Loading...
Search for: letafati--m
0.16 seconds

    Outage-Constrained robust and secure design for downlink rate-splitting UAV networks

    , Article 2021 IEEE International Conference on Communications Workshops, ICC Workshops 2021, 14 June 2021 through 23 June 2021 ; 2021 ; 9781728194417 (ISBN) Bastami, H ; Moradikia, M ; Letafati, M ; Abdelhadi, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Unmanned aerial vehicles (UAVs) are developing rapidly owing to flexible deployment and access services as the air base stations. In this paper, by taking the realistic assumption of imperfect channel state information at transmitter (CSIT), we investigate the robust and secure design of downlink UAV network while considering the worst-case outage constraints due to communication link uncertainties. In our proposed heterogeneous network, comprised of both UAV-cells and macro-users, rate splitting technique is deployed by UAV base-station (UAV-BS) to enhance the system performance in terms of security, power saving, and robustness against imperfect CSIT. Through our proposed design, we... 

    A novel metaverse-as-a-service architecture from an operator view

    , Article Proceedings - 2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023 ; 2023 , Pages 209-216 ; 979-835033333-6 (ISBN) Ahsani, V ; Rahimi, A ; Letafati, M ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    In this research paper, the authors present a comprehensive overview of three key elements of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and blockchain technology. The study begins by examining security concerns for wireless access to the Metaverse. It then delves into privacy and security issues within the Metaverse from data-centric, learning-centric, and human-centric perspectives. The authors propose novel and less-explored methods to aid mobile network operators and Metaverse service providers in creating secure and private MaaS platforms across various layers of the Metaverse, from access to social interactions. The article also explores the... 

    A lightweight secure and resilient transmission scheme for the internet of things in the presence of a hostile jammer

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 6 , 2021 , Pages 4373-4388 ; 23274662 (ISSN) Letafati, M ; Kuhestani, A ; Wong, K. K ; Piran, M. J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret... 

    Theoretical and Experimental Study of Turbine Discs under Severe Spin and Temperature Fluctuations

    , M.Sc. Thesis Sharif University of Technology Letafati, Mohammad Hassan (Author) ; Durali, Mohammad (Supervisor)
    Abstract
    Gas turbine discs must be tested before they are installed in an engine for their mechanical properties and resistance to crack growth. Such test is usually done in a device called Spin Tester in which high rotational speed and temperature fluctuations can be applied to a disc. In this project a plug-in software is developed by which life of gas turbine discs under sever fluctuations of rotating speed and temperature can be assessed. The tests performed in the software are; stress analysis, fatigue analysis, crack initiation point, and finally 3-D fatigue crack growth path. The software is written using Python programming in ABAQUS. The software adds a sub-menu in ABAQUS Plugins as "Engine... 

    Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for internet of things

    , Article IEEE Transactions on Information Forensics and Security ; Volume 15 , March , 2020 , Pages 2856-2868 Letafati, M ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may be placed far away. In this paper, by taking a variety of realistic hardware imperfections (HWIs) and channels estimation errors (CEEs) into account, the secrecy performance of a three-hop cooperative network with a source, a destination and two consecutive amplify-and-forward (AF) relays is investigated. The relays are considered to be untrusted, i.e., while they are mandatory helpers for data transmission, they may overhear the received signals. We adopt the artificial noise injection scheme, to keep the source message secret from... 

    Jamming-resilient frequency hopping-aided secure communication for internet-of-things in the presence of an untrusted relay

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 10 , July , 2020 , Pages 6771-6785 Letafati, M ; Kuhestani, A ; Behroozi, H ; Ng, D. W. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative network. In the considered system model, a source communicates with a destination in the presence of an untrusted relay and a powerful multi-Antenna adversary jammer. The untrusted relay is an authorized necessary helper who may wiretap the confidential information. Meanwhile, the jammer is an external attacker who tries to damage both the training and transmission phases. Different from traditional frequency hopping spread spectrum (FHSS) techniques that require a pre-determined pattern between communicating nodes, in... 

    A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay

    , Article 2020 IEEE International Conference on Communications Workshops, ICC Workshops 2020, 7 June 2020 through 11 June 2020 ; July , 2020 Letafati, M ; Kuhestani, A ; Ng, D. W. K ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    The Internet-of-Things (IoT) spans various applications in healthcare filed, from smart wearable or implantable sensors to remote monitoring of elderly, and medical device networking. In this paper, a jamming-resistant scheme for the healthcare IoT is proposed to provide secure and reliable data transmission in a two-hop cooperative network, where a source communicates with a destination in the presence of an untrusted relay and an active adversary. The untrusted relay is an authorized necessary helper who may wiretap the confidential information, e.g., the secret measured data of a patient, while the jammer is an external attacker who tries to interrupt the communication. Different from... 

    Physical Layer Secure Image Transmission Based on Machine Learning Methods

    , M.Sc. Thesis Sharif University of Technology Letafati, Mehdi (Author) ; Behroozi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Co-Supervisor)
    Abstract
    The rapid development of wireless communications, e.g., the sixth generation (6G) networks, together with the emergence of various technologies for exchanging data has made the information security a big concern. In other words, today’s decentralized wireless networks face with major challenges in terms of key distribution and management of traditional cryptographic techniques. In contrast, the approach of PHY layer security, which wisely utilizes the inherent characteristics of wireless links, has been introduced to address provable and lightweight security mechanisms. In addition, learning-based techniques have shown to be able to provide well-established mechanisms in enhancing the... 

    On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

    , Article IEEE Transactions on Communications ; 2021 ; 00906778 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions—containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system’s security, fountain-based packet delivery is also adopted, where the source node encodes... 

    Content-Based medical image transmission against randomly-distributed passive eavesdroppers

    , Article 2021 IEEE International Conference on Communications Workshops, ICC Workshops 2021, 14 June 2021 through 23 June 2021 ; 2021 ; 9781728194417 (ISBN) Letafati, M ; Behroozi, H ; Hossein Khalaj, B ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, a content-aware medical image transmission scheme is investigated over a multiple-input single-output (MISO) channel in wireless healthcare systems. The multi-antenna-aided access point, as a source node, wishes to wirelessly send medical images of a patient to a trusted destination node, while multiple randomly-located totally passive and non-colluding eavesdroppers (Eves) try to wiretap the transmission. Considering the fact that not all regions of an image have the same importancy level from the security view-point, we first segment the image into two parts: the region of interest (RoI), which more likely contains important diagnostic information regarding the medical image... 

    On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

    , Article IEEE Transactions on Communications ; Volume 70, Issue 2 , 2022 , Pages 1125-1139 ; 00906778 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions - containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system's security, fountain-based packet delivery is also adopted, where the source node... 

    Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries

    , Article IEEE Wireless Communications Letters ; Volume 11, Issue 4 , 2022 , Pages 856-860 ; 21622337 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from hardware impairments (HIs). Different from previous works on PHY-SKG that consider adversaries who simply try to make an interference in the communication link, the MiM aims to deceive legitimate entities about the source of common randomness. To conquer the MiM attack, legitimate parties utilize randomized pilots (RPs) in our proposed scheme. We analyze the effect of HIs on the performance of system by deriving the achievable secret key rate (SKR). Our results highlight a fundamental limit, as a ceiling phenomena, on the... 

    Learning-based secret key generation in relay channels under adversarial attacks

    , Article IEEE Open Journal of Vehicular Technology ; Volume 4 , 2023 , Pages 749-764 ; 26441330 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for securing the sixth generation (6G) wireless networks thanks to its inherently lightweight functionality. Nevertheless, with the existence of adversarial attacks or internal impairments, WSKG can be negatively affected during the randomness distillation, where the legitimate parties measure a source of common randomness. In this article, we propose a learning-aided approach for cooperative WSKG under man-in-the-middle (MitM) adversarial attack, while the legitimate nodes suffer from hardware impairments (HIs). The key idea is to process the PHY-attribute data on the application layer via deploying a deep... 

    Probability of missed detection as a criterion for receiver placement in MIMO PCL

    , Article IEEE National Radar Conference - Proceedings, 7 May 2012 through 11 May 2012, Atlanta, GA ; 2012 , Pages 0924-0927 ; 10975659 (ISSN) ; 9781467306584 (ISBN) Majd, M. N ; Chitgarha, M. M ; Radmard, M ; Nayebi, M. M ; Sharif University of Technology
    IEEE  2012
    Abstract
    Using multiple antennas at the transmit and receive sides of a passive radar brings both the benefits of MIMO radar and passive radar. However one of the obstacles arisen in such configuration is the receive antennas placement in proper positions so that the radar performance is improved. Here we just consider the case of positioning one receiver among multiple illuminators of opportunity. Indeed it is a start for the solution of optimizing the geometry of the multiple receivers in a passive radar  

    An efficient method for the ring opening of epoxides with aromatic amines by Sb(III) chloride under microwave irradiation

    , Article Journal of Chemical Research ; Issue 4 , 2008 , Pages 220-221 ; 03082342 (ISSN) Ghazanfari, D ; Hashemi, M. M ; Mottaghi, M. M ; Foroughi, M. M ; Sharif University of Technology
    2008
    Abstract
    SbCl3 supported on montmorillonite K-10 is an efficient catalyst for the ring opening of epoxides with aromatic amines under solvent-free conditions and microwave irradiation to give the corresponding b-amino alcohols in high yields with high regioselectivity  

    Resource allocation for uav-enabled integrated sensing and communication (isac) via multi-objective optimization

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; Volume 2023-June , 2023 ; 15206149 (ISSN); 978-172816327-7 (ISBN) Rezaei, O ; Naghsh, M. M ; Karbasi, M ; Nayebi, M. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    In this paper, we consider an integrated sensing and communication (ISAC) system with wireless power transfer (WPT) where an unmanned aerial vehicle (UAV)-based radar serves a group of energy-limited communication users in addition to its sensing functionality. In this architecture, the radar senses the environment in phase 1 (namely sensing phase) and mean-while, the communications users (nodes) harvest and store the energy from the radar transmit signal. The stored energy is then used for information transmission from the nodes to UAV in phase 2, i.e., uplink phase. Performance of the radar system depends on the transmit signal as well as the receive filter; the energy of the transmit... 

    MIMO radar signal design to improve the MIMO ambiguity function via maximizing its peak

    , Article Signal Processing ; Volume 118 , 2016 , Pages 139-152 ; 01651684 (ISSN) Chitgarha, M. M ; Radmard, M ; Nazari Majd, M ; Karbasi, S. M ; Nayebi, M. M ; Sharif University of Technology
    Elsevier  2016
    Abstract
    One of the important obstacles in MIMO (Multiple Input Multiple Output) radars is the issue of designing proper transmit signals. Indeed, the capability of signal design is a significant advantage in MIMO radars, through which, the system can achieve much better performance. Many different aspects of this performance improvement have been considered yet, and the transmit signals have been designed to attain such goal, e.g., getting higher SNR or better detector's performance at the receiver. However, an important tool for evaluating the radar's performance is its ambiguity function. In this paper, we consider the problem of transmit signal design, in order to optimize the ambiguity function... 

    Detection-localization tradeoff in MIMO radars

    , Article Radioengineering ; Volume 26, Issue 2 , 2017 , Pages 581-587 ; 12102512 (ISSN) Nazari Majd, M ; Radmard, M ; Chitgarha, M. M ; Bastani, M. H ; Nayebi, M. M ; Sharif University of Technology
    2017
    Abstract
    Two gains play key roles in recently developed MIMO wireless communication systems: "spatial diversity" gain and "spatial multiplexing" gain. The diversity gain refers to the capability to decrease the error rate of the MIMO channel, while the multiplexing gain implicitly refers to the amount of increase in the capacity of the MIMO channel. It has been shown that there is a fundamental tradeoff between these two types of gains, meaning interplay between increasing reliability (via an increase in the diversity gain) and increasing data rate (via an increase in the multiplexing gain). On the other hand, recently, MIMO radars have attracted much attention for their superior ability to enhance... 

    Antenna placement and power allocation optimization in MIMO detection

    , Article IEEE Transactions on Aerospace and Electronic Systems ; Vol. 50, Issue 2 , April , 2014 , pp. 1468-1478 Radmard, M ; Chitgarha, M. M ; Majd, M. N ; Nayebi, M. M ; Sharif University of Technology
    2014
    Abstract
    It is a well known fact that using multiple antennas at transmit and receive sides improves the detection performance. However, in such multiple-input multiple-output (MIMO) configuration, proper positioning of transmitters and receivers is a big challenge that can have significant influence on the performance of the overall system. In addition, determining the power of each transmitter under a total power constraint is a problem that should be solved in order to enhance the performance and coverage of such a system. In this paper, we design the Neyman-Pearson detector under the Rayleigh scatter model and use it to introduce a criterion for the antenna placement at both transmit and receive... 

    Ambiguity function of MIMO radar with widely separated antennas

    , Article Proceedings International Radar Symposium ; 16 -18 June , 2014 ; ISSN: 21555753 Radmard, M ; Chitgarha, M. M ; Nazari Majd, M ; Nayebi, M. M ; Sharif University of Technology
    2014
    Abstract
    There has been much interest, recently, towards exploiting the Multiple-Input Multiple-Output (MIMO) technique in radar. It is shown that using multiple antennas at transmit and receive sides can improve the performance of the system. However, in order to analyze the system's performance, its ambiguity function, i.e. the ambiguity function of a MIMO radar, is needed to be defined. In this paper, beginning from the information theoretic definitions, we derive such function, specifically for a MIMO radar with widely separated antennas