Search Results - "Kuhestani, Ali"
-
1
Can a multi-hop link relying on untrusted amplify-and-forward relays render security?
Published in Wireless networks (2021)“…Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due…”
Get full text
Journal Article -
2
Characterization of untrusted relaying networks in the presence of an adversary jammer
Published in Wireless networks (01-04-2020)“…By considering an adversary jammer in a communication network, we investigate the secrecy performance of a cooperative wireless network comprised of a source,…”
Get full text
Journal Article -
3
Adversarial Neural Network Training for Secure and Robust Brain-to-Brain Communication
Published in IEEE access (2024)“…In the rapidly evolving domain of brain-to-brain communication, safeguarding the transmission of information against adversarial threats is paramount. This…”
Get full text
Journal Article -
4
A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer
Published in IEEE internet of things journal (15-03-2021)“…In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things…”
Get full text
Journal Article -
5
Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments
Published in IEEE access (2019)“…In this work, by considering a variety of realistic hardware impairments, we aim to enhance the security of a cooperative relaying network, where a source…”
Get full text
Journal Article -
6
Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
Published in IEEE open journal of the Communications Society (01-01-2024)“…Limited power and computational resources make the employment of complex classical encryption schemes unrealistic in resource-limited networks, e.g., the…”
Get full text
Journal Article -
7
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers
Published in IEEE transactions on information forensics and security (01-02-2018)“…In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a…”
Get full text
Journal Article -
8
Three-Hop Untrusted Relay Networks with Hardware Imperfections and Channel Estimation Errors for Internet of Things
Published in IEEE transactions on information forensics and security (01-01-2020)“…Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may…”
Get full text
Journal Article -
9
RIS-Aided Secure Millimeter-Wave Communication Under RF-Chain Impairments
Published in IEEE transactions on vehicular technology (01-01-2024)“…The effects of hardware impairments (HWIs) on the secrecy performance of a reconfigurable intelligent surface (RIS)-assisted millimeter wave system are…”
Get full text
Journal Article -
10
Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens
Published in IEEE transactions on communications (01-06-2020)“…In this paper, we address the problem of joint covert communication and secure transmission in untrusted relaying networks when multiple wardens exist in the…”
Get full text
Journal Article -
11
Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer
Published in IEEE transactions on communications (01-06-2018)“…In this paper, we examine the secrecy performance of two-way relaying between a large-scale multiple antenna base station (BS) and a single antenna mobile user…”
Get full text
Journal Article -
12
Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay
Published in IEEE transactions on wireless communications (01-10-2020)“…In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a…”
Get full text
Journal Article -
13
Secure communication with a multiple-antennas untrusted relay in presence of randomly distributed adversary jammers
Published in Physical communication (01-10-2024)“…In this article, we examine the achievable secrecy rate of a cooperative network including one source, one destination, and one untrusted amplify-and-forward…”
Get full text
Journal Article -
14
Short-Packet Amplify-and-Forward Relaying for the Internet-of-Things in the Face of Imperfect Channel Estimation and Hardware Impairments
Published in IEEE transactions on green communications and networking (01-03-2022)“…In next-generation wireless systems ultra-reliable low-latency communications (URLLC) have to be realized in support of the Internet-of-things (IoT). However,…”
Get full text
Journal Article -
15
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
Published in IEEE transactions on vehicular technology (01-09-2018)“…In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless-powered untrusted…”
Get full text
Journal Article -
16
A new practical physical layer secret key generation in the presence of an untrusted relay
Published in Physical communication (01-10-2024)“…Physical layer secret key generation (SKG) has recently been introduced as a lightweight and efficient solution for sixth-generation (6G) networks. In this…”
Get full text
Journal Article -
17
A machine learning multi-hop physical layer authentication with hardware impairments
Published in Wireless networks (01-04-2024)“…Authentication is one of the major requirements of wireless networks security, which uses to distinguish legal transmitter from illegal transmitter. Physical…”
Get full text
Journal Article -
18
Reconfigurable-Intelligent-Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments
Published in IEEE internet of things journal (01-05-2024)“…Physical-layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by efficiently providing secret keys in…”
Get full text
Journal Article -
19
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach
Published in IEEE transactions on information forensics and security (2022)“…The physical layer security (PLS) of millimeter wave (mmWave) communication systems is investigated, where the secure source-to-destination communication is…”
Get full text
Journal Article -
20
Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
Published in IEEE internet of things journal (01-05-2021)“…In this article, we investigate joint information-theoretic secrecy and covert communication in a single-input-multioutput (SIMO) system where a transmitter…”
Get full text
Journal Article