Other language title :
HMAC-Based Authentication Protocol: Attacks and Improvements
Title of article :
طرح و توسعه آنتن شيپوري فشرده با بهره بهبود يافته و فناوري موجبر مجتمع شده در زير لايه
Author/Authors :
Abdolmaleki، B. نويسنده Information Systems and Security Laboratory (ISSL),Sharif University of Technology,Tehran,Iran عبدالمالكي, بهزاد , Baghery، K. نويسنده Information Systems and Security Laboratory (ISSL),Sharif University of Technology,Tehran,Iran باقري, كريم , Emadi، M. J. نويسنده Department of Electrical Engineering,Amirkabir University of Technology,Tehran,Iran عمادي, محمدجواد
Issue Information :
دوفصلنامه با شماره پیاپی سال 2016
Pages :
9
From page :
71
To page :
79
Abstract :
در اين مقاله يك آنتن جديد شيپوري با فناوري SIW صفحه H و با بهره بهبود يافته معرفي مي شود. آنتن پيشنهادي از دو قسمتمتوالي موجبري تشكيل شده است كه باعت يكنواخت شدن ميدان ها روي پنجره تشعشعي شده و بهره را افزايش مي دهد. آنتن معرفي شده از طريق نرم افزار بررسي و يك نمونه آن ساخته شده و مشخصات آن اندازه گيري مي شود.
Abstract :
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privacy of the recent wellknown HMACbased RFID mutual authentication protocol, is analyzed. We prove that this protocol is not secure against various attacks and also does not provide untraceability. Also, in order to improve the performance of the mentioned protocol and enhance the security of RFID users, a more effective and secure authentication HMACbased protocol is presented. Furthermore, security of our protocol is explored against different attacks such as; the replay attack, the tag’s ID exposure, the spoofing attack, DoS attack and traceability attack. It is shown that our proposed protocol is safe against the attacks. Finally, the security of the presented protocol is compared with some wellknown related protocols.
Keywords :
RFID systems , security analysis , Authentication protocols , HMAC
Journal title :
Amirkabir International Journal of Electrical and Electronics Engineering
Journal title :
Amirkabir International Journal of Electrical and Electronics Engineering
Record number :
2400548
Link To Document :
بازگشت