Loading...
Search for: mobile-communication
0.011 seconds
Total 67 records

    Anonymous authentication protocol for GSM networks

    , Article International Journal of Security and Networks ; Volume 3, Issue 1 , 2008 , Pages 54-62 ; 17478405 (ISSN) Asadpour, M ; Sattarzadeh, B ; Movaghar, A ; Sharif University of Technology
    Inderscience Publishers  2008
    Abstract
    In this paper, we propose a new anonymous channel protocol for authentication in GSM mobile communication networks. The protocol is the result of incorporating our anonymity scheme to an efficient GSM authentication protocol proposed by Chang et al. As a result, our protocol has all the features of their scheme including anonymity. Compared with the most recent protocols in this area, such as those by Peinado and Hwang et al., we show that our scheme generally is more secure and more efficient. © 2008, Inderscience Publishers  

    Spread-time/time-hopping UWB CDMA communication

    , Article IEEE International Symposium on Communications and Information Technologies: Smart Info-Media Systems, ISCIT 2004, Sapporo, 26 October 2004 through 29 October 2004 ; Volume 2 , 2004 , Pages 1047-1050 ; 0780385934 (ISBN) Farhang, M ; Salehi, J. A ; Sharif University of Technology
    2004
    Abstract
    The use of Spread-Time CDMA for ultrawideband (UWB) wireless communication is proposed and its capability for supporting many high data rate users is investigated. Furthermore we will study a hybrid technique, namely, Spread-Time/Time-Hopping to increase the capacity of the above mentioned technique and simultaneously minimizing the effect of near-far in a typical CDMA system  

    A data modem for GSM adaptive multi rate voice channel

    , Article Proceedings of IEEE East-West Design and Test Symposium, EWDTS 2013 ; 2013 ; 9781479920969 (ISBN) Boloursaz, M ; Hadavi, A. H ; Kazemi, R ; Behnia, F ; Sharif University of Technology
    2013
    Abstract
    This paper considers the problem of digital data transmission through the Global System for Mobile communications (GSM). A data modem is presented that utilizes codebooks of Speech-Like (SL) symbols to transmit data through the GSM Adaptive Multi Rate (AMR) voice codec. Using this codebook of finite alphabet, the continuous vocoder channel is modeled by a Discrete Memory less Channel (DMC). A heuristic optimization algorithm is proposed to select codebook symbols from a database of observed human speech such that the capacity of DMC is maximized. Simulation results show that the proposed data modem achieves higher data rates and lower symbol error rates compared to previously reported... 

    Data hiding robust to mobile communication vocoders

    , Article IEEE Transactions on Multimedia ; Volume 18, Issue 12 , 2016 , Pages 2345-2357 ; 15209210 (ISSN) Kazemi, R ; Perez Gonzalez, F ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    The swift growth of cellular mobile networks in recent years has made voice channels almost accessible everywhere. Besides, data hiding has recently attracted significant attention due to its ability to imperceptibly embed side information that can be used for signal enhancement, security improvement, and two-way authentication purposes. In this regard, we aim at proposing efficient schemes for hiding data in the widespread voice channel of cellular networks. To this aim, our first contribution is to model the channel accurately by considering a linear filter plus a nonlinear scaling function. This model is validated through experiments with true speech signals. Then we leverage on this... 

    Flopcoin: a cryptocurrency for computation offloading

    , Article IEEE Transactions on Mobile Computing ; 2017 ; 15361233 (ISSN) Chatzopoulos, D ; Ahmadi, M ; Kosta, S ; Hui, P ; Sharif University of Technology
    Abstract
    During the last years, researchers have proposed solutions to help smartphones improve execution time and reduce energy consumption by offloading heavy tasks to remote entities. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices, giving birth to the Device-to-Device offloading paradigm. None of these strategies, though, offers any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that... 

    A low-cost and low-power single Bit phased array at Ka-Band for 5G applications

    , Article 49th European Microwave Conference, EuMC 2019, 1 October 2019 through 3 October 2019 ; 2019 , Pages 622-625 ; 9782874870552 (ISBN) Mazaheri, M ; Vafaeinezhad, M ; Alizadeh, M ; Fakharzadeh, M ; Safavi Naeini, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we develop a phase inverting technique to improve the received power of an antenna array, with an emphasis on the simplicity of the receiver hardware and reducing the power consumption. The goal is to propose a simple array architecture to develop intelligent algorithms to enhance the received power of the array. A test set-up with 8-element switched array antenna at 28 GHz has been developed to implement the proposed algorithms. The measured results reveal that in a high scattering environment, the phase inverting technique provides about 13 dB enhancement in the received power compared to a fixed array. This significant enhancement plays a major role in establishing a robust... 

    Human body scattering modeling and measurement for millimeter-wave and 5g bands

    , Article Proceedings of the 2019 Texas Symposium on Wireless and Microwave Circuits and Systems, WMCS 2019, 28 March 2019 through 29 March 2019 ; 2019 ; 9781728118031 (ISBN) Mokhtari Koushyar, F ; Alamdar, M ; Fakharzadeh, M ; et al.; eV-Technologies; Keysight Technologies; Maury Microwave; Nokia; Wireless and Microwave Circuits and Systems Lab, Baylor University ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper we address the electromagnetic (EM) wave scattering from human body in millimeter-wave (MMW) band and 5G networks, where human body can be considered as an electrically large object. The complicated geometry of human body is accurately modeled using non-uniform rational B-spline (NURBS) surfaces as a thin dielectric slab with permittivity of human skin. Physical optics (PO) approximation is used to formulate the scattering problem. To solve highly oscillatory PO integrals, triangular boundary-rectangular mesh (TBRM) algorithm is exploited. This algorithm provides frequency-independent solution for PO integrals and allows frequency-independent meshing of the human body surface.... 

    Secure data over GSM based on algebraic codebooks

    , Article Proceedings of IEEE East-West Design and Test Symposium, EWDTS 2013, Rostov-on-Don ; 2013 ; 9781479920969 (ISBN) Boloursaz, M ; Kazemi, R ; Nashtaali, D ; Nasiri, M ; Behnia, F ; Sharif University of Technology
    2013
    Abstract
    This paper considers the problem of secure data communication through the Global System for Mobile communications (GSM). The algebraic codebook method for data transmission through the Adaptive Multi Rate 12.2Kbps voice channel is investigated and its maximum achievable data rate is calculated. Based on the vocoder channel properties, the method's Bit Error Rate (BER) performance is improved by repetition coding and classification methods. Simulation results show that by simultaneous application of repetition coding and clustering methods, the decoder's performance improves about 6.5% compared to the case of no clustering for 1Kbps data communication in AMR 4.75 voice codec  

    An improved attack on A5/1

    , Article 2011 8th International ISC Conference on Information Security and Cryptology, ISCISC 2011, 14 September 2011 through 15 September 2011, Mashhad ; 2011 , Pages 41-44 ; 9781467300773 (ISBN) Amin Ghafari, V ; Mohajeri, J ; Sharif University of Technology
    2011
    Abstract
    A5/1 is a stream cipher used in GSM to provide over-the-air communication privacy. Biham and Dunkelman proposed an attack on A5/1 with time complexity of 2∧(39.91) and data complexity of 2∧(21.1) known bits and memory complexity of 32 GB. In this paper, we propose an improvement on their attack. Our improvement is identification and elimination of useless states from the precomputed table. Furthermore, we propose another way for use of table in online phase of attack that causes decreasing in the time complexity to 2∧(37.89) and memory complexity decreases to half  

    A survey of system platforms for mobile payment

    , Article Proceedings - 2010 International Conference on Management of e-Commerce and e-Government, ICMeCG 2010, 23 October 2010 through 24 October 2010 ; 2010 , Pages 376-381 ; 9780769542454 (ISBN) Asadi Tehrani, M ; Amidian, A. A ; Muhammadi, J ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    With the evolution and significant growth in wireless technology and the development of mobile commerce, businesses can achieve superior performance through the implementation of platforms for mobile payment. However, there are several platforms for mobile payment to choose from which makes the selection of an appropriate platform for specific applications a challenging task. In response to this challenge, the most common mobile payment platforms recorded in the literature have been reviewed. This paper presents the result of this review describing the advantages and disadvantages of each system and offers ranking of the technologies considered. MCDM method is used for assessing and... 

    On social-aware content caching for D2D-enabled cellular networks with matching theory

    , Article IEEE Internet of Things Journal ; 2017 ; 23274662 (ISSN) Li, J ; Liu, M ; Lu, J ; Shu, F ; Zhang, Y ; Bayat, S ; Jayakody, D. N. K ; Sharif University of Technology
    Abstract
    In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device (D2D) communications is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users’ social properties to generate the utility functions of the... 

    Passwordless login system for mobile phones using CAPTCHA

    , Article 49th International Symposium ELMAR-2007 focused on Mobile Multimedia, Zadar, 12 September 2007 through 14 September 2007 ; September , 2007 , Pages 243-246 ; 13342630 (ISSN); 9789537044053 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2007
    Abstract
    In last 20 years, the Internet and mobile communication growth in parallel. There are many sites specially designed for mobile phones that users must enter username and password to enter them. In this paper we introduce a new method based on CAPTCHA which does not require entering any password. Instead of entering the password, an image of a number is shown to the user and he/she must type it. The user response is coded with his/her mobile phone IMEI and sent to the server. The server checks user's response according to user's IMEI and if it was correct, let the user to enter the site, so there is no need to enter any password. This method has been implemented in PHP and J2ME languages and... 

    Prioritisation of data partitioned MPEG-4 for streaming video in GPRS mobile networks

    , Article First IEEE and IFIP International Conference in Central Asia on Internet, 2005, Bishkek, 26 September 2005 through 28 September 2005 ; Volume 2005 , 2005 ; 0780391799 (ISBN); 9780780391796 (ISBN) Jafari, M ; Kasaei, S ; Sharif University of Technology
    2005
    Abstract
    With the advance of multimedia systems and wireless mobile communications, there has been a growing need to support multimedia services (such as mobile teleconferencing, mobile TV, telemedicine, and distance learning) using mobile multimedia technologies. Despite the research done in the field of mobile multimedia, delivery of real-time interactive video over noisy wireless channels is still a challenge for researchers. This paper presents a method for prioritising data partitioned MPEG-4 video in a way suitable for transmission over a mobile network. The effectiveness of the technique is demonstrated by examing its performance when the transport of the prioritized video streams can be... 

    A new soft-handoff management algorithm with two decision boundaries

    , Article 12th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2001), San Diego, CA, 30 September 2001 through 3 October 2001 ; Volume 1 , 2001 , Pages D54-D58 Ashtiani, F ; Salehi, J. A ; Aref, M. R ; Nasiri Kenari, M ; Sharif University of Technology
    2001
    Abstract
    One of the most prominent features of code division multiple-access (CDMA) cellular networks is their ability for applying soft-handoff. This type of handoff results in a better supporting of seamless communication services, capacity enhancement, QoS improvement, etc. Because of existence of more parameters and flexibilities compared to hard-handoff, an optimum solution for soft-handoff management and admission control for new and handoff calls is necessary. In this paper we propose a new algorithm with two thresholds for admission of new and handoff calls, and with two decision boundaries for controlling of handoff traffic. We compare this algorithm with a simpler one with only one decision... 

    Toward 5G: Fiwi enhanced lte-a hetnets with reliable low-latency fiber backhaul sharing and wifi offloading

    , Article IEEE/ACM Transactions on Networking ; Volume 25, Issue 2 , 2017 , Pages 690-707 ; 10636692 (ISSN) Beyranvand, H ; Levesque, M ; Maier, M ; Salehi, J. A ; Verikoukis, C ; Tipper, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    To cope with the unprecedented growth of mobile data traffic, we investigate the performance gains obtained from unifying coverage-centric 4G mobile networks and capacity-centric fiber-wireless (FiWi) broadband access networks based on data-centric Ethernet technologies with resulting fiber backhaul sharing and WiFi offloading capabilities. Despite recent progress on backhaul-aware 4G studies with capacity-limited backhaul links, the performance-limiting impact of backhaul latency and reliability has not been examined in sufficient detail previously. In this paper, we evaluate the maximum aggregate throughput, offloading efficiency, and in particular, the delay performance of FiWi enhanced... 

    GSLHA: Group-based secure lightweight handover authentication protocol for M2M communication

    , Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 15-20 ; 9781728143736 (ISBN) Modiri, M. M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, various protocols and schemes were proposed to achieve security requirements in M2M communication and reduce computational and communication costs. In this paper, we propose the group-based secure lightweight handover authentication (GSLHA) protocol for M2M communication in LTE and future 5G networks.... 

    On social-aware content caching for d2d-enabled cellular networks with matching theory

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 1 , 2019 , Pages 297-310 ; 23274662 (ISSN) Li, J ; Liu, M ; Lu, J ; Shu, F ; Zhang, Y ; Bayat, S ; Jayakody, D. N. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device communications (DTD) is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users' social properties to generate the utility functions of the... 

    An optimized small compact rectangular antenna with meta-material based on fast multi-objective optimization for 5G mobile communication

    , Article Journal of Computational Electronics ; Volume 20, Issue 4 , 2021 , Pages 1532-1540 ; 15698025 (ISSN) Nouri, M ; Abazari Aghdam, S ; Jafarieh, A ; Mallat, N. K ; Jamaluddin, M. H ; Dor Emami, M ; Sharif University of Technology
    Springer  2021
    Abstract
    The main purpose of this paper is to present a novel procedure for accelerating a multi-objective optimization method of designing a 5G antenna. The optimization method was chosen after comparing four learning optimization algorithms. The Kriging algorithm was found to be superior to the Artificial Neural Network (ANN), Support Vector Machine (SVM), and Rational algorithms. Our methodology is creatively correlated to exploit some cost functions of height, the Dielectric constant of the substrate, and meta-material design variables, with a view to reducing the return loss and increasing the gain in learning from the Kriging model builder techniques. This was fully achieved in the present... 

    Secure Data Communication through GSM Voice Channel

    , M.Sc. Thesis Sharif University of Technology Boloursaz Mashhadi, Mahdi (Author) ; Behnia, Fereidoon (Supervisor)
    Abstract
    Nowadays, with the increased penetration of wireless mobile networks (e.g. GSM, 3G, etc.), voice channels are widely available ubiquitously. This availability and wide coverage encourages utilization of such channels as a valuable available infrastructure for point to point secure data communication. This can be done either by using steganography and hiding the secure message in the voice passing through the channel or by ciphering and transmitting it through the voice channel as a speech-like signal. The proposed method for data communication or steganography through voice channels should be robust against lossy compression techniques applied by the vocoder block present in such channels.... 

    A lower capacity bound of secure end to end data transmission via GSM network

    , Article 2012 6th International Symposium on Telecommunications, IST 2012, 6 November 2012 through 8 November 2012 ; Novembe , 2012 , Pages 1015-1020 ; 9781467320733 (ISBN) Kazemi, R ; Mosayebi, R ; Etemadi, S. M ; Boloursaz, M ; Behnia, F ; Sharif University of Technology
    2012
    Abstract
    Global System for Mobile communications (GSM) is a widely spread, reliable and P2P channel through all over the world. These characteristics make GSM a channel suitable for a variety of applications in different domains especially security applications such as secure voice communication. Performance and usage of GSM applications extremely depends on the transmission data rate. Hence, transmitting data over GSM is still an attractive topic for research. This paper considers the problem of digital data transmission through the GSM voice channel. A lower capacity bound for data transmission through the GSM Adaptive Multi Rate (AMR) voice codec is presented. The GSM channel is modeled in a...