Loading...
Search for: physical-layers
0.009 seconds
Total 44 records

    Maximizing the secrecy energy efficiency of the cooperative rate-splitting aided downlink in multi-carrier uav networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 71, Issue 11 , 2022 , Pages 11803-11819 ; 00189545 (ISSN) Bastami, H ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Clerckx, B ; Hanzo, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information security by detecting the eavesdropper's location, their limited energy motivates our research to propose a secure and energy efficient scheme. Thanks to the common-message philosophy introduced by Rate-Splitting (RS), we no longer have to allocate a portion of the transmit power to radiate Artificial Noise (AN), and yet both the Energy Efficiency (EE) and secrecy can be improved. Hence we define and study the Secrecy Energy Efficiency (SEE) of a multi-carrier multi-UAV network, in which Cooperative Rate-Splitting (CRS) is employed by each multi-antenna UAV Base-Station (UAV-BS) for protecting... 

    Recent Trends, Challenges, and future aspects of p2p energy trading platforms in electrical-based networks considering blockchain technology: a roadmap toward environmental sustainability

    , Article Frontiers in Energy Research ; Volume 10 , 2022 ; 2296598X (ISSN) Javed, H ; Irfan, M ; Shehzad, M ; Abdul Muqeet, H ; Akhter, J ; Dagar, V ; Guerrero, J. M ; Sharif University of Technology
    Frontiers Media S.A  2022
    Abstract
    Peer-to-peer (P2P) energy trading platform is an upcoming energy generation and effective energy managing strategy that rewards proactive customers (acting as prosumers) in which individuals trade energy for products and services. On the other hand, P2P trading is expected to give multiple benefits to the grid in minimizing the peak load demand, energy consumption costs, and eliminating network losses. However, installing P2P energy trading on a broader level in electrical-based networks presents a number of modeling problems in physical and virtual network layers. As a result, this article presents a thorough examination of P2P studies of energy trade literature. An overview is given with... 

    Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning

    , Article Physical Communication ; Volume 49 , 2021 ; 18744907 (ISSN) Bastami, H ; Moradikia, M ; Behroozi, H ; de Lamare, R. C ; Abdelhadi, A ; Ding, Z ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    This paper investigates the physical layer security (PLS) design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdropping attacks performed by both untrusted relay nodes and Eve. Considering the hardware impairments (HIs), both total power budget constraint for the whole network and the individual power constraint at each node, this paper presents a novel approach to jointly optimize relay beamformer and transmit powers aiming at maximizing average secrecy rate (ASR). To... 

    On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks

    , Article IEEE Transactions on Information Forensics and Security ; Volume 16 , 2021 , Pages 5018-5033 ; 15566013 (ISSN) Bastami, H ; Letafati, M ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Hanzo, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search and rescue as well as in air-borne Base Station (BS). However, their communications are prone to both channel errors and eavesdropping. Hence, we investigate the max-min secrecy fairness of UAV-aided cellular networks, in which Cooperative Rate-Splitting (CRS) aided downlink transmissions are employed by each multi-antenna UAV Base Station (UAV-BS) to safeguard the downlink of a two-user Multi-Input Single-Output (MISO) system against an external multi-antenna Eavesdropper ( Eve ). Realistically, only Imperfect Channel State Information (ICSI) is assumed to be available at the transmitter.... 

    Massive MIMO-NOMA systems secrecy in the presence of active eavesdroppers

    , Article 30th International Conference on Computer Communications and Networks, ICCCN 2021, 19 July 2021 through 22 July 2021 ; Volume 2021-July , 2021 ; 10952055 (ISSN); 9780738113302 (ISBN) Soltani, M ; Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security... 

    Jamming-resilient frequency hopping-aided secure communication for internet-of-things in the presence of an untrusted relay

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 10 , July , 2020 , Pages 6771-6785 Letafati, M ; Kuhestani, A ; Behroozi, H ; Ng, D. W. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative network. In the considered system model, a source communicates with a destination in the presence of an untrusted relay and a powerful multi-Antenna adversary jammer. The untrusted relay is an authorized necessary helper who may wiretap the confidential information. Meanwhile, the jammer is an external attacker who tries to damage both the training and transmission phases. Different from traditional frequency hopping spread spectrum (FHSS) techniques that require a pre-determined pattern between communicating nodes, in... 

    A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay

    , Article 2020 IEEE International Conference on Communications Workshops, ICC Workshops 2020, 7 June 2020 through 11 June 2020 ; July , 2020 Letafati, M ; Kuhestani, A ; Ng, D. W. K ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    The Internet-of-Things (IoT) spans various applications in healthcare filed, from smart wearable or implantable sensors to remote monitoring of elderly, and medical device networking. In this paper, a jamming-resistant scheme for the healthcare IoT is proposed to provide secure and reliable data transmission in a two-hop cooperative network, where a source communicates with a destination in the presence of an untrusted relay and an active adversary. The untrusted relay is an authorized necessary helper who may wiretap the confidential information, e.g., the secret measured data of a patient, while the jammer is an external attacker who tries to interrupt the communication. Different from... 

    Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for internet of things

    , Article IEEE Transactions on Information Forensics and Security ; Volume 15 , March , 2020 , Pages 2856-2868 Letafati, M ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may be placed far away. In this paper, by taking a variety of realistic hardware imperfections (HWIs) and channels estimation errors (CEEs) into account, the secrecy performance of a three-hop cooperative network with a source, a destination and two consecutive amplify-and-forward (AF) relays is investigated. The relays are considered to be untrusted, i.e., while they are mandatory helpers for data transmission, they may overhear the received signals. We adopt the artificial noise injection scheme, to keep the source message secret from... 

    Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

    , Article Wireless Networks ; Volume 27 , November , 2020 , pages 795–807 Mamaghani, M. T ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Springer  2020
    Abstract
    Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed... 

    Secrecy throughput maximization for massive MIMO wireless powered communication networks

    , Article 2019 IEEE Global Communications Conference, GLOBECOM 2019, 9 December 2019 through 13 December 2019 ; 2019 ; 9781728109626 (ISBN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single- antenna sensor nodes which harvest energy from the BS. The first group, referred to as information transmitters (ITs), use the harvested energy to transmit information back to the BS; the second group, referred to as energy receivers (ERs), use the harvested energy for non- transmission related operations. We consider a two-slot protocol. In the first time slot, all nodes harvest energy from the BS. In the second slot, ITs transmit information to the BS,... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Outage performance in secure cooperative NOMA

    , Article 2019 Iran Workshop on Communication and Information Theory, IWCIT 2019, 24 April 2019 through 25 April 2019 ; 2019 ; 9781728105840 (ISBN) Abolpour, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in two phases: 1) Direct transmission phase, in which the base station broadcasts a superposition of the messages, 2) Cooperation phase, in which the strong user acts as a relay to help in forwarding the messages of the weak user. We study the secrecy outage performance in two cases: (i) security of... 

    Secure transmission with covert requirement in untrusted relaying networks

    , Article 9th International Symposium on Telecommunication, IST 2018, 17 December 2018 through 19 December 2018 ; 2019 , Pages 670-675 ; 9781538682746 (ISBN) Forouzesh, M ; Azmi, P ; Kuhestani, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we investigate the problem of secure communication with covert requirement in untrusted relaying networks. Our considered system model contains one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current time slot. To overcome these two attacks, it is assumed that the destination and the source inject jamming signal to the network in phase I and phase II, respectively. Accordingly, the communication in our proposed system model is accomplished in two phases. In the first phase, when the source... 

    On Medium chemical reaction in diffusion-based molecular communication: A two-way relaying example

    , Article IEEE Transactions on Communications ; Volume 67, Issue 2 , 2019 , Pages 1117-1132 ; 00906778 (ISSN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Chemical reactions are a prominent feature of molecular communication systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes, or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: 1) to reduce signal-dependent observation noise of receivers by reducing the signal density; 2) to realize molecular physical-layer network coding (PNC) by performing the natural XOR... 

    A novel genetic-based resource allocation and cooperative node selection technique for physical layer security designs

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 4733-4746 ; 09296212 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    This paper presents a novel approach for power allocation and cooperative node selection to enhance physical layer security in presence of an eavesdropper in a wireless network. Our network consists of a source–destination pair and a number of cooperative nodes which can be used as relays to increase throughput at the destination, or as friendly jammers to confuse eavesdropper. First, we introduce a low complexity method, for which relay−jammer selection and power allocation are performed, simultaneously. Then, we propose self-adaptive genetic algorithm to solve the non-linear non-convex programing problem. Using the proposed method, the number of friendly jammers that ensure the secrecy... 

    A genetic approach in relay-jammer selection and power allocation for physical layer security

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 374-379 ; 9781509034345 (ISBN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Node cooperation approaches improve physical layer security in wireless networks without applying data encryption. Selecting the appropriate nodes to cooperate as relays or friendly jammers, to degrade eavesdropper's link, is a challenging problem which has attracted a lot of attention in recent years. Various approaches, based on conventional exhaustive search, have been suggested for optimal relay-jammer selection and power allocation in the literature. The complexity of these methods is proportional to the number of intermediate nodes. As the number of intermediate nodes exceeds a specific bound, conventional exhaustive search appears infeasible due to high computational complexity. In... 

    Physical layer network coding in molecular two-way relay networks

    , Article IWCIT 2016 - Iran Workshop on Communication and Information Theory, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In traditional wireless networks, physical layer network coding (PNC) exploits the inverse additivity property of broadcast signals in the medium, an idea which is not directly applicable to molecular networks. In this paper, to make the natural XOR operation possible at the physical layer, we exploit the reaction of different molecule types and we propose a PNC scheme in diffusion-based molecular relay networks. For comparison, we consider the straightforward network coding (SNC) scheme in molecular networks. Assuming the ligand-receptor binding process at the receivers, we investigate the error performance of both schemes. It is observed that in addition to the simplicity of the proposed... 

    Proposing a hybrid protocol for secure wireless networks based on signcryption scheme

    , Article 2013 World Congress on Computer and Information Technology, WCCIT 2013 ; June , 2013 , Page(s): 1 - 6 ; 9781479904600 (ISBN) Darmian, N. R ; Oskoei, H. R. D ; Vazirnezhad, B ; Sharif University of Technology
    2013
    Abstract
    Considering the weaknesses of cryptography algorithms and the attacks performed against them, cryptography alone cannot guarantee the security of communication in a wireless network. With regard to the developments in wireless communication networks brought about by smart array antennas, security can be sought in the physical layer as well, aiming to restrict the access of the data in a wireless network and limit it to authorized users only in order to further restrain malicious data accesses. In this paper, we analysis a strategy for restricting data access using smart array antennas and present the results in security by a parameter called exposure region. For this strategy afterwards we... 

    Cross-layer rateless coding over wireless relay networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 1545-1549 ; 9781424495399 (ISBN) Shirvani Moghaddam, M ; Khalaj, B. H ; Pasandshanjani, E ; Sharif University of Technology
    2011
    Abstract
    The focus of the paper is on cross-layer transmission based on rateless coding for relay networks. In the proposed method, rateless coding is used at the packet level and a separate physical layer coding is used at the physical layer. As rateless codes are originally designed and optimized for erasure channels, using these codes at the physical layer can lead to significant performance degradation. The proposed scheme has the advantage of a cross-layer design which uses a rateless code at the packet level modeled by an erasure channel. Based on the analysis and simulation results provided in this paper, the cross-layer scheme results in earlier successful decoding at the destination  

    Performance analysis of slotted ALOHA random access packet-switching optical CDMA networks using generalized optical orthogonal codes and M-ary overlapping PPM signaling

    , Article Journal of Optical Communications and Networking ; Volume 3, Issue 7 , July , 2011 , Pages 568-576 ; 19430620 (ISSN) Shoaie, M. A ; Khazraei, S ; Pakravan, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper we study slotted ALOHA random access optical code division multiple access packet-switching networks with a chip-level receiver structure. We use generalized optical orthogonal codes (GOOCs) and the overlapping pulse position modulation (OPPM) signaling technique to improve system performance. The impact of physical layer parameters such as the GOOC cross-correlation value and the OPPM overlapping index on key performance benchmarks such as network throughput and delay are analyzed. We also study the stability of the network based on the number of backlogged users, using the expected state drift. It has been shown that using GOOC instead of strict optical orthogonal codes...