Risk of attack coefficient effect on availability of adhoc networks

Abstract: Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In […]


Discovering Triangles in Portraits for Supporting Photographic Creation, S He, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, Aug 2017. Intelligent Portrait Composition Assistance — Integrating Deep-learned Models and Photography Idea Retrieval, F Farhat, MM Kamani, S Mishra, JZ Wang, July 2017. Skeleton Matching with Applications in Severe Weather Detection, MM Kamani, F […]


Farshid Farhat @ EECS PSU PhD Candidate School of Electrical Engineering and Computer Science The Pennsylvania State University Address: 310 IST Building, University Park, PA, 16802. Email: fuf111 AT psu DOT edu Web: Farshid Farhat ‘s Site@PSU About Me I am a member of Intelligent Information Systems (IIS) research lab at Penn State. I am working with Prof. […]

Game-theoretic model to mitigate packet dropping

Abstract: Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try […]

Authentication and Key Agreement Protocol in 4G

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup, Farshid Farhat, Somayeh Salimi, Ahmad Salahi. Abstract Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we consider UMTS […]

Secure Multipath Adaptive Routing Protocol

Abstract Locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs is proposed in this paper. LMAR can find an ad-hoc path without selfish nodes and wormholes using a random search algorithm in polynomial-time. Also when the primary path fails, it discovers an alternative safe path if network […]

Extended Authentication and Key Agreement Protocol

Abstract Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a […]

Persian Boy Names

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Top آبان AbAn 8th month of the Iranian calendar; Name of a certain angel آبید Abid Spark, fire عبّاس abbAs (A) Frowning, looking austere; Lion; Name of Mohammad‘s uncle ابوعلی abou-ali Avicenna, Name of a famous Iranian scientist and philosopher آبتین Abtin A character in Shahnameh (Feraydoon‘s father) آدر Adar Fire عادل Adel […]