Furqan Zia | Université du Québec à Trois-Rivières (original) (raw)

Papers by Furqan Zia

Research paper thumbnail of Secrecy and Resilience in Next-Gen Wi-Fi: Exploring a Multi-User Down-Link Non-Orthogonal Transmission Framework

Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expan... more Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expanded coverage, robustness, and enhanced communication security. A major challenge in current and future Wi-Fi communication is preventing eavesdroppers from intercepting live transmissions and ensuring enhanced communication secrecy. The non-orthogonal multiple access (NOMA) scheme has emerged as a potential candidate for future Wi-Fi communication. This is attributed to its notable characteristic of serving multiple users simultaneously on the same time/frequency resources. In this work, my motivation is to propose a novel NOMA transmission scheme that can serve multiple users without any information leakage to an internal or external eavesdropper. My proposed NOMA transmission scheme utilizes physical layer security (PHY) and is less complex, more efficient, and more robust than the conventional power domain NOMA (PD-NOMA) transmission. PD-NOMA suffers from various drawbacks, such as the use of successive interference cancellation (SIC), which demands power sharing among users and has a high probability of information leakage.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secrecy and Resilience in Next-Gen Wi-Fi: Exploring a Multi-User Down-Link Non-Orthogonal Transmission Framework

IEEE Intermountain Engineering, Technology and Computing (IETC), 2024

Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expan... more Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expanded coverage, robustness, and enhanced communication security. A major challenge in current and future Wi-Fi communication is preventing eavesdroppers from intercepting live transmissions and ensuring enhanced communication secrecy. The non-orthogonal multiple access (NOMA) scheme has emerged as a potential candidate for future Wi-Fi communication. This is attributed to its notable characteristic of serving multiple users simultaneously on the same time/frequency resources. In this work, my motivation is to propose a novel NOMA transmission scheme that can serve multiple users without any information leakage to an internal or external eavesdropper. My proposed NOMA transmission scheme utilizes physical layer security (PHY) and is less complex, more efficient, and more robust than the conventional power domain NOMA (PD-NOMA) transmission. PD-NOMA suffers from various drawbacks, such as the use of successive interference cancellation (SIC), which demands power sharing among users and has a high probability of information leakage.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Overview of Security Issues in Cognitive Radio Ad Hoc Networks

Advances in systems analysis, software engineering, and high performance computing book series, Jun 30, 2023

Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combine... more Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combines the advantages of cognitive radio networks and mobile ad hoc networks. This chapter starts with an overview of various research issues of CRAHN along with representative solutions for these research issues. Among the various research issues presented, security is discussed in detail due to its prime importance. A review of existing literature reveals that not much work on security has been reported for cognitive radio networks. Specifically, an overview of security issues in CRAHN, presented in this article, is a novel work of this kind. A major part of this article highlights the importance of security in CRAHN and presents an overview of major security issues and the solutions proposed to address these issues in CRAHN.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced Non-Orthogonal Multiple Access Security Technique for Future Wireless Communication Networks

RS Open Journal on Innovative Communication Technologies, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-cell, Multi-user, and Multi-carrier Secure Communication Using Non-Orthogonal Signals’ Superposition with Dual-Transmission for IoT in 6G and Beyond

RS Open Journal on Innovative Communication Technologies, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design and Fabrication of Parallel Hybrid Car

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced Non-Orthogonal Multiple Access Security Technique for Future Wireless Communication Networks

RS Open Journal on Innovative Communication Technologies, 2020

The future wireless communication systems demand much more enhanced security and reliability comp... more The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. The conventional NOMA was previously adopted under the name of multiuser superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation. In this work, we analyze the drawbacks in conventional NOMA and present a new kind of NOMA with more improved performance metrics. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission usin...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-cell, Multi-user, and Multi-carrier Secure Communication Using Non-Orthogonal Signals' Superposition with Dual-Transmission for IoT in 6G and Beyond

RS Open Journal on Innovative Communication Technologies, 2021

Considering the advancements of the internet of things (IoT) in 6G and beyond communications , da... more Considering the advancements of the internet of things (IoT) in 6G and beyond communications , data transmission security in IoT devices has received extensive interest because of their significant features, such as low computational complexity, led by low power requirements. In such devices, the conventional cryptographic techniques may fail to provide secure communication. To fight this drawback, physical layer security (PLS) has remarkable potential to provide security solutions suitable for such applications. In this work, a highly effective PLS technique is proposed for providing secure communication against external and internal eavesdroppers in a downlink multi-cell, multiuser , and multi-carrier IoT communication system. In our proposed system, we considered two base stations, where each base station uses a single radio frequency (RF) chain to link two antennas that are used for the transmission of data. Further, we transmit the data in two rounds, and each round of transmission occurs through a single active antenna of each base station. A different antenna is used for each round of transmission to communicate with two single antenna IoT devices/users in the presence of a passive eavesdropper. In the proposed algorithm, frequency selective channel-based pre-coder matrices and the dual transmission approach are jointly employed. The dual-transmission is performed simultaneously from two base stations to provide security against internal and external eavesdroppers. The proposed system is suitable for IoT-based applications. Also, the potential capabilities of our proposed algorithm are proved by extensive mathematical and simulation analysis.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MANUFACTURING AND DESIGNING OF PARALLEL HYBRID CAR

This report presents a detailed description of the design, simulation, modelling and implementati... more This report presents a detailed description of the design, simulation, modelling and implementation of practically designed and manufactured low- budget Parallel Hybrid Car. The novel design of this car helps in reducing fuel consumption with better performance and efficiency than the conventional hybrid vehicles. The idea of this project was proposed and implemented by the engineering students of DHA Suffa University, Pakistan. The motive behind this project is to cope with the modern world technology and demonstrate this concept in which the low-cost car is fuel-efficient and environment-friendly, capable of generating electricity for itself and preserving the environment from deadly carbon-monoxide to overcome the hazards of global warming. This project proposes a novel design of a hybrid car where the car is capable of propelling by an electric motor or internal combustion engine. The novel concept for combining the benefits of both these sources, which is more efficient in performance than the conventional vehicles is also provided in this detailed report.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced Non-Orthogonal Multiple Access Security Technique for Future Wireless Communication Networks

RS Open Journal on Innovative Communication Technologies, 2020

The future wireless communication systems demand much more enhanced security and reliability comp... more The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. The conventional NOMA was previously adopted under the name of multiuser superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation. In this work, we analyze the drawbacks in conventional NOMA and present a new kind of NOMA with more improved performance metrics. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive analysis and numerical simulations.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced NOMA Security Technique for Future Wireless Communication Networks

Workshop on Information and Communications technologies, International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 17-19 Sep., 2020

The future wireless communication systems demand enhanced security and reliability than the curre... more The future wireless communication systems demand enhanced security and reliability than the current systems. In this work, we propose a more simple yet efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) system. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. As conventional NOMA was already adopted under the name of multi-user superposition transmission (MUST) in release 13 of 3GPP and is improved in terms of receiver design for 3GPP-release 16, which still suffers from several security risks and drawbacks. In this work, we have analyzed these drawbacks and presented a new kind of NOMA with better performance results in cases where conventional NOMA fails. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive numerical simulations.

Bookmarks Related papers MentionsView impact

Books by Furqan Zia

Research paper thumbnail of An Overview of Security Issues in Cognitive Radio Ad Hoc Networks

An Overview of Security Issues in Cognitive Radio Ad Hoc Networks, 2023

Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combine... more Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combines the advantages of cognitive radio networks and mobile ad hoc networks. This chapter starts with an overview of various research issues of CRAHN along with representative solutions for these research issues. Among the various research issues presented, security is discussed in detail due to its prime importance. A review of existing literature reveals that not much work on security has been reported for cognitive radio networks. Specifically, an overview of security issues in CRAHN, presented in this article, is a novel work of this kind. A major part of this article highlights the importance of security in CRAHN and presents an overview of major security issues and the solutions proposed to address these issues in CRAHN.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secrecy and Resilience in Next-Gen Wi-Fi: Exploring a Multi-User Down-Link Non-Orthogonal Transmission Framework

Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expan... more Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expanded coverage, robustness, and enhanced communication security. A major challenge in current and future Wi-Fi communication is preventing eavesdroppers from intercepting live transmissions and ensuring enhanced communication secrecy. The non-orthogonal multiple access (NOMA) scheme has emerged as a potential candidate for future Wi-Fi communication. This is attributed to its notable characteristic of serving multiple users simultaneously on the same time/frequency resources. In this work, my motivation is to propose a novel NOMA transmission scheme that can serve multiple users without any information leakage to an internal or external eavesdropper. My proposed NOMA transmission scheme utilizes physical layer security (PHY) and is less complex, more efficient, and more robust than the conventional power domain NOMA (PD-NOMA) transmission. PD-NOMA suffers from various drawbacks, such as the use of successive interference cancellation (SIC), which demands power sharing among users and has a high probability of information leakage.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secrecy and Resilience in Next-Gen Wi-Fi: Exploring a Multi-User Down-Link Non-Orthogonal Transmission Framework

IEEE Intermountain Engineering, Technology and Computing (IETC), 2024

Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expan... more Next-generation Wi-Fi communication necessitates improved spectral efficiency, low latency, expanded coverage, robustness, and enhanced communication security. A major challenge in current and future Wi-Fi communication is preventing eavesdroppers from intercepting live transmissions and ensuring enhanced communication secrecy. The non-orthogonal multiple access (NOMA) scheme has emerged as a potential candidate for future Wi-Fi communication. This is attributed to its notable characteristic of serving multiple users simultaneously on the same time/frequency resources. In this work, my motivation is to propose a novel NOMA transmission scheme that can serve multiple users without any information leakage to an internal or external eavesdropper. My proposed NOMA transmission scheme utilizes physical layer security (PHY) and is less complex, more efficient, and more robust than the conventional power domain NOMA (PD-NOMA) transmission. PD-NOMA suffers from various drawbacks, such as the use of successive interference cancellation (SIC), which demands power sharing among users and has a high probability of information leakage.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Overview of Security Issues in Cognitive Radio Ad Hoc Networks

Advances in systems analysis, software engineering, and high performance computing book series, Jun 30, 2023

Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combine... more Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combines the advantages of cognitive radio networks and mobile ad hoc networks. This chapter starts with an overview of various research issues of CRAHN along with representative solutions for these research issues. Among the various research issues presented, security is discussed in detail due to its prime importance. A review of existing literature reveals that not much work on security has been reported for cognitive radio networks. Specifically, an overview of security issues in CRAHN, presented in this article, is a novel work of this kind. A major part of this article highlights the importance of security in CRAHN and presents an overview of major security issues and the solutions proposed to address these issues in CRAHN.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced Non-Orthogonal Multiple Access Security Technique for Future Wireless Communication Networks

RS Open Journal on Innovative Communication Technologies, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-cell, Multi-user, and Multi-carrier Secure Communication Using Non-Orthogonal Signals’ Superposition with Dual-Transmission for IoT in 6G and Beyond

RS Open Journal on Innovative Communication Technologies, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design and Fabrication of Parallel Hybrid Car

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced Non-Orthogonal Multiple Access Security Technique for Future Wireless Communication Networks

RS Open Journal on Innovative Communication Technologies, 2020

The future wireless communication systems demand much more enhanced security and reliability comp... more The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. The conventional NOMA was previously adopted under the name of multiuser superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation. In this work, we analyze the drawbacks in conventional NOMA and present a new kind of NOMA with more improved performance metrics. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission usin...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-cell, Multi-user, and Multi-carrier Secure Communication Using Non-Orthogonal Signals' Superposition with Dual-Transmission for IoT in 6G and Beyond

RS Open Journal on Innovative Communication Technologies, 2021

Considering the advancements of the internet of things (IoT) in 6G and beyond communications , da... more Considering the advancements of the internet of things (IoT) in 6G and beyond communications , data transmission security in IoT devices has received extensive interest because of their significant features, such as low computational complexity, led by low power requirements. In such devices, the conventional cryptographic techniques may fail to provide secure communication. To fight this drawback, physical layer security (PLS) has remarkable potential to provide security solutions suitable for such applications. In this work, a highly effective PLS technique is proposed for providing secure communication against external and internal eavesdroppers in a downlink multi-cell, multiuser , and multi-carrier IoT communication system. In our proposed system, we considered two base stations, where each base station uses a single radio frequency (RF) chain to link two antennas that are used for the transmission of data. Further, we transmit the data in two rounds, and each round of transmission occurs through a single active antenna of each base station. A different antenna is used for each round of transmission to communicate with two single antenna IoT devices/users in the presence of a passive eavesdropper. In the proposed algorithm, frequency selective channel-based pre-coder matrices and the dual transmission approach are jointly employed. The dual-transmission is performed simultaneously from two base stations to provide security against internal and external eavesdroppers. The proposed system is suitable for IoT-based applications. Also, the potential capabilities of our proposed algorithm are proved by extensive mathematical and simulation analysis.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MANUFACTURING AND DESIGNING OF PARALLEL HYBRID CAR

This report presents a detailed description of the design, simulation, modelling and implementati... more This report presents a detailed description of the design, simulation, modelling and implementation of practically designed and manufactured low- budget Parallel Hybrid Car. The novel design of this car helps in reducing fuel consumption with better performance and efficiency than the conventional hybrid vehicles. The idea of this project was proposed and implemented by the engineering students of DHA Suffa University, Pakistan. The motive behind this project is to cope with the modern world technology and demonstrate this concept in which the low-cost car is fuel-efficient and environment-friendly, capable of generating electricity for itself and preserving the environment from deadly carbon-monoxide to overcome the hazards of global warming. This project proposes a novel design of a hybrid car where the car is capable of propelling by an electric motor or internal combustion engine. The novel concept for combining the benefits of both these sources, which is more efficient in performance than the conventional vehicles is also provided in this detailed report.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced Non-Orthogonal Multiple Access Security Technique for Future Wireless Communication Networks

RS Open Journal on Innovative Communication Technologies, 2020

The future wireless communication systems demand much more enhanced security and reliability comp... more The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. The conventional NOMA was previously adopted under the name of multiuser superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation. In this work, we analyze the drawbacks in conventional NOMA and present a new kind of NOMA with more improved performance metrics. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive analysis and numerical simulations.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Advanced NOMA Security Technique for Future Wireless Communication Networks

Workshop on Information and Communications technologies, International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 17-19 Sep., 2020

The future wireless communication systems demand enhanced security and reliability than the curre... more The future wireless communication systems demand enhanced security and reliability than the current systems. In this work, we propose a more simple yet efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) system. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. As conventional NOMA was already adopted under the name of multi-user superposition transmission (MUST) in release 13 of 3GPP and is improved in terms of receiver design for 3GPP-release 16, which still suffers from several security risks and drawbacks. In this work, we have analyzed these drawbacks and presented a new kind of NOMA with better performance results in cases where conventional NOMA fails. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive numerical simulations.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Overview of Security Issues in Cognitive Radio Ad Hoc Networks

An Overview of Security Issues in Cognitive Radio Ad Hoc Networks, 2023

Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combine... more Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combines the advantages of cognitive radio networks and mobile ad hoc networks. This chapter starts with an overview of various research issues of CRAHN along with representative solutions for these research issues. Among the various research issues presented, security is discussed in detail due to its prime importance. A review of existing literature reveals that not much work on security has been reported for cognitive radio networks. Specifically, an overview of security issues in CRAHN, presented in this article, is a novel work of this kind. A major part of this article highlights the importance of security in CRAHN and presents an overview of major security issues and the solutions proposed to address these issues in CRAHN.

Bookmarks Related papers MentionsView impact