Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Azadeh Sheikholeslami is active.

Publication


Featured researches published by Azadeh Sheikholeslami.


international conference on computer communications | 2012

Physical layer security from inter-session interference in large wireless networks

Azadeh Sheikholeslami; Dennis Goeckel; Hossein Pishro-Nik; Donald F. Towsley

Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered. In contrast to prior schemes, which have expended energy in the form of cooperative jamming to enable secrecy, we develop schemes where multiple transmitters send their signals in a cooperative fashion to confuse the eavesdroppers. Hence, power is not expended on “artificial noise”; rather, the signal of a given transmitter is protected by the aggregate interference produced by the other transmitters. We introduce a two-hop strategy for the case of equal path-loss between all pairs of nodes, and then consider its embedding within a multi-hop approach for the general case of an extended network. In each case, we derive an achievable number of eavesdroppers that can be present in the region while secure communication between all sources and intended destinations is ensured.


IEEE Journal on Selected Areas in Communications | 2013

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver

Azadeh Sheikholeslami; Dennis Goeckel; Hossein Pishro-Nik

Secure communication over a memoryless wiretap channel in the presence of a passive eavesdropper is considered. Traditional information-theoretic security methods require an advantage for the main channel over the eavesdropper channel to achieve a positive secrecy rate, which in general cannot be guaranteed in wireless systems. Here, we exploit the non-linear conversion operation in the eavesdroppers receiver to obtain the desired advantage - even when the eavesdropper has perfect access to the transmitted signal at the input to their receiver. The basic idea is to employ an ephemeral cryptographic key to force the eavesdropper to conduct two operations, at least one of which is non-linear, in a different order than the desired recipient. Since non-linear operations are not necessarily commutative, the desired advantage can be obtained and information-theoretic secrecy achieved even if the eavesdropper is given the cryptographic key immediately upon transmission completion. In essence, the lack of knowledge of the key during the short transmission time inhibits the recording of the signal in such a way that the secret information can never be extracted from it. The achievable secrecy rates for different countermeasures that the eavesdropper might employ are evaluated. It is shown that even in the case of an eavesdropper with uniformly better conditions (channel and receiver quality) than the intended recipient, a positive secrecy rate can be achieved.


international conference on communications | 2014

Jamming-aware minimum energy routing in wireless networks

Azadeh Sheikholeslami; Majid Ghaderi; Hossein Pishro-Nik; Dennis Goeckel

The effectiveness and straightforward implementation of physical layer jammers make them an essential security threat for wireless networks. In this paper, reliable communication in a wireless multi-hop network in the presence of multiple malicious jammers is considered. Since energy consumption is an important issue in wireless ad hoc networks, minimum energy routing with and without security constraints has received significant attention in the literature; however, energy-aware routing in the presence of active adversary (jammers) has not been considered. We propose an efficient algorithm for minimum energy routing between a source and a destination in the presence of both static and dynamic malicious jammers such that an end-to-end probability of outage is guaranteed. The percentage of energy saved by the proposed method with respect to a shortest path routing benchmark is evaluated. It is shown that the amount of energy saved, especially in terrestrial wireless networks with path-loss exponents greater than two, is substantial.


international symposium on information theory | 2016

Covert communication over classical-quantum channels

Azadeh Sheikholeslami; Boulat A. Bash; Donald F. Towsley; Dennis Goeckel; Saikat Guha

Recently, the fundamental limits of covert, i.e., reliable-yet-undetectable, communication have been established for general memoryless channels and for lossy-noisy bosonic (quantum) channels with a quantum-limited adversary. The key import of these results was the square-root law (SRL) for covert communication, which states that O(√n) covert bits, but no more, can be reliably transmitted over n channel uses with O(√n) bits of secret pre-shared between communicating parties. Here we prove the achievability of the SRL for a general memoryless classical-quantum channel, showing that SRL covert communication is achievable over any quantum communication channel with a product-state transmission strategy. We leave open the converse, which, if proven, would show that even using entangled transmissions and entangling measurements, the SRL for covert communication cannot be surpassed over an arbitrary quantum channel.


international symposium on information theory | 2013

Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy

Azadeh Sheikholeslami; Dennis Goeckel; Hossein Pishro-Nik

Secure communication over a wireless channel in the presence of a passive eavesdropper is considered. We present a method to exploit the eavesdroppers inherent receiver vulnerabilities to obtain everlasting secrecy. An ephemeral cryptographic key is pre-shared between the transmitter and the legitimate receiver and is utilized to induce intentional intersymbol interference (ISI). The legitimate receiver uses the key to cancel the ISI while the eavesdropper, since it does not have the key, cannot do such. It is shown that although ISI reduces the capacity of the main channel, it can lead to a net gain in secrecy rate. The achievable secrecy rates for different ISI filter settings are evaluated and the proposed method is compared with other information-theoretic security schemes.


asilomar conference on signals, systems and computers | 2014

Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers

Azadeh Sheikholeslami; Dennis Goeckel; Hossein Pishro-Nik

Secure communication over a wireless channel in the presence of a passive eavesdropper is considered. Our main interest is in the disadvantaged wireless environment, where the channel from the transmitter Alice to the eavesdropper Eve is (possibly much) better than that from Alice to Bob, hence making information-theoretic secrecy challenging. We present a method to exploit inherent vulnerabilities of the eavesdroppers receiver through the use of “cheap” cryptographically-secure key-bits, which only need be kept secret from Eve for the (short) transmission period of the message, to obtain information-theoretic (i.e. everlasting) secret bits at Bob. In particular, based on an ephemeral cryptographic key pre-shared between Alice and Bob, a random jamming signal with large variations is added to each symbol. The legitimate receiver Bob uses the key to subtract the jamming signal immediately, while Eve is forced to perform the inherently nonlinear operation of recording the signal; when Eve then obtains the key, which we assume pessimistically (for Alice) happens right after message transmission, Eve can then immediately subtract the jamming signal from the recorded signal. But, because of the intervening non-linear operation in Eves receiver and the non-commutativity of nonlinear operations, Bobs channel and Eves channel have different achievable rates and information-theoretic secrecy can be obtained, hence achieving the goal of converting the vulnerable cryptographic secret key into information-theoretic secure bits. The achievable secrecy rates for different settings are evaluated. Among other results, it is shown that, even when the eavesdropper has perfect access to the output of the transmitter (albeit through an imperfect analog-to-digital converter), the method can still achieve a positive secrecy rate.


allerton conference on communication, control, and computing | 2012

Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments

Azadeh Sheikholeslami; Dennis Goeckel; Hossein Pishro-Nik

Information-theoretic security guarantees that a message is kept secret from potential eavesdroppers regardless of their current or future computational abilities. But current information-theoretic security approaches generally rely on an advantage of the channel of the desired recipient over the adversary, and such an advantage can be difficult to guarantee in a wireless network where an eavesdropper might be very near the transmitter. This paper initiates an approach to everlasting security for wireless communication links by exploiting a fundamental concept from systems theory: that nonlinear systems are not (necessarily) commutative. This property is exploited by employing a short-term cryptographic key to force the eavesdroppers signal to be subjected to nonlinear operations in the reverse order of that of the signal at the desired recipient. After introducing the idea and providing analysis for the general case, we next consider a simple (and practical) instantiation where the transmitter uses the ephemeral cryptographic key to rapidly power modulate the transmitted signal. Secrecy rates with this rapid power modulation under various assumptions establish the promise of the approach, even in the case of an eavesdropper with uniformly better conditions (channel and receiver quality) than the intended recipient.


IEEE Transactions on Wireless Communications | 2016

Energy-Efficient Routing in Wireless Networks in the Presence of Jamming

Azadeh Sheikholeslami; Majid Ghaderi; Hossein Pishro-Nik; Dennis Goeckel

The effectiveness and the simple implementation of physical layer jammers make them an essential threat for wireless networks. In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer techniques (e.g., spread spectrum) to suppress jamming. However, whereas these approaches can provide significant gains, the residual jamming can still severely limit system performance. This motivates the consideration of routing approaches that account for the differences in the jamming environment between different paths. First, we take a straightforward approach where an equal outage probability is allocated to each link along a path and develop a minimum energy routing solution. Next, we demonstrate the shortcomings of this approach and then consider the joint problem of outage allocation and routing by employing an approximation to the link outage probability. This yields an efficient and effective routing algorithm that only requires knowledge of the measured jamming at each node. Numerical results demonstrate that the amount of energy saved by the proposed methods with respect to a standard minimum energy routing algorithm, especially for parameters appropriate for terrestrial wireless networks, is substantial.


IEEE Transactions on Wireless Communications | 2015

Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments

Azadeh Sheikholeslami; Dennis Goeckel; Hossein Pishro-Nik

Secure communication over a wiretap channel is considered in the disadvantaged wireless environment, where the eavesdropper channel is (possibly much) better than the main channel. We present a method to exploit inherent vulnerabilities of the eavesdroppers receiver to obtain everlasting secrecy. Based on an ephemeral cryptographic key pre-shared between the transmitter Alice and the intended recipient Bob, a random jamming signal is added to each symbol. Bob can subtract the jamming signal before recording the signal, while the eavesdropper Eve is forced to perform these non-commutative operations in the opposite order. Thus, information-theoretic secrecy can be obtained, hence achieving the goal of converting the vulnerable “cheap” cryptographic secret key bits into “valuable” information-theoretic (i.e., everlasting) secure bits. We evaluate the achievable secrecy rates for different settings, and show that, even when the eavesdropper has perfect access to the output of the transmitter (albeit through an imperfect analog-to-digital converter), the method can still achieve a positive secrecy rate. Next we consider a wideband system, where Alice and Bob perform frequency hopping in addition to adding the random jamming to the signal, and we show the utility of such an approach even in the face of substantial eavesdropper hardware capabilities.


IEEE Transactions on Communications | 2017

Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming

Azadeh Sheikholeslami; Majid Ghaderi; Hossein Pishro-Nik; Dennis Goeckel

This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guarantee secrecy for any routing algorithm. We develop an efficient (in terms of energy consumption and computational complexity) routing algorithm that does not rely on any information about the locations and CSIs of the eavesdroppers. Our algorithm guarantees secrecy even in disadvantaged wireless environments, where multiple eavesdroppers try to eavesdrop each message, are equipped with directional antennas, or can get arbitrarily close to the transmitter. The key is to employ additive random jamming to exploit inherent non-idealities of the eavesdropper’s receiver, which makes the eavesdroppers incapable of recording the messages. We have simulated our proposed algorithm and compared it with the existing secrecy routing algorithms in both single-hop and multi-hop networks. Our results indicate that when the uncertainty in the locations of eavesdroppers is high and/or in disadvantaged wireless environments, our algorithm outperforms existing algorithms in terms of energy consumption and secrecy.

Collaboration


Dive into the Azadeh Sheikholeslami's collaboration.

Top Co-Authors

Avatar

Dennis Goeckel

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Hossein Pishro-Nik

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Boulat A. Bash

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Donald F. Towsley

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cagatay Capar

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Oon Towsley

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge