Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems

H Jannati - International Journal of Critical Infrastructure Protection, 2015 - Elsevier
Abstract Radio Frequency Identification (RFID) technology is used in myriad applications
because of its speed of execution, ease of manufacturing and usability. In the domain of …

All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices

A Falahati, H Jannati - Electronic Commerce Research, 2015 - Springer
Distance bounding protocols are proposed based upon the round trip time measurements of
the executed messages to prevent sensor networks against wormhole attack and to …

Mutual implementation of predefined and random challenges over RFID distance bounding protocol

H Jannati, A Falahati - 2012 9th International ISC Conference …, 2012 - ieeexplore.ieee.org
Distance bounding protocols are launched based upon the round trip time measurements of
the carried out messages to defend RFID systems against the relay attack. In such protocols …

An RFID search protocol secured against relay attack based on distance bounding approach

H Jannati, A Falahati - Wireless Personal Communications, 2015 - Springer
RFID search protocols are suggested for the past decade to efficiently find a specific tag
among a large number of tags by a reader. For instance, in a pharmacy, according to a …

Mutual distance bounding protocol with its implementability over a noisy channel and its utilization for key agreement in peer-to-peer wireless networks

H Jannati, A Falahati - Wireless personal communications, 2014 - Springer
In order to protect a wireless sensor network and an RFID system against wormhole and
relay attacks respectively, distance bounding protocols are suggested for the past decade. In …

Achieving an appropriate security level for distance bounding protocols over a noisy channel

H Jannati, A Falahati - Telecommunication Systems, 2015 - Springer
A relay attack is probably the most popular assault that is normally executed over RFID
security protocols. To protect RFID systems against this attack, distance bounding protocols …

An efficient mutual distance bounding protocol over a binary symmetric noisy communication channel

H Jannati, A Falahati - International Journal of Ad Hoc and …, 2015 - inderscienceonline.com
Distance bounding protocols have been suggested to protect an RFID communication
system against relay attack. In such protocols, a verifier establishes an upper bound for the …

A new relay attack on distance bounding protocols and its solution with time-stamped authentication for RFID

G Wei, H Zhang, Y Wang - Wuhan University Journal of Natural Sciences, 2016 - Springer
Relay attack is one of the most threatening challenges against radio frequency identification
(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They …

Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack

A Falahati, H Jannati - International Journal of Ad Hoc and …, 2016 - inderscienceonline.com
RFID binding proof protocols are suggested for the past decade to guard inpatient
medication safety and to prevent medication errors in hospitals. In such protocols, the main …

[PDF][PDF] An RFID unilateral distance bounding protocol and analysis over a noisy channel

R Entezari, H Bahramgiri, M Tajamolian - Int. J. Mechatronics Elect …, 2015 - aeuso.org
Abstract form of automatic identification systems used for humans and objects is radio
frequency identification (RFID). Fast and almost error-free calculations have led to its wide …