• Channel secondary random process for robust secret key generation 

      Badawy A.; Khattab T.; Elfouly T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
    • Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions 

      Shakeri R.; Al-Garadi M.A.; Badawy A.; Mohamed A.; Khattab T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Unmanned aerial vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation ...
    • Estimating the number of sources: An efficient maximization approach 

      Salman T.; Badawy A.; Elfouly T.M.; Mohamed A.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
    • On the Achievable Degrees of Freedom of a Relay Aided X-Channel 

      Abumaali D.; Badawy A.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In this paper, we investigate the effect of a relay on the Degrees of Freedom (DoF) of a single input single output (SISO) X-channel with no channel state information at transmitters (CSIT). In contrast to previous work, ...
    • On the Performance of Quickest Detection Spectrum Sensing: The Case of Cumulative Sum 

      Badawy A.; El Shafie A.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Quickest change detection (QCD) is a fundamental problem in many applications. Given a sequence of measurements that exhibits two different distributions around a certain flipping point, the goal is to detect the change ...
    • Robust secret key extraction from channel secondary random process 

      Badawy A.; Elfouly T.; Khattab T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( John Wiley and Sons Ltd , 2016 , Conference Paper)
      The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
    • Secret key generation based on channel and distance measurements 

      Badawy A.; Khattab T.; ElFouly T.; Mohamed A.; Trinchero D. ( IEEE Computer Society , 2014 , Conference Paper)
      Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...