Showing 1–2 of 2 results for author: Berenjkoub, M
-
On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol
Authors:
Babak Siabi,
Mehdi Berenjkoub
Abstract:
In this paper we discuss the security of a distributed inner product (DIP) protocol [IEEE TIFS, 11(1), (2016), 59-73]. We show information leakage in this protocol that does not happen in an ideal execution of DIP functionality. In some scenarios, this information leakage enables one of the parties to completely learn the other party's input. We will give examples of such scenarios.
In this paper we discuss the security of a distributed inner product (DIP) protocol [IEEE TIFS, 11(1), (2016), 59-73]. We show information leakage in this protocol that does not happen in an ideal execution of DIP functionality. In some scenarios, this information leakage enables one of the parties to completely learn the other party's input. We will give examples of such scenarios.
△ Less
Submitted 22 September, 2018;
originally announced September 2018.
-
An Adaptive MAC Protocol for Wireless LANs
Authors:
Amin Jamali,
Seyed Mostafa Safavi Hemami,
Mehdi Berenjkoub,
Hossein Saidi
Abstract:
This paper focuses on contention-based Medium Access Control (MAC) protocols used in Wireless Local Area Networks (WLANs). We propose a novel MAC protocol called Adaptive Backoff Tuning MAC (ABTMAC) based on IEEE 802.11 DCF. In our proposed MAC protocol, we utilize a fixed transmission attempt rate and each node dynamically adjusts its backoff window size considering the current network status. We…
▽ More
This paper focuses on contention-based Medium Access Control (MAC) protocols used in Wireless Local Area Networks (WLANs). We propose a novel MAC protocol called Adaptive Backoff Tuning MAC (ABTMAC) based on IEEE 802.11 DCF. In our proposed MAC protocol, we utilize a fixed transmission attempt rate and each node dynamically adjusts its backoff window size considering the current network status. We determined the appropriate transmission attempt rate for both cases where the Request-To-Send/Clear-To-Send (RTS/CTS) mechanism was and was not employed. Robustness against performance degradation caused by the difference between desired and actual values of the attempt rate parameter is considered when setting it. The performance of the protocol is evaluated analytically and through simulations. These results indicate that a wireless network utilizing ABTMAC performs better than one using IEEE 802.11 DCF.
△ Less
Submitted 2 November, 2014;
originally announced November 2014.