Fa
  • Ph.D. (2013)

    Electrical Engineering

    Dep. of Electrical & Computer Engineering, Isfahan University of Technology, Isfahan, Iran

  • M.Sc. (2002)

    Computer Architecture

    Dep. of Electrical & Computer, Isfahan University of Technology, Isfahan, Iran

  • B.Sc. (1999)

    Computer Eng.

    Department of Computer Engineering, Sharif University of Technology, Tehran, Iran

  • 5G Mobile Network Design using Machine Learning, Aerial Networks and Blockchain Technology
  • Hardware Trojan Detection Based on Model Checking and Machine Learning
  • Access Control Framework using Blockchain and Attribute-Based Encryption
  • Security of Cloud Storage and IoT Devices
  • Hardware Security with Concentration on Side-Channel Attacks
  • Secuirty Evaluation Lab.

    Research field: Mobile PenTest

    Expert: Azadeh Mokhtarpoor

    Phone: 82883202

    Address: Floor 1, ECE Dep.

Contact

Curriculum Vitae (CV)

SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier

M Tebyanian, A Mokhtarpour, A Shafieinejad
Journal Paper , , {Pages }

Abstract

A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks

Maede Hojjati, Alireza Shafieinejad, Halim Yanikomeroglu
Journal PaperIEEE Access , Volume 8 , 2020 December 2, {Pages 216461-216476 }

Abstract

Subscriber authentication is a primitive operation in mobile networks required by each operator prior to offering any service to end users. In this paper, we propose a novel blockchain-based Authentication and Key Agreement (AKA) protocol for roaming services in 5G networks. Each Home Network (HN) creates its own smart contract and publishes its address to inform other operators who want to offer roaming services to HN subscribers. All subsequent communication between the HN and Serving Network (SN) is done by calling the function of this smart contract. The proposed protocol eliminates the need for a secure channel between the HN and SN, which is a primary requirement of current 5G AKA protocols. In practice, a secure channel requires the

INCP: practical wireless network coding for multiple unicast sessions

Alireza Shafieinejad, Norooz Motamedi, Faramarz Hendessi, Mojtaba Mahdavi
Journal PaperWireless Personal Communications , Volume 91 , Issue 2, 2016 November 1, {Pages 623-651 }

Abstract

In this paper, we propose INCP, inter-flow network coding protocol, for wireless mesh networks. INCP is designed with the concept of Layered Approach. It acts as a distinct layer above the MAC and has close cooperation with IP layer. INCP exploits the opportunities of network coding through multiple unicast sessions to decrease the number of transmissions, thereby increasing the aggregated throughput. Unlike most prior work that is mainly theoretical, INCP addresses the practical issues of network coding such as impact of lossy links, enabling/disabling RTS/CTS mechanism, packet size and its variation. We consider a retransmission mechanism to ensure a reliable broadcasting. We analyze the cost of this approach by providing a theoretical fo

Analysis of Inter-flow Network Coding in Lossy Wireless Networks

Alireza Shafieinejad, Faramarz Hendessi
Journal PaperThe Modares Journal of Electrical Engineering , Volume 16 , Issue 2, 2016 June 1, {Pages 62-71 }

Abstract

This paper addresses the problem of inter-flow network coding for unicast sessions in lossy channel wireless networks. In spite of decreasing the number of transmissions, network coding intuitively increases the sensitivity of nodes to lost packets. First of all, coded packets carry more information than native packets and thus losing a coded packet prohibits a series of dependent nodes from decoding their intended packets. Secondly, for the scheme with opportunistic listening, it is necessary for some of the nodes to overhear the transmission of their neighbors. Thus, successful decoding requires overhearing of the corresponding packet (s) in addition to correct reception of unicast and broadcast transmissions.

Star-structure network coding for multiple unicast sessions in wireless mesh networks

Alireza Shafieinejad, Faramarz Hendessi, Faramarz Fekri
Journal PaperWireless personal communications , Volume 72 , Issue 4, 2013 October 1, {Pages 2185-2214 }

Abstract

In this paper, first, we propose Star-NC, a new network coding (NC) scheme for multiple unicast sessions in an n-input n-output star structure. Then, we evaluate the network throughput of this coding scheme in wireless mesh network over the traditional non-NC transmission. Our scheme benefits from the proximity of all the nodes around the relay node and employs a more general form of overhearing different from other schemes such as COPE. We found that the gain of our NC scheme depends on both the star size and the routing pattern of the unicast transmissions. Based on this, we identify both the situations which the maximum gain is achievable and a lower bound for the expected value of the gain in the case of random routing pa

Network coding for multiple unicast sessions in multi-channel/interface wireless networks

Alireza Shafieinejad, Faramarz Hendessi, Faramarz Fekri
Journal PaperWireless Networks , Volume 19 , Issue 5, 2013 July 1, {Pages 891-911 }

Abstract

Throughput limitation of wireless networks imposes many practical problems as a result of wireless media broadcast nature. The solutions of the problem are mainly categorized in two groups; the use of multiple orthogonal channels and network coding (NC). The networks with multiple orthogonal channels and possibly multiple interfaces can mitigate co-channel interference among nodes. However, efficient assignment of channels to the available network interfaces is a major problem for network designers. Existing heuristic and theoretical work unanimously focused on joint design of channel assignment with the conventional transport/IP/MAC architecture. Furthermore, NC has been a prominent approach to improve the throughput of unic

A new vertical handoff method for 3G/WLAN Networks

Majid Fouladian, Faramarz Hendessi, Alireza Shafieinejad, Bahman Darvishi
Conference Paper2009 International Conference on Computer Engineering and Technology (ICCET 2009) , 2009 January 1, {Pages 06-Jan }

Abstract

This paper introduces a novel vertical handoff method in which the number of signaling and registration processes is lowered as a result of reduced utilization of home agent and correspondent nodes while users are mobile. Throughput performance of the integrated network is improved by reducing handoff delays and packet losses. We also decrease the system energy by estimating user locations in comparison with the WLANs to decrease interface ontimes. Performance and delay results are presented to demonstrate the effectiveness of the proposed scheme.

A new method for vertical handoff between WLANs and UMTS in boundary conditions

Majid Fouladian, Faramarz Hendessi, Alireza Shafieinejad, Morteza Rahimi, Mahdi M Bayat
Conference PaperAdvanced Computer Control, 2009. ICACC'09. International Conference on , 2009 January 22, {Pages 438-443 }

Abstract

We propose a new vertical handoff method in which the number of signaling and registration processes is lowered as a result of reduced utilization of home agent and correspondent nodes while users are mobile. Throughput performance of the integrated network is improved by reducing handoff delays and packet losses. Special conditions such as boundary condition also considered. Performance and delay evaluations which done by ns-2 are presented to demonstrate the effectiveness of the proposed scheme.

A structure for fast data encryption

Alireza Shafieinejad, Faramarz Hendessi, T Aaron Gulliver
Journal PaperInt. J. of Contemporary Mathematical Science , Volume 2 , Issue 29, 2008 January , {Pages 1401-1424 }

Abstract

Fast Data Encryption (FDE) is a new symmetric block cipher which has a DES-like structure. FDE has been designed with an increased key length, increased key scheduling complexity and an improved round function which can be executed in parallel. FDE uses eight Substitution Boxes (S-boxes) in the round function to provide confusion. In this paper, we present the FDE structure and an algorithm to construct a set of strong S-boxes. Eight suitable S-boxes from this set are suggested for use with FDE.

On the Security and Performance of the FDE Block Cipher

Alireza Shafieinejad, Faramarz Hendessi, T Aaron Gulliver
Journal Paper , 1 January , {Pages }

Abstract

FDE is a block cipher which has a Substitution-Permutation (SP) network structure. In this paper, the security and performance of this cipher are discussed. We show that FDE has a good security margin against differential and linear attacks. The best differential 15-round characteristic of FDE has a probability of success of less than 2− 140. Moreover, for linear cryptanalysis we show that the best linear probability of success is less than 2− 55, which requires at least 2110 plaintextciphertext pairs, which is greater than all possible pairs. We also present two fast software implementations of FDE which eliminate the permutations in the round functions. In the first method, this is achieved by merging the permutations with the s-box t

4G TO 5G MIGRATION THROUGH CORE NETWORK

Jahangir Dadkhah Chimeh, Seyed Amin Izadi Avanji, Ali-Mohammad Montazeri, Faezeh Alavi, Moslem Foruzesh, Paeiz Azmi, Saeed Sheikhzadeh, Mohammad Reza Javan, Alireza Shafieinejad, Faramarz Hendessi
Journal PaperJournal Archive , Volume 16 , 1 January , {Pages 2016-2017 }

Abstract

In this paper, we consider 5G as an evolution of 4G, thus we propose logical connections between LTE-A entities such as SGW, PDN firstly. Then, we present a new configuration and accordingly data/control realization of 5G EPS (Evolved Packet System) based on a carrier-grade hypervisor and an intelligent core server (IC server) to provide virtualization and flexibility to the network. In addition, we define two new entities hAN (heterogeneous access network) and TNT-Gateway (TENANT Gateway) for access and core, respectively and define their functions and data/signaling connections. Some important advantages of these configurations are: 1) cost reduction, 2) network efficiency improvement, and 3) increase of network flexibility and service av

Current Teaching

  • MS.c.

    Cyber Crimes

  • MS.c.

    Secure Software Systems

  • MS.c.

    Data Storage Systems

Teaching History

  • MS.c.

    Advanced Computer Architecture

  • MS.c.

    Applied Cryptography

  • 2021
    Azimi, Naeeme
    Placement of UAVs as relay nodes in 5G networks
  • 2021
    Moallem Taheri, Hamidreza
    Data not found
  • Winner of Bronz medal for national Mathematic Olympia
    Data not found

Top

New

    no record found