-
Enabling Continuous 5G Connectivity in Aircraft through Low Earth Orbit Satellites
Authors:
Raúl Parada,
Victor Monzon Baeza,
Carlos Horcajo Fernández de Gamboa,
Rocío Serrano Camacho,
Carlos Monzo
Abstract:
As air travel demand increases, uninterrupted high-speed internet access becomes essential. However, current satellite-based systems face latency and connectivity challenges. While prior research has focused on terrestrial 5G and geostationary satellites, there is a gap in optimizing Low Earth Orbit (LEO)-based 5G systems for aircraft. This study evaluates the feasibility of deployment strategies…
▽ More
As air travel demand increases, uninterrupted high-speed internet access becomes essential. However, current satellite-based systems face latency and connectivity challenges. While prior research has focused on terrestrial 5G and geostationary satellites, there is a gap in optimizing Low Earth Orbit (LEO)-based 5G systems for aircraft. This study evaluates the feasibility of deployment strategies and improving signal quality with LEO satellites for seamless in-flight 5G connectivity. Using Matlab and Simulink, we model satellite trajectories, aircraft movement, and handover mechanisms, complemented by ray-tracing techniques for in-cabin signal analysis. Results show that proposed LEO satellite configurations enhance coverage and reduce latency, with sequential handovers minimizing service interruptions. These findings contribute to advancing in-flight 5G networks, improving passenger experience, and supporting real-time global connectivity solutions.
△ Less
Submitted 9 April, 2025;
originally announced April 2025.
-
AI-Driven Tactical Communications and Networking for Defense: A Survey and Emerging Trends
Authors:
Victor Monzon Baeza,
Raúl Parada,
Laura Concha Salor,
Carlos Monzo
Abstract:
The integration of Artificial Intelligence (AI) in military communications and networking is reshaping modern defense strategies, enhancing secure data exchange, real-time situational awareness, and autonomous decision-making. This survey explores how AI-driven technologies improve tactical communication networks, radar-based data transmission, UAV-assisted relay systems, and electronic warfare re…
▽ More
The integration of Artificial Intelligence (AI) in military communications and networking is reshaping modern defense strategies, enhancing secure data exchange, real-time situational awareness, and autonomous decision-making. This survey explores how AI-driven technologies improve tactical communication networks, radar-based data transmission, UAV-assisted relay systems, and electronic warfare resilience. The study highlights AI applications in adaptive signal processing, multi-agent coordination for network optimization, radar-assisted target tracking, and AI-driven electronic countermeasures. Our work introduces a novel three-criteria evaluation methodology. It systematically assesses AI applications based on general system objectives, communications constraints in the military domain, and critical tactical environmental factors. We analyze key AI techniques for different types of learning applied to multi-domain network interoperability and distributed data information fusion in military operations. We also address challenges such as adversarial AI threats, the real-time adaptability of autonomous communication networks, and the limitations of current AI models under battlefield conditions. Finally, we discuss emerging trends in self-healing networks, AI-augmented decision support systems, and intelligent spectrum allocation. We provide a structured roadmap for future AI-driven defense communications and networking research.
△ Less
Submitted 7 April, 2025;
originally announced April 2025.
-
Blockchain-Enabled Management Framework for Federated Coalition Networks
Authors:
Jorge Álvaro González,
Ana María Saiz García,
Victor Monzon Baeza
Abstract:
In a globalized and interconnected world, interoperability has become a key concept for advancing tactical scenarios. Federated Coalition Networks (FCN) enable cooperation between entities from multiple nations while allowing each to maintain control over their systems. However, this interoperability necessitates the sharing of increasing amounts of information between different tactical assets, r…
▽ More
In a globalized and interconnected world, interoperability has become a key concept for advancing tactical scenarios. Federated Coalition Networks (FCN) enable cooperation between entities from multiple nations while allowing each to maintain control over their systems. However, this interoperability necessitates the sharing of increasing amounts of information between different tactical assets, raising the need for higher security measures. Emerging technologies like blockchain drive a revolution in secure communications, paving the way for new tactical scenarios. In this work, we propose a blockchain-based framework to enhance the resilience and security of the management of these networks. We offer a guide to FCN design to help a broad audience understand the military networks in international missions by a use case and key functions applied to a proposed architecture. We evaluate its effectiveness and performance in information encryption to validate this framework.
△ Less
Submitted 12 March, 2025;
originally announced March 2025.
-
Flexible Payload Configuration for Satellites using Machine Learning
Authors:
Marcele O. K. Mendonca,
Flor G. Ortiz-Gomez,
Jorge Querol,
Eva Lagunas,
Juan A. Vásquez Peralvo,
Victor Monzon Baeza,
Symeon Chatzinotas,
Bjorn Ottersten
Abstract:
Satellite communications, essential for modern connectivity, extend access to maritime, aeronautical, and remote areas where terrestrial networks are unfeasible. Current GEO systems distribute power and bandwidth uniformly across beams using multi-beam footprints with fractional frequency reuse. However, recent research reveals the limitations of this approach in heterogeneous traffic scenarios, l…
▽ More
Satellite communications, essential for modern connectivity, extend access to maritime, aeronautical, and remote areas where terrestrial networks are unfeasible. Current GEO systems distribute power and bandwidth uniformly across beams using multi-beam footprints with fractional frequency reuse. However, recent research reveals the limitations of this approach in heterogeneous traffic scenarios, leading to inefficiencies. To address this, this paper presents a machine learning (ML)-based approach to Radio Resource Management (RRM).
We treat the RRM task as a regression ML problem, integrating RRM objectives and constraints into the loss function that the ML algorithm aims at minimizing. Moreover, we introduce a context-aware ML metric that evaluates the ML model's performance but also considers the impact of its resource allocation decisions on the overall performance of the communication system.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
Multiple Access in Constellation Domain by Non-Coherent Massive MIMO
Authors:
Victor Monzon Baeza
Abstract:
Multiple access is the base for increasing the capacity in multi-user communication networks. However, the growing demand for higher data rates and the number of users who requires communication services has led to the scarcity of orthogonal resources in current wireless communications. On the other hand, integrating the satellite within terrestrial networks as an initiative of 3GPP since its Rele…
▽ More
Multiple access is the base for increasing the capacity in multi-user communication networks. However, the growing demand for higher data rates and the number of users who requires communication services has led to the scarcity of orthogonal resources in current wireless communications. On the other hand, integrating the satellite within terrestrial networks as an initiative of 3GPP since its Release 15 entails the need for new forms of multiple access between terrestrial and non-terrestrial users. This paper studies constellation schemes as a new domain to enhance the state-of-the-art multiple-access techniques for future communication technologies employing non-coherent communications with massive MIMO. In addition, we propose a hybrid model between the classic access methods such as Time Division Multiple Access (TDMA) or Frequency Division Multiple Access (FDMA), the emerging models of non-orthogonal multiple access (NOMA) and the proposed domain of the constellation based on non-coherent massive multiple-input multiple-output (MIMO) schemes. This model is discussed for different scenarios in satellite communications that help increase the system's capacity and avoid interference between terrestrial and non-terrestrial users.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions
Authors:
Brian Hildebrand,
Mohamed Baza,
Tara Salman,
Fathi Amsaad,
Abdul Razaqu,
Abdullah Alourani
Abstract:
Internet of Vehicles (IoVs) consist of smart vehicles, Autonomous Vehicles (AVs) as well as roadside units (RSUs) that communicate wirelessly to provide enhanced transportation services such as improved traffic efficiency and reduced traffic congestion and accidents. IoVs, however, suffer from issues of security, privacy and trust. Blockchain technology has been emerged as a decentralized approach…
▽ More
Internet of Vehicles (IoVs) consist of smart vehicles, Autonomous Vehicles (AVs) as well as roadside units (RSUs) that communicate wirelessly to provide enhanced transportation services such as improved traffic efficiency and reduced traffic congestion and accidents. IoVs, however, suffer from issues of security, privacy and trust. Blockchain technology has been emerged as a decentralized approach for enhanced security without depending on trusted third parties to run services. Blockchain offers the benefits of trustworthiness, immutability, and mitigates the problem of single point of failure and other attacks. In this work, we present the state-of-the-art of Blockchain-enabled IoVs (BIoV) with a particular focus on their applications such as crowdsourcing-based applications, energy trading, traffic congestion reduction, collision and accident avoidance and infotainment and content cashing. We also present in-depth applications federated learning (FL) applications for BIoVs. The key challenges resulted from the integration of Blockchain with IoV is investigated in several domains such as edge computing, ML, and FL. Lastly, a number of open issues and challenges as well as future opportunities in the area of AI-enabled BIoV, hardware-assisted security for BIoV and quantum computing attacks on BIoV.
△ Less
Submitted 20 March, 2022;
originally announced March 2022.
-
On Sharing Models Instead of Data using Mimic learning for Smart Health Applications
Authors:
Mohamed Baza,
Andrew Salazar,
Mohamed Mahmoud,
Mohamed Abdallah,
Kemal Akkaya
Abstract:
Electronic health records (EHR) systems contain vast amounts of medical information about patients. These data can be used to train machine learning models that can predict health status, as well as to help prevent future diseases or disabilities. However, getting patients' medical data to obtain well-trained machine learning models is a challenging task. This is because sharing the patients' medi…
▽ More
Electronic health records (EHR) systems contain vast amounts of medical information about patients. These data can be used to train machine learning models that can predict health status, as well as to help prevent future diseases or disabilities. However, getting patients' medical data to obtain well-trained machine learning models is a challenging task. This is because sharing the patients' medical records is prohibited by law in most countries due to patients privacy concerns. In this paper, we tackle this problem by sharing the models instead of the original sensitive data by using the mimic learning approach. The idea is first to train a model on the original sensitive data, called the teacher model. Then, using this model, we can transfer its knowledge to another model, called the student model, without the need to learn the original data used in training the teacher model. The student model is then shared to the public and can be used to make accurate predictions. To assess the mimic learning approach, we have evaluated our scheme using different medical datasets. The results indicate that the student model mimics the teacher model performance in terms of prediction accuracy without the need to access to the patients' original data records.
△ Less
Submitted 24 December, 2019;
originally announced December 2019.
-
B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment atop Public Blockchain
Authors:
Mohamed Baza,
Noureddine Lasla,
Mohamed Mahmoud,
Gautam Srivastava,
Mohamed Abdallah
Abstract:
Ride-sharing is a service that enables drivers to share their trips with other riders, contributing to appealing benefits of shared travel costs. However, the majority of existing platforms rely on a central third party, which make them subject to a single point of failure and privacy disclosure issues. Moreover, they are vulnerable to DDoS and Sybil attacks due to malicious users involvement. Bes…
▽ More
Ride-sharing is a service that enables drivers to share their trips with other riders, contributing to appealing benefits of shared travel costs. However, the majority of existing platforms rely on a central third party, which make them subject to a single point of failure and privacy disclosure issues. Moreover, they are vulnerable to DDoS and Sybil attacks due to malicious users involvement. Besides, high fees should be paid to the service provider. In this paper, we propose a decentralized ride-sharing service based on public Blockchain, named B-Ride. Both riders and drivers can find rides match while preserving their trip data, including pick-up/drop-off location, and departure/arrival date. However, under the anonymity of the public blockchain, a malicious user may submit multiple ride requests or offers, while not committing to any of them, to discover better offer or to make the system unreliable. B-Ride solves this problem by introducing a time-locked deposit protocol for a ride-sharing by leveraging smart contract and zero-knowledge set membership proof. In a nutshell, both a driver and a rider have to show their commitment by sending a deposit to the blockchain. Later, a driver has to prove to the blockchain on the agreed departure time that he has arrived at the pick-up location. To preserve rider/driver location privacy by hiding the exact pick-up location, the proof is done using zero-knowledge set membership protocol. Moreover, to ensure a fair payment, a pay-as-you-drive methodology is introduced based on the elapsed distance of the driver and the rider. Also, we introduce a reputation-based trust model to rate drivers based on their past trips to allow riders to select them based on their history on the system. Finally, we implement B-Ride in a test net of Ethereum. The experiment results show the applicability of our protocol atop the existing real-world blockchain.
△ Less
Submitted 13 November, 2019; v1 submitted 21 June, 2019;
originally announced June 2019.
-
Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid
Authors:
Mohamed Baza,
Marbin Pazos-Revilla,
Mahmoud Nabil,
Ahmed Sherif,
Mohamed Mahmoud,
Waleed Alasmary
Abstract:
Energy storage units (ESUs) including EVs and home batteries enable several attractive features of the modern smart grids such as effective demand response and reduced electric bills. However, uncoordinated charging of ESUs stresses the power system. In this paper, we propose privacy-preserving and collusion-resistant charging coordination centralized and decentralized schemes for the smart grid.…
▽ More
Energy storage units (ESUs) including EVs and home batteries enable several attractive features of the modern smart grids such as effective demand response and reduced electric bills. However, uncoordinated charging of ESUs stresses the power system. In this paper, we propose privacy-preserving and collusion-resistant charging coordination centralized and decentralized schemes for the smart grid. The centralized scheme is used in case of robust communication infrastructure that connects the ESUs to the utility, while the decentralized scheme is useful in case of infrastructure not available or costly. In the centralized scheme, each energy storage unit should acquire anonymous tokens from a charging controller (CC) to send multiple charging requests to the CC via the aggregator. CC can use the charging requests to enough data to run the charging coordination scheme, but it cannot link the data to particular ESUs or reveal any private information. Our centralized scheme uses a modified knapsack problem formulation technique to maximize the amount of power delivered to the ESUs before the charging requests expire without exceeding the available maximum charging capacity. In the decentralized scheme, several ESUs run the scheme in a distributed way with no need to aggregator or CC. One ESU is selected as a head node that should decrypt the ciphertext of the aggregated messages of the ESUs' messages and broadcast it to the community while not revealing the ESUs' individual charging demands. Then, ESUs can coordinate charging requests based on the aggregated charging demand while not exceeding the maximum charging capacity. Extensive experiments and simulations are conducted to demonstrate that our schemes are efficient and secure against various attacks, and can preserve ESU owner's privacy.
△ Less
Submitted 20 February, 2020; v1 submitted 12 May, 2019;
originally announced May 2019.
-
Mimic Learning to Generate a Shareable Network Intrusion Detection Model
Authors:
Ahmed Shafee,
Mohamed Baza,
Douglas A. Talbert,
Mostafa M. Fouda,
Mahmoud Nabil,
Mohamed Mahmoud
Abstract:
Purveyors of malicious network attacks continue to increase the complexity and the sophistication of their techniques, and their ability to evade detection continues to improve as well. Hence, intrusion detection systems must also evolve to meet these increasingly challenging threats. Machine learning is often used to support this needed improvement. However, training a good prediction model can r…
▽ More
Purveyors of malicious network attacks continue to increase the complexity and the sophistication of their techniques, and their ability to evade detection continues to improve as well. Hence, intrusion detection systems must also evolve to meet these increasingly challenging threats. Machine learning is often used to support this needed improvement. However, training a good prediction model can require a large set of labelled training data. Such datasets are difficult to obtain because privacy concerns prevent the majority of intrusion detection agencies from sharing their sensitive data. In this paper, we propose the use of mimic learning to enable the transfer of intrusion detection knowledge through a teacher model trained on private data to a student model. This student model provides a mean of publicly sharing knowledge extracted from private data without sharing the data itself. Our results confirm that the proposed scheme can produce a student intrusion detection model that mimics the teacher model without requiring access to the original dataset.
△ Less
Submitted 18 February, 2020; v1 submitted 2 May, 2019;
originally announced May 2019.
-
Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval
Authors:
Wesam Al Amiri,
Mohamed Baza,
Karim Banawan,
Mohamed Mahmoud,
Waleed Alasmary,
Kemal Akkaya
Abstract:
Searching for available parking spaces is a major problem for drivers especially in big crowded cities, causing traffic congestion and air pollution, and wasting drivers' time. Smart parking systems are a novel solution to enable drivers to have real-time parking information for pre-booking. However, current smart parking requires drivers to disclose their private information, such as desired dest…
▽ More
Searching for available parking spaces is a major problem for drivers especially in big crowded cities, causing traffic congestion and air pollution, and wasting drivers' time. Smart parking systems are a novel solution to enable drivers to have real-time parking information for pre-booking. However, current smart parking requires drivers to disclose their private information, such as desired destinations. Moreover, the existing schemes are centralized and vulnerable to the bottleneck of the single point of failure and data breaches. In this paper, we propose a distributed privacy-preserving smart parking system using blockchain. A consortium blockchain created by different parking lot owners to ensure security, transparency, and availability is proposed to store their parking offers on the blockchain. To preserve drivers' location privacy, we adopt a private information retrieval (PIR) technique to enable drivers to retrieve parking offers from blockchain nodes privately, without revealing which parking offers are retrieved. Furthermore, a short randomizable signature is used to enable drivers to reserve available parking slots in an anonymous manner. Besides, we introduce an anonymous payment system that cannot link drivers' to specific parking locations. Finally, our performance evaluations demonstrate that the proposed scheme can preserve drivers' privacy with low communication and computation overhead.
△ Less
Submitted 27 January, 2021; v1 submitted 21 April, 2019;
originally announced April 2019.
-
Detecting Sybil Attacks using Proofs of Work and Location in VANETs
Authors:
Mohamed Baza,
Mahmoud Nabil,
Niclas Bewermeier,
Kemal Fidan,
Mohamed Mahmoud,
Mohamed Abdallah
Abstract:
In this paper, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs is used to create vehicle trajectory which is used as vehicle anonymous identity. Also, one RSU is not able to issue trajectories for vehic…
▽ More
In this paper, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs is used to create vehicle trajectory which is used as vehicle anonymous identity. Also, one RSU is not able to issue trajectories for vehicles, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. So, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. Then, during any reported event, e.g., road congestion, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle; therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles
Authors:
Mohamed Baza,
Mahmoud Nabil,
Noureddine Lasla,
Kemal Fidan,
Mohamed Mahmoud,
Mohamed Abdallah
Abstract:
Recently, Autonomous Vehicles (AVs) have gained extensive attention from both academia and industry. AVs are a complex system composed of many subsystems, making them a typical target for attackers. Therefore, the firmware of the different subsystems needs to be updated to the latest version by the manufacturer to fix bugs and introduce new features, e.g., using security patches. In this paper, we…
▽ More
Recently, Autonomous Vehicles (AVs) have gained extensive attention from both academia and industry. AVs are a complex system composed of many subsystems, making them a typical target for attackers. Therefore, the firmware of the different subsystems needs to be updated to the latest version by the manufacturer to fix bugs and introduce new features, e.g., using security patches. In this paper, we propose a distributed firmware update scheme for the AVs' subsystems, leveraging blockchain and smart contract technology. A consortium blockchain made of different AVs manufacturers is used to ensure the authenticity and integrity of firmware updates. Instead of depending on centralized third parties to distribute the new updates, we enable AVs, namely distributors, to participate in the distribution process and we take advantage of their mobility to guarantee high availability and fast delivery of the updates. To incentivize AVs to distribute the updates, a reward system is established that maintains a credit reputation for each distributor account in the blockchain. A zero-knowledge proof protocol is used to exchange the update in return for a proof of distribution in a trust-less environment. Moreover, we use attribute-based encryption (ABE) scheme to ensure that only authorized AVs will be able to download and use a new update. Our analysis indicates that the additional cryptography primitives and exchanged transactions do not affect the operation of the AVs network. Also, our security analysis demonstrates that our scheme is efficient and secure against different attacks.
△ Less
Submitted 14 November, 2018;
originally announced November 2018.
-
Blockchain-based Charging Coordination Mechanism for Smart Grid Energy Storage Units
Authors:
Mohamed Baza,
Mahmoud Nabil,
Muhammad Ismail,
Mohamed Mahmoud,
Erchin Serpedin,
Mohammad Rahman
Abstract:
Energy storage units (ESUs) enable several attractive features of modern smart grids such as enhanced grid resilience, effective demand response, and reduced bills. However, uncoordinated charging of ESUs stresses the power system and can lead to a blackout. On the other hand, existing charging coordination mechanisms suffer from several limitations. First, the need for a central charging coordina…
▽ More
Energy storage units (ESUs) enable several attractive features of modern smart grids such as enhanced grid resilience, effective demand response, and reduced bills. However, uncoordinated charging of ESUs stresses the power system and can lead to a blackout. On the other hand, existing charging coordination mechanisms suffer from several limitations. First, the need for a central charging coordinator (CC) presents a single point of failure that jeopardizes the effectiveness of the charging coordination. Second, a transparent charging coordination mechanism does not exist where users are not aware whether the CC is honest or not in coordination charging requests among them in a fair way. Third, existing mechanisms overlook the privacy concerns of the involved customers. To address these limitations, in this paper, we leverage the blockchain and smart contracts to build a decentralized charging coordination mechanism without the need for a centralized charging coordinator. First ESUs should use tokens for anonymously authenticate themselves to the blockchain. Then each ESU sends a charging request that contains its State-of-Charge (SoC), Time-to-complete-charge (TCC) and amount of required charging to the smart contract address on the blockchain. The smart contract will then run the charging coordination mechanism in a self-executed manner such that ESUs with the highest priorities are charged in the present time slot while charging requests of lower priority ESUs are deferred to future time slots. In this way, each ESU can make sure that charging schedules are computed correctly. Finally, we have implemented the proposed mechanism on the Ethereum test-bed blockchain, and our analysis shows that execution cost can be acceptable in terms of gas consumption while enabling decentralized charging coordination with increased transparency, reliability, and privacy preserving.
△ Less
Submitted 2 April, 2019; v1 submitted 5 November, 2018;
originally announced November 2018.