A. S. M. Badrudduza

A. S. M. Badrudduza
Rajshahi University of Engineering & Technology · Department of Electronics & Telecommunication Engineering

Masters of Engineering

About

62
Publications
7,961
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
318
Citations
Citations since 2017
62 Research Items
318 Citations
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
2017201820192020202120222023020406080100120140
Introduction
A. S. M. Badrudduza has received his B. Sc and M. Sc in EEE from RUET in 2016 and 2019, respectively. He is now working as an assistant professor in the Dept. of ETE, RUET since 30 June, 2020. His research interest includes information-theoretic security in multicast, cellular and cooperative networks, physical layer security of RF/FSO and NOMA systems etc.
Additional affiliations
June 2020 - present
Rajshahi University of Engineering & Technology
Position
  • Professor (Assistant)
July 2017 - June 2020
Rajshahi University of Engineering & Technology
Position
  • Lecturer
August 2016 - July 2017
Bangladesh Army University of Engineering & Technology
Position
  • Lecturer

Publications

Publications (62)
Preprint
Full-text available
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wirele...
Preprint
Full-text available
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into elect...
Conference Paper
The aim of this research is to develop a graphene based multiband wearable antenna for biotelemetry and IoT applications with a very narrow bandwidth of 91.954 MHz, and 135.01 MHz which are highly demandable now-a-days due to the low cost, high stability and well flexibility of this material. For this purpose, a coplanar waveguide (CPW) fed antenna...
Article
Full-text available
The underlay cognitive radio-based hybrid radio frequency/free-space optical (RF/FSO) systems have emerged as a promising technology due to their ability to eliminate spectrum scarcity and spectrum under-utilization problems. The physical layer security of such a network with a primary user, a secondary source, a secondary receiver, and an eavesdro...
Preprint
Full-text available
With the completion of the standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rates, providing secrecy and privacy will be the center of attention by the wireless research community. To support...
Article
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize t...
Article
Full-text available
This paper deals with the secrecy performance analysis of a multicast network over mixed fading scenarios in which a cluster of passive eavesdroppers is trying to overhear the secret transmission. Our key contribution is to prevent this malicious attack of the illegitimate receivers. Rayleigh/ Rician mixed fading channels are considered to model al...
Article
Full-text available
Abstract In this era of 5G technology, the ever‐increasing demands for high data rates lead researchers to develop hybrid satellite‐terrestrial (HST) networks as a substitution to the conventional cellular terrestrial systems. Since an HST network suffers from a masking effect which can be mitigated by adopting the terrestrial relaying strategy, in...
Preprint
Full-text available
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimi...
Preprint
Full-text available
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bu...
Article
Full-text available
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bu...
Article
Full-text available
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be...
Article
Full-text available
Through ordinary transmissions over wireless multicast networks are greatly hampered due to the simultaneous presence of fading and shadowing of wireless channels, secure transmissions can be enhanced by properly exploiting random attributes of the propagation medium. This study focuses on the utilization of those attributes to enhance the physical...
Preprint
Full-text available
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that incl...
Article
In this paper, the physical layer security aspects of a wireless framework over α−κ−μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of S...
Article
Full-text available
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay’s transmitted optical signal. The RF and FSO links undergo (α-κ-μ)-shadowed fading and unified Málaga...
Preprint
Full-text available
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($\alpha$-$\kappa$-$\mu$)-shadowed fading...
Preprint
Full-text available
In this paper, the physical layer security aspects of a wireless framework over {\alpha}-\k{appa}-{\mu} shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptot...
Conference Paper
Device to Device (D2D) communication is going to be a promising wireless technology for 5G communication and beyond. So the security aspect of the D2D communication system has been the center of research for quite some time. Since Fisher Snedecor $\mathcal{F}$ fading channel is widely used to characterize the D2D communication scenarios, in this wo...
Preprint
Full-text available
The secrecy of wireless multicast networks is greatly hampered due to the simultaneous presence of fading and shadowing, which can be enhanced using random attributes of the propagation medium. This work focuses on utilizing those attributes to enhance the physical layer security (PHY security) performance of a dual-hop wireless multicast network o...
Preprint
Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is...
Preprint
Full-text available
In this era of 5G technology, the ever-increasing demands for high data rates lead researchers to develop hybrid satellite-terrestrial (HST) networks as a substitution to the conventional cellular terrestrial systems. Since an HST network suffers from a masking effect which can be mitigated by adopting the terrestrial relaying strategy, in this wor...
Preprint
Full-text available
With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the...
Preprint
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be...
Article
Full-text available
Increasing concerns regarding wireless systems’ security are leading researchers to exploit the physical properties of a medium while designing any secured wireless network. The secrecy performance of a mixed radio frequency-free space optical (RF-FSO) system with a variable gain relaying scheme is investigated in this paper under the attempt of wi...
Article
Full-text available
For a secure communication over Radio Frequency-Free Space Optical (RF-FSO) mixed link, a significant enhancement of secrecy capacity (SC) can be achieved via exploiting spatial diversity at the RF path. But besides atmospheric turbulence and pointing error of FSO link, practical multi-antenna systems experience correlation between the antennas at...
Conference Paper
The confidentiality of wireless multicast network is notably compromised by the concurrent existence of shadowing and fading. To overcome this security threat, mathematical modeling of a multicast scenario is proposed in this paper over κ−μ/ inverse gamma (IG) composite fading channel where transmitted confidential information from source is under...
Article
Full-text available
With the rapid evolution of communication technologies, high-speed optical wireless applications under the water surface as a replacement or complementary to the conventional radio frequency (RF) and acoustic technologies are attracting significant attention from the researchers. Since underwater turbulence (UWT) is an inevitable impediment for a l...
Article
We consider a confidential wireless multicasting scenario in which a base station sends a common stream of information to a group of U users via K relays. V eavesdroppers are trying to decode that confidential information. We are interested to protect the decoding of that information and to see, how the opportunistic relaying can be used to enhance...
Article
Full-text available
In this paper, we investigate a secure dual-hop radio frequency-free space optical (RF-FSO) mixed variable gain relaying framework in the presence of a single eavesdropper. The RF and FSO links are modeled with hyper Gamma (HG) and Gamma-Gamma (ΓΓ) fading channels, respectively. We assume that the eavesdropper utilizes another HG fading channel to...
Conference Paper
This paper deals with a secure satellite-terrestrial multicast framework over shadowed Rician fading channel, where a satellite communicates with legitimate receivers in the appearance of several eavesdroppers. Our main aim focuses on the protection of this multicast messages from wiretapping. The secrecy performance is analyzed by deriving express...
Conference Paper
As the variation of the fading signal can be modeled at a very small scale using α-η-µ fading channel, this paper concentrates on the security performance analysis over the α-η-µ fading multicast channel considering the presence of multiple eavesdroppers. The performance metrics of probability of nonzero secrecy multicast capacity (PNSMC) and secur...
Conference Paper
Full-text available
Secrecy performance of realistic wireless multicast scenarios are significantly deteriorated by simultaneous occurrence of multipath and shadowing which are modeled using composite fading channels. To resolve this security threat, in this paper a framework is proposed where a source transmits private multicast messages to multiple receivers over η...
Conference Paper
This paper focuse on the secrecy performance analysis over correlated κ - µ shadowed fading multicast channels considering a single input multiple output (SIMO) scenario. The proposed network consists of a single antenna source, and multiple receivers and eavesdroppers which are equipped with multiple antennas. The security analysis has been perfor...
Conference Paper
The secrecy performance analysis over the channels is done at the physical layer to assure the confidentiality of data. In this paper, the information-theoretic security over Hyper-Gamma fading channel is investigated by constructing a single-source multiple-receiver structure in which several number of eavesdroppers are trying to overhear the tran...
Article
Full-text available
The emergence of an array of new wireless networks has led researchers to evaluate the prospect of utilizing the physical properties of the wireless medium in order to design secure systems. In this paper, the physical layer secrecy performance of a mixed radio frequency-free space optical (RF-FSO) system with variable gain relaying scheme is inves...
Article
Full-text available
Educational data mining (EDM) is an emerging interdisciplinary research area concerned with analyzing and studying data from academic databases to better understand the students and the educational settings. In most of the Asian countries, it is a challenging task to perform EDM due to the diverse characteristics of the educational data. In this st...
Conference Paper
Images containing speckle noise are difficult to de-noise since the noise is multiplicative in nature. In this paper an efficient procedure is introduced to effectively eliminate speckle noise from an image and improving the visual quality of the image. The proposed method works with the Speckle Reducing Anisotropic Diffusion (SRAD) in combination...
Conference Paper
This paper is concerned with the study of a secure wireless multicasting communication through a Rayleigh fading dual-hop network consisting of a single user in the presence of multiple eavesdroppers. Since co-operative relaying network is becoming more popular to offer spatial diversity to single antenna systems and thus provide a reliable secure...

Questions

Questions (3)
Question
We know that the eavesdroppers are malicious nodes and they are not supposed to cooperate with the users. If we exploit opportunistic relaying protocol for the destination, can we consider the same protocol for the eavesdropper? If so, then how the CSI of the eavesdropper can be estimated at the relay?
Question
Wireless channels may be constantly and exponentially correlated (I'm interested about antenna correlation only). Actually what is the difference between these two correlations?
Question
I want to generate a Rician-k fading SIMO channel in MATLAB to compare the analytical results with Monte-Carlo Simulation for various values of K (Rician factor).

Network

Cited By

Projects

Projects (5)
Project
With the rapid deployments of UAV systems, the security concerns of UAVs are attracting the attention of the research communities since eavesdroppers try to attack UAVs to achieve a certain purpose. This project aims at analyzing the secrecy threats on the UAV networks based on physical layer security approach.
Project
Reconfigurable Intelligence Surface (RIS) is the man-made surface of electromagnetic (EM) material and can be electronically controlled with integrated electronics. Recently RISs received considerable research attention due to their unique capability of converting propagation environments into smart ones. The main goal of this project is to analyze the PLS challenge of RIS-aided networks since it will be a key technology in future wireless systems.
Project
Recently, optical wireless communication (OWC) is growing interest for short-range communication. In such a communication scenario unguided visible, infrared (IR), or ultraviolet (UV) light is used to carry a signal. The aim of this project is to analyze the secrecy behavior of various OWC networks, e.g., free-space optical (FSO) networks, underwater optical (UWO) networks, visible light communication (VLC) networks, etc.