Mohsen Hajsalehi Sichani  



Education History

B.S. Software Engineering, Najafabad Azad University, Najafabad, Isfahan, 2006

M.S. Information Technology-Network and Telecommunications, Sharif University of Technology, International Branch, 2008 (GPA=A+ , Top 10%).


Technical skills

* C,C++,C#



* SQL Server

SNMP,MRTG,ASN v1,2,3,MIBbrowsers

NS-2, NS-3


* Data Mining programs such as WEKA, SPSS, and RapidMiner

Matlab (image processing toolbox & Neural Net toolbox)




* Linux



*MS Windows Server


*=Means having much more experiences



Work Experience

Network Administrator, Lenjan agriculture (Jahad Keshaqvarzi Lenjan), 2010-So far

Programmer, Hoshmand Gostar Esfahan Corporation, 2007-So far

Wireless Network admin, Rasam Pey Corporation, 2009-2010




1. Implementing RoboSoftware with c#, Selenium, AutoIt with the ability to connect to site, login, doing some configuration changing, downloading and saving downloaded objects with appropriate names.

2. Designing and implementing different online shops with ability of online payment with C#, SQL, ASP.NET

3. Designing and implementing different E-Learning sites with C#, SQL, ASP.NET

4. Designing and implementing a web site for distributing, stock calculator and … for different kinds of dung (Fertilizers) with C#, SQL, ASP.NET

5. Designing and implementing several web sites for company introduction with C#, SQL, ASP.NET, Joomla, and DotNetNuke.



Courses Thought

Computer Graphics

Software Engineering

Computer Networks

Lab of Computer Networks

Computer System Architecture

Multimedia Systems

Lab of Web Designing

Web Designing

Computer Networks

Computer Programming with C/C++/C#




Conference Papers

A new analysis of RC4,  a data mining approach (j48),International Conference on Security and Cryptography, ICETE Conference, SECRYPT 2009, Milan, Italy, Mohsen Hajsalehi Sichani, Ali Movaghar, Download PDF.

Big step refinement laws,The 13th IEEE Joint International Computer Science and Information Technology Conference Sponsored by IEEE, JICSIT 2011, Chongqing, China, Saeed Khalafinejad & Mohsen Hajsalehi Sichani

Chapter book

Regression, Knowledge Oriented Applications in Data Mining, InTech publication, 2011, Chapter 22, Pages 353-372, Mohsen Hajsalehi Sichani & Saeed Khalafinejad, Availed at :



Language Proficiency




Research Interests


Security of VANET

SQL injection


Wireless ad hoc networks

Security of wireless networks

Security of Wireless Protocols


Academic Theses thesis: Implementing an E-learning site with ASP.NET and C# with ability to create groups of students, groups of teachers, Online exams, …….


M.Sc. thesis: Nowadays wireless technology is widespread all over the world and there is a competition among companies to provide the most secure and high range wireless networks for their customers.

This thesis focuses on the security of wireless ad hoc networks. There are lots of different encryption algorithms for securing wireless ad hoc networks. Some of the most important are: WEP, TKIP, WPA, WPA2. All other encryption methods of wireless ad hoc networks are derived from these methods.

This thesis focuses on WEP and WPA2. For both algorithms, a literature review is conducted, a new approach to cracking is suggested, and tested on real data, and the future works are mentioned.

For WEP, which is an acronym of Wired Equivalent Privacy, a new approach is used that proves that WEP is not a secure algorithm and shows that this algorithm is not a shuffle algorithm although these vulnerabilities have been proven in different ways through years.

For WPA2, which is an acronym of Wi-Fi Protected Access, its main encryption algorithm which is AES and is an acronym of Advanced Encryption Standard is discussed and a new approach is used which in real situation can break each bit of AES with the success rate of more than 70 percent. It should be mentioned that so far AES is not officially broken and is known as the most secure encryption algorithm of ad hoc networks by National Institute of Standards and Technology of America (NIST).