Loading...
Search for: physical-layers
0.006 seconds
Total 44 records

    Physical layer security in AF and CF relay networks with RF-energy harvesting

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 86-92 ; 9781538665602 (ISBN) Soleimani, A ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay, we adopt power splitting (PS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because, the relay must choose either to eavesdrop the signal to be able to decode... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Outage performance in secure cooperative NOMA

    , Article 2019 Iran Workshop on Communication and Information Theory, IWCIT 2019, 24 April 2019 through 25 April 2019 ; 2019 ; 9781728105840 (ISBN) Abolpour, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in two phases: 1) Direct transmission phase, in which the base station broadcasts a superposition of the messages, 2) Cooperation phase, in which the strong user acts as a relay to help in forwarding the messages of the weak user. We study the secrecy outage performance in two cases: (i) security of... 

    Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning

    , Article Physical Communication ; Volume 49 , 2021 ; 18744907 (ISSN) Bastami, H ; Moradikia, M ; Behroozi, H ; de Lamare, R. C ; Abdelhadi, A ; Ding, Z ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    This paper investigates the physical layer security (PLS) design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdropping attacks performed by both untrusted relay nodes and Eve. Considering the hardware impairments (HIs), both total power budget constraint for the whole network and the individual power constraint at each node, this paper presents a novel approach to jointly optimize relay beamformer and transmit powers aiming at maximizing average secrecy rate (ASR). To... 

    Massive MIMO-NOMA systems secrecy in the presence of active eavesdroppers

    , Article 30th International Conference on Computer Communications and Networks, ICCCN 2021, 19 July 2021 through 22 July 2021 ; Volume 2021-July , 2021 ; 10952055 (ISSN); 9780738113302 (ISBN) Soltani, M ; Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security... 

    Maximizing the secrecy energy efficiency of the cooperative rate-splitting aided downlink in multi-carrier uav networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 71, Issue 11 , 2022 , Pages 11803-11819 ; 00189545 (ISSN) Bastami, H ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Clerckx, B ; Hanzo, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information security by detecting the eavesdropper's location, their limited energy motivates our research to propose a secure and energy efficient scheme. Thanks to the common-message philosophy introduced by Rate-Splitting (RS), we no longer have to allocate a portion of the transmit power to radiate Artificial Noise (AN), and yet both the Energy Efficiency (EE) and secrecy can be improved. Hence we define and study the Secrecy Energy Efficiency (SEE) of a multi-carrier multi-UAV network, in which Cooperative Rate-Splitting (CRS) is employed by each multi-antenna UAV Base-Station (UAV-BS) for protecting... 

    Secure Communication via Cooperation and Cooperative Jamming

    , M.Sc. Thesis Sharif University of Technology Hatami, Mohammad (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    The broadcast nature of wireless communications makes the propagation medium vulnerable to security attacks such as eavesdropping and jamming from adversarial or unauthorized users. Applying physical layer secrecy approaches will enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without using any secret keys. However, physical layer security approaches are typically feasible only when the source-eavesdropper channel is weaker than the source-destination channel. Cooperative jamming can be used to overcome this challenge and increase the secrecy rate. In this thesis, the security of two-phase relaying system with multiple... 

    Secure Transmission in Cooperative Non-Orthogonal Multiple Access (NOMA) Systems

    , M.Sc. Thesis Sharif University of Technology Abolpour, Milad (Author) ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    Nowadays, number of the users in wireless networks are increasing due to the high speed data transmission. Increasing number of the users increases the required bandwidth and power resource. Using non-orthogonal multiple access (NOMA) is a promising approach to decrease the significant bandwidth and also the required power of the network. NOMA systems decrease the latency of the users and also improve the spectral efficiency by serving multiple users. As signals are transmitting in wireless networks, the internal and also external eavesdroppers have access to the message of the legitimate users in the networks. Therefore, some sort of secrecy of the messages of the users must be provided.... 

    Improving Throughput and Secrecy Throughput Performance in Wireless Powered Communication Networks

    , Ph.D. Dissertation Sharif University of Technology Rezaei Estakhrooeieh, Roohollah (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    In wireless powered communication networks (WPCNs), wireless nodes are charged via an access point. In these networks, an access point transfers power to the nodes, and then, the nodes use the received power to transmit their information to the access point. Due to the wireless transmission of the information, eavesdropping of it is an important vulnerability in these networks. The conventional method to resolve this security problem is using cryptography algorithms. However, this method needs key management and complex encryption algorithms to be used by the nodes, which may not be applicable. Physical layer security (PLS), which uses the channel characteristics, is a more suitable way to... 

    Stochastic restricted broadcast process theory

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 6977 LNCS , 2011 , Pages 72-86 ; 03029743 (ISSN) ; 9783642247484 (ISBN) Ghassemi, F ; Talebi, M ; Movaghar, A ; Fokkink, W ; Sharif University of Technology
    Abstract
    We provide a framework for modeling and analyzing both qualitative and quantitative aspects of mobile ad hoc network (MANET) protocols above the data-link layer. We extend Restricted Broadcast Process Theory [11,9]: delay functions are assigned to actions, while the semantics captures the interplay of a MANET protocol with stochastic behavior of the data-link and physical layer, and the dynamic topology. A continuous-time Markov chain is derived from our semantic model by resolving non-determinism, using the notion of weak Markovian network bisimilarity. The framework is applied to a leader election algorithm  

    On medium chemical reaction in diffusion-based molecular communication: a two-way relaying example

    , Article IEEE Transactions on Communications ; 2018 ; 00906778 (ISSN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Abstract
    Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: (i) to reduce signal-dependent observation noise of receivers by reducing the signal density, (ii) to realize molecular physical-layer network coding (molecular PNC) by... 

    Secrecy throughput maximization for massive MIMO wireless powered communication networks

    , Article 2019 IEEE Global Communications Conference, GLOBECOM 2019, 9 December 2019 through 13 December 2019 ; 2019 ; 9781728109626 (ISBN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single- antenna sensor nodes which harvest energy from the BS. The first group, referred to as information transmitters (ITs), use the harvested energy to transmit information back to the BS; the second group, referred to as energy receivers (ERs), use the harvested energy for non- transmission related operations. We consider a two-slot protocol. In the first time slot, all nodes harvest energy from the BS. In the second slot, ITs transmit information to the BS,... 

    On Medium chemical reaction in diffusion-based molecular communication: A two-way relaying example

    , Article IEEE Transactions on Communications ; Volume 67, Issue 2 , 2019 , Pages 1117-1132 ; 00906778 (ISSN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Chemical reactions are a prominent feature of molecular communication systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes, or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: 1) to reduce signal-dependent observation noise of receivers by reducing the signal density; 2) to realize molecular physical-layer network coding (PNC) by performing the natural XOR... 

    Jamming-resilient frequency hopping-aided secure communication for internet-of-things in the presence of an untrusted relay

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 10 , July , 2020 , Pages 6771-6785 Letafati, M ; Kuhestani, A ; Behroozi, H ; Ng, D. W. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative network. In the considered system model, a source communicates with a destination in the presence of an untrusted relay and a powerful multi-Antenna adversary jammer. The untrusted relay is an authorized necessary helper who may wiretap the confidential information. Meanwhile, the jammer is an external attacker who tries to damage both the training and transmission phases. Different from traditional frequency hopping spread spectrum (FHSS) techniques that require a pre-determined pattern between communicating nodes, in... 

    A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay

    , Article 2020 IEEE International Conference on Communications Workshops, ICC Workshops 2020, 7 June 2020 through 11 June 2020 ; July , 2020 Letafati, M ; Kuhestani, A ; Ng, D. W. K ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    The Internet-of-Things (IoT) spans various applications in healthcare filed, from smart wearable or implantable sensors to remote monitoring of elderly, and medical device networking. In this paper, a jamming-resistant scheme for the healthcare IoT is proposed to provide secure and reliable data transmission in a two-hop cooperative network, where a source communicates with a destination in the presence of an untrusted relay and an active adversary. The untrusted relay is an authorized necessary helper who may wiretap the confidential information, e.g., the secret measured data of a patient, while the jammer is an external attacker who tries to interrupt the communication. Different from... 

    Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for internet of things

    , Article IEEE Transactions on Information Forensics and Security ; Volume 15 , March , 2020 , Pages 2856-2868 Letafati, M ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may be placed far away. In this paper, by taking a variety of realistic hardware imperfections (HWIs) and channels estimation errors (CEEs) into account, the secrecy performance of a three-hop cooperative network with a source, a destination and two consecutive amplify-and-forward (AF) relays is investigated. The relays are considered to be untrusted, i.e., while they are mandatory helpers for data transmission, they may overhear the received signals. We adopt the artificial noise injection scheme, to keep the source message secret from... 

    Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

    , Article Wireless Networks ; Volume 27 , November , 2020 , pages 795–807 Mamaghani, M. T ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Springer  2020
    Abstract
    Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed... 

    A distributed cross-layer optimization method for multicast in interference-limited multihop wireless networks

    , Article Eurasip Journal on Wireless Communications and Networking ; Volume 2008 , 2008 ; 16871472 (ISSN) Amerimehr, M. H ; Khalaj, B. H ; Crespo, P. M ; Sharif University of Technology
    2008
    Abstract
    We consider joint optimization of data routing and resource allocation in multicast multihop wireless networks where interference between links is taken into account. The use of network coding in such scenarios leads to a nonconvex optimization problem. By applying the probability collectives (PCs) technique the original problem is turned into a new problem which is convex over probability distributions. The resulting problem is then further decomposed into a data routing subproblem at network layer and a power allocation subproblem at physical layer in order to achieve a cross-layer distributed solution for the whole range of SINR values. The proposed approach is also extended to minimum... 

    On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks

    , Article IEEE Transactions on Information Forensics and Security ; Volume 16 , 2021 , Pages 5018-5033 ; 15566013 (ISSN) Bastami, H ; Letafati, M ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Hanzo, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search and rescue as well as in air-borne Base Station (BS). However, their communications are prone to both channel errors and eavesdropping. Hence, we investigate the max-min secrecy fairness of UAV-aided cellular networks, in which Cooperative Rate-Splitting (CRS) aided downlink transmissions are employed by each multi-antenna UAV Base Station (UAV-BS) to safeguard the downlink of a two-user Multi-Input Single-Output (MISO) system against an external multi-antenna Eavesdropper ( Eve ). Realistically, only Imperfect Channel State Information (ICSI) is assumed to be available at the transmitter.... 

    An adaptive feedback bit allocation method for wireless systems with transmit diversity

    , Article 2005 1st International Conference on Computers, Communications and Signal Processing with Special Track on Biomedical Engineering, CCSP 2005, Kuala Lumpur, 14 November 2005 through 16 November 2005 ; 2005 , Pages 181-184 ; 1424400112 (ISBN); 9781424400119 (ISBN) Babadi, B ; Shariatpanahi, P ; Hossein Khalaj, B ; Sharif University of Technology
    2005
    Abstract
    Using multiple antenna transmitters and/or receivers is becoming a common method for improving spectral efficiency of wireless channels. The physical layer of the next generation of WLAN systems (802.11n) is based on a Multiple Input Multiple Output (MIMO) system which seems to be an efficient solution for defects which could occur in wireless channels. In this paper, we investigate an adaptive bit allocation method to feed the quantized channel state data back to the transmitting antennas, depending on the channel condition in a Multiple Input Single Output (MISO) scheme. We have proposed an adaptive bit allocation scheme with a significant performance improvement over the fixed bit...