References of "Kalantari, Ashkan 50002065"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailSymbol-level precoding with low resolution DACs for large-scale array MU-MIMO systems
Tsinos, Christos UL; Kalantari, Ashkan UL; Chatzinotas, Symeon UL et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

While (Multiple Input-Multiple Output) MIMO systems based on large-scale antenna arrays are seen as the solution to the continuously increasing demands in modern wireless systems, they require high ... [more ▼]

While (Multiple Input-Multiple Output) MIMO systems based on large-scale antenna arrays are seen as the solution to the continuously increasing demands in modern wireless systems, they require high hardware complexity and power consumption. To tackle this, solutions based on low resolution Analog-to-Digital Converters (ADCs) / Digital-to-Analog Converters (DACs) have been developed in the literature where they mainly propose quantized versions of typical channel dependent linear precoding solutions. Alternatively, nonlinear Symbol level Precoding techniques have been recently proposed for downlink Multi User (MU)-MIMO systems with low resolution DACs that achieve significantly improved performance in several cases. The existing SLP approaches support only DACs of 1-bit resolution which result in significant performance degradations, especially when constellations with order greater than 4 are employed. To that end, in this work a novel SLP approach is developed that supports systems with DACs of any resolution and it is applicable for any type of constellation. As it is verified by the presented numerical results, the proposed approach exhibits significantly improved performance when constellations with order greater than 4 are employed and require reduced computational complexity, compared to the existing solutions for the 1-bit DAC case. [less ▲]

Detailed reference viewed: 87 (5 UL)
Full Text
Peer Reviewed
See detailLow Complexity Symbol-Level Design for Linear Precoding Systems
Krivochiza, Jevgenij UL; Kalantari, Ashkan UL; Chatzinotas, Symeon UL et al

in Heusdens, Richard; Weber, Jos H. (Eds.) PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (2017, May 11)

The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational ... [more ▼]

The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational resources. In the real implementation of MIMO precoding systems, the processing time for each set of symbols is a crucial parameter, especially in the high-throughput mode. In this work, a symbol-level optimization algorithm with reduced complexity is devised. Performance of a symbol-level precoder is shown to improve in terms of the processing times per set of symbols. [less ▲]

Detailed reference viewed: 195 (63 UL)
Full Text
Peer Reviewed
See detailSpatial peak power minimization for relaxed phase M-PSK MIMO directional modulation transmitter
Kalantari, Ashkan UL; Tsinos, Christos UL; Soltanalian, Mojtaba UL et al

in Spatial peak power minimization for relaxed phase M-PSK MIMO directional modulation transmitter (2017)

Detailed reference viewed: 81 (0 UL)
Full Text
Peer Reviewed
See detailMIMO directional modulation M-QAM precoding for transceivers performance enhancement.
Kalantari, Ashkan UL; Tsinos, Christos UL; Soltanalian, Mojtaba UL et al

in MIMO directional modulation M-QAM precoding for transceivers performance enhancement. (2017)

Detailed reference viewed: 108 (1 UL)
Full Text
Peer Reviewed
See detailFrequency of Arrival-based Interference Localization Using a Single Satellite
Kalantari, Ashkan UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in 8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop (2016, September)

Intentional and unintentional interferences are an increasing threat for the satellite communications industry. In this paper, we aim to localize an interference with unknown location using frequency of ... [more ▼]

Intentional and unintentional interferences are an increasing threat for the satellite communications industry. In this paper, we aim to localize an interference with unknown location using frequency of arrival (FoA) technique by only relying on the measurements obtained through a single satellite. In each time instance, the satellite samples the interference and forwards it to the gateway to estimate its frequency. Since the satellite moves, each estimated frequency includes a Doppler shift, which is related to the location of the unknown interferer. The satellite's position, velocity, oscillator frequency, and the interference frequency are used at the gateway to build a location-related equation between the estimated frequency and the location of the unknown interference. Simultaneously with the interference signal, the satellite samples a reference signal to calibrate the estimated frequency and compensate for the mismatches between the available and real values of the satellite's position, velocity, and oscillator frequency. Multiple location-related equations obtained based on the FoA measurements, (at least two), along with the equation of the earth surface are used to localize the unknown interference. Simulations show that increasing the number of these equations, and the satellite velocity can improve the localization accuracy by 80% and 95%, respectively. [less ▲]

Detailed reference viewed: 174 (8 UL)
Full Text
Peer Reviewed
See detailDirectional Modulation via Symbol-Level Precoding: A Way to Enhance Security
Kalantari, Ashkan UL; Soltanalian, Mojtaba; Maleki, Sina UL et al

in IEEE Journal of Selected Topics in Signal Processing (2016)

Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the ... [more ▼]

Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known. However, such bounds are shown to be restrictive in practice and may require exploitation of specialized coding schemes. In this paper, we employ the concept of directional modulation and follow a signal processing approach to enhance the security of multi-user MIMO communication systems when a multi-antenna eavesdropper is present. Enhancing the security is accomplished by increasing the symbol error rate at the eavesdropper. Unlike the information-theoretic secrecy rate paradigm, we assume that the legitimate transmitter is not aware of its channel to the eavesdropper, which is a more realistic assumption. We examine the applicability of MIMO receiving algorithms at the eavesdropper. Using the channel knowledge and the intended symbols for the users, we design security enhancing symbol-level precoders for different transmitter and eavesdropper antenna configurations. We transform each design problem to a linearly constrained quadratic program and propose two solutions, namely the iterative algorithm and one based on non-negative least squares, at each scenario for a computationally-efficient modulation. Simulation results verify the analysis and show that the designed precoders outperform the benchmark scheme in terms of both power efficiency and security enhancement. [less ▲]

Detailed reference viewed: 216 (29 UL)
Full Text
See detailSIGNAL PROCESSING FOR PHYSICAL LAYER SECURITY WITH APPLICATION IN SATELLITE COMMUNICATIONS
Kalantari, Ashkan UL

Doctoral thesis (2016)

Wireless broadcast allows widespread and easy information transfer. However, it may expose the information to unintended receivers, which could include eavesdroppers. As a solution, cryptography at the ... [more ▼]

Wireless broadcast allows widespread and easy information transfer. However, it may expose the information to unintended receivers, which could include eavesdroppers. As a solution, cryptography at the higher network levels has been used to encrypt and protect data. Cryptography relies on the fact that the computational power of the adversary is not enough to break the encryption. However, due to increasing computing power, the adversary power also increases. To further strengthen the security and complement the encryption, the concept of physical layer security has been introduced and surged an enormous amount of research. Widely speaking, the research in physical layer security can be divided into two directions: the information-theoretic and signal processing paradigms. This thesis starts with an overview of the physical layer security literature and continues with the contributions which are divided into the two following parts. In the first part, we investigate the information-theoretic secrecy rate. In the first scenario, we study the confidentiality of a bidirectional satellite network consisting of two mobile users who exchange two messages via a multibeam satellite using the XOR network coding protocol. We maximize the sum secrecy rate by designing the optimal beamforming vector along with optimizing the return and forward link time allocation. In the second scenario, we study the effect of interference on the secrecy rate. We investigate the secrecy rate in a two-user interference network where one of the users, namely user 1, requires to establish a confidential connection. User 1 wants to prevent an unintended user of the network to decode its transmission. User 1 has to adjust its transmission power such that its secrecy rate is maximized while the quality of service at the destination of the other user, user 2, is satisfied. We obtain closed-form solutions for optimal joint power control. In the third scenario, we study secrecy rate over power ratio, namely ``secrecy energy efficiency''. We design the optimal beamformer for a multiple-input single-output system with and without considering the minimum required secrecy rate at the destination. In the second part, we follow the signal processing paradigm to improve the security. We employ the directional modulation concept to enhance the security of a multi-user multiple-input multiple-output communication system in the presence of a multi-antenna eavesdropper. Enhancing the security is accomplished by increasing the symbol error rate at the eavesdropper without the eavesdropper's CSI. We show that when the eavesdropper has less antennas than the users, regardless of the received signal SNR, it cannot recover any useful information; in addition, it has to go through extra noise enhancing processes to estimate the symbols when it has more antennas than the users. Finally, we summarize the conclusions and discuss the promising research directions in the physical layer security. [less ▲]

Detailed reference viewed: 590 (42 UL)
Full Text
Peer Reviewed
See detailSecure M-PSK Communication via Directional Modulation
Kalantari, Ashkan UL; Soltanalian, Mojtaba; Maleki, Sina UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2016, March)

In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M-PSK modulation to convey information. The directional ... [more ▼]

In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M-PSK modulation to convey information. The directional modulation method operates by steering the array beam in such a way that the phase of the received signal at the receiver matches that of the intended M-PSK symbol. Due to the difference between the channels of the legitimate receiver and the eavesdropper, the signals received by the eavesdropper generally encompass a phase component different than the actual symbols. As a result, the transceiver which employs directional modulation can impose a high symbol error rate on the eavesdropper without requiring to know the eavesdropper's channel. The optimal directional modulation beamformer is designed to minimize the consumed power subject to satisfying a specific resulting phase and minimal signal amplitude at each antenna of the legitimate receiver. The simulation results show that the directional modulation results in a much higher symbol error rate at the eavesdropper compared to the conventional benchmark scheme, i.e., zero-forcing precoding at the transmitter. [less ▲]

Detailed reference viewed: 168 (15 UL)
Full Text
Peer Reviewed
See detailSecrecy Energy Efficiency Optimization for MISO and SISO Communication Networks
Kalantari, Ashkan UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in The 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2015, June 28)

Energy-efficiency, high data rates and secure communications are essential requirements of the future wireless networks. In this paper, optimizing the secrecy energy efficiency is considered. The optimal ... [more ▼]

Energy-efficiency, high data rates and secure communications are essential requirements of the future wireless networks. In this paper, optimizing the secrecy energy efficiency is considered. The optimal beamformer is designed for a MISO system with and without considering the minimum required secrecy rate. Further, the optimal power control in a SISO system is carried out using an efficient iterative method, and this is followed by analyzing the trade-off between the secrecy energy efficiency and the secrecy rate for both MISO and SISO systems. [less ▲]

Detailed reference viewed: 175 (13 UL)
Full Text
Peer Reviewed
See detailSecrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications
Kalantari, Ashkan UL; Ottersten, Björn UL

in IEEE Transactions on Information Forensics and Security (2015)

Network coding is an efficient means to improve the spectrum efficiency of satellite communications. However, its resilience to eavesdropping attacks is not well understood. This paper studies the ... [more ▼]

Network coding is an efficient means to improve the spectrum efficiency of satellite communications. However, its resilience to eavesdropping attacks is not well understood. This paper studies the confidentiality issue in a bidirectional satellite network consisting of two mobile users who want to exchange message via a multibeam satellite using the XOR network coding protocol. We aim to maximize the sum secrecy rate by designing the optimal beamforming vector along with optimizing the return and forward link time allocation. The problem is non-convex, and we find its optimal solution using semidefinite programming together with a 1-D search. For comparison, we also solve the sum secrecy rate maximization problem for a conventional reference scheme without using network coding. Simulation results using realistic system parameters demonstrate that the bidirectional scheme using network coding provides considerably higher secrecy rate compared to that of the conventional scheme. [less ▲]

Detailed reference viewed: 224 (40 UL)
Full Text
Peer Reviewed
See detailJoint Power Control in Wiretap Interference Channels
Kalantari, Ashkan UL; Maleki, Sina UL; Zheng, Gan et al

in IEEE Transactions on Wireless Communications (2015)

Interference in wireless networks degrades the signal quality at the terminals. However, it can potentially enhance the secrecy rate. This paper investigates the secrecy rate in a two-user interference ... [more ▼]

Interference in wireless networks degrades the signal quality at the terminals. However, it can potentially enhance the secrecy rate. This paper investigates the secrecy rate in a two-user interference network where one of the users, namely user 1, requires to establish a confidential connection. User 1 wants to prevent an unintended user of the network to decode its transmission. User 1 has to transmit such that its secrecy rate is maximized while the quality of service at the destination of the other user, user 2, is satisfied, and both user's power limits are taken into account. We consider two scenarios: 1) user 2 changes its power in favor of user 1, an altruistic scenario, 2) user 2 is selfish and only aims to maintain the minimum quality of service at its destination, an egoistic scenario. It is shown that there is a threshold for user 2's transmission power that only below or above which, depending on the channel qualities, user 1 can achieve a positive secrecy rate. Closed-form solutions are obtained in order to perform joint optimal power control. Further, a new metric called secrecy energy efficiency is introduced. We show that in general, the secrecy energy efficiency of user 1 in an interference channel scenario is higher than that of an interference-free channel. [less ▲]

Detailed reference viewed: 231 (34 UL)
Full Text
Peer Reviewed
See detailFeasibility of Positive Secrecy Rate in Wiretap Interference Channels
Kalantari, Ashkan UL; Maleki, Sina UL; Zheng, Gan et al

in IEEE Global Conference on Signal and Information Processing (GlobalSIP) (2014, December 03)

Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the ... [more ▼]

Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1. User 1 tunes its transmission power in order to maximize its secrecy rate as well as to maintain the quality of service at the other user’s destination, user 2, while both user’s power limits are considered. It is demonstrated that achieving a positive secrecy rate for user 1 only depends on the channel conditions and user 2’s transmission power. Consequently, depending on the channel conditions, the exact threshold for user 2’s transmission power which leads to a positive secrecy rate for user 1 is derived. [less ▲]

Detailed reference viewed: 184 (16 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Energy-Constrained Cognitive Radios in the Presence of an Eavesdropper
Maleki, Sina UL; Kalantari, Ashkan UL; Chatzinotas, Symeon UL et al

in 2014 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) (2014, May)

Reliable and agile spectrum sensing as well as secure communication are key requirements of a cognitive radio system. In this paper, secrecy throughput of a cognitive radio is maximized in order to ... [more ▼]

Reliable and agile spectrum sensing as well as secure communication are key requirements of a cognitive radio system. In this paper, secrecy throughput of a cognitive radio is maximized in order to determine the sensing threshold, the sensing time, and the transmission power. Constraints of the problem are defined as a lower-bound on the detection probability, an upper-bound on the average energy consumption per time-frame, and the maximum transmission power of the cognitive radio. We show that the problem can be solved by an on-off strategy where the cognitive radio only performs sensing and transmits data if the cognitive channel gain is greater than the average eavesdropper channel gain. The problem is then solved by a line-search over sensing time. Eventually, the secrecy throughput of the cognitive radio is evaluated employing the IEEE 802.15.4/ZigBee standard. [less ▲]

Detailed reference viewed: 146 (4 UL)