Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Journal: 

ELECTRONIC INDUSTRIES

Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    2
  • Pages: 

    45-54
Measures: 
  • Citations: 

    0
  • Views: 

    1288
  • Downloads: 

    0
Abstract: 

RFID (Radio Frequency Identification) is a new technology which is used in many applications. Security and privacy are two concerns of RFID technology. To address these concerns, many protocols have been proposed, which each of them has advantages and disadvantages. In this paper after introducing three lightweight matrixes based RFID authentication protocols, the feasibility of some attacks such as de-synchronization attack, reader impersonation attack and tag traceability attack against these protocols have been investigated. In addition, we also have tried to address disadvantages of theses protocols by proposing an improved authentication protocol.In an improved protocol we exploit two lightweight pseudorandom number generators (AKARI-1 and AKARI-2) with maximum 128 bit and 64 bit. Hence, proposed protocol is still conforming to EPC Class-1 Gen-2 standard and can provide its requirements.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1288

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ZEYNALI B. | Bahramgiri H.

Issue Info: 
  • Year: 

    2021
  • Volume: 

    8
  • Issue: 

    4 (32)
  • Pages: 

    119-128
Measures: 
  • Citations: 

    0
  • Views: 

    325
  • Downloads: 

    0
Abstract: 

The ability to easily and quickly access information through radio frequency identification (RFID) systems has led to the ever-expanding use of this technology in a variety of usages such as tactical applications. This technology provides the conditions for better situational awareness in tactical environments or logistics. But, on the other hand, the process of identification in a scenario with different and numerous actors, faces the collision challenge. The collision of tags in RFID systems is inevitable, and it affects the performance of RFID systems, especially in environments with a large number of tags. In this report, a hybrid (of ALOHA and tree-based) anti-collision protocol is proposed. In the provided protocol, each frame and slot have prefixes, and in each slot, tags whose identities match the prefixes of the frame and the slot, send their responses to the reader. In this protocol, using the Manchester Coding method, the position of the collision bits is specified, and then collision tags are split into separate subgroups to reduce the collision rate in the identification process. The simulation results of this protocol indicate that compared to other benchmark protocols, the identification time and the bit number of transferred tags in the proposed method are lower, which improve its performance.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 325

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    1
  • Issue: 

    4
  • Pages: 

    71-89
Measures: 
  • Citations: 

    0
  • Views: 

    77
  • Downloads: 

    11
Abstract: 

In recent years, the Internet of Things (IoT) networks have extensively been used in various practical field, one of the most important of which is medical Internet of Things (MIoT). In these networks, radio frequency identification (RFID) is one of the main technologies in creating an authentication system that is able to efficiently identify and identify medical equipment and patients. Therefore, researchers in this field have proposed different authentication protocols for RFID-based MIOT systems and claimed that they are resistant to active and passive attacks. Contrary to their claims, most of these protocols are not resistant to conventional attacks. Fan et al. have recently proposed a lightweight RFID authentication scheme for cloud-based RFID health-care systems and claimed that it is sufficiently efficient and secure. In this paper, we analyzed the Fan et al protocole and demonstrated that their protocol is vulnerable to replay, reader impersonation, tag tracking, and de-synchronization attacks. Moreover, we show how the similarity of some of their protocol messages causes attack. Then, we propose an improved protocol (LRAMP) that is resistant to these and other known attacks in RFID authentication protocol. According to security analysis, we can see that the LRAPM protocol has a high level of security. This high security can only be achieved by adding a new message and changing other messages. A comparison of the performance of the LRAPM protocol shows that this protocol is comparable to similar protocols in terms of computational costs, storage costs and communication costs.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 77

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 11 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    5
Measures: 
  • Views: 

    265
  • Downloads: 

    0
Keywords: 
Abstract: 

SYSTEM IDENTIFICATION USING RADIO WAVES (RFID) WIRELESS IDENTIFICATION SYSTEM THAT IS CAPABLE OF COMMUNICATING BY MEANS OF DATA EXCHANGE BETWEEN A TAG OBJECT TO A COMMODITY, CARDS, ETC. CONNECTED AND A CODE READER. RFID SYSTEM OF ELECTRONIC AND ELECTROMAGNETIC SIGNALS TO READ AND WRITE DATA WITHOUT MAKING CONTACT. BASICALLY ANY SYSTEM THAT IS ABLE TO READ AND DISCERN INFORMATION ABOUT THE PEOPLE OR GOODS IDENTIFICATION SYSTEM IS SAID TO BE. AUTOMATIC IDENTIFICATION AND GENERAL DATA RETENTION IS A WAY IN WHICH HARDWARE OR SOFTWARE TO BE ABLE TO READ THE DATA WITHOUT DETECTION AND GET HELP FROM A PERSON ARE. ONE OF THE NEWEST TOPICS OF INTEREST TO SCIENTISTS TO IDENTIFY INDIVIDUALS OR GOODS IDENTIFICATION SYSTEM USING RADIO FREQUENCY. IN GENERAL THIS TECHNOLOGY IN MANY DIFFERENT AND IMPORTANT ORGANIZATIONS BEING USED AND WELL YOUR EXAM. THIS ARTICLE INTRODUCES THE RADIO ID TECHNOLOGY (RFID) AND COMPARES IT WITH BARCODE-BASED IDENTIFICATION SYSTEMS.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 265

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    1
  • Issue: 

    2
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    3913
  • Downloads: 

    0
Abstract: 

System identification using radio waves (RFID) wireless identification system that is capable of communicating by means of data exchange between a tag object to a commodity, cards, etc. Connected and a code reader. RFID system of electronic and electromagnetic signals to read and write data without making contact. Basically any system that is able to read and discern information about the people or goods identification system is said to be. Automatic identification and general data retention is a way in which hardware or software to be able to read the data without detection and get help from a person are. One of the newest topics of interest to scientists to identify individuals or goods identification system using radio frequency. In general this technology in many different and important organizations being used and well your exam. This article introduces the Radio ID technology (RFID) and compares it with barcode-based identification systems.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3913

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    7
  • Issue: 

    2
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    245
  • Downloads: 

    136
Abstract: 

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we analyze the privacy of two recently proposed RFID authentication protocols in 2012 and 2013. We present several traceability attacks including traceability, backward traceability and forward traceability against the first protocol. We also show that, the second protocol not only suffers from Denial-of-Service (DoS) attack, but also it is vulnerable to traceability and backward traceability attacks. We present our privacy analysis based on a well-known formal RFID privacy model which has been proposed by Ouafi and Phan in 2008. Then, in order to overcome the weaknesses, we apply some modifications on these protocols and propose two modified versions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 245

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 136 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    19
  • Issue: 

    73
  • Pages: 

    53-86
Measures: 
  • Citations: 

    0
  • Views: 

    23
  • Downloads: 

    0
Abstract: 

Background and Objective: Given the continuous emphasis by governmental, judicial, law enforcement, and security institutions on combating the crime of goods smuggling, which leads to reduced production and employment, this research focuses on the integration of technologies and aims to explore how to combat goods smuggling through the integration of GIS and RFID systems. Method: This research is applied in terms of purpose and descriptive-analytical in terms of method and nature, with a survey approach. The study population included 105 heads and deputies of the Economic Security Police and Customs Police of the Law Enforcement Force of the Islamic Republic of Iran (Faraja) and provincial units. The sample size was determined to be 82 using Cochran's formula and simple random sampling. Data collection was conducted using a researcher-made questionnaire, and data analysis was performed using a one-sample t-test with SPSS 23 software. Findings: Based on the research findings, combating goods smuggling is feasible in three areas: the GIS system, the RFID system, and the intersection of these two systems. According to statistical data, the intersection of the two systems, the capabilities of GIS, and the capabilities of RFID have the most significant impact on combating goods smuggling, respectively. Conclusion: The results of the study indicate that GIS and RFID systems, as well as their intersections, are effective in combating goods smuggling. Designing an integrated monitoring and control system using RFID and enhancing the informational layers of the GIS system by the Customs Police can lead to an effective fight against this crime.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 23

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    4 (26)
  • Pages: 

    13-25
Measures: 
  • Citations: 

    0
  • Views: 

    273
  • Downloads: 

    104
Abstract: 

RFID system is a wireless technology that can transfer data between tags and readers via radio frequency. In an RFID network, readers are located close to each other to obtain optimal connectivity and sufficient coverage. In such an environment, which is called dense reader environment (DRE).Different types of collisions such as Reader-to-Reader and Reader-to-Tag ones, often lead to serious problems such as decreasing the performance. Accordingly, providing an appropriate method to resolve reader collision appeared to be one of the most important research topics in the field. To solve this problem, different methods have been introduced of which NFRA protocol has higher throughput. In this paper, we use multi-channel technique and sift distribution function on the NFRA protocol to improve RFID system throughput while avoiding increase in reader collision. In addition of supporting mobile reader, the proposed method provides higher throughput compared to other protocols in dense environments.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 273

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 104 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

QIAO J. | WANG W.

Issue Info: 
  • Year: 

    2012
  • Volume: 

    19
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    104
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 104

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SAFKHANI M.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    5
  • Issue: 

    2 (18)
  • Pages: 

    59-66
Measures: 
  • Citations: 

    0
  • Views: 

    756
  • Downloads: 

    0
Abstract: 

Authentication protocols are tools used to ensure the identity of the parties in cyberspace. If these protocols are compromised، the cyber security is threatened. These threats are of paramount importance in military applications. Recently، in [1] an authentication protocol، called SPRS has been considered and several attacks such as secret disclosure attack، tag impersonation attack and tag traceability attack have been applied on it. In addition، authors of that paper، presented the improved version of the protocol and claimed the improved protocol، unlike its predecessor، is secure against the attacks applied on the predecessor version and also other active and passive attacks. In this paper، we show that unfortunately، the security claims of authors do not hold and the improved protocol is also vulnerable against secret disclosure attack and tag traceability attack. We offer two versions of the secret disclosure attack which are offline and online versions. The basis of the attacks presented in this paper is that given Y=PRNG(X) and PRNG function is a public function and X and Y are 16 bits، performing an exhaustive search to find X as a pre-image of Y with a maximum of 216 off-line evaluations of PRNG function is possible. The offline version of the attack with the complexity of one run of protocol eavesdropping and doing 233 evaluations of PRNG function can disclose 4 secret values of protocol i. e. Ki، Pi، NT and EPCS which are 16 bits and the online version of the attack with the complexity of two times impersonating the reader and doing 217 evaluations of PRNG function can disclose these 4 secret values of protocol. Given these secret disclosure attacks، the improved protocol is not secure against other active and passive attacks as well. In addition، we propose a tag traceability attack to trace a given tag which does not depend on the length of the output of the PRNG function. Given this attack، an adversary can trace a given tag between any two sessions with the reader.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 756

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button