Loading...
Search for: frequency-hopping
0.009 seconds
Total 21 records

    Unified multiple-access performance analysis of several multi-rate multicarrier spread-spectrum systems

    , Article 2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security, Los Angeles, CA, 26 September 2004 through 29 September 2004 ; Volume 60, Issue 1 , 2004 , Pages 424-429 ; 15502252 (ISSN) Nikjah, R ; Nasiri Kenari, M ; Sharif University of Technology
    2004
    Abstract
    A unified multiple-access performance analysis and comparison of three multicarrier spread-spectrum multiple-access schemes, namely MC-CDMA (multicarrier code-division multiple-access), MC-FH (multicarrier frequency hopping) and a hybrid of the above systems, called DS-MC-FH (direct-sequence MC-FH), in synchronous and asynchronous multi-rate environments, where each user can have several multi-rate services, with a maximum-ratio combining (MRC) receiver is provided. Near-far and power-control-error (PCE) effects on the systems' performances have also been investigated. Our analyses indicate that MC-CDMA systems with Walsh codes outperform the other schemes. DS-MC-FH systems with Walsh codes... 

    Iterative interference cancellation for a coded multicarrier frequency-hopping CDMA (MC-FH-CDMA) system

    , Article Scientia Iranica ; Volume 11, Issue 3 , 2004 , Pages 248-254 ; 10263098 (ISSN) M. Ebrahimi, T. M ; Nasiri Kenari, M ; Sharif University of Technology
    Sharif University of Technology  2004
    Abstract
    In this paper a low complexity iterative multi-user receiver for the coded MC-FH-CDMA system, is considered, which has been introduced in [1]. The structure of the proposed receiver consists of a Multi-User Likelihood Calculator (MULC) and a bank of SISO channel decoders, one for each active user. Based on the received signal and a priori information about code bits, provided by SISO decoders in the previous iteration, MULC computes the extrinsic information of the coded symbols of active users in the form of a Log-Likelihood Ratio (LLR). This information is used by channel decoders as a priori information to compute an update of LLRs. The processing proceeds in an iterative manner, similar... 

    Performance analysis of an internally coded MC-FH-CDMA system

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 23-28 ; 1424410940 (ISBN); 9781424410941 (ISBN) Ghani Shayesteh, M ; Nasiri Kenari, M ; Sharif University of Technology
    2007
    Abstract
    We consider an internally coded scheme for multicarrier frequency-hopping CDMA (MC-FH-CDMA) communication systems. In this method, the total bandwidth is partitioned into Ns1 disjoint bands and each band is also segmented into Ns2 subbands. Based on the super-orthogonal encoder output and a pseudorandom (PN) sequence, one of the Ns1 bands is selected. Then, the data is transmitted in that band in the form of multicarrier frequency-hopping technique using BPSK modulation. At the receiver front end, we use soft detector, then we apply Viterbi decoding algorithm. We evaluate the performance of the proposed method. The results indicate that our method outperforms the previously presented uncoded... 

    On the intelligent eavesdropping of differential frequency hopping

    , Article IEEE Wireless and Microwave Technology Conference, WAMICON 2006, Clearwater Beach, FL, 4 December 2006 through 5 December 2006 ; 2006 ; 1424408482 (ISBN); 9781424408481 (ISBN) Zibaee Nejad, A ; Aref, M. R ; Sharif University of Technology
    2006
    Abstract
    Dirential frequency hopping (DFH) was introduced as a new technology for reliable high data rate transmission. Since the system utilizes lower transmitting power relative to the other spread spectrum techniques and also principle part of the technique, frequency transition function (FTF), is designed privately and uniformly, the scheme is said to be safe and secure. In spite of previous researches, this paper shows that an intelligent eavesdropper may threat the security of the system by finding FTF and sending jamming signal toward authorized receivers. As a result, regular DFH can not provide consumers with security in wireless networks and hence we propose that FTF should be designed with... 

    Performance evaluation of LDPC coded MC-FH-CDMA system over fading channels

    , Article 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC2003, Beijing, 7 September 2003 through 10 September 2003 ; Volume 2 , 2003 , Pages 1574-1578 ; 0780378229 (ISBN); 9780780378223 (ISBN) Behroozi, H ; Haghighat, J ; Nasiri Kenari, M ; Jamali, S. H ; Sharif University of Technology
    2003
    Abstract
    In this paper, we consider the application of Low-Density Parity-Check (LDPC) codes in multi-carrier frequency-hopping (MC-FH) CDMA systems. We evaluate the performance of the coded system in a slowly Rayleigh fading frequency-selective channel using different construction methods of regular LDPC codes. We then compare the results with those of the Super-Orthogonal coded system. Our simulation results show that the LDPC coded scheme significantly outperforms the uncoded and the Super-Orthogonal coded scheme. Finally, we propose a new semi-random construction of regular LDPC code and evaluate its performance in MC-FH-CDMA system. Our numerical results indicate that this new construction... 

    Performance analysis and comparisons of different ultra-wideband multiple access modulation schemes

    , Article IEE Proceedings: Communications ; Volume 153, Issue 5 , 2006 , Pages 705-718 ; 13502425 (ISSN) Zeinalpour Yazdi, Z ; Nasiri Kenari, M ; Sharif University of Technology
    2006
    Abstract
    The multiuser performance of two kinds of ultra-wideband (UWB) systems, namely, multi-carrier frequency-hopping-UWB and time-hopping-UWB, is evaluated. We derive the bit error rate of these systems in both AWGN and fading channels. Our numerical results show that the TH-UWB system always outperforms the MC-FH-UWB system with non-coherent detection. However, the MC-FH-UWB system with coherent detection presents a better performance than TH-UWB in a very few cases. Then, we use a practical low-rate convolutional error correcting code, which does not require any extra bandwidth further than that needed by the uncoded scheme, to improve the system performance. The results show that the coded... 

    A wide tuning range, fractional multiplying delay-locked loop topology for frequency hopping applications

    , Article Analog Integrated Circuits and Signal Processing ; Volume 46, Issue 3 , 2006 , Pages 203-214 ; 09251030 (ISSN) Tajalli, A ; Torkzadeh, P ; Atarodi, M ; Sharif University of Technology
    2006
    Abstract
    This paper introduces a low-jitter and wide tuning range delay-locked loop (DLL) -based fractional clock generator (CG) topology. The proposed fractional multiplying DLL (FMDLL) architecture overcomes some disadvantages of phase-locked loops (PLLs) such as jitter accumulation while maintaining the advantageous of a PLL as a multi-rate fractional frequency multiplier. Based on this topology, a CG with 1-2.5 GHz output frequency tuning range has been designed in a digital 0.18 um CMOS technology while the multiplication ratios are M+k/(2N C ) in which M, k, and N C are adjustable. To generate some finer ratios, k is changed periodically or randomly (by a digital delta-sigma modulator) between... 

    A lightweight secure and resilient transmission scheme for the internet of things in the presence of a hostile jammer

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 6 , 2021 , Pages 4373-4388 ; 23274662 (ISSN) Letafati, M ; Kuhestani, A ; Wong, K. K ; Piran, M. J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret... 

    Jamming-resilient frequency hopping-aided secure communication for internet-of-things in the presence of an untrusted relay

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 10 , July , 2020 , Pages 6771-6785 Letafati, M ; Kuhestani, A ; Behroozi, H ; Ng, D. W. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative network. In the considered system model, a source communicates with a destination in the presence of an untrusted relay and a powerful multi-Antenna adversary jammer. The untrusted relay is an authorized necessary helper who may wiretap the confidential information. Meanwhile, the jammer is an external attacker who tries to damage both the training and transmission phases. Different from traditional frequency hopping spread spectrum (FHSS) techniques that require a pre-determined pattern between communicating nodes, in... 

    A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay

    , Article 2020 IEEE International Conference on Communications Workshops, ICC Workshops 2020, 7 June 2020 through 11 June 2020 ; July , 2020 Letafati, M ; Kuhestani, A ; Ng, D. W. K ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    The Internet-of-Things (IoT) spans various applications in healthcare filed, from smart wearable or implantable sensors to remote monitoring of elderly, and medical device networking. In this paper, a jamming-resistant scheme for the healthcare IoT is proposed to provide secure and reliable data transmission in a two-hop cooperative network, where a source communicates with a destination in the presence of an untrusted relay and an active adversary. The untrusted relay is an authorized necessary helper who may wiretap the confidential information, e.g., the secret measured data of a patient, while the jammer is an external attacker who tries to interrupt the communication. Different from... 

    Performance analysis of internally coded partial-band DS-CDMA system in multipath Rayleigh fading channel

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 29-34 ; 1424410940 (ISBN); 9781424410941 (ISBN) Mirmohseni, M ; Nasiri Kenari, M ; Shayesteh, M. G ; Sharif University of Technology
    2007
    Abstract
    We evaluate the performance of the internally coded partial-band DS-CDMA scheme first introduced in [1], in a multipath Rayleigh fading channel. The scheme of [1] is based on frequency-hopping (FH) and direct-sequence (DS) spread spectrum techniques. The total bandwidth is divided into Ns subbands. The output of a super-orthogonal encoder and a pseudorandom (PN) sequence selects one subband, in which the user's data is sent in the form of DS-CDMA signal using the second PN sequence. We consider soft detection at the receiver front end. We obtain the upper and lower bounds on the bit error rate. For comparison, we also consider the conventional DS-CDMA system. It is shown that for the same... 

    Throughput Analysis in Multi Hop Cellular Networks

    , M.Sc. Thesis Sharif University of Technology Vaezi, Kaveh (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    OFDMA multi-hop cellular network (MCN) is the topic of a wide range of research today. In this thesis, we analyse this type of networks, regarding shadowing status, mobility patterns and different service requirements. In the multi-hop (MH) scenario, six fixed relays are set up in each cell, which split the cell into seven subcells. For mobility modeling, each subcell is split into several sub-regions. Mobile nodes are able to maintain at each sub-region with a random time distribution and migrate from it to one of its neighboring sub-regions. We also consider three types of services requiring specific number of subcarriers with specific BERs. The set of subcarriers is distributed among... 

    Design and implementation of spectrally-encoded spread-time CDMA transceiver

    , Article IEEE Communications Letters ; Vol. 18, issue. 5 , 2014 , pp. 741-744 ; ISSN: 10897798 Shoreh, M. H ; Hosseinianfar, H ; Akhoundi F ; Yazdian, E ; Farhang, M ; Salehi, J. A ; Sharif University of Technology
    Abstract
    In this paper, we present and discuss the physical implementation and testing of a Spectrally-Encoded Spread-Time Code Devision Multiple Access (SE/ST-CDMA) transceiver. The proposed design is suitable for multiple-access and anti jamming wireless communication systems. The design and implementation takes into account the ability to automatically detect and mitigate tone jammers by altering the corresponding Gold sequence codes assigned uniquely to each user and setting the corresponding code's chip to zero. A simple real-time anti jamming mechanism capable of dealing with frequency hopping jammers is also proposed. The simulation results are provided in terms of Bit Error Rate (BER) versus... 

    Expert key selection impact on the MANETs' performance using probabilistic key management algorithm

    , Article SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks ; 2013 , Pages 347-351 ; 9781450324984 (ISBN) Gharib, M ; Minaei, M ; Golkari, M ; Movaghar, A ; Sharif University of Technology
    2013
    Abstract
    Mobile ad hoc networks (MANETs) have been turned into very attractive area of research in the duration of recent years, whereas security is the most challenging point that they undergo. Cryptography is an essential solution for providing security within MANETs. However, storing all keys in every node, if practically possible, is inefficient in large scale MANETs due to some limitations such as memory or process capability. This paper extends our previous idea which was a novel probabilistic key management algorithm that stores only a few randomly chosen keys instead of all ones. In this paper, several different scenarios are proposed for key selection in which they are more practical, and... 

    A semantic-based access control mechanism using semantic technologies

    , Article SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks, 6 October 2009 through 10 October 2009, Famagusta ; 2009 , Pages 258-267 ; 9781605584126 (ISBN) Ehsan, M. A ; Amini, M ; Jalili, R ; Taganrog Inst. Technol. South. Fed. Univ.; Russian Foundation for Basic Research; Int. Counc. Electron. Commer. Consult. (EC-Counc.); Kordon Ltd.; World Scientific Publishing (UK) Ltd ; Sharif University of Technology
    2009
    Abstract
    In order to overcome the shortcomings of the recent frameworks and mechanisms for semantic-based access control, this paper presents a semantic-based, context-aware, and multi-domain enabled framework implementing a semantic-based access control mechanism for Semantic Web. The access control framework is based on the MA(DL)2 model, which takes the semantic relationships among different entities into account. The framework handles the Semantic Web context by classifying and representing it through an ontology. Considering the MA(DL)2 model, the framework assumes SemanticWeb having some overlapped domains, which each contains an authority and a security agent. As a domain authority... 

    Performance evaluations and comparisons of several LDPC coded MC-FH-CDMA systems

    , Article Scientia Iranica ; Volume 13, Issue 4 , 2006 , Pages 337-347 ; 10263098 (ISSN) Behroozi, H ; Haghighat, J ; Nasiri Kenari, M ; Jamali, S. H ; Sharif University of Technology
    Sharif University of Technology  2006
    Abstract
    In this paper, the application of regular Low-Density Parity-Check (LDPC) codes in Multi-Carrier Frequency-Hopping (MC-FH) CDMA systems is studied. To this end, different well-known constructions of regular LDPC codes are considered and the performance of LDPC coded MC-FH-CDMA systems, based on these constructions, are evaluated and compared in a frequency-selective slowly Rayleigh fading channel. These results are compared with those previously reported for super-orthogonal convolutionally coded MC-FH-CDMA systems. The simulation results indicate that the LDPC coded MC-FH-CDMA system significantly outperforms the uncoded and super-orthogonal convolutionally coded schemes. To alleviate the... 

    An internally coded partial-band DS-CDMA system and its performance analysis

    , Article ICU 2005: 2005 IEEE International Conference on Ultra-Wideband, Zurich, 5 September 2005 through 8 September 2005 ; Volume 2005 , 2005 , Pages 38-42 ; 078039397X (ISBN); 9780780393974 (ISBN) Mirmohseni, M ; Nasiri Kenari, M ; Shayesteh, M. G ; Sharif University of Technology
    2005
    Abstract
    We propose a new partial-band DS-CDMA scheme for UWB communication systems, which is based on frequency-hopping (FH) and direct-sequence (DS) spread spectrum techniques. The total bandwidth is divided into Ns subbands. The output of a superorthogonal encoder and a pseudorandom (PN) sequence select one subband, in which the user's data is sent in the form of DS-CDMA signal using the second PN sequence. We consider soft detection at the receiver front end. We obtain the upper and lower bounds on the bit error rate for the proposed method. For comparison, we also consider the conventional DS-CDMA system. It is shown that the proposed multiple access method outperforms the conventional DS-CDMA... 

    New Achievable Rates In Frequency Hopped Spread Spectrum Systems

    , M.Sc. Thesis Sharif University of Technology Aref, Vahid (Author) ; Marvasti, Farrokh (Supervisor)
    Abstract
    In  this  dissertation,  we  investigate  the  frequency  hopped  spread  spectrum  systems  which are extensively used in many communication systems. We derive the capacity region  of  Synchronous  Frequency  Hopped  Multiple  Access  (FHMA)  channels  (for  any  kind of noisy or nonselective fading environment) by using the side information which exists in the multi‐user detection. We assume that random hopping patterns are used by all the transmitters, and the common receiver knows the hopping patterns. We also compute  the  capacities  of  FHMA  with  and  without  power  control  for  AWGN  and  noiseless MFSK (in particular BFSK) modulated systems and compare the ... 

    Verification of OSPF vulnerabilities by colored petri net

    , Article SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks ; November , 2013 , Pages 102-109 ; 9781450324984 (ISBN) Niari, S. T ; Jahangir, A. H ; Sharif University of Technology
    2013
    Abstract
    Routers and routing protocols are critical parts of a network infrastructure. OSPF is one of the most important routing protocols, and therefore its vulnerabilities can be very destructive. This makes its security analysis critical. There are many reported and potential vulnerabilities in OSPF protocol. Considering the complexity and the ambiguity of its description in RFC 2328, it is very valuable to design a formal model of the protocol and analyze the vulnerabilities of its critical parts. In this paper, some challenging parts of OSPF protocol along with attack scenarios are modeled by means of Colored Petri Net in CPN Tools environment. Then, the reported vulnerabilities are analyzed by... 

    Unified multiple-access performance analysis of several multirate multicarrier spread-spectrum systems

    , Article Scientia Iranica ; Volume 13, Issue 1 , 2006 , Pages 33-49 ; 10263098 (ISSN) Nikjah, R ; Nasiri Kenari, M ; Sharif University of Technology
    Sharif University of Technology  2006
    Abstract
    A unified multiple-access performance analysis and comparison of three multicarrier spread-spectrum multiple-access schemes, namely, MC-CDMA (Multicarrier Code-Division Multiple-Access), MC-FH (Multicarrier Frequency Hopping) and a hybrid of the above systems, called DS-MC-FH (Direct-Sequence MC-FH), in a multirate environment, where each user can have several multirate services, is provided. In MC-CDMA and MC-FH systems, users and their diverse services are differentiated by means of only one kind of signature code. However, in a DS-MCFH scheme, different users and different services of the same user are distinguished through the first and second signature codes, respectively. The...