Browsing by Author "Trinchero D."
Now showing items 1-10 of 10
-
A simple cross correlation switched beam system (XSBS) for angle of arrival estimation
Badawy A.; Khattab T.; Trinchero D.; Elfouly T.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)We propose a practical, simple and hardware friendly, yet novel and efficient, angle of arrival (AoA) estimation system. Our intuitive, two-phases cross-correlation-based system requires a switched beam antenna array with ... -
Advanced experimental setup for the reliability characterization of radio-acoustic sensors in water pipes
Trinchero D.; Stefanelli R.; Kadri A.; Abu-Dayya A.; Khattab T.; Hasna , Mazen... more authors ... less authors ( IEEE , 2011 , Conference Paper)The paper presents the design and construction of a test bench for the analysis and certification of radio-acoustic sensors inside conduits filled with liquids. It is a brand new test-set that integrates the capability to ... -
Channel secondary random process for robust secret key generation
Badawy A.; Khattab T.; Elfouly T.; Chiasserini C.-F.; Mohamed A.; Trinchero D.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ... -
Enabling ICT development with low cost high capacity wireless networks in remote and underdeveloped locations an application to public finance management in Comoros Islands
De La Concepcion A.R.; Hasna , Mazen; Elsayed M.; Stefanelli R.; Trinchero D.; Mohamed K.A.; Mashmoun N.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)The 'Union of the Comoros' is a volcanic archipelago nation in the Indian Ocean, consisting of three islands. About half the population lives below the international poverty line of US$1.25 a day. The interiors of the ... -
Exposure assessment to WiFi access points by simulations and measurements
Elsayed M.; Abdelazid A.F.; Hasna , Mazen; Trinchero D. ( IEEE , 2011 , Conference Paper)This paper discusses two different approaches to assess exposure to indoor WiFi access points at two different frequency bands: 2.4GHz and 5GHz. The first analyzes the electromagnetic propagation in almost empty environments ... -
Innovative ad-hoc wireless sensor networks to significantly reduce leakages in underground water infrastructures
Trinchero D.; Stefanelli R.; Cisoni L.; Kadri A.; Abu-Dayya A.; Hasna , Mazen; Khattab T.... more authors ... less authors ( IEEE , 2010 , Conference Paper)This paper presents an ICT solution to overcome the problem of water dispersion in water distribution networks. Leakage prevention and breaks identification in water distribution networks are fundamental for an adequate ... -
Mobile wireless sensor networks applied to the survey of water infrastructures
Trinchero D.; Cisoni L.; Stefanelli R.; Abu-Dayya A.; Hasna , Mazen; Kadri A.; Khattab T.M.... more authors ... less authors ( IEEE , 2010 , Conference Paper)The paper reports our last advances in the realization of mobile wireless sensor networks (WSNs), able to reveal unknown tracks and leakages within underground pipelines used to distribute water. This WSN technology is ... -
Robust secret key extraction from channel secondary random process
Badawy A.; Elfouly T.; Khattab T.; Chiasserini C.-F.; Mohamed A.; Trinchero D.... more authors ... less authors ( John Wiley and Sons Ltd , 2016 , Conference Paper)The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ... -
Secret key generation based on AoA estimation for low SNR conditions
Badawy A.; Khattab T.; El-Fouly T.; Mohamed A.; Trinchero D.; Chiasserini C.-F.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ... -
Secret key generation based on channel and distance measurements
Badawy A.; Khattab T.; ElFouly T.; Mohamed A.; Trinchero D. ( IEEE Computer Society , 2014 , Conference Paper)Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...