Ahmed Refaey Hussein

Ahmed Refaey Hussein
  • Doctor of Philosophy
  • University of Guelph

About

109
Publications
15,304
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,383
Citations
Current institution
University of Guelph
Additional affiliations
January 2015 - present
Western University
Position
  • Professor
Education
May 2007 - May 2011
Université Laval
Field of study
  • Computer Engineering

Publications

Publications (109)
Preprint
Full-text available
Existing network paradigms have achieved lower downtime as well as a higher Quality of Experience (QoE) through the use of Artificial Intelligence (AI)-based network management tools. These AI management systems, allow for automatic responses to changes in network conditions, lowering operation costs for operators, and improving overall performance...
Preprint
Full-text available
Autonomous Vehicles (AVs) represent a transformative advancement in the transportation industry. These vehicles have sophisticated sensors, advanced algorithms, and powerful computing systems that allow them to navigate and operate without direct human intervention. However, AVs' systems still get overwhelmed when they encounter a complex dynamic c...
Preprint
Full-text available
Researchers all over the world are employing a variety of analysis approaches in attempt to provide a safer and faster solution for sharing resources via a Multi-access Edge Computing system. Multi-access Edge Computing (MEC) is a job-sharing method within the edge server network whose main aim is to maximize the pace of the computing process, resu...
Preprint
Full-text available
Autonomous Vehicles (AVs), furnished with sensors capable of capturing essential vehicle dynamics such as speed, acceleration, and precise location, possess the capacity to execute intelligent maneuvers, including lane changes, in anticipation of approaching roadblocks. Nevertheless, the sheer volume of sensory data and the processing necessary to...
Article
The upcoming Sixth Generation (6G) network is projected to grapple with a range of security concerns, encompassing access control, authentication, secure connections among 6G Core (6GC) entities, and trustworthiness. Classical Virtual Private Networks (VPNs), extensively deployed in Evolved Packet Core (EPC) network infrastructure, are notoriously...
Article
Securing Next Generation Networks (NGNs) remains a prominent topic of discussion in academia and industries alike, driven by the rapid evolution of cyber attacks. As these attacks become increasingly complex and dynamic, it is crucial to develop sophisticated security strategies with automated dynamic policy enforcement. In this paper, we propose a...
Article
With ongoing proliferation of wireless networks and dramatic growth of data traffic, offloading cellular network traffic to unlicensed band (UB) enabled new radio (NR) base stations (BSs) becomes one of the critical alternatives to address the radio resource constraint. Due to network densification and reduced small cell coverage, this solution can...
Article
Several zero trust security frameworks were introduced to protect the modern network infrastructures. Among them, the SDP which offers a security perimeter for a network by dividing its control and data plane. Under the SDP framework, a controller and accepting host module must verify and authenticate a legitimate initiating host/clients before gai...
Preprint
Full-text available
The vision of the upcoming 6G technologies, characterized by ultra-dense network, low latency, and fast data rate is to support Pervasive AI (PAI) using zero-touch solutions enabling self-X (e.g., self-configuration, self-monitoring, and self-healing) services. However, the research on 6G is still in its infancy, and only the first steps have been...
Article
Full-text available
The vision of the upcoming 6G technologies, characterized by ultra-dense networks, low latency, and fast data rate, is to support pervasive artificial intelligence (PAI) using zero touch solutions enabling self-X (e.g., self-configuration, self-monitoring, and self-healing) services. However, the research on 6G is still in its infancy, and only the...
Article
With the development of low-cost computer chips and wireless networks, any object or thing can become a component of the Internet of Things (IoT). As a result, these disparate things will gain digital intelligence, enabling them to connect with real-time data and be used for a wide range of valuable and practical IoT applications. However, due to t...
Article
Full-text available
Advanced Indoor Positioning Systems (IPS) based on Received Signal Strength (RSS) fingerprints have been paramount in 6G network research and commercial exploitation due to their costeffectiveness and simplicity. Despite their popularity, the advent of 6G has prompted a shift towards exploring Deep Learning algorithms to further enhance their perfo...
Article
Full-text available
The deployment of mobile systems is facing several challenges. Precisely, the lack of available licensed bands limits the network capacity, affecting the quality of service (QoS). Consequently, there has been significant interest in utilizing the unlicensed spectrum for mobile data traffic. 3GPP proposed and improved the coexistence of LTE and Wi‐F...
Article
Speech classification acceleration using field-programmable gate arrays (FPGAs) is a well-studied field and enables the potential to gain both speed and better energy efficiency over other processor-intensive classifiers. System-on-chip (SoC) architecture allows for an integrated system between programmable logic and processor and for increased ban...
Article
The rapid increase in data traffic is forcing mobile network operators to enhance and expand their network infrastructure to meet the new requirements of customers’ Service Level Agreements (SLA). Network Function Virtualization (NFV) provides abstractions of core network functions from the vendor-specific hardware. This allows the network function...
Article
Full-text available
The efficient administration of network resources in Multi-Access Edge Computing (MEC) is an active research topic these days. Task sharing, in particular, is one of the fundamental problems regarding MEC architectures although the existing literature approaches the topic mostly from the mobile user point of view. In this article, we present the ch...
Article
Full-text available
This work presents a novel drift-aware approach to multivariate time series modeling in the nonstationary industrial Internet of Things (IIoT) environments. The three-layered three-state (TriLS) system enables cooperation between the gateway and the cloud towards the timely adjustment of a lightweight predictive model. The concept drift is detected...
Article
Full-text available
In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core networks and a variety of scaling solutions have been proposed that rely on horizontal scaling or vertical scaling. These solutio...
Article
Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day’s life. The heterogeneous nature of IoT devices and the complex use scenarios make it hard to build secure and private IoT systems. Physical-Layer Security (PLS) can lead to efficient solutions reducing the impact of the i...
Article
The rapid increase of mobile devices requires more network capacity as limited licensed spectrum is diminishing access to long-term evolution (LTE) users. As increasing licensed spectrum becomes costly, a cost-effective solution that improves network capacity is needed. Another overlooked issue is spectrum efficiency, where unused resources could b...
Article
This article proposes the manifold alignment algorithm, followed by learning models for prediction in indoor localization within intelligent systems. Processing data to and from multiple data sets can lead to increased time complexity and a greater demand for disk space and memory if the system is not properly scaled. Herein, the proposed manifold...
Article
In the context of Multi-access Edge Computing (MEC), the task sharing mechanism among edge servers is an activity of vital importance for speeding up the computing process and thereby improving the user experience. The distributed resources in the form of edge servers are expected to collaborate with each other in order to boost overall performance...
Preprint
Full-text available
The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing to the extent that it is starting to affect the performance. Recently, Tor's resource allocation among circuits has been studied...
Article
Full-text available
The COVID-19 pandemic has resulted in unprecedented challenges to global society and the healthcare system in particular. The main objective of this article is to introduce an end-to-end Internet of Things (IoT) ecosystem for healthcare that uses an open source hardware and interoperable IoT standard for eHealth monitoring in general, and COVID-19...
Conference Paper
Full-text available
Internet of Things (IoT) allows households to have real-time access to various services such as IP cameras for monitoring home security, automatic climate controls, doors and window access for family members including pets, mood-based home lighting, or automatic refrigerators that tell what item is going to expire at what time, etc. However, IoT ha...
Article
The proliferation of the IoT in connected society is rapidly expanding into vertical industry sectors due to the ever-increasing ties amongst businesses and economies. As the number of IoT nodes utilized in a network increases, decentralized network infrastructure, and security provisioning mechanisms, primarily enabled by blockchain-based technolo...
Preprint
Full-text available
The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70\% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several challenges such as security, latency, scalability, and quality of service, for which reason Edge Computing or Fog Computing ha...
Article
Welcome to a Special Issue of the IEEE Canadian Journal of Electrical and Computer Engineering, which presents some of the top articles (in extended form) from the Canadian Conference of Electrical and Computer Engineering (CCECE 2019) held in Edmonton, AB, Canada, May 5–8, 2019. This conference was hosted by the Northern Canada Section, with four...
Preprint
Full-text available
In the context of Multi-access Edge Computing (MEC), the task sharing mechanism among edge servers is an activity of vital importance for speeding up the computing process and thereby improve user experience. The distributed resources in the form of edge servers are expected to collaborate with each other in order to boost overall performance of a...
Preprint
Full-text available
The future of healthcare systems is being shaped by incorporating emerged technological innovations to drive new models for patient care. By acquiring, integrating, analyzing, and exchanging medical data at different system levels, new practices can be introduced, offering a radical improvement to healthcare services. This paper presents a novel sm...
Article
Full-text available
The future of healthcare systems is being shaped by incorporating emerged technological innovations to drive new models for patient care. By acquiring, integrating, analyzing, and exchanging medical data at different system levels, new practices can be introduced, offering a radical improvement to healthcare services. This article presents a novel...
Article
The rapid increase in global IP traaffic and the adoption of mobile devices have challenged network service providers to scale and improve infrastructure to meet this new demand. To improve return on investment for scaling networking infrastructure and capitalize on advancements in virtualization technologies, Network Function Virtualization (NFV) h...
Article
Full-text available
In this work, we propose a novel sidechain structure via optimized two-way peg protocol for the device authentication in smart community in order to overcome the limitations of existing approaches. The proposed scheme uses private side blockchains to distribute and manage the local registration and authentication processes, in addition to a local m...
Article
In this paper, a novel pseudorandom key chaining (PRKC) algorithm is introduced and evaluated. This lightweight symmetric scheme enables a transmission-triggered time-variation of group keys in low-power wireless networks during broadcasting or multicasting. The proposed algorithm uses pseudorandom (PR) sequences, generated at the physical layer (P...
Article
Full-text available
In this paper, we study the robustness of the proposed watermarking algorithm by Al-Nuaimy et al. (Digit Signal Process 21(6):764–779 2011) for audio signals which is based on singular value decomposition (SVD). It has been concluded that it is fundamentally flawed in its design, in that it falls to two ambiguity attacks where the extracted waterma...
Article
As a technology foundation of cryptocurrencies, blockchain enables decentralized peer-to-peer trading through consensus mechanisms without the involvement of a third party. Blockchain has been regarded as an auspicious technology for future cellular networks. It is able to provide solutions to problems related to mobile operators and user trust, em...
Article
Full-text available
In this work, the software‐defined perimeter (SDP) is considered for the Message Queuing Telemetry Transport (MQTT) protocol framework in the Internet of Things (IoT) applications. In fact, the SDP provides an additional layer of security with or without SSL/TLS by replacing the traditional login method (username/password) with a single‐packet auth...
Article
Full-text available
The widespread adoption and evolution of Software Defined Networking (SDN) have enabled the service providers to successfully simplify network management. Along with the traffic explosion, there is decreasing CAPEX and OPEX as well as an increase in the average revenue per user. However, this wide adoption of SDNs is posing real challenges and conc...
Article
Full-text available
The boom in the evolution and adoption of new technologies, architectures, and paradigms such as cloud computing, SDN, and NFV in recent years has led to a new set of security and privacy challenges and concerns. These challenges/ concerns include proper authentication, access control, data privacy, and data integrity, among others. SDP has been pr...
Preprint
Full-text available
As a technology foundation of cryptocurrencies, blockchain enables decentralized peer-to-peer trading through consensus mechanisms without the involvement of a third party. Blockchain has been regarded as an auspicious technology for future cellular networks. It is able to provide solutions to problems related to mobile operators and user trust, em...
Conference Paper
In recent years, there has been great interest in utilizing the unlicensed spectrum for mobile data traffic, as deployment of mobile systems are facing severe challenges due to licensed spectrum scarcity. Increasing the bandwidth is a possible solution to increasing the network capacity, however, the licensed spectrum is limited and can be very cos...
Article
Full-text available
In this paper, a fingerprint image encryption algorithm is proposed in order to enhance the protection of fingerprint-based systems against replay attacks. The proposed algorithm is consisting of permutation and diffusion operations in wavelet domain, whereas, one-level Lifting Wavelet Transform Integer-to-Integer is performed to the original finge...
Article
Full-text available
Wireless Network Virtualization (WNV) and Cloud Radio Access Networks (CRAN) are promising technologies with the potential to be game changing for the fifth generation (5G) wireless networks. In particular, these technologies may have significant impact on the capital expenditure, quality of service (QoS) provisioning, as well as spectral efficienc...
Article
Cloud computing provides on-demand IT services via large distributed datacenters over high-speed networks. Virtualization, a key cloud computing technology, allows service providers to offer computing services in cloud environments without platform compatibility discrepancies. The recent proliferation of cloud computing has rekindled interest in ne...
Article
Full-text available
In this paper, it is shown that there is a fundamental flaw in the paper entitled ”A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition” by Agoyi et al. (Agoyi et al., 2015). The algorithm has watermark ambiguity problem and could not be used as copyright protection and content authentica...
Article
In the paper entitled “A robust color image watermarking with singular value decomposition method” (Dogan et al., 2011), a robust digital image watermarking algorithm based on singular value decomposition for multi-modal biometric color face and iris images has been proposed. This comment shows that this proposed method has some defects and limits,...
Article
Full-text available
In the recent paper entitled “Homomorphic image watermarking with a singular value decomposition algorithm” by Abdallah et al., a homomorphic image watermarking using a singular value decomposition is presented. This comment shows that this watermarking scheme is fundamentally flawed in that the extracted watermark is not the embedded watermark but...
Article
Radio access networks empowered by CRAN is a new design paradigm that is drawing the attention of many researchers today to tackle the growing complexity of provisioning broadband wireless services. Because of the need to provide high data rates and better coverage simultaneously, operators are maintaining heterogeneous networks with cells of vario...
Article
Full-text available
Among emergent applications of digital watermarking, owner identification, proof of ownership and transaction tracking are applications that protect data by embedding the owner's information (watermark) in it. Recently, a robust image watermarking scheme based on discrete wavelet transform, discrete cosine transform and singular value decomposition...
Conference Paper
Full-text available
In a non-cooperative context such as military or spectrum surveillance application, a passive adversary has to solve the problem of estimating the transmitter parameters. In addition, wireless systems cause signaling overhead since their transmitter must inform the receiver about the chosen bit allocation table or the Forward Error Correction (FEC)...
Article
Full-text available
The inherent properties of channel impulse response (CIR), which are considered as location-specific characteristics of the physical link, have been exploited for the authentication purpose at the physical layer in the wireless communications. Unfortunately, the reliability of CIR-based physical layer authentication is challenged by the noise prese...
Article
Full-text available
A novel physical layer authentication scheme is proposed in this paper by exploiting the time-varying carrier frequency offset (CFO) associated with each pair of wireless communications devices. In realistic scenarios, radio frequency oscillators in each transmitter-and-receiver pair always present device-dependent biases to the nominal oscillating...
Conference Paper
The dynamic nature of traffic over Internet protocol (IP) networks often induce high end-to-end latency and packet loss rate. These problems hamper the Quality of Service (QoS) of various conventional and emerging applications over Internet. In order to mitigate these challenges and improve the network efficiency, an adaptive compression technique...
Conference Paper
In cooperative communications, spatial channel diversity introduced by scattered locations of cooperating nodes can be exploited to enhance transmission security. In this paper, we propose a secure cooperative orthogonal frequency division multiplexing (OFDM) transmission scheme with the help of multiple relay nodes. For each relay, the wireless ch...
Conference Paper
The applicability of the Viterbi add-compare-select (ACS) functional block to both convolutional and LDPC codes in various parallel implementations is investigated. To this end, a trellis representation for arbitrary LDPC codes must first be established. Then, a high-level architecture for a Viterbi-algorithm-based unified decoder is proposed. An i...

Network

Cited By