Loading...
Search for: physical-layer-security
0.014 seconds
Total 26 records

    Physical Layer Security in Non-Orthogonal Multiple Access (NOMA) Networks

    , M.Sc. Thesis Sharif University of Technology Jahanbazi, Shahab (Author) ; Mirmohseni, Mahtab (Supervisor)
    Abstract
    The increasing expansion of wireless communications and the increase in information traffic and the number of communication users, and on the other hand, the frequency and energy frequency limitations have led to the emergence of new generation communications. In the fifth generation of communications, one of the solutions to ensure the optimal use of bandwidth is the use of the non-orthogonal multiple access (NOMA) schema, which of course, the use of such a scheme in the system naturally increases the complexity of the receivers. Unlike most access methods in previous generations of communications, the goal of NOMA is the simultaneous use of multiple users from a frequency band for data... 

    A comparison between different meta-heuristic techniques in power allocation for physical layer security

    , Article Iranian Journal of Electrical and Electronic Engineering ; Volume 13, Issue 4 , 2017 , Pages 310-317 ; 17352827 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Abstract
    Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA), Partial Swarm Optimization... 

    Secure transmission with covert requirement in untrusted relaying networks

    , Article 9th International Symposium on Telecommunication, IST 2018, 17 December 2018 through 19 December 2018 ; 2019 , Pages 670-675 ; 9781538682746 (ISBN) Forouzesh, M ; Azmi, P ; Kuhestani, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we investigate the problem of secure communication with covert requirement in untrusted relaying networks. Our considered system model contains one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current time slot. To overcome these two attacks, it is assumed that the destination and the source inject jamming signal to the network in phase I and phase II, respectively. Accordingly, the communication in our proposed system model is accomplished in two phases. In the first phase, when the source... 

    Secure Transmission Strategies in Relay Simultaneous Wireless Information and Power Transfer

    , M.Sc. Thesis Sharif University of Technology Soleimani Baghshsh, Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Advisor)
    Abstract
    In this thesis, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay,we adopt power splitting (PS) and time switching (TS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because,the relay must choose either to eavesdrop the... 

    Improving Physical Layer Security for Cellular Users in Threat of Eavesdroppers

    , M.Sc. Thesis Sharif University of Technology Rahimi, Mahdi (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Security for wireless communication networks has become a crucial issue because of the broadcast nature of wireless channels. On every cellular network Since it is possible for passive nodes to easily overhear the confidential information transmitted between transmitter and receiver, it is necessary to provide secure communication.When a cellular user wants to communicate with a node or base station on the cellular network, it expects that information will be transmitted and received without interference, with enough quality and without eavesdropping. On the other hand In practical scenarios, we know that cellular network nodes are not equipped with ideal equipment and some percent... 

    Physical Layer Secure Image Transmission Based on Machine Learning Methods

    , M.Sc. Thesis Sharif University of Technology Letafati, Mehdi (Author) ; Behroozi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Co-Supervisor)
    Abstract
    The rapid development of wireless communications, e.g., the sixth generation (6G) networks, together with the emergence of various technologies for exchanging data has made the information security a big concern. In other words, today’s decentralized wireless networks face with major challenges in terms of key distribution and management of traditional cryptographic techniques. In contrast, the approach of PHY layer security, which wisely utilizes the inherent characteristics of wireless links, has been introduced to address provable and lightweight security mechanisms. In addition, learning-based techniques have shown to be able to provide well-established mechanisms in enhancing the... 

    Physical Layer Security in Wireless Communication Networks in Presence of Intelligent Reflecting Surfaces

    , M.Sc. Thesis Sharif University of Technology Pourkarimi, Ali (Author) ; Nasiri Kenari, Masoumeh (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    The ever-increasing demand for wireless communication has raised the need for better utilization of bandwidth and energy. Intelligent Reflecting Surface (IRS) is an emerging technology that has been proposed for the sixth generation of wireless communication. In this thesis, we study the essential role these surfaces can play in improving the physical layer security.First, we consider a relatively realistic scenario for the location of the eavesdroppers. In this scenario, we will assume that the transmitters, users, and eavesdroppers all use a single antenna configuration, and the eavesdroppers are placed randomly across the studied region. Two notable parameters in physical layer security,... 

    Improvement of Physical Layer Security Based on Polar Codes in Wireless Communications

    , M.Sc. Thesis Sharif University of Technology Ghamami, Iman (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In modern wireless communication networks,that we have heterogeneous, asynchronous and ultra low latency networks and Due to the high processing power required by conventional cryptographic systems based on computational security, information theoritc security can play important role in the future development of these systems. Security in this case does not depend on the eavesdropper's computing power, but on the statistical independence between the main message and the received message of the eavesdropper. In recent years, polar codes have created new arenas, as they were the provable channel codes that could achieve capacity and reliability simultaneously. In addition, the clear structure,... 

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    Proposing a hybrid protocol for secure wireless networks based on signcryption scheme

    , Article 2013 World Congress on Computer and Information Technology, WCCIT 2013 ; June , 2013 , Page(s): 1 - 6 ; 9781479904600 (ISBN) Darmian, N. R ; Oskoei, H. R. D ; Vazirnezhad, B ; Sharif University of Technology
    2013
    Abstract
    Considering the weaknesses of cryptography algorithms and the attacks performed against them, cryptography alone cannot guarantee the security of communication in a wireless network. With regard to the developments in wireless communication networks brought about by smart array antennas, security can be sought in the physical layer as well, aiming to restrict the access of the data in a wireless network and limit it to authorized users only in order to further restrain malicious data accesses. In this paper, we analysis a strategy for restricting data access using smart array antennas and present the results in security by a parameter called exposure region. For this strategy afterwards we... 

    A novel genetic-based resource allocation and cooperative node selection technique for physical layer security designs

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 4733-4746 ; 09296212 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    This paper presents a novel approach for power allocation and cooperative node selection to enhance physical layer security in presence of an eavesdropper in a wireless network. Our network consists of a source–destination pair and a number of cooperative nodes which can be used as relays to increase throughput at the destination, or as friendly jammers to confuse eavesdropper. First, we introduce a low complexity method, for which relay−jammer selection and power allocation are performed, simultaneously. Then, we propose self-adaptive genetic algorithm to solve the non-linear non-convex programing problem. Using the proposed method, the number of friendly jammers that ensure the secrecy... 

    A genetic approach in relay-jammer selection and power allocation for physical layer security

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 374-379 ; 9781509034345 (ISBN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Node cooperation approaches improve physical layer security in wireless networks without applying data encryption. Selecting the appropriate nodes to cooperate as relays or friendly jammers, to degrade eavesdropper's link, is a challenging problem which has attracted a lot of attention in recent years. Various approaches, based on conventional exhaustive search, have been suggested for optimal relay-jammer selection and power allocation in the literature. The complexity of these methods is proportional to the number of intermediate nodes. As the number of intermediate nodes exceeds a specific bound, conventional exhaustive search appears infeasible due to high computational complexity. In... 

    Physical layer security in AF and CF relay networks with RF-energy harvesting

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 86-92 ; 9781538665602 (ISBN) Soleimani, A ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay, we adopt power splitting (PS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because, the relay must choose either to eavesdrop the signal to be able to decode... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Outage performance in secure cooperative NOMA

    , Article 2019 Iran Workshop on Communication and Information Theory, IWCIT 2019, 24 April 2019 through 25 April 2019 ; 2019 ; 9781728105840 (ISBN) Abolpour, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in two phases: 1) Direct transmission phase, in which the base station broadcasts a superposition of the messages, 2) Cooperation phase, in which the strong user acts as a relay to help in forwarding the messages of the weak user. We study the secrecy outage performance in two cases: (i) security of... 

    Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning

    , Article Physical Communication ; Volume 49 , 2021 ; 18744907 (ISSN) Bastami, H ; Moradikia, M ; Behroozi, H ; de Lamare, R. C ; Abdelhadi, A ; Ding, Z ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    This paper investigates the physical layer security (PLS) design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdropping attacks performed by both untrusted relay nodes and Eve. Considering the hardware impairments (HIs), both total power budget constraint for the whole network and the individual power constraint at each node, this paper presents a novel approach to jointly optimize relay beamformer and transmit powers aiming at maximizing average secrecy rate (ASR). To... 

    Massive MIMO-NOMA systems secrecy in the presence of active eavesdroppers

    , Article 30th International Conference on Computer Communications and Networks, ICCCN 2021, 19 July 2021 through 22 July 2021 ; Volume 2021-July , 2021 ; 10952055 (ISSN); 9780738113302 (ISBN) Soltani, M ; Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security... 

    Maximizing the secrecy energy efficiency of the cooperative rate-splitting aided downlink in multi-carrier uav networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 71, Issue 11 , 2022 , Pages 11803-11819 ; 00189545 (ISSN) Bastami, H ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Clerckx, B ; Hanzo, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information security by detecting the eavesdropper's location, their limited energy motivates our research to propose a secure and energy efficient scheme. Thanks to the common-message philosophy introduced by Rate-Splitting (RS), we no longer have to allocate a portion of the transmit power to radiate Artificial Noise (AN), and yet both the Energy Efficiency (EE) and secrecy can be improved. Hence we define and study the Secrecy Energy Efficiency (SEE) of a multi-carrier multi-UAV network, in which Cooperative Rate-Splitting (CRS) is employed by each multi-antenna UAV Base-Station (UAV-BS) for protecting... 

    Secure Transmission in Cooperative Non-Orthogonal Multiple Access (NOMA) Systems

    , M.Sc. Thesis Sharif University of Technology Abolpour, Milad (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    Nowadays, number of the users in wireless networks are increasing due to the high speed data transmission. Increasing number of the users increases the required bandwidth and power resource. Using non-orthogonal multiple access (NOMA) is a promising approach to decrease the significant bandwidth and also the required power of the network. NOMA systems decrease the latency of the users and also improve the spectral efficiency by serving multiple users. As signals are transmitting in wireless networks, the internal and also external eavesdroppers have access to the message of the legitimate users in the networks. Therefore, some sort of secrecy of the messages of the users must be provided.... 

    Improving Throughput and Secrecy Throughput Performance in Wireless Powered Communication Networks

    , Ph.D. Dissertation Sharif University of Technology Rezaei Estakhrooeieh, Roohollah (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    In wireless powered communication networks (WPCNs), wireless nodes are charged via an access point. In these networks, an access point transfers power to the nodes, and then, the nodes use the received power to transmit their information to the access point. Due to the wireless transmission of the information, eavesdropping of it is an important vulnerability in these networks. The conventional method to resolve this security problem is using cryptography algorithms. However, this method needs key management and complex encryption algorithms to be used by the nodes, which may not be applicable. Physical layer security (PLS), which uses the channel characteristics, is a more suitable way to...