Loading...
Search for: physical-layers
0.008 seconds
Total 44 records

    Secure Communication via Cooperation and Cooperative Jamming

    , M.Sc. Thesis Sharif University of Technology Hatami, Mohammad (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    The broadcast nature of wireless communications makes the propagation medium vulnerable to security attacks such as eavesdropping and jamming from adversarial or unauthorized users. Applying physical layer secrecy approaches will enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without using any secret keys. However, physical layer security approaches are typically feasible only when the source-eavesdropper channel is weaker than the source-destination channel. Cooperative jamming can be used to overcome this challenge and increase the secrecy rate. In this thesis, the security of two-phase relaying system with multiple... 

    Secure Transmission Strategies in Relay Simultaneous Wireless Information and Power Transfer

    , M.Sc. Thesis Sharif University of Technology Soleimani Baghshsh, Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Advisor)
    Abstract
    In this thesis, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay,we adopt power splitting (PS) and time switching (TS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because,the relay must choose either to eavesdrop the... 

    Physical Layer Security in Non-Orthogonal Multiple Access (NOMA) Networks

    , M.Sc. Thesis Sharif University of Technology Jahanbazi, Shahab (Author) ; Mirmohseni, Mahtab (Supervisor)
    Abstract
    The increasing expansion of wireless communications and the increase in information traffic and the number of communication users, and on the other hand, the frequency and energy frequency limitations have led to the emergence of new generation communications. In the fifth generation of communications, one of the solutions to ensure the optimal use of bandwidth is the use of the non-orthogonal multiple access (NOMA) schema, which of course, the use of such a scheme in the system naturally increases the complexity of the receivers. Unlike most access methods in previous generations of communications, the goal of NOMA is the simultaneous use of multiple users from a frequency band for data... 

    Secure Transmission in Cooperative Non-Orthogonal Multiple Access (NOMA) Systems

    , M.Sc. Thesis Sharif University of Technology Abolpour, Milad (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    Nowadays, number of the users in wireless networks are increasing due to the high speed data transmission. Increasing number of the users increases the required bandwidth and power resource. Using non-orthogonal multiple access (NOMA) is a promising approach to decrease the significant bandwidth and also the required power of the network. NOMA systems decrease the latency of the users and also improve the spectral efficiency by serving multiple users. As signals are transmitting in wireless networks, the internal and also external eavesdroppers have access to the message of the legitimate users in the networks. Therefore, some sort of secrecy of the messages of the users must be provided.... 

    Implementation and Development of a New Framework for Flexible Inter-PHY Functional Splitting in Cloud RAN Networks

    , M.Sc. Thesis Sharif University of Technology Basiri-Moghadam, Shahriar (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Thorough investigation of the Cloud-RAN (C-RAN) architecture has recently shown that CRAN can bring advanced cooperated and coordinated processing capabilities as well as the multiplexing gains toward future radio access networks. The baseband processing of each base station instance can now be flexibly split into smaller functional components, that can be placed either at remote radio units (RRUs) or baseband units (BBUs), depending on the available resources. In this project, we investigate recent implemented methods in C-RAN. also, we propose, develop and implement new architectural frameworks for C-RAN that can support both a flexible functional split and a new functional splitting known... 

    Improving Physical Layer Security for Cellular Users in Threat of Eavesdroppers

    , M.Sc. Thesis Sharif University of Technology Rahimi, Mahdi (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Security for wireless communication networks has become a crucial issue because of the broadcast nature of wireless channels. On every cellular network Since it is possible for passive nodes to easily overhear the confidential information transmitted between transmitter and receiver, it is necessary to provide secure communication.When a cellular user wants to communicate with a node or base station on the cellular network, it expects that information will be transmitted and received without interference, with enough quality and without eavesdropping. On the other hand In practical scenarios, we know that cellular network nodes are not equipped with ideal equipment and some percent... 

    Physical Layer Secure Image Transmission Based on Machine Learning Methods

    , M.Sc. Thesis Sharif University of Technology Letafati, Mehdi (Author) ; Behroozi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Co-Supervisor)
    Abstract
    The rapid development of wireless communications, e.g., the sixth generation (6G) networks, together with the emergence of various technologies for exchanging data has made the information security a big concern. In other words, today’s decentralized wireless networks face with major challenges in terms of key distribution and management of traditional cryptographic techniques. In contrast, the approach of PHY layer security, which wisely utilizes the inherent characteristics of wireless links, has been introduced to address provable and lightweight security mechanisms. In addition, learning-based techniques have shown to be able to provide well-established mechanisms in enhancing the... 

    Physical Layer Security in Wireless Communication Networks in Presence of Intelligent Reflecting Surfaces

    , M.Sc. Thesis Sharif University of Technology Pourkarimi, Ali (Author) ; Nasiri Kenari, Masoumeh (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    The ever-increasing demand for wireless communication has raised the need for better utilization of bandwidth and energy. Intelligent Reflecting Surface (IRS) is an emerging technology that has been proposed for the sixth generation of wireless communication. In this thesis, we study the essential role these surfaces can play in improving the physical layer security.First, we consider a relatively realistic scenario for the location of the eavesdroppers. In this scenario, we will assume that the transmitters, users, and eavesdroppers all use a single antenna configuration, and the eavesdroppers are placed randomly across the studied region. Two notable parameters in physical layer security,... 

    Improvement of Physical Layer Security Based on Polar Codes in Wireless Communications

    , M.Sc. Thesis Sharif University of Technology Ghamami, Iman (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In modern wireless communication networks,that we have heterogeneous, asynchronous and ultra low latency networks and Due to the high processing power required by conventional cryptographic systems based on computational security, information theoritc security can play important role in the future development of these systems. Security in this case does not depend on the eavesdropper's computing power, but on the statistical independence between the main message and the received message of the eavesdropper. In recent years, polar codes have created new arenas, as they were the provable channel codes that could achieve capacity and reliability simultaneously. In addition, the clear structure,... 

    Design and Quality of Service Improvement in Optical Code Division Multiple Access Networks

    , M.Sc. Thesis Sharif University of Technology Hadi, Mohammad (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Considering the advantages of optical communications and code division multiple access technique, Optical Code Division Multiple Access Networks (OCDMANs) was introduced. Thence, many researchers have suggested methods for creating Quality of Service (QoS) differentiated classes in OCDMANs. In this thesis, we have comprehensive review on the QoS assignment methods and enhance them by offering new techniques. In physical layer, we concentrate on variable chip rate OCDMANs and in MAC sub-layer, a new algorithm named Adaptive Level Control (ALC) is introduced. Then, we focus on the physical design of OCDMANs. Firstly, we solve the problem of one-class OCDMAN and introduce few simple and... 

    Improving Throughput and Secrecy Throughput Performance in Wireless Powered Communication Networks

    , Ph.D. Dissertation Sharif University of Technology Rezaei Estakhrooeieh, Roohollah (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    In wireless powered communication networks (WPCNs), wireless nodes are charged via an access point. In these networks, an access point transfers power to the nodes, and then, the nodes use the received power to transmit their information to the access point. Due to the wireless transmission of the information, eavesdropping of it is an important vulnerability in these networks. The conventional method to resolve this security problem is using cryptography algorithms. However, this method needs key management and complex encryption algorithms to be used by the nodes, which may not be applicable. Physical layer security (PLS), which uses the channel characteristics, is a more suitable way to... 

    Physical Layer Authentication in the Internet of Things based on Deep Learning

    , M.Sc. Thesis Sharif University of Technology Abdollahi, Majid (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    IoT security is an important step in the rapid development of its applications and ser-vices. Many security protocols have been defined to maintain security at higher communication layers, such as the transport layer and the application layer, but with the advent of quantum computers due to high-speed parallel computing, the previous methods are no longer secure and we have to establish security at lower layers such as the physical layer. The efficiency of IoT devices depends on the reliability of their message transmission. Cyber-attacks such as data injection, eavesdropping and man-in-the-middle can lead to security challenges. In this study, we propose a new deep learning based component... 

    A novel genetic-based resource allocation and cooperative node selection technique for physical layer security designs

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 4733-4746 ; 09296212 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    This paper presents a novel approach for power allocation and cooperative node selection to enhance physical layer security in presence of an eavesdropper in a wireless network. Our network consists of a source–destination pair and a number of cooperative nodes which can be used as relays to increase throughput at the destination, or as friendly jammers to confuse eavesdropper. First, we introduce a low complexity method, for which relay−jammer selection and power allocation are performed, simultaneously. Then, we propose self-adaptive genetic algorithm to solve the non-linear non-convex programing problem. Using the proposed method, the number of friendly jammers that ensure the secrecy... 

    Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

    , Article Wireless Networks ; Volume 27 , November , 2020 , pages 795–807 Mamaghani, M. T ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Springer  2020
    Abstract
    Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed... 

    Physical layer network coding in molecular two-way relay networks

    , Article IWCIT 2016 - Iran Workshop on Communication and Information Theory, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In traditional wireless networks, physical layer network coding (PNC) exploits the inverse additivity property of broadcast signals in the medium, an idea which is not directly applicable to molecular networks. In this paper, to make the natural XOR operation possible at the physical layer, we exploit the reaction of different molecule types and we propose a PNC scheme in diffusion-based molecular relay networks. For comparison, we consider the straightforward network coding (SNC) scheme in molecular networks. Assuming the ligand-receptor binding process at the receivers, we investigate the error performance of both schemes. It is observed that in addition to the simplicity of the proposed... 

    A genetic approach in relay-jammer selection and power allocation for physical layer security

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 374-379 ; 9781509034345 (ISBN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Node cooperation approaches improve physical layer security in wireless networks without applying data encryption. Selecting the appropriate nodes to cooperate as relays or friendly jammers, to degrade eavesdropper's link, is a challenging problem which has attracted a lot of attention in recent years. Various approaches, based on conventional exhaustive search, have been suggested for optimal relay-jammer selection and power allocation in the literature. The complexity of these methods is proportional to the number of intermediate nodes. As the number of intermediate nodes exceeds a specific bound, conventional exhaustive search appears infeasible due to high computational complexity. In... 

    Secrecy throughput maximization for massive MIMO wireless powered communication networks

    , Article 2019 IEEE Global Communications Conference, GLOBECOM 2019, 9 December 2019 through 13 December 2019 ; 2019 ; 9781728109626 (ISBN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single- antenna sensor nodes which harvest energy from the BS. The first group, referred to as information transmitters (ITs), use the harvested energy to transmit information back to the BS; the second group, referred to as energy receivers (ERs), use the harvested energy for non- transmission related operations. We consider a two-slot protocol. In the first time slot, all nodes harvest energy from the BS. In the second slot, ITs transmit information to the BS,... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Outage performance in secure cooperative NOMA

    , Article 2019 Iran Workshop on Communication and Information Theory, IWCIT 2019, 24 April 2019 through 25 April 2019 ; 2019 ; 9781728105840 (ISBN) Abolpour, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in two phases: 1) Direct transmission phase, in which the base station broadcasts a superposition of the messages, 2) Cooperation phase, in which the strong user acts as a relay to help in forwarding the messages of the weak user. We study the secrecy outage performance in two cases: (i) security of... 

    Secure transmission with covert requirement in untrusted relaying networks

    , Article 9th International Symposium on Telecommunication, IST 2018, 17 December 2018 through 19 December 2018 ; 2019 , Pages 670-675 ; 9781538682746 (ISBN) Forouzesh, M ; Azmi, P ; Kuhestani, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we investigate the problem of secure communication with covert requirement in untrusted relaying networks. Our considered system model contains one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current time slot. To overcome these two attacks, it is assumed that the destination and the source inject jamming signal to the network in phase I and phase II, respectively. Accordingly, the communication in our proposed system model is accomplished in two phases. In the first phase, when the source...