Ahmed Khattab

Ahmed Khattab
Cairo University | CU · Department of Electronics and Communication Engineering

Professor, SMIEEE
Machine Learning, IoT, VANET, Security, Blockchain, Wireless Networks

About

123
Publications
33,345
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,293
Citations
Additional affiliations
July 2012 - July 2017
Cairo University
Position
  • Professor

Publications

Publications (123)
Article
Full-text available
IoT system becomes a hot topic nowadays for smart home. IoT helps devices to communicate together without human intervention inside home, so it is offering many challenges. A new smart home IoT platform powered using electromagnetic energy harvesting is proposed in this paper. It contains a high gain transmitted antenna array and efficient circular...
Chapter
The olive fruit fly is considered a major threat for olive fruits and may cause damage to up to 100% of the harvested fruit. Olive fruit fly control falls under the generic topic of integrated pest management (IPM). Identifying the presence and the count of the olive fruit fly in time allows IPM to infer the best treatment strategy to be followed t...
Article
Accurate channel model predictions are crucial in mobile communication systems to identify the coverage area of cellular base stations. It also allows network operators to optimally choose the locations of the new sites, solve coverage gap problems and optimize the current network parameters. Current prediction models use ray tracing techniques tha...
Article
Electrocardiogram (ECG) signal compression is a vital signal processing area, especially with the growing usage of wireless body sensor networks (WBSN). ECG signals need to be compressed for efficient storage or transmission. Traditional compression methods acquire the ECG signal and perform compression in the sensors, where most of the computation...
Article
Full-text available
The olive fruit fly can damage up to 100% of the harvested fruit and can cause up to 80% reduction of the value of the resulting olive oil. Therefore, it is important to early detect its presence in the olive orchard to take the appropriate chemical or biological countermeasures as early as possible. Traps filled with attractant pheromones are typi...
Article
Full-text available
While various frameworks for iris recognition have been proposed, most lack efficiency and high speed. A new framework for iris recognition is presented that is both efficient and fast. Feature extraction is performed by extracting Gabor features and then applying supervised locality‐preserving projections with heat kernel weights, which improves t...
Chapter
The Internet of Things (IoT) is one of the most prominent technologies that has recently penetrated in many application domains including smart homes. One of the main challenges in IoT applications is to design low-power systems such that they have prolonged lifetimes or can be powered via the ambient power harvested from the environments they are...
Chapter
The recent exponential growth of the number of connected devices in smart cities is expected to further increase over the next decade. Smart cities exploit the Internet of Things (IoT) technology to create cyber-physical systems. Smart city evolution through the IoT technology brings a new era of smart healthcare, industrial, automotive, security,...
Article
Full-text available
IoT system becomes a hot topic nowadays for smart home. IoT helps devices to communicate together without human intervention inside home, so it is offering many challenges. A new smart home IoT platform powered using electromagnetic energy harvesting is proposed in this paper. It contains a high gain transmitted antenna array and efficient circular...
Article
Full-text available
Vehicular ad‐hoc network (VANET) is a key enabling technology of intelligent transportation systems. VANETs are characterised by the rapidly changing topology and the unbounded network size. These characteristics present a range of challenges to different VANET applications such as routing and security. Clustering has strongly presented itself as a...
Chapter
The rapid increase in the number of smart devices hosting sophisticated applications is significantly affecting the landscape of the information com-munication technology industry. The Internet of Things (IoT) is gaining popularity and importance in man’s everyday life. However, the IoT challenges also increase with its evolution. The urge for IoT...
Article
Full-text available
Joint sparse recovery aims to recover a number of sparse signals having joint sparsity from multiple compressed measurements. Such a problem is finding increasing applications in wireless sensor networks (WSN) and Internet of Things (IoT) where multiple sensors collect measurements. However, existing algorithms lack both reconstruction accuracy and...
Article
In this paper, we develop an IoT-based monitoring system for precision agriculture applications such as epidemic disease control. Such an agricultural monitoring system provides environmental monitoring services that maintain the crop growing environment in an optimal status and early predicts the conditions that lead to epidemic disease outbreak....
Article
Full-text available
Museum contents are vulnerable to bad ambience conditions and human vandalization. Preserving the contents of museums is a duty towards humanity. In this paper, we develop an Internet of Things (IoT)-based system for museum monitoring and control. The developed system does not only autonomously set the museum ambience to levels that preserve the he...
Article
A real-time and calibration-free lane departure warning system algorithm is proposed. The pre-processing stage of the lane departure algorithm is carried out using Gaussian pyramid to smooth the image and reduce its dimensions, which decrease the unnecessary details in the image. A lane detection stage is then developed based on Edge Drawing Lines...
Article
Full-text available
Cognitive radio vehicular ad-hoc networks (CR-VANETs) allow the vehicles to exploit the unused channels in their vicinity to fulfil the bandwidth demands of infotainment applications. Existing CR-VANET approaches aim at incorporating spectrum sensing and reporting to the widely used IEEE 802.11p standard developed for VANETs. However, all such appr...
Article
Full-text available
Scalability and the highly dynamic topology of Vehicular Ad Hoc Networks (VANETs) are the biggest challenges that slow the roll-out of such a promising technology. Adopting an effective VANET clustering algorithm can tackle these issues in addition to benefiting routing, security and media access management. In this paper, we propose a general-purp...
Article
Full-text available
Wireless Sensor Networks have been often used in the context of Greenhouse architectures. In this paper, an architecture is proposed for two Greenhouses based on Networked Control Systems. This architecture is IoT-based and built on top of switched Ethernet and Wi-Fi. Some sensors in the proposed architecture require a one-second real-time deadline...
Article
Full-text available
Wideband spectrum sensing is one of the most challenging components of cognitive radio networks. It should be performed as fast and accurately as possible. Traditional wideband spectrum sensing techniques suffer from the requirement of analog-to-digital converters with very high sampling rates. Compressed sensing has been recently considered as a t...
Article
Even though face recognition is one of the most studied pattern recognition problems, most existing solutions still lack efficiency and high speed. Here, the authors present a new framework for face recognition which is efficient, fast, and robust against variations of illumination, expression, and pose. For feature extraction, the authors propose...
Article
Cognitive Radio Vehicular Ad-hoc Networks (CR-VANETs) exploit cognitive radios to allow vehicles to access the unused channels in their radio environment. Thus, CR-VANETs do not only suffer the traditional CR problems, especially spectrum sensing, but also suffer new challenges due to the highly dynamic nature of VANETs. In this paper, we present a...
Chapter
This chapter presents a comprehensive evaluation of the proposed RBS cryptosystem and compares its performance against the performance of existing lightweight ciphers. An extensive set of simulation experiments is performed to show that the RBS cryptosystem requires less power and area compared to other known symmetric algorithms proposed for RFID...
Chapter
Redundant Bit Security (RBS) is a lightweight symmetric encryption algorithm that targets the resource-constrained RFID devices. Unlike its existing counterparts, RBS simultaneously provide confidentiality, authentication, and integrity of the plaintext by inserting hash-generated redundant bits among the already modified plaintext-data. Using a fl...
Chapter
Radio Frequency IDentification (RFID) technology is challenged by numerous security and privacy threats that render the widespread of such an advantageous technology. The security threats encountered in RFID systems is different from the security threats of traditional wireless systems. This chapter is devoted to survey the existing security threat...
Chapter
The Internet of Things (IoT) is considered as the next generation of science revolution. Conceptually, it is possible to enable Internet connectivity to anything such as cloths, TVs, machines, cars, …, etc. IoT is a futuristic application of Wireless Sensor Network (WSN). The main characteristic of WSNs is that it is an ad-hoc network for enabling...
Chapter
One of the most important factors of a highly secure cryptosystem is its resilience against security attacks. There exists several well known attacks that target RFID systems. Having a lightweight cipher in terms of area and power consumption must not compromise its resilience to such security attacks. Otherwise, the advantages of such a lightweigh...
Chapter
To provide security and privacy in RFID systems, physical solutions are not suitable because of their limitations and disadvantages. Instead, cryptography is an inevitable way to make the RFID technology secure. From a theoretical point of view, standard cryptosystems might be an accurate approach. However, they demand resources far more than those...
Chapter
Radio Frequency IDentification (RFID) is a technology that is being increasingly integrated into many aspects of everyday life. The proliferation of RFID has created a paradigm shift in the way humans, pets, merchandizes, assets, etc., are currently being identified and tracked worldwide. RFID technology utilizes inexpensive wireless RFID chips or...
Article
Full-text available
In this paper, we provide an implementation and thorough performance evaluation of the RFC 6775 opti- mized Neighbor Discovery (ND) protocol. RFC 6775 was developed by the Internet Engineering Task Force (IETF) to standardize IPv6 neighbor discovery over Low power Wireless Personal Area Networks (6LoW- PAN). First, we investigate and analyze the ba...
Conference Paper
Full-text available
The Internet of Things (IoT) has been widely used to interconnect the available medical resources and offer smart, reliable, and effective healthcare service to the elderly people. Health monitoring for active and assisted living is one of the paradigms that can use the IoT advantages to improve the elderly lifestyle. In this paper, we present an I...
Article
Full-text available
Wireless Sensor Networks (WSNs) are widely used in numerous critical applications, and require the network to have a prolonged lifetime and high tolerance to failures. However, the battery-operated sensor nodes used in WSNs cause the network to be resource-constrained. On the one hand, there is a continuous urge to efficiently exploit the WSN energ...
Article
Full-text available
This paper presents an analysis of the security performance and evaluation of the hardware architecture of the redundant bit security (RBS) cryptosystem. RBS is a lightweight symmetric encryption algorithm that targets resource-constrained RFID devices. Unlike the existing cryptosystems, RBS simultaneously provides confidentiality, authentication,...
Book
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of int...
Conference Paper
In this paper, we propose an Energy-Efficient Cluster Head Selection (ECHS) approach for Cognitive Radio Sensor Networks (CRSNs). ECHS achieves energy-efficient clustering while considering the dynamic channel access nature of CRSNs. ECHS is a distributed algorithm in which serving as a cluster head depends on two factors: the channel availability...
Conference Paper
Full-text available
The Internet of Things (IoT) technology is currently shaping different aspects of human life. Precision agriculture is one of the paradigms which can use the IoT advantages to optimize the production efficiency and uniformity across the agriculture fields, optimize the quality of the crops, and minimize the negative environmental impact. In this pa...
Conference Paper
Full-text available
Wireless sensor networks is one of the most promising elements of the Internet-of-Things. Faced with many challenges, energy dissipation and lifetime are among the main performance metrics that require improvement. In this paper, a new hybrid routing protocol is proposed to elongate the lifetime of a sensor network. The proposed hybrid protocol ove...
Conference Paper
Full-text available
In this paper, we propose an Energy-Efficient Cluster Head Selection (ECHS) approach for Cognitive Radio Sensor Networks (CRSNs). ECHS achieves energy-efficient clustering while considering the dynamic channel access nature of CRSNs. ECHS is a distributed algorithm in which serving as a cluster head depends on two factors: the channel availability...
Conference Paper
Full-text available
The Internet of Things (IoT) is connecting relatively low bandwidth sensing devices to the Internet. Given the IoT computational paradigm, applications that touch every aspect of modern life are now rapidly evolving. In order to keep up with the evolving future, a unified real-time, low-power, low-cost, and reliable IoT framework is needed. This pa...
Article
Full-text available
Compressed sensing enables the acquisition of sparse signals at a rate that is much lower than the Nyquist rate. Compressed sensing initially adopted ℓ1 minimization for signal reconstruction which is computationally expensive. Several greedy recovery algorithms have been recently proposed for signal reconstruction at a lower computational complexi...
Article
Full-text available
In this study, the authors tackle the dynamic spectrum access (DSA) problem for primary operators (POs) for long-term evolution-advanced (LTE-A) systems. They propose an auction-based DSA framework that exploits the capabilities of carrier aggregation to efficiently utilise the under-utilised spectrum which varies with time and space. Their propose...
Conference Paper
Incorporating the cognitive radio (CR) concept to cognitive radio wireless sensor networks (CRSNs) allows wireless sensor networks (WSNs) to overcome the spectrum scarcity problem and dynamically access the available channels. However, existing CR channel sensing techniques are not efficient to the energy-constrained WSNs nodes. In this paper, we p...
Article
Wireless Sensor Networks (WSN) have recently become one of the major research areas in the wireless communication field and are implemented in a variety of applications. One of these applications that will be tackled in this paper is monitoring electromagnetic (EM) pollution that is mostly caused by a variety of wireless devices that we use in our...