Skip to main content
mustapha djeddou
  • Alger, Alger, Algeria

mustapha djeddou

In this paper, a Modified Spatial Modulation Multiple-Input Multiple-Output-Chirp (MSM-MIMO-C) scheme is proposed to enhance the Spatial Modulation (SM) spectral efficiency. One of the drawbacks of SM is its limitation in increasing the... more
In this paper, a Modified Spatial Modulation Multiple-Input Multiple-Output-Chirp (MSM-MIMO-C) scheme is proposed to enhance the Spatial Modulation (SM) spectral efficiency. One of the drawbacks of SM is its limitation in increasing the data rates. Hence, in this proposal, we add new source information carrying which consist in using a battery of predefined chirps waveforms instead of a single waveform use. Obtained results are promising and outperform the ones of conventional SM in terms of Bit Error Rate (BER) and spectral efficiency.
ABSTRACT We describe in this paper the solutions adopted to fulfill the MIL-STD-188-110B standard HF modem requirements. We present the designs details of all the blocks of the standard such as channel encoding/decoding, matched... more
ABSTRACT We describe in this paper the solutions adopted to fulfill the MIL-STD-188-110B standard HF modem requirements. We present the designs details of all the blocks of the standard such as channel encoding/decoding, matched filtering, digital modulation/demodulation, synchronization, and equalization. We deal also with channel modeling and provide performance analysis of the developed chain of communication.
Radio frequency identification technology is one of the modern popular emerging technologies proven to advance a wide range of applications in both academia and industry. However, potential security risks, privacy issues, and efficiency... more
Radio frequency identification technology is one of the modern popular emerging technologies proven to advance a wide range of applications in both academia and industry. However, potential security risks, privacy issues, and efficiency are still open challenges that must be addressed seriously to achieve enhanced protection. In this paper, we show that the Akgün et al. protocol remains unsafe and imperfect in terms of the security issue and database identification efficiency. We, first, demonstrate that the Akgün et al. protocol suffers from a stolen/lost reader attack, which could expose users to some life threatening situations and unwanted collection of sensitive private information. Second, we found that all indexing identification‐based protocols and exceptionally the Akgün et al. protocol cannot be used properly when the collision of tag index occurs, which exhibits a low efficiency in the database entry identification process. As the Akgün et al. protocol is almost perfect, it is worthy to be enhanced. Therefore, towards a complete and secure mobile radio frequency identification authentication protocol, we propose efficient solutions that could overcome the aforementioned security problem and offer high identification efficiency using efficient anticollision procedure based on dynamic linked list data structure principle. Via informal and formal security analysis, we show that the improved version is insensitive to the most common attacks and is more efficient than the existing schemes in the literature. Copyright © 2016 John Wiley & Sons, Ltd.
Radio‐frequency identification (RFID) is a technology for automated identification of objects and people. RFID raises two main concerns: security and privacy. RFID tags are likely to proliferate into billions, and nowadays, security and... more
Radio‐frequency identification (RFID) is a technology for automated identification of objects and people. RFID raises two main concerns: security and privacy. RFID tags are likely to proliferate into billions, and nowadays, security and privacy of RFID systems are to be continuously improved. In this context, we propose a new ultralightweight RFID mutual authentication protocol based on the Feistel cipher structure. This structure is based on substitutions and random permutations which create confusion and diffusion in the transmitted messages. The main contribution of this work is the application of Feistel cipher structure to design a low‐cost authentication protocol for RFID tags involving simple lightweight operations in the tag. Security analysis shows that the proposed protocol achieves the functionalities of mutual authentication, resists to various attacks, and presents a scalable security level. Copyright © 2017 John Wiley & Sons, Ltd.
Purpose – The paper aims to propose a new method for estimating the time of arrival (TOA) of ultra-wideband (UWB) signals under IEEE 802.15.4a multipath channel model. Design/methodology/approach – The proposed approach is based on a... more
Purpose – The paper aims to propose a new method for estimating the time of arrival (TOA) of ultra-wideband (UWB) signals under IEEE 802.15.4a multipath channel model. Design/methodology/approach – The proposed approach is based on a proportionality test and consists in finding out whether two autoregressive (AR) processes, modeling two frames, are proportional or not. The latter operation uses a distance to measure the proportionality between the two AR processes. Findings – The developed technique may be used in two ways, sample-by-sample or block-by-block, according to the required ranging accuracy. It is important to note that the method offers flexibility between the computational load and the needed estimation accuracy. Moreover, the proposed method uses a threshold that is derived analytically according to a preset false alarm probability. Practical implications – Simulation experiments are conducted to assess the performance of the new TOA estimation algorithm. Thereby, the comparison is done against the well-known CLEAN algorithm for a sample-by-sample based TOA estimation and against three energy detector based receiver algorithms. The obtained results highlight the effectiveness of the developed approach. Originality/value – The developed TOA estimation algorithm is completely different from other techniques in the literature, and it is based on a proportionality test between two sliding frames. These latter are modeled by two AR processes. Then a distance measure is used to check whether or not the power spectral densities are proportional.
The presence of self interference (SI) in full duplex (FD) created by the Base Station (BS) severely hampers the performance of communication system, in addition to multiple access interference (MAI). To tackle such impairments, a new... more
The presence of self interference (SI) in full duplex (FD) created by the Base Station (BS) severely hampers the performance of communication system, in addition to multiple access interference (MAI). To tackle such impairments, a new scheme based on NOMA-OFDM in Massive MIMO is proposed. Moreover, blind channel estimator is used to provide channel state estimation. This architecture is based on the blind source separation approach (SOBI) algorithm which estimates the residual (RSI) channel in the OFDM-NOMA-FD-Massive MIMO architecture, to combat the RSI and MAI created by the base station and the multi-user presence, respectively. Furthermore, The so-mentioned architecture incorporates ordered successive interference canceler minimum means square Error (OSIC-MMSE) as receiver, in order to offer an additional reliability of the wireless link. A comparative performance study between the proposed architecture, the least square estimator and half duplex (HD) architectures is performed. To the best of author knowledge, the performance of the aforementioned architecture was not previously investigated, more particularly SI power is characterized under Rician distribution. From simulation results, the adopted architecture returns acceptable bit error rate performance.
Pseudo-random numbers generators (PRNG) are one of the main security tools in Radio Frequency IDentification (RFID) technology. Thus, a weak internal embedded generator can directly cause the entire application to be insecure and it makes... more
Pseudo-random numbers generators (PRNG) are one of the main security tools in Radio Frequency IDentification (RFID) technology. Thus, a weak internal embedded generator can directly cause the entire application to be insecure and it makes no sense to employ robust protocols for the security issue. In this paper, we propose a new PRNG constructed by randomly selecting points from two elliptic curves, suitable for ECC based applications. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to two curves randomly selected. The main advantages of this PRNG in comparison to previous works are the large periodicity, a better distribution of the generated sequences and a high security level based on the elliptic curve discrete logarithm problem (ECDLP). Further, the proposed PRNG has passed the different Special Publication 800-22 NIST statistical test suite. Moreover, the proposed PRNG presents a scalable architecture in term of security level and periodicity at the expense of increasing the computation complexity. Thus, it can be adapted for ECC based cryptosystems such as RFID tags and sensors networks and other applications like computer physic simulations, and control coding.
RFID (radio frequency identification) is an efficient automatic identification technology used in a wide variety of applications and more recently as a leading authentication technology in many security services. However, the wireless... more
RFID (radio frequency identification) is an efficient automatic identification technology used in a wide variety of applications and more recently as a leading authentication technology in many security services. However, the wireless nature of the transmitted data causes various security issues that must be addressed decisively. To solve these issues, numerous solutions and attempts have been proposed in the literature using several cryptographic primitives. Yet, it is still uncertain about the practicability of a significant number of these protocols, as their hardware implementation has not received much attention. In this paper, we deal with an efficient FPGA implementation and validation of an RFID authentication protocol based on elliptic curve (ECC) encryption scheme. As far as we know, this is the first FPGA implementation of an RFID authentication protocol based on ECC-ElGamal encryption. We believe that the proposed design architecture will bring a new clarity to others ECC-based protocols architectures. In addition, we illustrate the effectiveness of the implemented architecture in the car key systems.
ABSTRACT In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to... more
ABSTRACT In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to various kinds of attacks such as man-in-the-middle attack, simple power analysis, and replay attacks.These features make it very attractive to low cost RFID applications, such as the biometric passport active authentication (AA) for example. The proposed protocol is tested and simulated in c ≠ language for several NIST recommended curves over GF(p) (p = 112; 128; 160; 192 and 256 bits).
Radio Frequency IDentification (RFID) technology is used in a wide variety of applications, more recently as a leading identification technology in healthcare environments. In the most recent years, this technology has been adopted for... more
Radio Frequency IDentification (RFID) technology is used in a wide variety of applications, more recently as a leading identification technology in healthcare environments. In the most recent years, this technology has been adopted for telecare medicine information system (TMIS) for authentication, safety, security, data confidentiality, and patient's privacy protection over public networks. TMIS is the bridge between patients at home and doctors at healthcare organizations that permits to validate the correctness of exchanged information between different actors of the system. Recently, several RFID and smart cards authentication schemes have been presented and suggested for the TMIS in the literature. These schemes try to resolve the security and privacy problems over insecure healthcare network environments by exploiting different cryptographic primitive's solutions. In this paper, we first highlighted the vulnerabilities of the most recent proposed protocol for TMIS in the literature and proposed attacks based on the weaknesses related to the misuse of the timestamp technique, the calculation of the reader request and tag response messages using the one‐way hash function, which are not attentively scrutinized. Second, we propose an efficient dual RFID‐TMIS mobile authentication protocol with high efficiency and security for healthcare systems. Our proposal is an improvement and extension of the protocol of Li et al., where we propose to associate the RFID technology with TMIS in the same authentication system to take advantages of both these two promising technologies. The performance analysis shows that our improved protocol could solve security weaknesses of the studied protocol and provide mobility, efficiency and is well suited for TMIS adoption in remote areas and low population density. Copyright © 2016 John Wiley & Sons, Ltd.
ABSTRACTWith the fast growth of the automatic authentication and asset tracking usage in a wide variety of applications in different fields, government, logistics, transportation and retail are among the most supportive of the... more
ABSTRACTWith the fast growth of the automatic authentication and asset tracking usage in a wide variety of applications in different fields, government, logistics, transportation and retail are among the most supportive of the radio‐frequency identification (RFID) market. Security is a crucial issue and must be addressed seriously. RFID security must meet the public demand of data protection. Recently, several lightweight RFID authentication protocols conforming to the EPCglobal Class 1 Generation 2 (EPC C1‐G2) standard have been proposed. In this paper, we present efficient attacks against the authenticated RFID security mechanism of Chang et al. based on Chebyshev chaotic maps, which is the first solution that adopted the chaos in the RFID authentication process. It turns out that this protocol has fundamental weaknesses that can be used by an adversary to break the system. We will show that this protocol is vulnerable to tracking attack, secret disclosure attack, impersonation attack and desynchronization attack. The proposed attack techniques are in light of two flaws related to the message generation and the shared‐secret update process, which are not neatly scrutinized. Then, we propose an improved RFID authentication protocol based on the Chebyshev chaotic map hard problem, conforming to the EPC C1‐G2 standard with more flexibility, security and mobility for the RFID application. Copyright © 2014 John Wiley & Sons, Ltd.
ABSTRACT In this paper, an implementation of synchronization algorithms in digital communication systems such as carrier phase recovery and symbol timing recovery is presented. For this implementation, we use the development kit... more
ABSTRACT In this paper, an implementation of synchronization algorithms in digital communication systems such as carrier phase recovery and symbol timing recovery is presented. For this implementation, we use the development kit TMS320C6711 DSK with a rapid prototype method. The implemented algorithms are founded on estimators and detectors derived from the maximum likelihood (ML) approach. Feedback and feedforward structures are considered. These algorithms operate in non-data-aided (NDA) mode or decision directed (DD) mode. For the problem of symbol timing recovery synchronization, we used the Gardner, Early Late Gate and Mueller & Muller algorithms. The obtained implementation results are very promising.
ABSTRACT In radar applications, when a target is in close proximity to a reflectory surface, the received echo signal reaches the radar site via two or more paths, even though there exists only one target in the environment. So, it is... more
ABSTRACT In radar applications, when a target is in close proximity to a reflectory surface, the received echo signal reaches the radar site via two or more paths, even though there exists only one target in the environment. So, it is often relevant to estimate the directions and the relative delays of each path ray. We present two approaches to jointly estimate these parameters based on a 2D ESPRIT-like algorithm Van der Veen et al., (1998) in wireless communications. Numerical simulations are provided to access the performance of the proposed approaches, which are compared to the Cramer-Rao bound and the MUSIC algorithm combined with spatial smoothing
The spectrum sensing function, is one of the primary requirements to ensure efficient and reliable cognitive radio network since it determines whether to allow an unlicensed or secondary user to use certain spectrum resources that are not... more
The spectrum sensing function, is one of the primary requirements to ensure efficient and reliable cognitive radio network since it determines whether to allow an unlicensed or secondary user to use certain spectrum resources that are not being used by its owner or primary users. In this paper, we combine the goodness of fit test and bootstrap resampling techniques to address spectrum sensing for the case of a small samples size, thus a faster-sensing step, and where the asymptotic methods do not perform well. It is shown that the proposed method, in the case of a single secondary user, outperforms the energy detection method and the technique based only on the goodness of fit test.
LTE which stands for Long Term Evolution is now an agreed-upon protocol that aims at supporting various high data rate applications particularly encompassing current and multimedia features. It relies on the merging of OFDMA and MIMO... more
LTE which stands for Long Term Evolution is now an agreed-upon protocol that aims at supporting various high data rate applications particularly encompassing current and multimedia features. It relies on the merging of OFDMA and MIMO abilities for affording high rates in frequency selective channels (ISI), thus efficiently combating inter-symbol interference. The performance of this protocol has been studied for various channels, however, no study reports such an issue for Nakagami channel. In this paper, the BLER performance and the achievable throughput are evaluated in Nakagami-m fading channel with 3 different transmission modes, namely, SISO, transmit diversity and open loop spatial multiplexing (OLSM). The OFDM channel is estimated using the least square approach and the very recently proposed K Best-Soft Sphere Decoder (KBSSD) is adopted at the receiver side. Also, the impact of the number of retransmissions on the BLER performance is reported herein.
Long Term Evolution (LTE) standard supports MU-MIMO as a new technology to take advantage of the inherent properties of MIMO technology in improving the spectral efficiency and to support multiple users simultaneously. This paper studies... more
Long Term Evolution (LTE) standard supports MU-MIMO as a new technology to take advantage of the inherent properties of MIMO technology in improving the spectral efficiency and to support multiple users simultaneously. This paper studies the performance of the SC-OFDMA-based LTE system in the uplink correlated Rayleigh fading channel in terms of bit error rate (BER). To the best of author knowledge, the performance of such an LTE system incorporating Successive Interference Cancellation Minimum Mean Square Error (SICMMSE) receiver in correlated Rayleigh channel was not previously investigated, more particularly with different antenna configurations. The choice of such a receiver is motivated by its relative complexity and computation reduction.
The key element of enabling millimeter wave communications is the adoption of a hybrid beamforming. This hybrid architecture requires the development of new algorithms to estimate the mmWave channel. The main goal of this work is jointly... more
The key element of enabling millimeter wave communications is the adoption of a hybrid beamforming. This hybrid architecture requires the development of new algorithms to estimate the mmWave channel. The main goal of this work is jointly estimating the mmWave channel parameters: the angle of departure (AOD), the angle of arrival (AOA) and the path's gain using the sparsity of the mmWave channel in conjunction with a criterion test based on diagonality of data matrices. The results of the simulation, in terms of performance, show the superiority of the modified algorithm integrating the new criterion compared to the original one.
An interleave-division multiple-access (IDMA) system supports the presence of multiple users in a cell by resorting to a different interleaver per user. Therefore the choice of the interleaver critically impinges on system performance. A... more
An interleave-division multiple-access (IDMA) system supports the presence of multiple users in a cell by resorting to a different interleaver per user. Therefore the choice of the interleaver critically impinges on system performance. A new interleaver structure is proposed for the so-called STBC–OFDM–IDMA [space-time block coding (STBC), orthogonal frequency division multiplexing (OFDM) and IDMA] architecture, combining the viable features of the STBC, the OFDM and the IDMA techniques. This interleaver is based on the new idea of adopting permutation control keys generated using two cryptography elliptic curves in which the degree of randomness of the interleaved sequence is scalable by using several rounds and a different subkey in each round. In addition to offering a certain degree of data security, it is shows through simulation results that the resulting architecture incorporating the proposed interleaver yields a viable bit error rate performance.
In this paper, we present a software development of multimedia streaming encryption using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate keystream for... more
In this paper, we present a software development of multimedia streaming encryption using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate keystream for encrypting and decrypting real-time multimedia data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme through image and audio security analysis confirms its robustness against different kind of attacks.
International audienceWe give a simple yet efficient Alternating Direction Method of Multipliers algorithm for solving sparse-modeling-based detectors [7, 9] for massive MIMO systems. Our solution relies on a special reformulation of the... more
International audienceWe give a simple yet efficient Alternating Direction Method of Multipliers algorithm for solving sparse-modeling-based detectors [7, 9] for massive MIMO systems. Our solution relies on a special reformulation of the associated optimization problem by describing the constraints as a Cartesian power of the probability simplex. Simulation results show that the proposed algorithm is as accurate as the best known solvers (interior point methods), while its complexity remains linear with respect to the size of the system
The presence of self interference (SI) in full duplex (FD) created by the Base Station (BS) severely hampers the performance of communication system, in addition to multiple access interference (MAI). To tackle such impairments, a new... more
The presence of self interference (SI) in full duplex (FD) created by the Base Station (BS) severely hampers the performance of communication system, in addition to multiple access interference (MAI). To tackle such impairments, a new scheme based on NOMA-OFDM in Massive MIMO is proposed. Moreover, blind channel estimator is used to provide channel state estimation. This architecture is based on the blind source separation approach (SOBI) algorithm which estimates the residual (RSI) channel in the OFDM-NOMA-FD-Massive MIMO architecture, to combat the RSI and MAI created by the base station and the multi-user presence, respectively. Furthermore, The so-mentioned architecture incorporates ordered successive interference canceler minimum means square Error (OSIC-MMSE) as receiver, in order to offer an additional reliability of the wireless link. A comparative performance study between the proposed architecture, the least square estimator and half duplex (HD) architectures is performed. To the best of author knowledge, the performance of the aforementioned architecture was not previously investigated, more particularly SI power is characterized under Rician distribution. From simulation results, the adopted architecture returns acceptable bit error rate performance.
In this paper, a narrowband frequency-tunable antenna is proposed. The tuning operation is achieved by integrating a variable capacitor in a narrowband antenna. Both simulated and measured results of the designed antenna are presented and... more
In this paper, a narrowband frequency-tunable antenna is proposed. The tuning operation is achieved by integrating a variable capacitor in a narrowband antenna. Both simulated and measured results of the designed antenna are presented and discussed. The experimental results show that very narrowband resonant frequency can be accurately tuned in a large frequency range. Hence, the proposed design can be a good candidate for modern wireless communication systems.
Human speech is one of the most affected by a neurodegenerative disease. In this paper, a study case of acoustic features for persons affected by Parkinson disease is done in order to discriminate voices of respectively healthy... more
Human speech is one of the most affected by a neurodegenerative disease. In this paper, a study case of acoustic features for persons affected by Parkinson disease is done in order to discriminate voices of respectively healthy individuals (HI) and persons with Parkinson (PWP). For this purpose, a set of Mel frequency cepstral coefficients is extracted from speech of healthy and Parkinson disease individuals. Promising performance of discrimination is reached (97 %) thanks to the use of compensation/normalization of features along with K-nearest neighbor classification.
Adopting the architecture combining Orthogonal Frequency Division Multiplexing (OFDM) scheme and Interleave Division Multiple Access (IDMA) technique, the so-called OFDM-IDMA is a promising scheme in uplink wireless communications... more
Adopting the architecture combining Orthogonal Frequency Division Multiplexing (OFDM) scheme and Interleave Division Multiple Access (IDMA) technique, the so-called OFDM-IDMA is a promising scheme in uplink wireless communications channels. This architecture has shown potential in achieving high spectral efficiency and low decoding complexity. In this paper we propose to study the performance of a scheme resulting from the combination of the OFDM-IDMA architecture and the transmit diversity system designed by adopting space-time coded transmittion (STBC) and equipping the transmitter with multiple antennas. Furthermore, we propose a novel structure for the interleaver, the key block in the IDMA combined structure. The resulting architecture we have chosen to refer to as STBC-OFDM-IDMA is evaluated in terms of bit error rate (BER) performance. The architecture is designed to exploit the features of OFDM in increasing the robustness against inter-symbol interference (ISI), the IDMA in...
... [5] I. Guvenc, H. Arslan, “comparison of two searchback schemes for non-coherent TOA estimation in IR-UWB systems,” in Proc. IEEE, Sarnoff Symposium, March 2006. ... [7] AF Molisch, K. Balakrishnan, CC Chong, S. Emami, A, Fort, J.... more
... [5] I. Guvenc, H. Arslan, “comparison of two searchback schemes for non-coherent TOA estimation in IR-UWB systems,” in Proc. IEEE, Sarnoff Symposium, March 2006. ... [7] AF Molisch, K. Balakrishnan, CC Chong, S. Emami, A, Fort, J. Karedal, J. Kunisch, H. Schantz, U. Schuster ...
The spectrum sensing function, is one of the primary requirements to ensure efficient and reliable cognitive radio network since it determines whether to allow an unlicensed or secondary user to use certain spectrum resources that are not... more
The spectrum sensing function, is one of the primary requirements to ensure efficient and reliable cognitive radio network since it determines whether to allow an unlicensed or secondary user to use certain spectrum resources that are not being used by its owner or primary users. In this paper, we combine the goodness of fit test and bootstrap resampling techniques to address spectrum sensing for the case of a small samples size, thus a faster-sensing step, and where the asymptotic methods do not perform well. It is shown that the proposed method, in the case of a single secondary user, outperforms the energy detection method and the technique based only on the goodness of fit test.

And 61 more