مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

930
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

IDENTIFICATION OF SECURITY WEAKNESSES ON MAP AUTHENTICATION PROTOCOL AND PRESENTATION OF IMPROVED PROTOCOL

Pages

  183-191

Abstract

 Nowadays, RFID technology is using widely in our daily lives. This technology is used in many applications such as healthcare, military, identifying friend or foe of fighter-aircraft and etc. In order to provide SECURITY and privacy of RFID SYSTEMS, different AUTHENTICATION PROTOCOLS have been proposed. Pang proposed a RFID authentication protocol based on EPC C-1 G-2 STANDARD. They claimed that their protocol is secure against various ATTACKS and provides user privacy. It is shown that protocol proposed by pang is not safe and suffer from ATTACKS such as tag ID exposure, tag impersonation, reader impersonation and de-synchronization. Also to enhance SECURITY of RFID users, an improved version of this protocol is proposed, showing that it is secure against aforementioned ATTACKS. In addition, complexity and efficiency of the improved protocol is compared with some similar ones and it is shown that the improved protocol is completely secure. Eventually, SECURITY of the improved protocol is compared with some existed protocols.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    SHAHRBABAK, M.M., & ABDOLMALEKI, S.. (2016). IDENTIFICATION OF SECURITY WEAKNESSES ON MAP AUTHENTICATION PROTOCOL AND PRESENTATION OF IMPROVED PROTOCOL. (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY, 7(3), 183-191. SID. https://sid.ir/paper/167494/en

    Vancouver: Copy

    SHAHRBABAK M.M., ABDOLMALEKI S.. IDENTIFICATION OF SECURITY WEAKNESSES ON MAP AUTHENTICATION PROTOCOL AND PRESENTATION OF IMPROVED PROTOCOL. (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY[Internet]. 2016;7(3):183-191. Available from: https://sid.ir/paper/167494/en

    IEEE: Copy

    M.M. SHAHRBABAK, and S. ABDOLMALEKI, “IDENTIFICATION OF SECURITY WEAKNESSES ON MAP AUTHENTICATION PROTOCOL AND PRESENTATION OF IMPROVED PROTOCOL,” (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY, vol. 7, no. 3, pp. 183–191, 2016, [Online]. Available: https://sid.ir/paper/167494/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top