Loading...
Search for:
aref--a--d
0.137 seconds
Total 15625 records
A novel approach to radio direction finding and detecting the number of sources simultaneously: DMSAE algorithm
, Article Conference Proceedings- 34th European Microwave Conference, London, 12 October 2004 through 14 October 2004 ; Volume 2 , 2004 , Pages 745-748 ; 1580539920 (ISBN) ; Tadaion, A. A ; Aref, M. R ; Sharif University of Technology
2004
Abstract
In smart antenna systems, The localization and direction of desired source(s) must be known. In this paper, we introduce a method called "DMSAE" (Direction finding of Multiple Sources by Alternating Eliminations) to find the radio directions of signals impinging on an arbitrary antenna array and the number of the signals. This method which is based on the Minimum Variance Distortionless Response (MVDR) algorithm, can not only detect the direction and the number of sources, simultaneously, but also has better resolution ability compared to the other conventional direction finding algorithms. This method can also detect very weak sources when other powerful sources exist in the environment. In...
When is it possible to simulate a DMC channel from another?
, Article 2013 IEEE Information Theory Workshop, ITW 2013 ; Sept , 2013 , Page(s): 1 - 5 ; 9781479913237 (ISBN) ; Yassaee, M. H ; Aref, M. R ; Gohari, A
2013
Abstract
In this paper, we study the problem of simulating a DMC channel from another DMC channel. We assume that the input to the channel we are simulating is i.i.d. and that the transmitter and receivers are provided with common randomness at limited rates. We prove bounds for simulating point-to-point, MAC and broadcast channels. As a special case, we recover the achievability part of the result of Cuff for point-to-point channel simulation via a noiseless link and shared randomness
Improved related-key boomerang cryptanalysis of AES-256
, Article 2010 International Conference on Information Science and Applications, ICISA 2010, 21 April 2010 through 23 April 2010 ; April , 2010 ; 9781424459438 (ISBN) ; Sharifi, A ; Aref, M ; Sharif University of Technology
2010
Abstract
A specific class of differential cryptanalytic approach, known as Related Key Boomerang Attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). In this paper, we propose a new related-key boomerang attack on 8-round AES-256, a couple of ones on 9-round following the work of Gorski et al. In the first one, we attacked 8-round AES-256 with the time complexity of 279 and the data complexity of 259. The extended 8-round attack on 9-round AES-256 is more efficient than previous attacks from both time and data complexity perspectives
Key agreement over multiple access channel
, Article IEEE Transactions on Information Forensics and Security ; Volume 6, Issue 3 PART 1 , 2011 , Pages 775-790 ; 15566013 (ISSN) ; Salmasizadeh, M ; Aref, M. R ; Golic, J. D ; Sharif University of Technology
2011
Abstract
In this paper, a generalized multiple access channel (MAC) model for secret key sharing between three terminals is considered. In this model, there are two transmitters and a receiver where all three terminals receive noisy channel outputs. In addition, there is a one-way public channel from the transmitters to the receiver. Each of the transmitters intends to share a secret key with the receiver by using the MAC and the public channel, where the transmitters are eavesdroppers with respect to each other. Two strategies for secret key sharing are considered, namely, the pregenerated key strategy and the two-stage key strategy. For both of them, inner and outer bounds of the secret key...
Risk of attack coefficient effect on availability of Ad-hoc networks
, Article 2011 IEEE Consumer Communications and Networking Conference, CCNC'2011, Las Vegas, NV, 8 January 2011 through 11 January 2011 ; 2011 , Pages 166-168 ; 9781424487905 (ISBN) ; Farhat, F ; Pakravan, M. R ; Aref, M. R ; Sharif University of Technology
2011
Abstract
Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well. We also present the connectivity coefficient of nodes in a network which shows how important is a node in a network and how much damage is caused if a certain node is compromised
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
, Article 2011 IEEE Consumer Communications and Networking Conference, CCNC'2011, 8 January 2011 through 11 January 2011, Las Vegas, NV ; 2011 , Pages 163-165 ; 9781424487905 (ISBN) ; Farhat, F ; Pakravan, M. R ; Aref, M. R ; Sharif University of Technology
2011
Abstract
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to...
On Körner-Marton's sum modulo two problem
, Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly...
Joint source-channel coding using finite state integer arithmetic codes
, Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 19-22 ; 9781424433551 (ISBN) ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
2009
Abstract
Inserting redundancy to arithmetic codes is a common strategy to add error detection capability to this well-known family of source codes. By using this strategy error correction is possible through some decoding algorithms such as Viterbi decoder. In this paper a system has proposed that uses finite state integer arithmetic codes (FSAC) as a joint source-channel code in combination with a cyclic redundancy check (CRC) and a List Viterbi decoder. The proposed scheme has shown better performance than previous ones. © 2009 IEEE
Performance comparison of the neyman-pearson fusion rule with counting rules for spectrum sensing in cognitive radio
, Article Iranian Journal of Science and Technology - Transactions of Electrical Engineering ; Volume 36, Issue E1 , 2012 , Pages 1-17 ; 22286179 (ISSN) ; Tadaion, A. A ; Derakhtian, M ; Aref, M. R ; Sharif University of Technology
2012
Abstract
Distributed spectrum sensing (DSS) is of great importance in Cognitive Radio, especially under fading or shadowing effects. In order to evaluate the performance of a distributed system, it is commonly compared with the centralized system as an upper performance bound. Now the question is whether or not one can obtain a distributed strategy serving as an upper bound to benchmark any distributed strategy, tighter than that of the centralized scheme. Here, we suggest employing the Neyman-Pearson (NP) fusion rule to achieve an upper bound. Furthermore, the analysis of a randomized fusion rule has been provided, which is a long-existing problem in this field. For this purpose, theoretical...
Key agreement over a generalized multiple access channel using noiseless and noisy feedback
, Article IEEE Journal on Selected Areas in Communications ; Volume 31, Issue 9 , 2013 , Pages 1765-1778 ; 07338716 (ISSN) ; Skoglund, M ; Golic, J. D ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
2013
Abstract
A secret key agreement framework involving three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. There is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 where the three users receive outputs from the channel. Furthermore, there is a feedback channel from user 3 to users 1 and 2 through which user 3 sends information extracted from the received output from the GDMMAC to increase the key rates. We consider both noiseless and noisy feedback. In the case of noiseless feedback, a public channel of unlimited capacity from user 3 to users...
From source model to quantum key distillation: An improved upper bound
, Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 ; Mahzoon, M ; Gohari, A ; Aref, M.R ; Sharif University of Technology
2014
Abstract
In this paper we derive a new upper bound on the quantum key distillation capacity. This upper bound is an extension of the classical bound of Gohari and Anantharam on the source model problem. Our bound strictly improves the quantum extension of reduced intrinsic information bound of Christandl et al. Although this bound is proposed for quantum settings, it also serves as an upper bound for the special case of classical source model, and may improve the bound of Gohari and Anantharam. The problem of quantum key distillation is one in which two distant parties, Alice and Bob, and an adversary, Eve, have access to copies of quantum systems A, B, E respectively, prepared jointly according to...
Channel simulation via interactive communications
, Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 3053-3057 ; 9781467325790 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
IEEE
2012
Abstract
In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d. copies of two random variables and would like to generate i.i.d. copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way communication links, and shared common randomness, all at limited rates. Two special cases of this problem are the interactive function computation studied by Ma and Ishwar, and the tradeoff curve between one-way communication and shared randomness studied by Cuff. The latter work had inspired Gohari and...
Adaptive random puncturing based secure block turbo coding
, Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010 ; December , 2010 , Pages 216-220 ; 9781424481835 (ISBN) ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
2010
Abstract
Reliability and security are two important subjects in modern digital communications. A secure channel coding scheme provides both of reliability and security in one process to combat problems in an unreliable and insecure channel. In this paper, a secure block turbo coding scheme will be proposed and analyzed. Security and reliability are based on pseudo-random puncturing. Simulation results show that this scheme has superior performance and high security
Perfectly secure index coding
, Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 1432-1436 ; 21578095 (ISSN) ; 9781467377041 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
In this paper, we investigate the index coding problem in the presence of an eavesdropper. Messages are to be sent from one transmitter to a number of legitimate receivers who have side information about the messages, and share a set of secret keys with the transmitter. We assume perfect secrecy, meaning that the eavesdropper should not be able to retrieve any information about the message set. This problem is a generalization of the Shannon's cipher system. We study the minimum key lengths for zero-error and perfectly secure index coding problems
On the equivalency of reliability and security metrics for wireline networks
, Article IEEE International Symposium on Information Theory - Proceedings, 25 June 2017 through 30 June 2017 ; 2017 , Pages 2713-2717 ; 21578095 (ISSN) ; 9781509040964 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
2017
Abstract
'To be considered for the 2017 IEEE Jack Keil Wolf ISIT Student Paper Award' In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of 'perfect secrecy with zero-error constraint' and 'weak secrecy with-error constraint'. © 2017 IEEE
Analytical computation of spatial traffic distribution in a typical region of a cellular network by proposing a general mobility model
, Article 10th International Conference on Telecommunications, ICT 2003, 23 February 2003 through 1 March 2003 ; Volume 1 , 2003 , Pages 295-301 ; 0780376617 (ISBN); 9780780376618 (ISBN) ; Salehi, J. A ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2003
Abstract
We propose a general mobility model based on region splitting and mapping each subregion on a multi-server node. By using the theory of multi-class Jackson queueing network with multiserver nodes and employing the product-form solution for such queueing networks, we obtain an analytical form for the spatial traffic distribution in a typical region with specific number of users. To this end, we consider the spatial statistical pattern for new and handoff call arrivals and the ratio between these two types of arrivals. At last, we apply our new model to some simple mobility scenarios and compute the resultant active user's location densities. © 2003 IEEE
A flexible dynamic traffic model for reverse link CDMA cellular networks
, Article IEEE Transactions on Wireless Communications ; Volume 3, Issue 1 , 2004 , Pages 159-164 ; 15361276 (ISSN) ; Salehi, J. A ; Aref, M. R ; Sharif University of Technology
2004
Abstract
In this paper, we focus on the reverse link traffic analysis of a code-division multiple-access (CDMA) cellular network in dynamic environments. In this respect, we propose a new and flexible traffic model, which takes into account the interference-limitedness attribute of CDMA capacity as well as its soft-handoff feature. This new traffic model is developed according to interference-based call admission control (ICAC) method and a geographical structure with three regions. The main advantage of this traffic model is in its flexibility when we consider different traffic conditions including time-varying status of traffic in the neighboring cells
A semi-supervised ids for cyber-physical systems using a deep learning approach
, Article ISeCure ; Volume 15, Issue 3 Special Issue , 2023 , Pages 1-8 ; 20082045 (ISSN) ; Ahmadi, S ; Aref, M. R ; Sharif University of Technology
Iranian Society of Cryptology
2023
Abstract
Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, because these systems are now increasingly interacting with the Internet. Classic systems are suffering from many security problems and with the expansion of Internet connectivity, they are now exposed to new types of threats and cyber-attacks. Addressing this, intrusion detection technology is one of the most important security solutions that is used in industrial control systems to identify potential attacks and malicious activities. In this paper, we propose Stacked...
Detection of a band-limited signal using an orthonormal, fully-decimated filter-bank
, Article Scientia Iranica ; Volume 14, Issue 6 , 2007 , Pages 555-565 ; 10263098 (ISSN) ; Tadaion, A. A ; Nayebi, M. M ; Aref, M. R ; Sharif University of Technology
Sharif University of Technology
2007
Abstract
In this paper, two methods are proposed for the detection of a band-limited signal in unknown variance white Gaussian noise. The complex amplitude and the frequency of the signal and the noise variance are assumed as unknown parameters. Using wavelet concepts, an orthonormal, fully-decimated filter-bank is employed to decompose the signal into its subband components. It is shown that, in this process, the noise is also decomposed into orthonormal zero-mean components. In the output, if a band-limited target signal is present, the respective single subband component (or two components in marginal cases) containing the target signal presents a non-zero mean. The presence of a non-zero mean...
Analytical power allocation for a full-duplex decodeand- forward relay channel
, Article IET Communications ; Volume 7, Issue 13 , September , 2013 , Pages 1338-1347 ; 17518628 (ISSN) ; Golami Davoodi, A ; Aref, M. R ; Sharif University of Technology
2013
Abstract
For a fading full-duplex decode-and-forward relay channel, the authors analytically derive optimum power allocation schemes subject to individual power constraints at the source and the relay. The authors prove that the problem is a convex optimisation problem over the feasible power set, and by proposing a systematic technique to solve min-max problems, optimum power allocations are derived in closed-forms. Finally, for a Rayleigh-fading channel model, optimum power allocations are derived and the respective achievable rate and an upper bound are evaluated. The implications of the derived theoretical results are discussed through some graphs