Fahimeh Rezaei

Learn More
Long Term Evolution (LTE) has been introduced by 3GPP (3rd Generation Partnership Project) and is poised to dominate the 4th generation (4G) of mobile telecommunication networks. In this article, we present an in-depth analysis of the LTE physical layer's characteristics and its performance. Our work is unique in providing a detailed performance study based(More)
Modern covert channel communication is the art of hiding secret information in legitimate network traffic in a way that cannot normally be detected by anyone other than the intended receiver. It is growing in its presence and sophistication. This type of communication enables the distribution of malicious or sensitive information and poses a significant(More)
In this paper, we have investigated Covert Channels in 3GPP LTE-A (Long Term Evolution-Advanced) for identifying headers and extension fields where covert data can be hidden in covert communications. We also discuss the covert channel capacity for LTE-A where the specific fields in the headers of the MAC (Medium Access Control), RLC (Radio Link Control) and(More)
LTE (3GPP Release8) and Mobile WiMAX (IEEE 802.16e) are discussed extensively as choices for the next generation of mobile broadband technologies. In this paper, LTE and Mobile WiMAX are analyzed comprehensively from a physical layer performance point of view for different antenna diversity modes in downlink and uplink transmissions. The objective of this(More)
Now a day's use of an internet in public masses is growing. So large amount of data is stored in computers and transmitted over networks. Data security is main issue now days. Steganography is one of data hiding technique. In this paper we use a multilevel technique in audio steganography. By using multilevel technique we use three methods instead of(More)
One of the most rapidly growing technology areas is the advances in sensing, networking, and miniaturization in medical domain, which enables innovative new applications. This is especially apparent in e-Health and telemedicine. There is an enormous demand for innovation in wireless sensor networking, body area networks, network security and routing, and(More)
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the most prevailing CTC algorithms, originally proposed by Cabuk et al. CTC is a form of covert channels – methods that exploit network activities to transmit secret data over packet-based networks – by modifying packet timing. This algorithm is a seminal work, one(More)
Covert channels exploit side channels within existing network resources to transmit secret messages. They are integrated into the elements of network resources that were not even designed for the purpose of communication. This means that traditional security features like firewalls cannot detect them. Their ability to evade detection makes covert channels a(More)