Skip to main content

Showing 1–50 of 59 results for author: Mirmohseni, M

.
  1. arXiv:2406.07352  [pdf, other

    cs.IT math.PR

    Stochastic Analysis of Homogeneous Wireless Networks Assisted by Intelligent Reflecting Surfaces

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari, Behrouz Maham, Umberto Spagnolini

    Abstract: In this paper, we study the impact of the existence of multiple IRSs in a homogeneous wireless network, in which all BSs, users (U), and IRSs are spatially distributed by an independent homogeneous PPP, with density $λ_{\rm BS}\rm{[BS/m^2]}$, $λ_{\rm U}\rm{[U/m^2]}$, and $λ_{\rm IRS}\rm{[IRS/m^2]}$, respectively. We utilize a uniformly random serving strategy for BS and IRS to create stochastic sy… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2405.04993  [pdf, ps, other

    cs.IT

    On Stochastic Fundamental Limits in a Downlink Integrated Sensing and Communication Network

    Authors: Marziyeh Soltani, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2305.15388

  3. arXiv:2405.03361  [pdf, other

    cs.IT

    Secure Semantic Communication over Wiretap Channel

    Authors: Denis Kozlov, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: Semantic communication is an emerging feature for future networks like 6G, which emphasizes the meaning of the message in contrast to the traditional approach where the meaning of the message is irrelevant. Yet, the open nature of a wireless channel poses security risks for semantic communications. In this paper, we derive information-theoretic limits for the secure transmission of semantic source… ▽ More

    Submitted 10 May, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  4. A Novel Stochastic Model for IRS-Assisted Communication Systems Based on the Sum-Product of Nakagami-$m$ Random Variables

    Authors: Hamid Amiriara, Mahtab Mirmohseni, Farid Ashtiani, Masoumeh Nasiri-Kenari

    Abstract: This paper presents exact formulas for the probability distribution function (PDF) and moment generating function (MGF) of the sum-product of statistically independent but not necessarily identically distributed (i.n.i.d.) Nakagami-$m$ random variables (RVs) in terms of Meijer's G-function. Additionally, exact series representations are also derived for the sum of double-Nakagami RVs, providing us… ▽ More

    Submitted 18 January, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Comments: 11 pages

  5. arXiv:2305.15388  [pdf, ps, other

    cs.IT eess.SP

    Outage Tradeoff Analysis in a Downlink Integrated Sensing and Communication Network

    Authors: Marziyeh Soltani, Mahtab Mirmohseni, Rahim Tafazolli

    Abstract: This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  6. arXiv:2304.12606  [pdf, ps, other

    cs.IT

    Statistics of Random Binning Based on Tsallis Divergence

    Authors: Masoud Kavian, Mohammad Mahdi Mojahedian, Mohammad Hossein Yassaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Random binning is a widely utilized tool in information theory, finding applications in various domains. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. Our investigation encompasses all values of $α$ within the range of $(0,\infty)$. The proofs provided in this paper cover both the achievability and converse aspects. To accommodate the… ▽ More

    Submitted 13 February, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

  7. arXiv:2210.16667  [pdf, other

    eess.SP eess.SY

    IRS-User Association in IRS-Aided MISO Wireless Networks: Convex Optimization and Machine Learning Approaches

    Authors: Hamid Amiriara, Farid Ashtiani, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: This paper concentrates on the problem of associating an intelligent reflecting surface (IRS) to multiple users in a multiple-input single-output (MISO) downlink wireless communication network. The main objective of the paper is to maximize the sum-rate of all users by solving the joint optimization problem of the IRS-user association, IRS reflection, and BS beamforming, formulated as a non-convex… ▽ More

    Submitted 29 October, 2022; originally announced October 2022.

    Comments: 10 pages, 4 figures

  8. arXiv:2210.12091  [pdf, ps, other

    cs.IT

    Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks

    Authors: Elmira Shahraki, Mahtab Mirmohseni, Hengameh Keshavarz

    Abstract: The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A $K$-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers. The base stations, legitimate users (in a two-user NOMA setup), and passive eavesdroppers, all with single-antenna, are randomly distributed. Assuming indepen… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

  9. arXiv:2207.06032  [pdf, other

    cs.IT eess.SP

    Abnormality Detection and Localization Schemes using Molecular Communication Systems: A Survey

    Authors: Ali Etemadi, Maryam Farahnak-Ghazani, Hamidreza Arjmandi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Abnormality detection and localization (ADL) have been studied widely in wireless sensor networks (WSNs) literature, where the sensors use electromagnetic waves for communication. Molecular communication (MC) has been introduced as an alternative approach for ADL in particular areas such as healthcare, being able to tackle the shortcomings of conventional WSNs, such as invasiveness, bio-incompatib… ▽ More

    Submitted 12 November, 2022; v1 submitted 13 July, 2022; originally announced July 2022.

    Comments: *Ali Etemadi and Maryam Farahnak-Ghazani are co-first authors

  10. arXiv:2203.16641  [pdf, other

    eess.SP q-bio.MN

    Joint Sensing, Communication and Localization of a Silent Abnormality Using Molecular Diffusion

    Authors: Ladan Khaloopour, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In this paper, we propose a molecular communication system to localize an abnormality in a diffusion based medium. We consider a general setup to perform joint sensing, communication and localization. This setup consists of three types of devices, each for a different task: mobile sensors for navigation and molecule releasing (for communication), fusion centers (FC)s for sampling, amplifying and f… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

  11. arXiv:2202.04696  [pdf, other

    cs.IT

    Distributed Attribute-based Private Access Control

    Authors: Amir Masoud Jafarpisheh, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali

    Abstract: In attribute-based access control, users with certain verified attributes will gain access to some particular data. Concerning with privacy of the users' attributes, we study the problem of distributed attribute-based private access control (DAPAC) with multiple authorities, where each authority will learn and verify only one of the attributes. To investigate its fundamental limits, we introduce… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

  12. arXiv:2202.02307  [pdf, ps, other

    cs.IT

    Privacy-aware Distributed Hypothesis Testing in Gray-Wyner Network with Side Information

    Authors: Reza Abbasalipour, Mahtab Mirmohseni

    Abstract: The problem of distributed binary hypothesis testing in the Gray-Wyner network with side information is studied in this paper. An observer has access to a discrete memoryless and stationary source and describes its observation to two detectors via one common and two private channels. The channels are considered error-free but rate-limited. Each detector also has access to its own discrete memoryle… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

  13. arXiv:2109.09624  [pdf, other

    cs.IT

    On Achievable Degrees of Freedom for the Frequency-Selective K-User Interference Channel in the Presence of an Instantaneous Relay

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In this paper, we study the degrees of freedom (DoF) of the frequency-selective K-user interference channel in the presence of an instantaneous relay (IR) with multiple receive and transmit antennas. We investigate two scenarios based on the IR antennas' cooperation ability. First, we assume that the IR receive and transmit antennas can coordinate with each other, where the transmitted signal of e… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: Submitted to IEEE Transactions on Information Theory

  14. arXiv:2105.07438  [pdf, other

    eess.SP

    Theoretical Concept Study of Cooperative Abnormality Detection and Localization in Fluidic-Medium Molecular Communication

    Authors: Ladan Khaloopour, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In this paper, we propose a theoretical framework for cooperative abnormality detection and localization systems by exploiting molecular communication setup. The system consists of mobile sensors in a fluidic medium, which are injected into the medium to search the environment for abnormality. Some fusion centers (FC) are placed at specific locations in the medium, which absorb all sensors arrived… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    Comments: This paper is accepted for publication in the IEEE Sensors Journal

  15. arXiv:2105.02215  [pdf, other

    cs.IT cs.CR

    Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers

    Authors: Marziyeh Soltani, Mahtab Mirmohseni, Panos Papadimitratos

    Abstract: Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mi… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

  16. arXiv:2103.01568  [pdf, other

    cs.IT cs.CR

    The Capacity Region of Distributed Multi-User Secret Sharing

    Authors: Ali Khalesi, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali

    Abstract: In this paper, we study the problem of distributed multi-user secret sharing, including a trusted master node, $N\in \mathbb{N}$ storage nodes, and $K$ users, where each user has access to the contents of a subset of storage nodes. Each user has an independent secret message with certain rate, defined as the size of the message normalized by the size of a storage node. Having access to the secret… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  17. arXiv:2101.10745  [pdf, other

    cs.IT

    Interference Alignment Using Reaction in Molecular Interference Channels

    Authors: Maryam Farahnak-Ghazani, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Co-channel interference (CCI) is a performance limiting factor in molecular communication (MC) systems with shared medium. Interference alignment (IA) is a promising scheme to mitigate CCI in traditional communication systems. Due to the signal-dependent noise in MC systems, the traditional IA schemes are less useful in MC systems. In this paper, we propose a novel IA scheme in molecular interfere… ▽ More

    Submitted 26 June, 2022; v1 submitted 26 January, 2021; originally announced January 2021.

  18. arXiv:2101.00109  [pdf, other

    cs.IT

    Achievable Rates for Binary Two-hop Channel with Energy Harvesting Relay and Finite Battery

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: We study the problem of joint information and energy transfer in a binary two-hop channel with an energy harvesting relay. We consider a finite battery size at the relay and energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memory. We model the energy save… ▽ More

    Submitted 28 September, 2021; v1 submitted 31 December, 2020; originally announced January 2021.

    Comments: arXiv admin note: text overlap with arXiv:1704.04149

  19. On Molecular Flow Velocity Meters

    Authors: Maryam Farahnak-Ghazani, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Flow velocity is an important characteristic of the fluidic mediums. In this paper, we introduce a molecular based flow velocity meter consisting of a molecule releasing node and a receiver that counts these molecules. We consider both flow velocity detection and estimation problems, which are employed in different applications. For the flow velocity detection, we obtain the maximum a posteriori (… ▽ More

    Submitted 11 January, 2021; v1 submitted 5 July, 2020; originally announced July 2020.

    Comments: To be published in the IEEE Transactions on Molecular, Biological, and Multi-Scale Communications

  20. arXiv:2006.13398  [pdf, other

    cs.IT

    On the Capacity of the Joint Time and Concentration Modulation for Molecular Communications

    Authors: Farhad Mirkarimi, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Most diffusion based molecular channels suffer from low information capacity due to the structure of the diffusion environment. To address this issue, this paper studies the capacity of the diffusion based molecular communication by exploiting both time and concentration level of the released molecules for information transfer. The transmitter releases molecules in one of the sub-intervals with a… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

  21. arXiv:2003.12052  [pdf, other

    stat.ML cs.CR cs.IT cs.LG

    Corella: A Private Multi Server Learning Approach based on Correlated Queries

    Authors: Hamidreza Ehteram, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni

    Abstract: The emerging applications of machine learning algorithms on mobile devices motivate us to offload the computation tasks of training a model or deploying a trained one to the cloud or at the edge of the network. One of the major challenges in this setup is to guarantee the privacy of the client data. Various methods have been proposed to protect privacy in the literature. Those include (i) adding n… ▽ More

    Submitted 27 July, 2020; v1 submitted 26 March, 2020; originally announced March 2020.

    Comments: 13 pages, 9 figures, 4 tables

  22. arXiv:1907.08934  [pdf, other

    cs.IT cs.ET

    Adaptive Release Duration Modulation for Limited Molecule Production and Storage

    Authors: Ladan Khaloopour, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: The nature of molecular transmitter imposes some limitations on the molecule production process and its storage. As the molecules act the role of the information carriers, the limitations affect the transmission process and the system performance considerably. In this paper, we focus on the transmitter's limitations, in particular, the limited molecule production rate and the finite storage capaci… ▽ More

    Submitted 21 July, 2019; originally announced July 2019.

  23. arXiv:1906.03929  [pdf, ps, other

    cs.IT

    On the Secrecy Performance of NOMA Systems with both External and Internal Eavesdroppers

    Authors: Milad Abolpour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Sharing resource blocks in NOMA systems provides more opportunity to the internal users to overhear the messages of the other users. Therefore, some sort of secrecy against the internal users in addition to the external eavesdroppers must be provided. In this paper, we investigate the secrecy performance of a two-user NOMA system in existence of the external and internal passive eavesdroppers, whe… ▽ More

    Submitted 10 June, 2019; originally announced June 2019.

  24. arXiv:1902.06319  [pdf, ps, other

    cs.IT

    Private Inner Product Retrieval for Distributed Machine Learning

    Authors: Mohammad Hossein Mousavi, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni

    Abstract: In this paper, we argue that in many basic algorithms for machine learning, including support vector machine (SVM) for classification, principal component analysis (PCA) for dimensionality reduction, and regression for dependency estimation, we need the inner products of the data samples, rather than the data samples themselves. Motivated by the above observation, we introduce the problem of pri… ▽ More

    Submitted 17 February, 2019; originally announced February 2019.

  25. arXiv:1902.00948  [pdf, ps, other

    cs.IT

    Outage Performance in Secure Cooperative NOMA

    Authors: Milad Abolpour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in… ▽ More

    Submitted 13 March, 2019; v1 submitted 3 February, 2019; originally announced February 2019.

  26. arXiv:1901.05927  [pdf, other

    cs.IT

    Fundamental Limits of Private User Authentication

    Authors: Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (u… ▽ More

    Submitted 12 September, 2022; v1 submitted 17 January, 2019; originally announced January 2019.

    Comments: 15 pages, 4 figures

  27. arXiv:1802.08965  [pdf, ps, other

    cs.IT

    Diffusion Based Molecular Communication with Limited Molecule Production Rate

    Authors: Hamid G. Bafghi, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: This paper studies the impact of a transmitter's molecule generation process on the capacity of a concentration based Molecular Communication (MC) system. Constraints caused by the molecule generation process affect the availability of the molecules at the transmitter. The transmitter has a storage of molecules, and should decide whether to release or save the currently produced molecules. As a re… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.

  28. arXiv:1711.04677  [pdf, ps, other

    cs.IT cs.CR

    Private Function Retrieval

    Authors: Mahtab Mirmohseni, Mohammad Ali Maddah-Ali

    Abstract: The widespread use of cloud computing services raises the question of how one can delegate the processing tasks to the untrusted distributed parties without breeching the privacy of its data and algorithms. Motivated by the algorithm privacy concerns in a distributed computing system, in this paper, we introduce the private function retrieval (PFR) problem, where a user wishes to efficiently retri… ▽ More

    Submitted 15 November, 2017; v1 submitted 13 November, 2017; originally announced November 2017.

  29. arXiv:1704.04149  [pdf, other

    cs.IT

    Joint Transfer of Energy and Information in a Two-hop Relay Channel

    Authors: Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: We study the problem of joint information and energy transfer in a two-hop channel with a Radio frequency (RF) energy harvesting relay. We consider a finite battery size at the relay and deterministic energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay must receive multiple energy-contained symbols. Thus, we face a kind of channel with memor… ▽ More

    Submitted 13 April, 2017; originally announced April 2017.

  30. arXiv:1702.03590  [pdf, other

    cs.IT

    On the Capacity of a Class of Signal-Dependent Noise Channels

    Authors: Hamid Ghourchian, Gholamali Aminian, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In some applications, the variance of additive measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal-dependent noise (ASDN) channels. The idea of the first lower bound is the extension of… ▽ More

    Submitted 2 June, 2017; v1 submitted 12 February, 2017; originally announced February 2017.

    Comments: 34 pages, 3 figures

  31. arXiv:1701.05392  [pdf, other

    cs.IT

    On Optimal Online Algorithms for Energy Harvesting Systems with Continuous Energy and Data Arrivals

    Authors: Milad Rezaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Energy harvesting (EH) has been developed to extend the lifetimes of energy-limited communication systems. In this letter, we consider a single-user EH communication system, in which both of the arrival data and the harvested energy curves are modeled as general functions. Unlike most of the works in the field, we investigate the online algorithms which only acquire the causal information of the a… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: This paper has been submitted to IEEE Wireless Communications Letters

  32. arXiv:1612.09496  [pdf, other

    cs.IT

    Optimal Transmission Policies for Multi-hop Energy Harvesting Systems

    Authors: Milad Rezaee, Mahtab Mirmohseni, Vaneet Aggarwal, Mohammad Reza Aref

    Abstract: In this paper, we consider a multi-hop energy harvesting (EH) communication system in a full-duplex mode, where arrival data and harvested energy curves in the source and the relays are modeled as general functions. This model includes the EH system with discrete arrival processes as a special case. We investigate the throughput maximization problem considering minimum utilized energy in the sourc… ▽ More

    Submitted 30 December, 2016; originally announced December 2016.

    Comments: paper has been submitted to IEEE Transactions on Wireless Communications

  33. arXiv:1612.03360  [pdf, other

    cs.IT

    Information Theory of Molecular Communication: Directions and Challenges

    Authors: Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Molecular Communication (MC) is a communication strategy that uses molecules as carriers of information, and is widely used by biological cells. As an interdisciplinary topic, it has been studied by biologists, communication theorists and a growing number of information theorists. This paper aims to specifically bring MC to the attention of information theorists. To do this, we first highlight the… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.

    Comments: Accepted for publication in the IEEE Transactions on Molecular, Biological, and Multi-Scale Communications as a Shannon Centennial Special Issue

  34. arXiv:1605.05693  [pdf, ps, other

    cs.IT

    Capacity of the State-Dependent Wiretap Channel: Secure Writing on Dirty Paper

    Authors: Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper we consider the State-Dependent Wiretap Channel (SD-WC). As the main idea, we model the SD-WC as a Cognitive Interference Channel (CIC), in which the primary receiver acts as an eavesdropper for the cognitive transmitter's message. By this point of view, the Channel State Information (CSI) in SD-WC plays the role of the primary user's message in CIC which can be decoded at the eavesd… ▽ More

    Submitted 18 May, 2016; originally announced May 2016.

    Comments: Submitted to: IEEE Transaction on Forensics and Security

  35. arXiv:1604.05680  [pdf, ps, other

    cs.IT

    On Medium Chemical Reaction in Diffusion-Based Molecular Communication: a Two-Way Relaying Example

    Authors: Maryam Farahnak-Ghazani, Gholamali Aminian, Mahtab Mirmohseni, Amin Gohari, Masoumeh Nasiri-Kenari

    Abstract: Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and… ▽ More

    Submitted 24 April, 2018; v1 submitted 19 April, 2016; originally announced April 2016.

    Comments: 32 pages, 6 figures

  36. arXiv:1604.04818  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Capacity in Large Cooperative Networks in Presence of Eavesdroppers with Unknown Locations

    Authors: Amir Hossein Hadavi, Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effe… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

  37. arXiv:1603.01819  [pdf, other

    cs.IT cs.ET

    Type Based Sign Modulation and its Application for ISI mitigation in Molecular Communication

    Authors: Reza Mosayebi, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri Kenari

    Abstract: An important challenge in design of modulation schemes for molecular communication is positivity of the transmission signal (only a positive concentration of molecules can be released in the environment). This restriction makes handling of the InterSymbol Interference (ISI) a challenge for molecular communication. Previous works have proposed use of chemical reactions to remove molecules from the… ▽ More

    Submitted 14 December, 2016; v1 submitted 6 March, 2016; originally announced March 2016.

  38. arXiv:1601.04622  [pdf

    cs.CR

    Investigating the Performances and Vulnerabilities of Two New Protocols Based on R-RAPSE

    Authors: Seyed Salman Sajjadi Ghaemmaghami, Afrooz Haghbin, Mahtab Mirmohseni

    Abstract: Radio Frequency IDentification (RFID) is a pioneer technology which has depicted a new lifestyle for humanity in all around the world. Every day we observe an increase in the scope of RFID applications and no one cannot withdraw its numerous usage around him/herself. An important issue which should be considered is providing privacy and security requirements of an RFID system. Recently in 2014, Ca… ▽ More

    Submitted 18 January, 2016; originally announced January 2016.

    Comments: 5 figures, 2 tables

  39. arXiv:1511.07168  [pdf, ps, other

    cs.IT

    On The Secrecy of the Cognitive Interference Channel with Partial Channel States

    Authors: Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter-receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by a channel state sequence which is estimated partially at the cognitive trans… ▽ More

    Submitted 18 May, 2016; v1 submitted 23 November, 2015; originally announced November 2015.

    Comments: 14 pages, 3 figures, submitted to TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (ETT)

  40. arXiv:1510.04197  [pdf

    cs.CR

    A Privacy Preserving Improvement for SRTA in Telecare Systems

    Authors: Seyed Salman Sajjadi Ghaemmaghami, Mahtab Mirmohseni, Afrooz Haghbin

    Abstract: Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed SRTA… ▽ More

    Submitted 14 October, 2015; originally announced October 2015.

  41. arXiv:1509.05877  [pdf, other

    cs.IT q-bio.MN

    On the Capacity of Point-to-Point and Multiple-Access Molecular Communications with Ligand-Receptors

    Authors: Gholamali Aminian, Maryam Farahnak Ghazani, Mahtab Mirmohseni, Masoumeh Nasiri Kenari, Faramarz Fekri

    Abstract: In this paper, we consider the bacterial point-to-point and multiple-access molecular communications with ligand-receptors. For the point-to-point communication, we investigate common signaling methods, namely the Level Scenario (LS), which uses one type of a molecule with different concentration levels, and the Type Scenario (TS), which employs multiple types of molecules with a single concentrat… ▽ More

    Submitted 19 September, 2015; originally announced September 2015.

  42. arXiv:1508.02495  [pdf, other

    cs.IT

    On ISI-free Modulations for Diffusion based Molecular Communication

    Authors: Hamidreza Arjmandi, Mohammad Movahednasab, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri Kenari, Faramarz Fekri

    Abstract: A diffusion molecular channel is a channel with memory, as molecules released into the medium hit the receptors after a random delay. Coding over the diffusion channel is performed by choosing the type, intensity, or the released time of molecules diffused in the environment over time. To avoid intersymbol interference (ISI), molecules of the same type should be released at time instances that are… ▽ More

    Submitted 11 August, 2015; originally announced August 2015.

  43. arXiv:1506.04079  [pdf, other

    cs.IT

    Energy Harvesting Systems with Continuous Energy and Data Arrivals: the Optimal Offline and a Heuristic Online Algorithms

    Authors: Milad Rezaee, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a singleuser energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. For the single-user model, our first goal is to find an offline algorithm, which maxi… ▽ More

    Submitted 22 January, 2016; v1 submitted 12 June, 2015; originally announced June 2015.

  44. arXiv:1504.04322  [pdf, other

    cs.IT

    On the Capacity of Level and Type Modulation in Molecular Communication with Ligand Receptors

    Authors: Gholamali Aminian, Mahtab Mirmohseni, Masoumeh Nasiri Kenari, Faramarz Fekri

    Abstract: In this paper, we consider the bacterial point-to-point communication problem with one transmitter and one receiver by considering the ligand receptor binding process. The most commonly investigated signalling model, referred to as the Level Scenario (LS), uses one type of a molecule with different concentration levels for signaling. An alternative approach is to employ multiple types of molecules… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

    Comments: 18 pages, Accepted at ISIT conference

  45. arXiv:1411.3716  [pdf, ps, other

    cs.NI cs.ET cs.IT math.OC

    Power Allocation in the Energy Harvesting Full-Duplex Gaussian Relay Channels

    Authors: Mahmood Mohassel Feghhi, Mahtab Mirmohseni, Aliazam Abbasfar

    Abstract: In this paper, we propose a general model to study the full-duplex non-coherent decode-and-forward Gaussian relay channel with energy harvesting (EH) nodes, called NC-EH-$\mathcal{RC}$, in three cases: $i)$ no energy transfer (ET), $ii)$ one-way ET from the source (S) to the relay (R), and $iii)$ two-way ET. We consider the problem of optimal power allocation in NC-EH-$\mathcal{RC}$ in order to ma… ▽ More

    Submitted 14 November, 2014; originally announced November 2014.

    Comments: Accepted for publication in International Journal of Communication Systems (Special Issue on Energy Efficient Wireless Communication Networks with QoS), October 2014

    Journal ref: International Journal of Communication Systems, Vol. 30, No. 2, Jan 2017

  46. arXiv:1411.2890  [pdf, ps, other

    cs.IT cs.ET cs.PF

    Performance Analysis for Energy Harvesting Communication Protocols with Fixed Rate Transmission

    Authors: Mahmood Mohassel Feghhi, Aliazam Abbasfar, Mahtab Mirmohseni

    Abstract: Energy Harvesting (EH) has emerged as a promising technique for Green Communications and it is a novel technique to prolong the lifetime of the wireless networks with replenishable nodes. In this paper, we consider the energy shortage analysis of fixed rate transmission in communication systems with energy harvesting nodes. First, we study the finite-horizon transmission and provide the general fo… ▽ More

    Submitted 11 November, 2014; originally announced November 2014.

    Comments: 29 pages, 12 figures, Accepted for publication in IET Communications, August 2014

    Journal ref: IET Communications, Vol. 8, No. 18, Dec. 2014, Pages 3259-3270

  47. arXiv:1404.6331  [pdf, ps, other

    cs.IT cs.CR

    Active Adversaries from an Information-Theoretic Perspective: Data Modification Attacks

    Authors: Mahtab Mirmohseni, Panagiotis Papadimitratos

    Abstract: We investigate the problem of reliable communication in the presence of active adversaries that can tamper with the transmitted data. We consider a legitimate transmitter-receiver pair connected over multiple communication paths (routes). We propose two new models of adversary, a "memoryless" and a "foreseer" adversary. For both models, the adversaries are placing themselves arbitrarily on the rou… ▽ More

    Submitted 25 April, 2014; originally announced April 2014.

    Comments: A shorter version of this paper was accepted to the IEEE International Symposium on Information Theory (ISIT 2014), Honolulu, HI, USA

  48. arXiv:1312.3200  [pdf, ps, other

    cs.IT cs.CR

    Constrained Colluding Eavesdroppers: An Information-Theoretic Model

    Authors: Mahtab Mirmohseni, Panagiotis Papadimitratos

    Abstract: We study the secrecy capacity in the vicinity of colluding eavesdroppers. Contrary to the perfect collusion assumption in previous works, our new information-theoretic model considers constraints in collusion. We derive the achievable secure rates (lower bounds on the perfect secrecy capacity), both for the discrete memoryless and Gaussian channels. We also compare the proposed rates to the non-co… ▽ More

    Submitted 11 December, 2013; originally announced December 2013.

    Comments: A shorter version of this paper was accepted to International Zurich Seminar (IZS) 2014

  49. arXiv:1312.3198  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Capacity Scaling in Large Cooperative Wireless Networks

    Authors: Mahtab Mirmohseni, Panagiotis Papadimitratos

    Abstract: We investigate large wireless networks subject to security constraints. In contrast to point-to-point, interference-limited communications considered in prior works, we propose active cooperative relaying based schemes. We consider a network with $n_l$ legitimate nodes, $n_e$ eavesdroppers, and path loss exponent $α\geq 2$. As long as $n_e^2(\log(n_e))^γ=o(n_l)$, for some positive $γ$, we show one… ▽ More

    Submitted 28 February, 2015; v1 submitted 11 December, 2013; originally announced December 2013.

    Comments: The material in this paper has been presented in part in the IEEE INFOCOM, Toronto, Canada, April-May 2014 and in the Iran Workshop on Communication and Information Theory (IWCIT), Tehran, Iran, May 2014

  50. arXiv:1305.3778  [pdf, other

    cs.IT

    Empirical Coordination in a Triangular Multiterminal Network

    Authors: Ali Bereyhi, Mohsen Bahrami, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper, we investigate the problem of the empirical coordination in a triangular multiterminal network. A triangular multiterminal network consists of three terminals where two terminals observe two external i.i.d correlated sequences. The third terminal wishes to generate a sequence with desired empirical joint distribution. For this problem, we derive inner and outer bounds on the empiric… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: Accepted in ISIT 2013