• Other language title
    HMAC-Based Authentication Protocol: Attacks and Improvements
  • Title of article

    طرح و توسعه آنتن شيپوري فشرده با بهره بهبود يافته و فناوري موجبر مجتمع شده در زير لايه

  • Author/Authors

    Abdolmaleki، B. نويسنده Information Systems and Security Laboratory (ISSL),Sharif University of Technology,Tehran,Iran عبدالمالكي, بهزاد , Baghery، K. نويسنده Information Systems and Security Laboratory (ISSL),Sharif University of Technology,Tehran,Iran باقري, كريم , Emadi، M. J. نويسنده Department of Electrical Engineering,Amirkabir University of Technology,Tehran,Iran عمادي, محمدجواد

  • Issue Information
    دوفصلنامه با شماره پیاپی سال 2016
  • Pages
    9
  • From page
    71
  • To page
    79
  • Abstract
    در اين مقاله يك آنتن جديد شيپوري با فناوري SIW صفحه H و با بهره بهبود يافته معرفي مي شود. آنتن پيشنهادي از دو قسمتمتوالي موجبري تشكيل شده است كه باعت يكنواخت شدن ميدان ها روي پنجره تشعشعي شده و بهره را افزايش مي دهد. آنتن معرفي شده از طريق نرم افزار بررسي و يك نمونه آن ساخته شده و مشخصات آن اندازه گيري مي شود.
  • Abstract
    As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privacy of the recent wellknown HMACbased RFID mutual authentication protocol, is analyzed. We prove that this protocol is not secure against various attacks and also does not provide untraceability. Also, in order to improve the performance of the mentioned protocol and enhance the security of RFID users, a more effective and secure authentication HMACbased protocol is presented. Furthermore, security of our protocol is explored against different attacks such as; the replay attack, the tag’s ID exposure, the spoofing attack, DoS attack and traceability attack. It is shown that our proposed protocol is safe against the attacks. Finally, the security of the presented protocol is compared with some wellknown related protocols.
  • Keywords
    RFID systems , security analysis , Authentication protocols , HMAC
  • Journal title
    Amirkabir International Journal of Electrical and Electronics Engineering
  • Journal title
    Amirkabir International Journal of Electrical and Electronics Engineering
  • Record number

    2400548