Imran Shafique Ansari

Imran Shafique Ansari
University of Glasgow | UofG · School of Engineering

PhD

About

202
Publications
39,312
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,133
Citations
Introduction
Imran Shafique Ansari currently works at the James Watt School of Engineering, University of Glasgow. Imran does research in Free-Space Optics (FSO), Underwater Communications, Satellite Communications, Physical Layer (PHY) Security (PLS), and Reconfigurable Intelligent Surfaces (RIS) / Intelligent Reflective Surfaces (IRS).
Additional affiliations
February 2005 - January 2009
King Fahd University of Petroleum and Minerals
Position
  • Student
May 2009 - August 2009
Michigan State University
Position
  • Graduate Visiting Student
June 2011 - March 2015
King Abdullah University of Science and Technology
Position
  • PhD Student

Publications

Publications (202)
Preprint
Full-text available
With the advent of sixth-generation networks, reconfigurable intelligent surfaces (RISs) have revolutionized wireless communications through dynamic electromagnetic wave manipulation, thereby facilitating the adaptability and unparalleled control of real-time performance evaluations. This study proposed a framework to analyze the performance of RIS...
Preprint
Full-text available
In the dynamic realm of 6G technology, emphasizing security is essential, particularly for optimizing high-performance communication. A notable strategy involves the use of reconfigurable intelligent surfaces (RISs), an emerging and cost-efficient technology aimed at fortifying incoming signals, broadening coverage, and ultimately improving the ove...
Article
Full-text available
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits critical information to ground users in...
Article
Full-text available
As air-to-ground links tend to exhibit a high probability of being line-of-sight (LoS), unmanned aerial vehicles (UAVs) are widely used to improve the performance of wireless communications. The design of the UAV flight path plays a pivotal role in determining the effectiveness of UAV communication systems. However, the air-to-ground links with a h...
Article
Full-text available
Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback dela...
Article
Full-text available
Unmanned aerial vehicles (UAVs) offer wireless access services to terrestrial users without geographical limitations, making them integral to future communication systems. However, the openness of wireless channels and the mobility of UAVs pose significant security challenges to UAV-based communication systems. This work delves into the security of...
Preprint
Full-text available
In the sixth-generation (6G) Internet of Things (IoT) networks, the use of UAV-mounted base stations and reconfigurable intelligent surfaces (RIS) has been considered to enhance coverage, flexibility, and security in non-terrestrial networks (NTNs). In addition to aerial networks enabled by NTN technologies, the integration of underwater networks w...
Article
Full-text available
This study investigates the impact of imperfect channel state information (CSI), caused by channel estimation errors and feedback delays, on the physical‐layer security performance of multi‐user relay networks. More specifically, a multi‐user untrusted half/full‐duplex (HD/FD) uni/bi‐directional wireless amplify‐and‐forward (AF) relay network is st...
Article
In the realm of the Internet of Things, reconfigurable intelligent surfaces (RISs) have emerged as a pivotal technology, offering unprecedented opportunities to enhance signal quality, coverage, and energy efficiency as part of the ongoing pursuit to overcome the limitations of conventional wireless communication systems. In this context, this arti...
Article
Millimeter-wave (mmWave) communication is one of the effective technologies for the next generation of wireless communications due to the enormous amount of available spectrum resources. Rate splitting multiple access (RSMA) is a powerful multiple access, interference management, and multiuser strategy for designing future wireless networks. In thi...
Article
Full-text available
In this work, a mixed underwater acoustic/optical wireless transmission system under both amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols is proposed. Assuming pointing errors and both heterodyne detection (HD) as well as intensity modulation/direct detection (IM/DD) techniques in the underwater optical link, we deduce the e...
Article
Full-text available
Cyber resilience has become a major concern for both academia and industry due to the increasing number of data breaches caused by the expanding attack surface of existing IT infrastructure. Cyber resilience refers to an organisation’s ability to prepare for, absorb, recover from, and adapt to adverse effects typically caused by cyber-attacks that...
Conference Paper
Full-text available
This study investigates the secrecy performance of a rate-splitting multiple-access system inspired by cognitive radio principles, where the primary user takes on the role of a potential eavesdropper seeking to intercept the secondary user's message. The on-off scheme is utilized to guarantee the transmission of the primary user. We provide closed-...
Article
Full-text available
In this study, physical layer security (PLS) in a dual-hop underwater optical wireless communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links is considered. An intermediate decode-and-forward (DF) relay node between an underwater source and a destination transforms the optical signal in...
Article
Full-text available
Sixth generation (6G) networks must guarantee radio-resource availability for coexisting users and machines. Here, non-orthogonal multiple access (NOMA) can address resource limitations by serving multiple devices on the same spectral and temporal resources. Meanwhile, cooperative relays can mitigate the impact with excessive large- and small-scale...
Article
In the sixth-generation (6G) Internet of Things (IoT) networks, unmanned aerial vehicle (UAV)-mounted base stations and reconfigurable intelligent surfaces (RISs) have been considered key technologies to enhance coverage, flexibility, and security in non-terrestrial networks (NTNs). In addition to aerial networks enabled by NTN technologies, the in...
Preprint
Full-text available
p>Non-orthogonal multiple access (NOMA) has been proposed as an efficient way to support the massive number of users and devices in sixth generation (6G) networks. As the interest for NOMA- based communication has increased in recent years, it is important to analyze the network performance under interference-limited scenarios. In this paper, the d...
Preprint
Full-text available
p>Non-orthogonal multiple access (NOMA) has been proposed as an efficient way to support the massive number of users and devices in sixth generation (6G) networks. As the interest for NOMA- based communication has increased in recent years, it is important to analyze the network performance under interference-limited scenarios. In this paper, the d...
Preprint
Full-text available
p>Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback de...
Preprint
Full-text available
p>Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback de...
Preprint
Full-text available
p>Sixth generation (6G) networks must adopt spectral-efficient communication techniques to ensure massive connectivity for coexisting humans and machines. However, the impact of various practical issues must be analyzed and addressed, including imperfect channel state information (CSI), stemming by the channel estimation error (CEE) and feedback de...
Article
In sixth generation (6 G) networks, a massive number of users and devices must be connected, necessitating flexible resource allocation. In this context, non-orthogonal multiple access (NOMA) has been proposed as a promising technique to enable mass connectivity. This study presents a performance analysis for the impact of co-channel interference (...
Article
Free-space optical (FSO) channels offer line-of-sight wireless communication with high data rates utilizing unlicensed optical spectrum. The hybrid radio frequency (RF)–FSO system is currently receiving a great deal of research interest because atmospheric turbulence prevents enhanced secrecy performance. Except for the double generalized gamma (DG...
Article
Full-text available
In the uplink cognitive radio-inspired non-orthogonal multiple access (CR-NOMA) systems, the successive interference cancellation (SIC) and power control (PC) schemes were designed to enhance the outage performance but they lack the capability of protecting signals from being eavesdropped. This work investigates the secrecy performance of uplink CR...
Article
Full-text available
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make them vulnerable to being wiretapped by malicious e...
Article
Full-text available
In this work, we propose an unmanned aerial vehicle (UAV)-based reconfigurable intelligent surface (RIS)-assisted dual-hop power line communication and radio frequency (PLC-RF) system, in which a UAV-based RIS (URIS) located in the sky forwards signals from the relay to the terrestrial user. More specifically, we assume that the PLC channel suffers...
Article
Full-text available
With the completion of the standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rates, providing secrecy and privacy will be the center of attention by the wireless research community. To support...
Article
Full-text available
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymp...
Preprint
Full-text available
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to t...
Article
The time-reversal division multiple access (TRDMA) system employs multipath channels to realize multi-user transmission via time-reversal filtering. The performance of TRDMA is affected by the correlation among users’ channels. When the correlation is high, inter-user interference (IUI) in the TRDMA system will be serious and the system capacity wi...
Article
Full-text available
The underlay cognitive radio-based hybrid radio frequency/free-space optical (RF/FSO) systems have emerged as a promising technology due to their ability to eliminate spectrum scarcity and spectrum under-utilization problems. The physical layer security of such a network with a primary user, a secondary source, a secondary receiver, and an eavesdro...
Article
Millimeter-wave (mmWave) communication has attracted considerable attention from academia and industry, providing multi-gigabits per second rates due to the substantial bandwidth. Rate splitting multiple access (RSMA) is an effective technology that provides a generalized multiple access framework. Regarding the new propagation characteristics of t...
Preprint
Full-text available
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wirele...
Preprint
Full-text available
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into elect...
Article
Full-text available
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of millimeter wave and sub-THz frequencies. One of these solutions is the utilization of reconfigu...
Article
Full-text available
The reconfigurable intelligent surface (RIS) is widely recognized as an effective solution for enhancing security in wireless communications, owing to its passive reflective components and the ability to adjust signal phases. In light of this, this study investigates the physical layer security issues for a dual-hop RIS-aided system that makes use...
Preprint
Full-text available
With the completion of the standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rates, providing secrecy and privacy will be the center of attention by the wireless research community. To support...
Article
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize t...
Preprint
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized....
Article
The desire to provide global Internet coverage is driving traditional terrestrial networks to evolve towards an integrated space and terrestrial network wherein miniaturized satellites, a.k.a CubeSats, remain at the core. Although both academia and industry are investigating the potential of CubeSats to provide global connectivity, they still fall...
Preprint
Full-text available
The present work proposes analytical solutions for the integral of bivariate Fox H-function in combination with algebraic, exponential, and complementary error functions. In addition, the work also presents the derivative identities with respect to function arguments. Further, the suitability of the proposed mathematical solutions is verified with...
Article
Full-text available
The hybrid combination between underwater optical wireless communication (UOWC) and radio frequency (RF) is a vital demand for enabling communication through the air-water boundary. On the other hand, non-orthogonal multiple access (NOMA) is a key technology for enhancing system performance in terms of spectral efficiency. In this paper, we propose...
Article
Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emissions and electricity expenses of base stations. However, renewable energy is inherently stochastic and intermittent, imposing formidable challenges on reliably satisfying users' time-varying wireless traffic demands. In addition, the probabil...
Preprint
Full-text available
This paper proposes a new scheme to enhance the secrecy performance of a NOMA-based coordinated direct relay transmission system (NOMA-CDRT) with an untrusted relay. The physical-layer network coding and the non-orthogonal multiple access scheme are combined to improve the spectrum efficiency. Furthermore, inter-user interference and friendly jammi...
Preprint
Full-text available
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistical...
Preprint
Full-text available
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eav...
Preprint
Full-text available
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymp...
Article
In this article, we study the secure communication performance of nonorthogonal multiple access (NOMA) communication systems with aerial eavesdroppers. First, the ground-to-ground NOMA communications systems are considered wherein the near user is uniformly distributed in an inner disc and the far user is uniformly distributed in an outer ring with...
Article
This article investigates the secrecy performance of a dual-hop radio frequency-underwater optical wireless communication (RF-UOWC) system. Using stochastic geometry theory, the eavesdroppers are modeled as a Poisson point process distribution, and RF and UOWC links are modeled as Nakagami- $m$ and mixture exponential-generalized gamma distribution...
Article
Full-text available
This paper proposes a new scheme to enhance the secrecy performance of non-orthogonal multiple access (NOMA)-based coordinated direct relay transmission (CDRT) systems with an untrusted relay. The physical-layer network coding (PNC) and the NOMA schemes are combined to improve spectrum efficiency. Furthermore, inter-user interference and friendly j...
Article
Full-text available
Benefiting from the intrinsic convenience, flexibility, low cost, and unmanned aerial vehicles (UAVs) are envisioned to play an important role in future wireless communication systems. However, the limited on-board battery capacities and the broadcast characteristic of air-to-ground wireless channels bring some nonnegligible challenges on achieving...
Preprint
Full-text available
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimi...
Article
Full-text available
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be...
Preprint
Full-text available
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that incl...
Article
In this paper, the physical layer security aspects of a wireless framework over α−κ−μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of S...
Preprint
Full-text available
We present the concept of power HotSpots wherein the bigger satellites in low earth orbits (LEO), having power generation capacity much larger than CubeSats, can transfer their excess energy to CubeSats in need, using optical wireless technology. This provides a business opportunity for larger enterprises having the capability of launching bigger s...
Article
In this paper, the problem of timing error for free-space optical links with high mobility is investigated. In particular, we consider a real scenario in which the sampling clock offset is randomly changing and, in addition, the receiver has no information about the instantaneous channel coefficient as well as instantaneous timing error. Moreover,...
Article
Full-text available
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay’s transmitted optical signal. The RF and FSO links undergo (α-κ-μ)-shadowed fading and unified Málaga...
Preprint
Full-text available
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($\alpha$-$\kappa$-$\mu$)-shadowed fading...
Preprint
Full-text available
In this paper, the physical layer security aspects of a wireless framework over {\alpha}-\k{appa}-{\mu} shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptot...