I am Hamed
Farkhari, a Ph.D. early-stage researcher in the TeamUp5G group as ESR 13 that aims
to improve the security and design secure authentication algorithms according
to Artificial Intelligence inherent in SCNs.
born in Tehran which is the capital city of Iran. When I was 6 years old, my
Family moved to Mashhad which is another important city in the east of Iran and
I grow up there. I was able to graduate from the Azad University of
Telecommunication Engineering in 2008, while I was selected as a top student
throughout all semesters.
I graduated from Telecommunications Engineering in Master’s Degree with an Internal
article on watermarking in Digital Imaging and the effect of Attacks on them. During
my studies and afterward I was involved in various activities including:
computer and electrical training classes, creating computer training packages
at Lyda’s studio (A startup company owned by a friend of mine in Mashhad, aims
to provide and produce educational content that is complex and important in a
way that is easy to understand and accessible to everybody.), Internet
subscriber support at ParsOnline Company and then radio network support at
Mashhad Urban Train Company.
same time, because of my interest in design and programming, I learned to do 3D
design and jewelry making as a side activity. Other interests I can also
mention are financial analysis and markets, forecasting them, and learning
Teaching, Programming, Designing and learn and use artificial Intelligent are
some of the most important of my hobbies. I also like to play chess, sudoku, Ping-Pong
(Tennis on the table), Swimming, Mountaineering, Hiking, and Traveling.
The goal of this project is to design efficient and effective privacy preservation mechanisms for small-cell networks (SCN) that feature secure authentication algorithms. Authentication and privacy-preserving schemes for (5G or otherwise) SCN entail serious security and privacy issues, where it is important to protect user identity, location privacy, among others.
New privacy preservation and authentication algorithms and cumulative methodologies, specifically developed for SCN that will mitigate the security and privacy issues inherent in SCNs while allowing for their advantages to remaining. Development of authentication algorithms and validation of results. Implementation of the proposed methods in an open-source simulator. Identification of advantages and trade-offs of the proposed methods.