2020 Proceedings of the ACM on Measurement and Analysis of Computing Systems Article Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints Luis F. Abanto-Leon Andreas Bäuml Gek Hong Sim Matthias Hollick Arash Asadi PDF BibTeX DOI: 10.1145/3428329
2020 IEEE Internet of Things Journal Article LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems Milan Stute Pranay Agarwal Abhinav Kumar Arash Asadi Matthias Hollick PDF BibTeX DOI: 10.1109/JIOT.2020.2985044
2020 IEEE Internet of Things Journal Article Postprint LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems Milan Stute Pranay Agarwal Abhinav Kumar Arash Asadi Matthias Hollick PDF BibTeX DOI: 10.25534/tuprints-00013320 Abstract IoT devices penetrate different aspects of our life including critical services, such as health monitoring, public safety, and autonomous driving. Such safety-critical IoT systems often consist of a large number of devices and need to withstand a vast range of known Denial-of-Service (DoS) network attacks to ensure a reliable operation while offering low-latency information dissemination. As the first solution to jointly achieve these goals, we propose LIDOR, a secure and lightweight multihop communication protocol designed to withstand all known variants of packet dropping attacks. Specifically, LIDOR relies on an end-to-end feedback mechanism to detect and react on unreliable links and draws solely on efficient symmetric-key cryptographic mechanisms to protect packets in transit. We show the overhead of LIDOR analytically and provide the proof of convergence for LIDOR which makes LIDOR resilient even to strong and hard-to-detect wormhole-supported grayhole attacks. In addition, we evaluate the performance via testbed experiments. The results indicate that LIDOR improves the reliability under DoS attacks by up to 91% and reduces network overhead by 32% compared to a state-of-the-art benchmark scheme.
2019 IEEE Journal on Selected Areas in Communications Article SCAROS: A Scalable and Robust Self-backhauling Solution for Highly Dynamic Millimeter-Wave Networks Andrea Patricia Ortiz Jimenez Arash Asadi Gek Hong Sim Daniel Steinmetzer Matthias Hollick BibTeX DOI: 10.1109/JSAC.2019.2947925
2019 IEEE Journal on Selected Areas in Communications Article CBMoS: Combinatorial Bandit Learning for Mode Selection and Resource Allocation in D2D Systems Andrea Patricia Ortiz Jimenez Arash Asadi Max Engelhardt Matthias Hollick Anja Klein BibTeX DOI: 10.1109/JSAC.2019.2933764
2018 IEEE/ACM Transactions on Networking Article An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications Gek Hong Sim Sabrina Klos Arash Asadi Anja Klein Matthias Hollick BibTeX DOI: 10.1109/TNET.2018.2869244
2018 37th IEEE Conference on Computer Communications Conference FML: Fast Machine Learning for 5G mmWave Vehicular Communications Arash Asadi Gek Hong Sim Matthias Hollick Anja Klein Sabrina Müller BibTeX DOI: 10.1109/INFOCOM.2018.8485876
2017 IEEE Wireless Communications Article 5G Millimeter-Wave and D2D Symbiosis: 60 GHz for Proximity-based Services Gek Hong Sim Adrian Loch Arash Asadi Vincenzo Mancuso Jörg Widmer BibTeX DOI: 10.1109/MWC.2017.1600098
2017 IEEE/ACM Transactions on Networking Article DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks Arash Asadi Vincenzo Mancuso Rohit Gupta BibTeX DOI: 10.1109/TNET.2017.2712285
2017 9th International Conference on Communication Systems and Networks (COMSNETS) Conference mm-Wave on Wheels: Practical 60 GHz Vehicular Communication Without Beam Training Adrian Loch Arash Asadi Gek Hong Sim Jörg Widmer Matthias Hollick BibTeX DOI: 10.1109/COMSNETS.2017.7945351
2017 16th International IFIP TC6 Networking Conference Conference SEMUD: Secure Multi-hop Device-to-Device Communication for 5G Public Safety Networks Milan Schmittner Arash Asadi Matthias Hollick BibTeX DOI: 10.23919/IFIPNetworking.2017.8264846
2017 IFIP Networking Conference Postprint SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks Milan Schmittner Arash Asadi Matthias Hollick PDF BibTeX DOI: 10.25534/tuprints-00013324 Abstract Multi-hop Device-to-Device (D2D) communication has emerged as a key enabler for public safety applications in 5G networks. A failure of these applications would be catastrophic since they control vital human-in-the-loop services. As a result, it is of utmost importance to identify and mitigate security risks prior to commercial deployment. To this end, we devise SEMUD, the first secure multi-hop D2D solution for 5G mobile networks. It enables robust and secure communication even in the absence of supporting infrastructure. We design SEMUD to be compliant with 3GPP Proximity-based Services, the standard to implement D2D communications. We implement SEMUD in the ns-3 simulator and our testbed. Via extensive simulation, we assert its resilience against strong adversaries and attacks. Furthermore, we show the energy efficiency and achievable throughput of our proposal on real devices.
2017 9th International Conference on Communication Systems & Networks Conference mm-Broker: Managing Directionality and Mobility Issues of Millimeter-Wave via D2D Communication Gek Hong Sim Arash Asadi Adrian Loch Matthias Hollick Jörg Widmer BibTeX
2016 IEEE Transactions on mobile computing Article Network-assisted Outband D2D-clustering in 5G Cellular Networks: Theory and Practice Arash Asadi Vincenzo Mancuso BibTeX DOI: 10.1109/TMC.2016.2621041
2016 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks Conference Tie-breaking Can Maximize Fairness without Sacrificing Throughput in D2D-assisted Networks Vincenzo Mancuso Arash Asadi Peter Jacko BibTeX DOI: 10.1109/WoWMoM.2016.7523498
2016 35th Annual IEEE International Conference on Computer Communications Conference An SDR-based Experimental Study of Outband D2D Communications Arash Asadi Vincenzo Mancuso Rohit Gupta BibTeX DOI: 10.1109/INFOCOM.2016.7524372
2014 ACM SIGMETRICS Performance Evaluation Review Article Modeling D2D communications with LTE and WiFi Arash Asadi Peter Jacko Vincenzo Mancuso BibTeX DOI: 10.1145/2667522.2667540
2014 Computer Communications Article DRONEE: Dual-radio opportunistic networking for energy efficiency Arash Asadi Vincenzo Mancuso BibTeX DOI: 10.1016/j.comcom.2014.02.014
2014 IEEE Communications Surveys & Tutorials Article A Survey on Device-to-Device Communication in Cellular Networks Arash Asadi Wang Qing Vincenzo Mancuso BibTeX DOI: 10.1109/COMST.2014.2319555
2013 IEEE Communications Surveys & Tutorials Article A Survey on Opportunistic Scheduling in Wireless Communications Arash Asadi Vincenzo Mancuso BibTeX DOI: 10.1109/SURV.2013.011413.00082