Imran Shafique AnsariUniversity of Glasgow | UofG · School of Engineering
Imran Shafique Ansari
PhD
About
202
Publications
39,312
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,133
Citations
Introduction
Imran Shafique Ansari currently works at the James Watt School of Engineering, University of Glasgow. Imran does research in Free-Space Optics (FSO), Underwater Communications, Satellite Communications, Physical Layer (PHY) Security (PLS), and Reconfigurable Intelligent Surfaces (RIS) / Intelligent Reflective Surfaces (IRS).
Additional affiliations
February 2005 - January 2009
May 2009 - August 2009
June 2011 - March 2015
Publications
Publications (202)
With the advent of sixth-generation networks, reconfigurable intelligent surfaces (RISs) have revolutionized wireless communications through dynamic electromagnetic wave manipulation, thereby facilitating the adaptability and unparalleled control of real-time performance evaluations. This study proposed a framework to analyze the performance of RIS...
In the dynamic realm of 6G technology, emphasizing security is essential, particularly for optimizing high-performance communication. A notable strategy involves the use of reconfigurable intelligent surfaces (RISs), an emerging and cost-efficient technology aimed at fortifying incoming signals, broadening coverage, and ultimately improving the ove...
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits critical information to ground users in...
As air-to-ground links tend to exhibit a high probability of being line-of-sight (LoS), unmanned aerial vehicles (UAVs) are widely used to improve the performance of wireless communications. The design of the UAV flight path plays a pivotal role in determining the effectiveness of UAV communication systems. However, the air-to-ground links with a h...
Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback dela...
Unmanned aerial vehicles (UAVs) offer wireless access services to terrestrial users without geographical limitations, making them integral to future communication systems. However, the openness of wireless channels and the mobility of UAVs pose significant security challenges to UAV-based communication systems. This work delves into the security of...
In the sixth-generation (6G) Internet of Things (IoT) networks, the use of UAV-mounted base stations and reconfigurable intelligent surfaces (RIS) has been considered to enhance coverage, flexibility, and security in non-terrestrial networks (NTNs). In addition to aerial networks enabled by NTN technologies, the integration of underwater networks w...
This study investigates the impact of imperfect channel state information (CSI), caused by channel estimation errors and feedback delays, on the physical‐layer security performance of multi‐user relay networks. More specifically, a multi‐user untrusted half/full‐duplex (HD/FD) uni/bi‐directional wireless amplify‐and‐forward (AF) relay network is st...
In the realm of the Internet of Things, reconfigurable intelligent surfaces (RISs) have emerged as a pivotal technology, offering unprecedented opportunities to enhance signal quality, coverage, and energy efficiency as part of the ongoing pursuit to overcome the limitations of conventional wireless communication systems. In this context, this arti...
Millimeter-wave (mmWave) communication is one of the effective technologies for the next generation of wireless communications due to the enormous amount of available spectrum resources. Rate splitting multiple access (RSMA) is a powerful multiple access, interference management, and multiuser strategy for designing future wireless networks. In thi...
In this work, a mixed underwater acoustic/optical wireless transmission system under both amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols is proposed. Assuming pointing errors and both heterodyne detection (HD) as well as intensity modulation/direct detection (IM/DD) techniques in the underwater optical link, we deduce the e...
Cyber resilience has become a major concern for both academia and industry due to the increasing number of data breaches caused by the expanding attack surface of existing IT infrastructure. Cyber resilience refers to an organisation’s ability to prepare for, absorb, recover from, and adapt to adverse effects typically caused by cyber-attacks that...
This study investigates the secrecy performance of a rate-splitting multiple-access system inspired by cognitive radio principles, where the primary user takes on the role of a potential eavesdropper seeking to intercept the secondary user's message. The on-off scheme is utilized to guarantee the transmission of the primary user. We provide closed-...
In this study, physical layer security (PLS) in a dual-hop underwater optical wireless communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links is considered. An intermediate decode-and-forward (DF) relay node between an underwater source and a destination transforms the optical signal in...
Sixth generation (6G) networks must guarantee radio-resource availability for coexisting users and machines. Here, non-orthogonal multiple access (NOMA) can address resource limitations by serving multiple devices on the same spectral and temporal resources. Meanwhile, cooperative relays can mitigate the impact with excessive large- and small-scale...
In the sixth-generation (6G) Internet of Things (IoT) networks, unmanned aerial vehicle (UAV)-mounted base stations and reconfigurable intelligent surfaces (RISs) have been considered key technologies to enhance coverage, flexibility, and security in non-terrestrial networks (NTNs). In addition to aerial networks enabled by NTN technologies, the in...
p>Non-orthogonal multiple access (NOMA) has been proposed as an efficient way to support the massive number of users and devices in sixth generation (6G) networks. As the interest for NOMA- based communication has increased in recent years, it is important to analyze the network performance under interference-limited scenarios. In this paper, the d...
p>Non-orthogonal multiple access (NOMA) has been proposed as an efficient way to support the massive number of users and devices in sixth generation (6G) networks. As the interest for NOMA- based communication has increased in recent years, it is important to analyze the network performance under interference-limited scenarios. In this paper, the d...
p>Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback de...
p>Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback de...
p>Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback de...
In sixth generation (6 G) networks, a massive number of users and devices must be connected, necessitating flexible resource allocation. In this context, non-orthogonal multiple access (NOMA) has been proposed as a promising technique to enable mass connectivity. This study presents a performance analysis for the impact of co-channel interference (...
Free-space optical (FSO) channels offer line-of-sight wireless communication with high data rates utilizing unlicensed optical spectrum. The hybrid radio frequency (RF)–FSO system is currently receiving a great deal of research interest because atmospheric turbulence prevents enhanced secrecy performance. Except for the double generalized gamma (DG...
In the uplink cognitive radio-inspired non-orthogonal multiple access (CR-NOMA) systems, the successive interference cancellation (SIC) and power control (PC) schemes were designed to enhance the outage performance but they lack the capability of protecting signals from being eavesdropped. This work investigates the secrecy performance of uplink CR...
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make them vulnerable to being wiretapped by malicious e...
In this work, we propose an unmanned aerial vehicle (UAV)-based reconfigurable intelligent surface (RIS)-assisted dual-hop power line communication and radio frequency (PLC-RF) system, in which a UAV-based RIS (URIS) located in the sky forwards signals from the relay to the terrestrial user. More specifically, we assume that the PLC channel suffers...
With the completion of the standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rates, providing secrecy and privacy will be the center of attention by the wireless research community. To support...
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymp...
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to t...
The time-reversal division multiple access (TRDMA) system employs multipath channels to realize multi-user transmission via time-reversal filtering. The performance of TRDMA is affected by the correlation among users’ channels. When the correlation is high, inter-user interference (IUI) in the TRDMA system will be serious and the system capacity wi...
The underlay cognitive radio-based hybrid radio frequency/free-space optical (RF/FSO) systems have emerged as a promising technology due to their ability to eliminate spectrum scarcity and spectrum under-utilization problems. The physical layer security of such a network with a primary user, a secondary source, a secondary receiver, and an eavesdro...
Millimeter-wave (mmWave) communication has attracted considerable attention from academia and industry, providing multi-gigabits per second rates due to the substantial bandwidth. Rate splitting multiple access (RSMA) is an effective technology that provides a generalized multiple access framework. Regarding the new propagation characteristics of t...
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wirele...
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into elect...
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of millimeter wave and sub-THz frequencies. One of these solutions is the utilization of reconfigu...
The reconfigurable intelligent surface (RIS) is widely recognized as an effective solution for enhancing security in wireless communications, owing to its passive reflective components and the ability to adjust signal phases. In light of this, this study investigates the physical layer security issues for a dual-hop RIS-aided system that makes use...
With the completion of the standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rates, providing secrecy and privacy will be the center of attention by the wireless research community. To support...
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize t...
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized....
The desire to provide global Internet coverage is driving traditional terrestrial networks to evolve towards an integrated space and terrestrial network wherein miniaturized satellites, a.k.a CubeSats, remain at the core. Although both academia and industry are investigating the potential of CubeSats to provide global connectivity, they still fall...
The present work proposes analytical solutions for the integral of bivariate Fox H-function in combination with algebraic, exponential, and complementary error functions. In addition, the work also presents the derivative identities with respect to function arguments. Further, the suitability of the proposed mathematical solutions is verified with...
The hybrid combination between underwater optical wireless communication (UOWC) and radio frequency (RF) is a vital demand for enabling communication through the air-water boundary. On the other hand, non-orthogonal multiple access (NOMA) is a key technology for enhancing system performance in terms of spectral efficiency. In this paper, we propose...
Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emissions and electricity expenses of base stations. However, renewable energy is inherently stochastic and intermittent, imposing formidable challenges on reliably satisfying users' time-varying wireless traffic demands. In addition, the probabil...
This paper proposes a new scheme to enhance the secrecy performance of a NOMA-based coordinated direct relay transmission system (NOMA-CDRT) with an untrusted relay. The physical-layer network coding and the non-orthogonal multiple access scheme are combined to improve the spectrum efficiency. Furthermore, inter-user interference and friendly jammi...
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistical...
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eav...
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymp...
In this article, we study the secure communication performance of nonorthogonal multiple access (NOMA) communication systems with aerial eavesdroppers. First, the ground-to-ground NOMA communications systems are considered wherein the near user is uniformly distributed in an inner disc and the far user is uniformly distributed in an outer ring with...
This article investigates the secrecy performance of a dual-hop radio frequency-underwater optical wireless communication (RF-UOWC) system. Using stochastic geometry theory, the eavesdroppers are modeled as a Poisson point process distribution, and RF and UOWC links are modeled as Nakagami- $m$ and mixture exponential-generalized gamma distribution...
This paper proposes a new scheme to enhance the secrecy performance of non-orthogonal multiple access (NOMA)-based coordinated direct relay transmission (CDRT) systems with an untrusted relay. The physical-layer network coding (PNC) and the NOMA schemes are combined to improve spectrum efficiency. Furthermore, inter-user interference and friendly j...
Benefiting from the intrinsic convenience, flexibility, low cost, and unmanned aerial vehicles (UAVs) are envisioned to play an important role in future wireless communication systems. However, the limited on-board battery capacities and the broadcast characteristic of air-to-ground wireless channels bring some nonnegligible challenges on achieving...
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimi...
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be...
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that incl...
In this paper, the physical layer security aspects of a wireless framework over α−κ−μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of S...
We present the concept of power HotSpots wherein the bigger satellites in low earth orbits (LEO), having power generation capacity much larger than CubeSats, can transfer their excess energy to CubeSats in need, using optical wireless technology. This provides a business opportunity for larger enterprises having the capability of launching bigger s...
In this paper, the problem of timing error for free-space optical links with high mobility is investigated. In particular, we consider a real scenario in which the sampling clock offset is randomly changing and, in addition, the receiver has no information about the instantaneous channel coefficient as well as instantaneous timing error. Moreover,...
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay’s transmitted optical signal. The RF and FSO links undergo (α-κ-μ)-shadowed fading and unified Málaga...
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($\alpha$-$\kappa$-$\mu$)-shadowed fading...
In this paper, the physical layer security aspects of a wireless framework over {\alpha}-\k{appa}-{\mu} shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptot...