امروز : چهارشنبه دوم تیر 1400

چهارشنبه یکم بهمن 1399 ساعت 8:0 ق ظ - توسط : علی کوهستانی


بسم الله الرحمن الرحیم
(In the name of God)

Dr. Ali Kuhestani


Assistant Professor

Department of Electrical and Computer Engineering
Qom University of Technology (QUT)
Qom, Iran

Emails: kuhestani@sharif.edu  ,  alikuhestani@yahoo.com  

Google Scholar         Linkedin       


Educational Background

PostDoc. in Electrical Engineering, Sharif University of Technology, Tehran, Iran, Sept 2018- Jan. 2020.
   Research topic: Physical layer security in Internet-of-Things (IoT)
   Supervisor: Prof. Hamid Behroozi   

Ph.D. in Electrical Engineering, Amirkabir University of Technology, Tehran, Iran, Sept 2013- Nov 2017 (Four years).
   Thesis topic: Physical Layer Security in Untrusted Relaying Networks
   Supervisor: Prof. Abbas Mohammadi

M.S. in Electrical Engineering, Tarbiat Modares University, Tehran, Iran, Sept 2010- Sept 2012 (Two years).
   Thesis topic: Design of Linear Dispersion Space-Time Codes Using Genetic Algorithm
   Supervisor: Prof. Paeiz Azmi 

B.S. in Electrical Engineering, Shiraz University of Technology, Shiraz, Iran, Sept 2006- Sept 2010 (Four yeras).
   Project topic: Design of a software to visualize a communication system with single-carrier and OFDM modulations. 
   Supervisor: Dr. Reza Mohseni

Diploma in Mathematics and Physics Discipline, Nemoone Esterabadi high School, Gorgan, Iran, Sept 2002- Sept 2006.


Research Interests
   - Physical layer secuity in communication systems
   - Internet of Things (IoT)
   - Machine learning
   - MIMO systems and Space-Time Coding
   - Wireless communication systems

Publications
   
- Journals:
1. M. Letafati, A. Kuhestani, K.-K. Wong, and M. J. Piran “On the Secret Key Rate and Secrecy Rate of the Internet-of-Things in the Presence of a Passive Eavesdropper and a Hostile Jammer,” IEEE Internet of Things Journal. doi: 10.1109/JIOT.2020.3026475. (IF=9.9)

2. M. Forouzesh, P. Azmi, and A. Kuhestani, and P. L. Yeoh, “Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden,” IEEE Internet of Things Journal. doi: 10.1109/JIOT.2020.3038682. (IF=9.9)

3. M. Tatar Mamaghani, A. Kuhestani, and H. Behroozi, “Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?,” Wireless Networks, Oct. 2020. (IF=2.4)

4. M. Letafati, A. Kuhestani and H. Behroozi, “Three-Hop Untrusted Relay Networks with Hardware Imperfections and Channel Estimation Errors for Internet of Things,” IEEE Trans. Inf. Foren. Sec., Mar. 2020. doi: 10.1109/TIFS.2020.2978627. (IF=6.2)

5. M. Letafati, A. Kuhestani, H. Behroozi, and D. K. W. Ng, “Jamming-Resilient Frequency Hopping Aided Secure Communication for Internet of Things in the Presence of an Untrusted Relay,” IEEE Trans. Wireless Commun., June 2020. doi: 10.1109/TWC.2020.3006012. (IF=6.4)

6. M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Covert Communication and Secure Transmission over Untrusted Relaying Networks in the Presence of Multiple-Wardens,” IEEE Trans. Commun, Mar. 2020. doi: 10.1109/TCOMM.2020.2978206. (IF=5.7)

7. A. Kuhestani, A. Mohammadi, K.-K. Wong, P. L. Yeoh, M. Moradikia, and M. R. Khandaker “Optimal power allocation by imperfect hardware analysis in untrusted relaying networks,” IEEE Trans. Wireless. Commun., vol. 17, no. 7, pp. 4302-4314, July 2018. (IF=6.4)

8. A. Kuhestani, A. Mohammadi, and P. L. Yeoh, “Optimal power allocation and secrecy sum rate performance in untrusted relaying networks with an external jammer,” IEEE Trans. Commun., vol. 66, no. 6, pp. 2671-2684, June 2018. (IF=5.7)

9. A. Kuhestani, A. Mohammadi, and M. Mohammadi, “Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers,” IEEE Trans. Information Forensics & Security, vol 13, no. 2, pp. 341-355, Feb. 2018. (IF=6.2)

10. M. Tatar Mamaghani, A. Kuhestani, and K.-K. Wong, “Secure two-way transmission via wireless-powered untrusted relay and external jammer,” IEEE Trans. Veh. Tech., vol. 67, no. 9, Sept. 2018. (IF=5.4)

11. M. Moradikia, H. Bastami, A. Kuhestani, H. Behroozi, and L. Hanzo, “Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, a Passive Eavesdropper and Hardware Impairments,” IEEE ACCESS, July 2019. (IF=4. 1)

12. H. Saedi, A. Mohammadi, and A. Kuhestani, “Characterization of Untrusted Relaying Networks in the Presence of an Adversary Jammer”, Wireless Networks, Jun. 2019. (IF=2.4)

13. K. P. Roshandeh, A. Kuhestani, M. Ardakani and C. Tellambura, “Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network,” IET Communications. vol. 11, no. 2, pp. 211-217, Jan. 2017. (IF=1.8)

14. A. Kuhestani, and M. Moradikia, “Energy-efficient relay selection and power allocation for untrusted relay network at high SNR regime”, IET Communications. vol. 10, no. 16, pp. 21432148, Oct. 2016. (IF=1.8)

15. A. Kuhestani, A. Mohammadi, and M. Noori, “Optimal Power Allocation to Improve Secrecy Performance of Non-Regenerative Cooperative Systems Using an Untrusted Relay,” IET Communications. vol. 10, no. 8, pp. 962-968, May. 2016. (IF=1.8)

16. A. Kuhestani, A. Mohammadi, and M. Masoudi, “Joint Optimal Power Allocation and Relay Selection to Establish Secure Transmission in Uplink Transmission of Untrusted Relays Network,” IET Networks. vol. 5, no. 2, pp. 30-36, Mar. 2016. (IF=1.8)

17. A. Kuhestani and A. Mohammadi, “Destination-Based Cooperative Jamming in Untrusted Amplify-and-Forward Relay Networks: Resource Allocation and Performance Study,” IET Communications. vol. 10, no. 1, pp. 17-23, Feb. 2016. (IF=1.8)

18. A. Kuhestani and A. Mohammadi, “Diversity-Multiplexing Tradeoff of Linear Dispersion Coded MIMO Systems,” IET Communications, vol. 9, no. 1, pp. 55-61, Jan. 2015. (IF=1.8)

19. A. Kuhestani, H. PilAram, and A. Mohammadi, “Simply Decoded Efficient Full-Rate SpaceTime Block Codes Over Correlated Ricean Fading Channel,” IET Communications, vol. 8, no. 10, pp. 1684-1695, Jul. 2014. (IF=1.8)

20. A. Kuhestani, and P. Azmi, “Design of Efficient Full-Rate LD-STBCs Over Correlated Fading Channels,” IET Communications, vol. 7, no. 12, pp. 1243-1253, Aug. 2013. (IF=1.8)

 
- Conferences: 
1. M. Letafati, A. Kuhestani, D. W. K. Ng, and H. Behroozi, “A New Frequency HoppingAided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay,” IEEE ICC'20 Workshop, IoT-Health Session, May 2020.

2. M. Letafati, A. Kuhestani, D. W. K. Ng, and M. R. A. Beshkani, “Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications,” in Proc. IEEE Globecom, Taiwan, Dec. 2020.

3. M. Sarkheil, P. Azmi, M. Forouzesh, and A. Kuhestani, “Improving Covert Communication in Wireless Networks with Relay and Jammer Selection” in 4th international conference on Communications, Signal Processing and their Applications (ICCSPA), Sharjah, Oct. 2020.

4. M. Forouzesh, P. Azmi, and A. Kuhestani, “Secure transmission with covert requirement in untrusted relaying networks”, IEEE Int. Symp. on Telecomm (IST), Dec. 2018. Best Paper!

5. A. Kuhestani, A. Mohammadi, and P. L. Yeoh, “Security-Reliability Trade-off in CyberPhysical Cooperative Systems with Non-Ideal Untrusted Relaying,” in Proc. IEEE WF-IoT conf. Singapore, Feb. 2018.

6. A. Kuhestani, P. L. Yeoh, and A. Mohammadi, “Optimal Power Allocation and Secrecy Sum Rate Performance in Untrusted Relaying Networks”, in Proc. IEEE Globecom 2017, Singapore, Dec. 2017.

7. M. Tatar Mamaghani, A. Mohammadi, P. L. Yeoh, and A. Kuhestani, “Secure Two-way Communication via a Wireless powered Untrusted Relay and Friendly Jammer”, in Proc. IEEE Globecom 2017, Singapore, Dec. 2017.

8. A. Kuhestani, and A. Mohammadi, “Security-Reliability Trade-off Analysis of Untrusted Relay Networks”, in Proc. IEEE IWCIT 2016, Tehran, Accepted for publication.

9. A. Kuhestani, and A. Mohammadi, ''Simple Structure Efficient Full-Rate STBC for LTEAdvanced System over Correlated Rayleigh Fading Channel with Simple Decoder", IEEE IST2014, Sep. 2014.

10. A. Kuhestani, and A. Mohammadi, ''Finite-SNR Diversity-Multiplexing Tradeoff of Linear Dispersion Coded MISO Systems", IEEE IWCIT Conf., Sharif University of Technology, Tehran, Iran, 8 May 2014.

11. A. Kuhestani, P. Azmi, and H. Pilaram, "Efficient full-rate LDCs in correlated Rician fading channel with decoupled decoder", IEEE Sixth Int. Symp. on Telecomm (IST), pp. 393-398, Nov. 2012.

Research-Industrial Projects:
1- “Design and analysis of hysical layer security for next generation wireless networks under practical considerations,” supported by INSF, Summer 2020 – Now.
 
2- “Physical layer security for Internet of Things (IoT),” supported by INSF, Fall 2018 – Spring 2020. 

3- “Physical layer security for Infrastructure-based and Ad-hoc communication networks”, support by telecommunication research institute, Fall 2017-Spring 2018. 

4- “Physical layer security for 5G communication”, supported by INSF, Fall 2016 – Fall 2017. 

.
RSS