Loading...
Search for: physical-layers
0.007 seconds
Total 44 records

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    Proposing a hybrid protocol for secure wireless networks based on signcryption scheme

    , Article 2013 World Congress on Computer and Information Technology, WCCIT 2013 ; June , 2013 , Page(s): 1 - 6 ; 9781479904600 (ISBN) Darmian, N. R ; Oskoei, H. R. D ; Vazirnezhad, B ; Sharif University of Technology
    2013
    Abstract
    Considering the weaknesses of cryptography algorithms and the attacks performed against them, cryptography alone cannot guarantee the security of communication in a wireless network. With regard to the developments in wireless communication networks brought about by smart array antennas, security can be sought in the physical layer as well, aiming to restrict the access of the data in a wireless network and limit it to authorized users only in order to further restrain malicious data accesses. In this paper, we analysis a strategy for restricting data access using smart array antennas and present the results in security by a parameter called exposure region. For this strategy afterwards we... 

    Stochastic restricted broadcast process theory

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 6977 LNCS , 2011 , Pages 72-86 ; 03029743 (ISSN) ; 9783642247484 (ISBN) Ghassemi, F ; Talebi, M ; Movaghar, A ; Fokkink, W ; Sharif University of Technology
    Abstract
    We provide a framework for modeling and analyzing both qualitative and quantitative aspects of mobile ad hoc network (MANET) protocols above the data-link layer. We extend Restricted Broadcast Process Theory [11,9]: delay functions are assigned to actions, while the semantics captures the interplay of a MANET protocol with stochastic behavior of the data-link and physical layer, and the dynamic topology. A continuous-time Markov chain is derived from our semantic model by resolving non-determinism, using the notion of weak Markovian network bisimilarity. The framework is applied to a leader election algorithm  

    Cross-layer rateless coding over wireless relay networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 1545-1549 ; 9781424495399 (ISBN) Shirvani Moghaddam, M ; Khalaj, B. H ; Pasandshanjani, E ; Sharif University of Technology
    2011
    Abstract
    The focus of the paper is on cross-layer transmission based on rateless coding for relay networks. In the proposed method, rateless coding is used at the packet level and a separate physical layer coding is used at the physical layer. As rateless codes are originally designed and optimized for erasure channels, using these codes at the physical layer can lead to significant performance degradation. The proposed scheme has the advantage of a cross-layer design which uses a rateless code at the packet level modeled by an erasure channel. Based on the analysis and simulation results provided in this paper, the cross-layer scheme results in earlier successful decoding at the destination  

    Performance analysis of slotted ALOHA random access packet-switching optical CDMA networks using generalized optical orthogonal codes and M-ary overlapping PPM signaling

    , Article Journal of Optical Communications and Networking ; Volume 3, Issue 7 , July , 2011 , Pages 568-576 ; 19430620 (ISSN) Shoaie, M. A ; Khazraei, S ; Pakravan, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper we study slotted ALOHA random access optical code division multiple access packet-switching networks with a chip-level receiver structure. We use generalized optical orthogonal codes (GOOCs) and the overlapping pulse position modulation (OPPM) signaling technique to improve system performance. The impact of physical layer parameters such as the GOOC cross-correlation value and the OPPM overlapping index on key performance benchmarks such as network throughput and delay are analyzed. We also study the stability of the network based on the number of backlogged users, using the expected state drift. It has been shown that using GOOC instead of strict optical orthogonal codes... 

    Design and Quality of Service Improvement in Optical Code Division Multiple Access Networks

    , M.Sc. Thesis Sharif University of Technology Hadi, Mohammad (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Considering the advantages of optical communications and code division multiple access technique, Optical Code Division Multiple Access Networks (OCDMANs) was introduced. Thence, many researchers have suggested methods for creating Quality of Service (QoS) differentiated classes in OCDMANs. In this thesis, we have comprehensive review on the QoS assignment methods and enhance them by offering new techniques. In physical layer, we concentrate on variable chip rate OCDMANs and in MAC sub-layer, a new algorithm named Adaptive Level Control (ALC) is introduced. Then, we focus on the physical design of OCDMANs. Firstly, we solve the problem of one-class OCDMAN and introduce few simple and... 

    Secure Communication via Cooperation and Cooperative Jamming

    , M.Sc. Thesis Sharif University of Technology Hatami, Mohammad (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    The broadcast nature of wireless communications makes the propagation medium vulnerable to security attacks such as eavesdropping and jamming from adversarial or unauthorized users. Applying physical layer secrecy approaches will enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without using any secret keys. However, physical layer security approaches are typically feasible only when the source-eavesdropper channel is weaker than the source-destination channel. Cooperative jamming can be used to overcome this challenge and increase the secrecy rate. In this thesis, the security of two-phase relaying system with multiple... 

    Cross-layer rateless coding over wireless relay channel

    , Article 2010 5th International Symposium on Telecommunications, IST 2010 ; 2010 , Pages 351-355 ; 9781424481835 (ISBN) Shirvani Moghaddam, M ; Hossein Khalaj, B ; Sharif University of Technology
    Abstract
    This paper focuses on cross-layer transmission based on rateless coding for relay channels. In the proposed method, rateless coding is used at packet level and a separate physical layer coding is used at the physical layer. As rateless codes are originally designed and optimized for erasure channels, using these codes at the physical layer can lead to significant performance degradation. The proposed scheme has the advantage of a cross-layer design which uses a rateless code at the packet level modeled by an erasure channel. Based on the analysis and simulation results provided in this paper, there is an exact tradeoff between physical layer code rate and rateless code depth, and the optimum... 

    Quality of service provisioning in optical CDMA packet networks

    , Article Journal of Optical Communications and Networking ; Volume 2, Issue 5 , 2010 , Pages 283-292 ; 19430620 (ISSN) Khaleghi, S ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    An enhanced media access control (MAC) layer protocol that uses the signaling method benefits of the physical layer in order to provide different levels of quality to different users in optical code-division multiple-access (OCDMA) packet networks is presented. In the proposed network architecture the users are categorized into two classes of service, one having a higher quality level and the other having a lower quality level. Users of each class transmit at the same power level and different from the other classes users. Also, the MAC of each user estimates the amount of interference on the channel and adjusts the packet transmissions time to improve network performance. Through simulation... 

    Physical layer network coding in molecular two-way relay networks

    , Article IWCIT 2016 - Iran Workshop on Communication and Information Theory, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In traditional wireless networks, physical layer network coding (PNC) exploits the inverse additivity property of broadcast signals in the medium, an idea which is not directly applicable to molecular networks. In this paper, to make the natural XOR operation possible at the physical layer, we exploit the reaction of different molecule types and we propose a PNC scheme in diffusion-based molecular relay networks. For comparison, we consider the straightforward network coding (SNC) scheme in molecular networks. Assuming the ligand-receptor binding process at the receivers, we investigate the error performance of both schemes. It is observed that in addition to the simplicity of the proposed... 

    A comparison between different meta-heuristic techniques in power allocation for physical layer security

    , Article Iranian Journal of Electrical and Electronic Engineering ; Volume 13, Issue 4 , 2017 , Pages 310-317 ; 17352827 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Abstract
    Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA), Partial Swarm Optimization... 

    Secure Transmission Strategies in Relay Simultaneous Wireless Information and Power Transfer

    , M.Sc. Thesis Sharif University of Technology Soleimani Baghshsh, Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Advisor)
    Abstract
    In this thesis, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay,we adopt power splitting (PS) and time switching (TS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because,the relay must choose either to eavesdrop the... 

    Efficient polar code-based physical layer encryption scheme

    , Article IEEE Wireless Communications Letters ; 2017 ; 21622337 (ISSN) Hooshmand, R ; Aref, M. R ; Sharif University of Technology
    Abstract
    This letter presents an efficient polar code-based physical layer encryption (PLE) scheme with a short key length in comparison to the conventional symmetric key cryptosystems. By using the properties of polar codes, we consider several efficient techniques to reduce the key length and the computational overhead of the presented PLE scheme. Moreover, the results of the security analyses show that the proposed scheme has a high level of security against conventional attacks on the PLE schemes. In fact, reducing the key length and the computational overhead of the presented PLE scheme has no effect on its security level, which makes it suitable for secure mobile communication devices with... 

    A novel genetic-based resource allocation and cooperative node selection technique for physical layer security designs

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 4733-4746 ; 09296212 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    This paper presents a novel approach for power allocation and cooperative node selection to enhance physical layer security in presence of an eavesdropper in a wireless network. Our network consists of a source–destination pair and a number of cooperative nodes which can be used as relays to increase throughput at the destination, or as friendly jammers to confuse eavesdropper. First, we introduce a low complexity method, for which relay−jammer selection and power allocation are performed, simultaneously. Then, we propose self-adaptive genetic algorithm to solve the non-linear non-convex programing problem. Using the proposed method, the number of friendly jammers that ensure the secrecy... 

    A genetic approach in relay-jammer selection and power allocation for physical layer security

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 374-379 ; 9781509034345 (ISBN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Node cooperation approaches improve physical layer security in wireless networks without applying data encryption. Selecting the appropriate nodes to cooperate as relays or friendly jammers, to degrade eavesdropper's link, is a challenging problem which has attracted a lot of attention in recent years. Various approaches, based on conventional exhaustive search, have been suggested for optimal relay-jammer selection and power allocation in the literature. The complexity of these methods is proportional to the number of intermediate nodes. As the number of intermediate nodes exceeds a specific bound, conventional exhaustive search appears infeasible due to high computational complexity. In... 

    Physical layer security in AF and CF relay networks with RF-energy harvesting

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 86-92 ; 9781538665602 (ISBN) Soleimani, A ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay, we adopt power splitting (PS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because, the relay must choose either to eavesdrop the signal to be able to decode... 

    On medium chemical reaction in diffusion-based molecular communication: a two-way relaying example

    , Article IEEE Transactions on Communications ; 2018 ; 00906778 (ISSN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Abstract
    Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: (i) to reduce signal-dependent observation noise of receivers by reducing the signal density, (ii) to realize molecular physical-layer network coding (molecular PNC) by... 

    Physical Layer Security in Non-Orthogonal Multiple Access (NOMA) Networks

    , M.Sc. Thesis Sharif University of Technology Jahanbazi, Shahab (Author) ; Mirmohseni, Mahtab (Supervisor)
    Abstract
    The increasing expansion of wireless communications and the increase in information traffic and the number of communication users, and on the other hand, the frequency and energy frequency limitations have led to the emergence of new generation communications. In the fifth generation of communications, one of the solutions to ensure the optimal use of bandwidth is the use of the non-orthogonal multiple access (NOMA) schema, which of course, the use of such a scheme in the system naturally increases the complexity of the receivers. Unlike most access methods in previous generations of communications, the goal of NOMA is the simultaneous use of multiple users from a frequency band for data... 

    Secure Transmission in Cooperative Non-Orthogonal Multiple Access (NOMA) Systems

    , M.Sc. Thesis Sharif University of Technology Abolpour, Milad (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    Nowadays, number of the users in wireless networks are increasing due to the high speed data transmission. Increasing number of the users increases the required bandwidth and power resource. Using non-orthogonal multiple access (NOMA) is a promising approach to decrease the significant bandwidth and also the required power of the network. NOMA systems decrease the latency of the users and also improve the spectral efficiency by serving multiple users. As signals are transmitting in wireless networks, the internal and also external eavesdroppers have access to the message of the legitimate users in the networks. Therefore, some sort of secrecy of the messages of the users must be provided.... 

    Implementation and Development of a New Framework for Flexible Inter-PHY Functional Splitting in Cloud RAN Networks

    , M.Sc. Thesis Sharif University of Technology Basiri-Moghadam, Shahriar (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Thorough investigation of the Cloud-RAN (C-RAN) architecture has recently shown that CRAN can bring advanced cooperated and coordinated processing capabilities as well as the multiplexing gains toward future radio access networks. The baseband processing of each base station instance can now be flexibly split into smaller functional components, that can be placed either at remote radio units (RRUs) or baseband units (BBUs), depending on the available resources. In this project, we investigate recent implemented methods in C-RAN. also, we propose, develop and implement new architectural frameworks for C-RAN that can support both a flexible functional split and a new functional splitting known...