Skip to main content

Showing 1–4 of 4 results for author: Kuhestani, A

Searching in archive eess. Search in all archives.
.
  1. arXiv:2212.01563  [pdf, other

    eess.SP

    Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments

    Authors: Vahid Shahiri, Hamid Behroozi, Ali Kuhestani

    Abstract: Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means t… ▽ More

    Submitted 3 December, 2022; originally announced December 2022.

  2. arXiv:2007.05502  [pdf, other

    eess.SP

    Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

    Authors: Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani, Phee Lep Yeoh

    Abstract: In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. S… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: 9 pages, 5 figures, 1 table

  3. Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?

    Authors: Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi

    Abstract: Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relayin… ▽ More

    Submitted 5 July, 2020; v1 submitted 17 May, 2019; originally announced May 2019.

    Comments: 24 pages, 9 figures, submitted for journal publication

  4. arXiv:1812.10312  [pdf, other

    eess.SP

    Covert Transmission with Antenna Selection and Using an External Jammer

    Authors: Morteza Sarkheil, Paeiz Azmi, Moslem Forouzesh, Ali Kuhestani

    Abstract: This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the j… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.