Network Security
1. RSPAE: RFID Search Protocol based on Authenticated Encryption

M. Eslamnezhad Namin; M. Hosseinzadeh; N. Bagheri; A. Khademzadeh

Volume 6, Issue 2 , Summer and Autumn 2018, , Pages 185-198

http://dx.doi.org/10.22061/jecei.2019.5186.199

Abstract
  Background and Objectives: Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. Methods: In this article, an RFID-based search ...  Read More

2. Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati

F. Baghernejad; N. Bagheri; M. Safkhani

Volume 2, Issue 2 , Summer and Autumn 2014, , Pages 85-92

http://dx.doi.org/10.22061/jecei.2014.246

Abstract
  In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of ...  Read More