Loading...
Search for: physical-layers
0.012 seconds
Total 44 records

    Design and Quality of Service Improvement in Optical Code Division Multiple Access Networks

    , M.Sc. Thesis Sharif University of Technology Hadi, Mohammad (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Considering the advantages of optical communications and code division multiple access technique, Optical Code Division Multiple Access Networks (OCDMANs) was introduced. Thence, many researchers have suggested methods for creating Quality of Service (QoS) differentiated classes in OCDMANs. In this thesis, we have comprehensive review on the QoS assignment methods and enhance them by offering new techniques. In physical layer, we concentrate on variable chip rate OCDMANs and in MAC sub-layer, a new algorithm named Adaptive Level Control (ALC) is introduced. Then, we focus on the physical design of OCDMANs. Firstly, we solve the problem of one-class OCDMAN and introduce few simple and... 

    Secure Communication via Cooperation and Cooperative Jamming

    , M.Sc. Thesis Sharif University of Technology Hatami, Mohammad (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    The broadcast nature of wireless communications makes the propagation medium vulnerable to security attacks such as eavesdropping and jamming from adversarial or unauthorized users. Applying physical layer secrecy approaches will enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without using any secret keys. However, physical layer security approaches are typically feasible only when the source-eavesdropper channel is weaker than the source-destination channel. Cooperative jamming can be used to overcome this challenge and increase the secrecy rate. In this thesis, the security of two-phase relaying system with multiple... 

    Secure Transmission Strategies in Relay Simultaneous Wireless Information and Power Transfer

    , M.Sc. Thesis Sharif University of Technology Soleimani Baghshsh, Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Advisor)
    Abstract
    In this thesis, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay,we adopt power splitting (PS) and time switching (TS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because,the relay must choose either to eavesdrop the... 

    Physical Layer Security in Non-Orthogonal Multiple Access (NOMA) Networks

    , M.Sc. Thesis Sharif University of Technology Jahanbazi, Shahab (Author) ; Mirmohseni, Mahtab (Supervisor)
    Abstract
    The increasing expansion of wireless communications and the increase in information traffic and the number of communication users, and on the other hand, the frequency and energy frequency limitations have led to the emergence of new generation communications. In the fifth generation of communications, one of the solutions to ensure the optimal use of bandwidth is the use of the non-orthogonal multiple access (NOMA) schema, which of course, the use of such a scheme in the system naturally increases the complexity of the receivers. Unlike most access methods in previous generations of communications, the goal of NOMA is the simultaneous use of multiple users from a frequency band for data... 

    Secure Transmission in Cooperative Non-Orthogonal Multiple Access (NOMA) Systems

    , M.Sc. Thesis Sharif University of Technology Abolpour, Milad (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    Nowadays, number of the users in wireless networks are increasing due to the high speed data transmission. Increasing number of the users increases the required bandwidth and power resource. Using non-orthogonal multiple access (NOMA) is a promising approach to decrease the significant bandwidth and also the required power of the network. NOMA systems decrease the latency of the users and also improve the spectral efficiency by serving multiple users. As signals are transmitting in wireless networks, the internal and also external eavesdroppers have access to the message of the legitimate users in the networks. Therefore, some sort of secrecy of the messages of the users must be provided.... 

    Implementation and Development of a New Framework for Flexible Inter-PHY Functional Splitting in Cloud RAN Networks

    , M.Sc. Thesis Sharif University of Technology Basiri-Moghadam, Shahriar (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Thorough investigation of the Cloud-RAN (C-RAN) architecture has recently shown that CRAN can bring advanced cooperated and coordinated processing capabilities as well as the multiplexing gains toward future radio access networks. The baseband processing of each base station instance can now be flexibly split into smaller functional components, that can be placed either at remote radio units (RRUs) or baseband units (BBUs), depending on the available resources. In this project, we investigate recent implemented methods in C-RAN. also, we propose, develop and implement new architectural frameworks for C-RAN that can support both a flexible functional split and a new functional splitting known... 

    Improving Throughput and Secrecy Throughput Performance in Wireless Powered Communication Networks

    , Ph.D. Dissertation Sharif University of Technology Rezaei Estakhrooeieh, Roohollah (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    In wireless powered communication networks (WPCNs), wireless nodes are charged via an access point. In these networks, an access point transfers power to the nodes, and then, the nodes use the received power to transmit their information to the access point. Due to the wireless transmission of the information, eavesdropping of it is an important vulnerability in these networks. The conventional method to resolve this security problem is using cryptography algorithms. However, this method needs key management and complex encryption algorithms to be used by the nodes, which may not be applicable. Physical layer security (PLS), which uses the channel characteristics, is a more suitable way to... 

    Improving Physical Layer Security for Cellular Users in Threat of Eavesdroppers

    , M.Sc. Thesis Sharif University of Technology Rahimi, Mahdi (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Security for wireless communication networks has become a crucial issue because of the broadcast nature of wireless channels. On every cellular network Since it is possible for passive nodes to easily overhear the confidential information transmitted between transmitter and receiver, it is necessary to provide secure communication.When a cellular user wants to communicate with a node or base station on the cellular network, it expects that information will be transmitted and received without interference, with enough quality and without eavesdropping. On the other hand In practical scenarios, we know that cellular network nodes are not equipped with ideal equipment and some percent... 

    Physical Layer Secure Image Transmission Based on Machine Learning Methods

    , M.Sc. Thesis Sharif University of Technology Letafati, Mehdi (Author) ; Behroozi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Co-Supervisor)
    Abstract
    The rapid development of wireless communications, e.g., the sixth generation (6G) networks, together with the emergence of various technologies for exchanging data has made the information security a big concern. In other words, today’s decentralized wireless networks face with major challenges in terms of key distribution and management of traditional cryptographic techniques. In contrast, the approach of PHY layer security, which wisely utilizes the inherent characteristics of wireless links, has been introduced to address provable and lightweight security mechanisms. In addition, learning-based techniques have shown to be able to provide well-established mechanisms in enhancing the... 

    Physical Layer Security in Wireless Communication Networks in Presence of Intelligent Reflecting Surfaces

    , M.Sc. Thesis Sharif University of Technology Pourkarimi, Ali (Author) ; Nasiri Kenari, Masoumeh (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    The ever-increasing demand for wireless communication has raised the need for better utilization of bandwidth and energy. Intelligent Reflecting Surface (IRS) is an emerging technology that has been proposed for the sixth generation of wireless communication. In this thesis, we study the essential role these surfaces can play in improving the physical layer security.First, we consider a relatively realistic scenario for the location of the eavesdroppers. In this scenario, we will assume that the transmitters, users, and eavesdroppers all use a single antenna configuration, and the eavesdroppers are placed randomly across the studied region. Two notable parameters in physical layer security,... 

    Improvement of Physical Layer Security Based on Polar Codes in Wireless Communications

    , M.Sc. Thesis Sharif University of Technology Ghamami, Iman (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In modern wireless communication networks,that we have heterogeneous, asynchronous and ultra low latency networks and Due to the high processing power required by conventional cryptographic systems based on computational security, information theoritc security can play important role in the future development of these systems. Security in this case does not depend on the eavesdropper's computing power, but on the statistical independence between the main message and the received message of the eavesdropper. In recent years, polar codes have created new arenas, as they were the provable channel codes that could achieve capacity and reliability simultaneously. In addition, the clear structure,... 

    Physical Layer Authentication in the Internet of Things based on Deep Learning

    , M.Sc. Thesis Sharif University of Technology Abdollahi, Majid (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    IoT security is an important step in the rapid development of its applications and ser-vices. Many security protocols have been defined to maintain security at higher communication layers, such as the transport layer and the application layer, but with the advent of quantum computers due to high-speed parallel computing, the previous methods are no longer secure and we have to establish security at lower layers such as the physical layer. The efficiency of IoT devices depends on the reliability of their message transmission. Cyber-attacks such as data injection, eavesdropping and man-in-the-middle can lead to security challenges. In this study, we propose a new deep learning based component... 

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    Proposing a hybrid protocol for secure wireless networks based on signcryption scheme

    , Article 2013 World Congress on Computer and Information Technology, WCCIT 2013 ; June , 2013 , Page(s): 1 - 6 ; 9781479904600 (ISBN) Darmian, N. R ; Oskoei, H. R. D ; Vazirnezhad, B ; Sharif University of Technology
    2013
    Abstract
    Considering the weaknesses of cryptography algorithms and the attacks performed against them, cryptography alone cannot guarantee the security of communication in a wireless network. With regard to the developments in wireless communication networks brought about by smart array antennas, security can be sought in the physical layer as well, aiming to restrict the access of the data in a wireless network and limit it to authorized users only in order to further restrain malicious data accesses. In this paper, we analysis a strategy for restricting data access using smart array antennas and present the results in security by a parameter called exposure region. For this strategy afterwards we... 

    Stochastic restricted broadcast process theory

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 6977 LNCS , 2011 , Pages 72-86 ; 03029743 (ISSN) ; 9783642247484 (ISBN) Ghassemi, F ; Talebi, M ; Movaghar, A ; Fokkink, W ; Sharif University of Technology
    Abstract
    We provide a framework for modeling and analyzing both qualitative and quantitative aspects of mobile ad hoc network (MANET) protocols above the data-link layer. We extend Restricted Broadcast Process Theory [11,9]: delay functions are assigned to actions, while the semantics captures the interplay of a MANET protocol with stochastic behavior of the data-link and physical layer, and the dynamic topology. A continuous-time Markov chain is derived from our semantic model by resolving non-determinism, using the notion of weak Markovian network bisimilarity. The framework is applied to a leader election algorithm  

    Cross-layer rateless coding over wireless relay networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 1545-1549 ; 9781424495399 (ISBN) Shirvani Moghaddam, M ; Khalaj, B. H ; Pasandshanjani, E ; Sharif University of Technology
    2011
    Abstract
    The focus of the paper is on cross-layer transmission based on rateless coding for relay networks. In the proposed method, rateless coding is used at the packet level and a separate physical layer coding is used at the physical layer. As rateless codes are originally designed and optimized for erasure channels, using these codes at the physical layer can lead to significant performance degradation. The proposed scheme has the advantage of a cross-layer design which uses a rateless code at the packet level modeled by an erasure channel. Based on the analysis and simulation results provided in this paper, the cross-layer scheme results in earlier successful decoding at the destination  

    Performance analysis of slotted ALOHA random access packet-switching optical CDMA networks using generalized optical orthogonal codes and M-ary overlapping PPM signaling

    , Article Journal of Optical Communications and Networking ; Volume 3, Issue 7 , July , 2011 , Pages 568-576 ; 19430620 (ISSN) Shoaie, M. A ; Khazraei, S ; Pakravan, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper we study slotted ALOHA random access optical code division multiple access packet-switching networks with a chip-level receiver structure. We use generalized optical orthogonal codes (GOOCs) and the overlapping pulse position modulation (OPPM) signaling technique to improve system performance. The impact of physical layer parameters such as the GOOC cross-correlation value and the OPPM overlapping index on key performance benchmarks such as network throughput and delay are analyzed. We also study the stability of the network based on the number of backlogged users, using the expected state drift. It has been shown that using GOOC instead of strict optical orthogonal codes... 

    Cross-layer rateless coding over wireless relay channel

    , Article 2010 5th International Symposium on Telecommunications, IST 2010 ; 2010 , Pages 351-355 ; 9781424481835 (ISBN) Shirvani Moghaddam, M ; Hossein Khalaj, B ; Sharif University of Technology
    Abstract
    This paper focuses on cross-layer transmission based on rateless coding for relay channels. In the proposed method, rateless coding is used at packet level and a separate physical layer coding is used at the physical layer. As rateless codes are originally designed and optimized for erasure channels, using these codes at the physical layer can lead to significant performance degradation. The proposed scheme has the advantage of a cross-layer design which uses a rateless code at the packet level modeled by an erasure channel. Based on the analysis and simulation results provided in this paper, there is an exact tradeoff between physical layer code rate and rateless code depth, and the optimum... 

    Quality of service provisioning in optical CDMA packet networks

    , Article Journal of Optical Communications and Networking ; Volume 2, Issue 5 , 2010 , Pages 283-292 ; 19430620 (ISSN) Khaleghi, S ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    An enhanced media access control (MAC) layer protocol that uses the signaling method benefits of the physical layer in order to provide different levels of quality to different users in optical code-division multiple-access (OCDMA) packet networks is presented. In the proposed network architecture the users are categorized into two classes of service, one having a higher quality level and the other having a lower quality level. Users of each class transmit at the same power level and different from the other classes users. Also, the MAC of each user estimates the amount of interference on the channel and adjusts the packet transmissions time to improve network performance. Through simulation... 

    Physical layer network coding in molecular two-way relay networks

    , Article IWCIT 2016 - Iran Workshop on Communication and Information Theory, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In traditional wireless networks, physical layer network coding (PNC) exploits the inverse additivity property of broadcast signals in the medium, an idea which is not directly applicable to molecular networks. In this paper, to make the natural XOR operation possible at the physical layer, we exploit the reaction of different molecule types and we propose a PNC scheme in diffusion-based molecular relay networks. For comparison, we consider the straightforward network coding (SNC) scheme in molecular networks. Assuming the ligand-receptor binding process at the receivers, we investigate the error performance of both schemes. It is observed that in addition to the simplicity of the proposed...