRUE and FALSE and the aim is to decide which one of the two states was held by the majority of the nodes. The nodes exchange their measurements and each one updates its state according to the state communicated by the last contacted node. We propose the implementation of the distributed binary consensus algorithm in WSN when the network contains t faulty nodes. The implementation was tested on sensor nodes using the TinyOSSimulator (TOSSIM) for a WSN with a large number of nodes. This ensures that the simulation is more close to the real environment. It also guarantees that the code performs correctly when deployed on the physical nodes. In order to evaluate the performance of the distributed system, we consider the analysis of the average convergence time over a simulated environment such as TOSSIM and considering the presence of malicious nodes. These results are presented for a WSN with different topologies such as fully connected, path, ring, Erdos Reny random, and star-shaped.

Unleashing the secure potential of the wireless physical layer: Secret key generation methods

Journal Papers
Ahmed Badawy, Tarek M. Elfouly Tamer Khattab, Amr Mohamed, Mohsen Guizani
Physical Communication Journal, Volume 19 June 2016 pages 1 – 10

Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from eavesdroppers. In this paper, we survey the most recent common sources of randomness used to generate the secret key. We present the steps used to extract the secret key from the estimated common source of randomness. We describe the metrics used to evaluate the strength of the generated key. We follow that with a qualitative comparison between different common sources of randomness along with a proposed new direction which capitalizes on hybridization of sources of randomness. We conclude by a discussion about current open research problems in secret key generation.

Video acquisition between USB 2.0 CMOS camera and embedded FPGA system

Conferences
Abdaoui, A.; Gurram, K.; Singh, M.; Errandani, A.; Chatelet, E.; Doumar, A.; Elfouly, T.
2011 5th International Conference on Signal Processing and Communication Systems (ICSPCS)

In this paper, we introduce the hardware implementation of video acquisition in a sensor node of wireless sensor network with the help of USB 2.0 interface. The USB 2.0 video acquisition is based on the CY7C67300 controller and the DCC1545M image sensor. In this paper, we detail the hardware architecture and the application program design in a sensor node using field-programmable gate array (FPGA) board and USB 2.0 interface. The CY7C67300 controller is the suitable choice for FPGA Virtex 4 and 5 based USB peripherals. A simple interface module capable of transferring data rates above 400 Mbits/s is implemented to communicate with the CY7C67300 controller. In order to use the developed module, in Xilinx embedded design, we provide a custom peripheral which includes the CY767300 interface as its core and additional logic for the connection to the external peripheral controller (EPC) and then the processor local bus (PLB).