Skip to main content

Showing 1–10 of 10 results for author: Kuhestani, A

.
  1. arXiv:2212.01563  [pdf, other

    eess.SP

    Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments

    Authors: Vahid Shahiri, Hamid Behroozi, Ali Kuhestani

    Abstract: Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means t… ▽ More

    Submitted 3 December, 2022; originally announced December 2022.

  2. arXiv:2007.05502  [pdf, other

    eess.SP

    Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

    Authors: Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani, Phee Lep Yeoh

    Abstract: In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. S… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: 9 pages, 5 figures, 1 table

  3. Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?

    Authors: Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi

    Abstract: Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relayin… ▽ More

    Submitted 5 July, 2020; v1 submitted 17 May, 2019; originally announced May 2019.

    Comments: 24 pages, 9 figures, submitted for journal publication

  4. arXiv:1812.10312  [pdf, other

    eess.SP

    Covert Transmission with Antenna Selection and Using an External Jammer

    Authors: Morteza Sarkheil, Paeiz Azmi, Moslem Forouzesh, Ali Kuhestani

    Abstract: This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the j… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

  5. arXiv:1809.00312  [pdf, other

    cs.CR cs.IT

    Secure transmission with covert requirement in untrusted relaying networks

    Authors: Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani

    Abstract: In this paper, we study the problem of secure transmission with covert requirement in untrusted relaying networks. Our considered system model consists of one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current… ▽ More

    Submitted 2 September, 2018; originally announced September 2018.

    Comments: 13 pages, 8 figures, TIFS journal

  6. arXiv:1709.01341  [pdf, ps, other

    cs.IT cs.CR

    Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers

    Authors: Ali Kuhestani, Abbas Mohammadi, Mohammadali Mohammadi

    Abstract: In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a multiple antennas source communicates with a single-antenna destination in presence of untrusted relays and passive eavesdroppers (Eves). The objective is to protect the data confidentially while concurrently relying on the untrusted relays a… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

    Comments: 18 pages, 10 figures, IEEE Transactions on Information Forensics and Security (In press)

  7. arXiv:1709.01334  [pdf, ps, other

    cs.CR cs.IT

    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

    Authors: Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad Ruhul Amin Khandaker

    Abstract: By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA)… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

    Comments: 29 pages, 7 figures, Submitted to IEEE Transactions on Wireless Communications

  8. arXiv:1709.01330  [pdf, ps, other

    cs.CR cs.IT

    Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying

    Authors: Ali Kuhestani, Phee Lep Yeoh, Abbas Mohammadi

    Abstract: In this paper, we examine the secrecy performance of two-way relaying between a multiple antenna base station (BS) and a single antenna mobile user (MU) in the presence of a multiple antenna friendly jammer (FJ). We consider the untrusted relaying scenario where an amplify-and-forward relay is both a necessary helper and a potential eavesdropper. To maximize the instantaneous secrecy sum rate, we… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

    Comments: 5 pages, 4 figures, Accepted for presentation at the IEEE GLOBECOM 2017 in Singapore and for publication in its proceedings

  9. Secure two-way communication via a wireless powered untrusted relay and friendly jammer

    Authors: Milad Tatar Mamaghani, Abbas Mohammadi, Phee Lep Yeoh, Ali Kuhestani

    Abstract: In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ). By adopting the time switching (TS) architecture at the relay, the data transmission is accomplished in three phases: Phase I) Energy harvesting by the untrusted relay and the FJ through no… ▽ More

    Submitted 22 October, 2017; v1 submitted 22 August, 2017; originally announced August 2017.

    Comments: 6 pages, 5 figures, IEEE Global Communications Conference 2017 CISS (Accepted)

  10. arXiv:1708.06437  [pdf, ps, other

    cs.CR cs.IT cs.NI

    Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

    Authors: Milad Tatar Mamaghani, Ali Kuhestani, Kai-Kit Wong

    Abstract: In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is do… ▽ More

    Submitted 1 March, 2018; v1 submitted 21 August, 2017; originally announced August 2017.

    Comments: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular Technology