Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Attiya Mahmood is active.

Publication


Featured researches published by Attiya Mahmood.


IEEE Transactions on Antennas and Propagation | 2015

Impact of Array Mutual Coupling on Multiantenna Propagation-Based Key Establishment

Attiya Mahmood; Michael A. Jensen

While the impact of antenna mutual coupling on multiple-input multiple-output (MIMO) communication performance has been well documented, little work has appeared demonstrating how antenna coupling impacts the performance of multiantenna radios that use reciprocal electromagnetic propagation to establish secret encryption keys. This paper uses network theory to analyze the performance of such systems. The presentation includes an eavesdropper whose antennas may be very near and therefore coupled to the antennas of a legitimate node and further demonstrates the signal and noise model when the systems must remove the impact of nonreciprocal circuit elements through calibration. Representative results obtained with the model quantify the impact of coupling and the type of impedance matching used to connect the antennas to the radio circuitry on the system key establishment performance.


IEEE Transactions on Antennas and Propagation | 2016

Impact of Propagation on the Vulnerability of Channel-Based Key Establishment

Attiya Mahmood; Michael A. Jensen

When generating encryption keys using the reciprocal propagation channel, the secure key rate bounding the number of bits that can be generated securely differs from the available key rate that ignores the presence of an eavesdropper. To explore the impact of propagation on this difference, this work formulates a model for computing the secure and available key rates for a multiuser scenario involving two legitimate nodes and a passive eavesdropper. Application of the model to a variety of different propagation conditions demonstrates that the secure and available key rates differ appreciably when the K-factor is large or when the separation between the eavesdropper and one of the legitimate nodes is small.


radio and wireless symposium | 2014

Data-dependent transmitter fingerprints for radio authentication

Attiya Mahmood; Michael A. Jensen

In radio frequency fingerprinting, observations of the impact of unique imperfections in the transmitter circuitry on the transmitted waveform are used to identify the device from which the data was transmitted. While this technique can be used to authenticate radios accessing a secure network, the security of the authentication can be enhanced if the transmitter fingerprint changes based on the transmitted data. This paper uses simulations and measurements to examine the behavior of a data-dependent filter response designed for such an application. The results show that the circuit holds promise for providing a data-dependent fingerprint useful for device authentication.


international symposium on antennas and propagation | 2017

UAV attitude estimation using antenna arrays

Attiya Mahmood; Jon W. Wallace; Michael A. Jensen

This paper presents a new algorithm for estimating all three Euler angles that specify the relative attitude between two unmanned aerial vehicles based on multiple-input multiple-output (MIMO) radio transmissions. The algorithm uses direction-of-arrival estimates as well as estimates of the multi-polarized MIMO channel response to construct the coordinate frames describing the UAV attitudes. These coordinate frames then allow specification of the rotations required to align one UAV with the other. Simulations reveal that estimation errors are relatively small even for low signal-to-noise ratio.


international symposium on antennas and propagation | 2016

Simple evaluation of the multi-user MIMO channel spatial covariance

Attiya Mahmood; Michael A. Jensen

This paper proposes a simple formulation for computing the full cross-covariance of multi-user multi-antenna multipath propagation channels where the multipath characteristics observed at two adjacent radios are correlated. The technique is applied to the case of key establishment based on reciprocal electromagnetic propagation to demonstrate the impact of a proximate eavesdropper on the key rate performance.


international symposium on antennas and propagation | 2016

Radio circuitry calibration for reciprocal channel-based secret key establishment

Attiya Mahmood; Michael A. Jensen

Successful establishment of secret encryption keys based on bidirectional estimates of the multipath propagation channel depends critically on the reciprocity of the observed channel coefficients. Since typical radio circuitry is not reciprocal, calibration is required to remove the impact of non-reciprocal channel contributions. This paper reports on the impact of circuit non-reciprocity on key establishment performance and demonstrates calibration to recover the lost performance.


international symposium on antennas and propagation | 2015

Secure key establishment in the presence of a passive eavesdropper: Impact of antenna coupling

Attiya Mahmood; Michael A. Jensen

While the establishment of encryption keys based on reciprocal electromagnetic propagation has received recent attention, work has so far ignored the impact of mutual coupling. This paper formulates the rate at which key bits can be generated incorporating the effects of antenna mutual coupling and a passive eavesdropper that is close to one of the radios.


usnc ursi radio science meeting | 2014

The impact of array mutual coupling on propagation-based key establishment

Attiya Mahmood; Michael A. Jensen

Theoretical analyses and practical protocol implementations have demonstrated the concept of using reciprocal electromagnetic propagation as a basis for establishing secret encryption keys that enable secure communication between two radios. Recent studies have extended this concept, demonstrating that when multiple-antenna radios are used for such key establishment, the key rate, or the number of bits that can be generated for each channel estimate, can be increased (C. Chen and M. A. Jensen, IEEE Trans. Mobile Computing, 10, 205-215, 2011). However, these prior studies have largely ignored the impact of antenna mutual coupling on the achievable key establishment performance.


ursi general assembly and scientific symposium | 2014

Network model for evaluating the performance of reciprocal channel-based key establishment with coupled antennas

Attiya Mahmood; Michael A. Jensen

Prior work on multi-antenna wireless communication has produced practical yet rigorous signal models that can account for the impact of antenna array mutual coupling and sophisticated circuit noise contributions. However, these models have not yet been extended to the case of systems that generate secret encryption keys based on the reciprocal electromagnetic propagation of multipath channels. This work performs this extension, building upon previously developed network models and augmenting them to accommodate considerations unique to the key establishment protocol. Simulation results demonstrate the impact on the achievable performance of mutual coupling and of the impedance matching network that interfaces the coupled array to the accompanying circuitry.


european conference on antennas and propagation | 2017

Radio frequency UAV attitude estimation using direction of arrival and polarization

Attiya Mahmood; Jon W. Wallace; Michael A. Jensen

Collaboration


Dive into the Attiya Mahmood's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge