Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol
Journal: Advances in Computer Science : an International Journal(ACSIJ) (Vol.3, No. 6)Publication Date: 2014-11-30
Authors : Seyed Mohammad Alavi; Behzad Abdolmaleki; Karim Baghery;
Page : 51-56
Keywords : RFID authentication protocols; HRAP+ protocol; Security; Impersonation Attack;
Abstract
In the last decade, Radio Frequency Identification (RFID) systems are employed in many authentications and identifi-cations applications. In RFID systems, in order to provide secure authentication between RFID users, different au-thentication protocols pr ...
Other Latest Articles
- A Novel Vernier-based Time to Digital Converter for Low-power RFID Sensor Tags
- Load Sensitive Forwarding for Software Defined Networking ? Openflow Based
- Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View
- CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level
- Novel Approach for Optimal Sizing of Stand-alone Hybrid Photovoltaic/Wind Systems Using Evolutionary Algorithms
Last modified: 2014-12-01 19:37:50