Loading...
Search for: protocol-designers
0.004 seconds

    Recursive linear and differential cryptanalysis of ultralightweight authentication protocols

    , Article IEEE Transactions on Information Forensics and Security ; Volume 8, Issue 7 , 2013 , Pages 1140-1151 ; 15566013 (ISSN) Ahmadian, Z ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    Privacy is faced with serious challenges in the ubiquitous computing world. In order to handle this problem, some researchers in recent years have focused on design and analysis of privacy-friendly ultralightweight authentication protocols. Although the majority of these schemes have been broken to a greater or lesser extent, most of these attacks are based on ad-hoc methods that are not extensible to a large class of ultralightweight protocols. So this research area still suffers from the lack of structured cryptanalysis and evaluation methods. In this paper, we introduce new frameworks for full disclosure attacks on ultralightweight authentication protocols based on new concepts of... 

    Mobility analyzer: A framework for analysis and recognition of mobility traces in mobile Ad-Hoc networks

    , Article 3rd International Conference on New Technologies, Mobility and Security, 20 December 2009 through 23 December 2009 ; 2009 ; 9781424462735 (ISBN) Khaledi, M. J ; Hemmatyar, A. M. A ; Rabiee, H. R ; Mousavi, S. M ; Khaledi, M. H ; Sharif University of Technology
    Abstract
    Mobility is one of the most challenging issues in mobile Ad-Hoc networks which has a significant impact on performance of network protocols. To cope with this issue, the protocol designers should be able to analyze the movement of mobile nodes in a particular wireless network. In this paper, a new framework called Mobility Analyzer has been introduced for analysis and recognition of mobility traces. At first, the Mobility Analyzer acquires some mobility traces collected by GPS or generated with mobility simulators; then it calculates some mobility metrics which represent the movement behavior of the mobile nodes; finally it attempts to classify mobility traces into particular mobility models... 

    Mental arousal level recognition competition on the shared database

    , Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1730-1736 ; 9781728115085 (ISBN) Saidi, M ; Rezania, S ; Khazaei, E ; Taghibeyglou, B ; Hashemi, S. S ; Kaveh, R ; Abootalebi, V ; Bagheri, S ; Homayounfar, M ; Asadi, M ; Mohammadian, A ; Mozafari, M ; Hasanzadeh, N ; DIni, H ; Sarvi, H. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper presents the results of the shared task with the aim of arousal level recognition for the competition held in conjunction with the 27th Iranian Conference on Electrical Engineering (ICEE 2019). A database annotated with arousal level labels released by Research Center for Development of Advanced Technologies. The contest was held on arousal database according to a defined protocol. Three teams were able to enter into the final stage of the competition according to compare their performance measure with the baseline method. The baseline method is proposed by the data owner. The aim of this paper is outlining the database, protocol design, and providing an overview of top-ranked... 

    On the link excess life in mobile wireless networks

    , Article International Conference on Computing: Theory and Applications, ICCTA 2007, Kolkata, 5 March 2007 through 7 March 2007 ; 2007 , Pages 72-76 ; 0769527701 (ISBN); 9780769527703 (ISBN) Nayebi, A ; Khosravi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2007
    Abstract
    In this paper, one of the most important parameters in performance evaluation and protocol design of wireless networks, Link Excess Life (LEL), is investigated. An analytical model for LEL is proposed and evaluated. Evaluation of the proposed model leads to the first closed form expression for the excess life PDF. The closed form expression affords ease of further evaluations, e.g, an interesting result is that the average excess life is infinite for the proposed model. The effect of relative velocity distribution on the link excess life PDF is also investigated. The superposition property of LEL is mentioned and used to explore a systematic method for evaluation of the effect of stationary... 

    QoS-aware joint policies in cognitive radio networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 2220-2225 ; 9781424495399 (ISBN) Salehkaleybar, S ; Majd, S. A ; Pakravan, M. R ; Sharif University of Technology
    2011
    Abstract
    One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only tries to guarantee QoS requirements but also maximize network throughput. We use Decentralized Partially Observable Markov Decision Process (Dec-POMDP) to formulate interactions between SUs. Meanwhile, a tractable approach for Dec-POMDP is utilized to extract sub-optimum joint policies for large horizons. Among these policies, the QoS-aware joint... 

    An energy efficient cross-layer protocol for wireless sensor networks

    , Article 26th Iranian Conference on Electrical Engineering, ICEE 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 493-498 ; 9781538649169 (ISBN) Janbakhsh, N ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Wireless Sensor Networks (WSNs) have developed in recent years and are used in many different applications such as fire detection, military operations, and healthcare. Sensor nodes have the ability to sense an environment, sending and receiving information and forwarding packets from source nodes to a sink. These tasks consume large amounts of energy. In many WSN applications, delay and reliability of data delivery and the energy consumption of nodes are important design metrics. Network protocols such as medium access control (MAC) and routing should be designed to improve these metrics. In this article, we propose a new cross layer algorithm that improves the performance of WSN networks...