Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems

H Jannati - International Journal of Critical Infrastructure Protection, 2015 - Elsevier
Abstract Radio Frequency Identification (RFID) technology is used in myriad applications
because of its speed of execution, ease of manufacturing and usability. In the domain of …

An RFID search protocol secured against relay attack based on distance bounding approach

H Jannati, A Falahati - Wireless Personal Communications, 2015 - Springer
RFID search protocols are suggested for the past decade to efficiently find a specific tag
among a large number of tags by a reader. For instance, in a pharmacy, according to a …

Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack

A Falahati, H Jannati - International Journal of Ad Hoc and …, 2016 - inderscienceonline.com
RFID binding proof protocols are suggested for the past decade to guard inpatient
medication safety and to prevent medication errors in hospitals. In such protocols, the main …

On the performance analysis of wireless communication systems over α-μ/α-μ composite fading channels

OS Badarneh, FS Almehmadi… - … Journal of Ad Hoc …, 2019 - inderscienceonline.com
The α-μ/α-μ fading channel model is the result of the product of two independent and non-
identically distributed (inid) α-μ variates. As such, in order to study the performance of …

A general and efficient distance bounding protocol with multi-objective optimisation for RFID applications over a noisy channel

E Shafiee, A Falahati - International Journal of Ad Hoc and …, 2021 - inderscienceonline.com
It is common to employ the distance bounding (DB) protocols to prevent relay attacks over
RFID communication systems. It is impossible to utilise only one specific version of a DB …

Analysis of unilateral distance bounding protocol with mixed predefined and bidirectional challenges over a noisy communication channel

H Jannati, A Falahati - 2014 22nd Iranian Conference on …, 2014 - ieeexplore.ieee.org
Distance bounding protocols have been proposed to prevent a relay attack on RFID
systems. In a distance bounding protocol, an upper bound for the physical distance between …