IoT Security
1. Improving the Security of a Low-cost Tag Search Protocol

S. Saderi Oskuiee; F. Moazami; G. Oudi Ghadim

Volume 9, Issue 1 , Winter and Spring 2021, , Pages 25-36

http://dx.doi.org/10.22061/jecei.2020.7342.383

Abstract
  Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among a large number of tags. Numerous works have been ...  Read More

Network Security
2. RSPAE: RFID Search Protocol based on Authenticated Encryption

M. Eslamnezhad Namin; M. Hosseinzadeh; N. Bagheri; A. Khademzadeh

Volume 6, Issue 2 , Summer and Autumn 2018, , Pages 185-198

http://dx.doi.org/10.22061/jecei.2019.5186.199

Abstract
  Background and Objectives: Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. Methods: In this article, an RFID-based search ...  Read More