scispace - formally typeset
M

Mahdi R. Alagheband

Researcher at Islamic Azad University

Publications -  22
Citations -  240

Mahdi R. Alagheband is an academic researcher from Islamic Azad University. The author has contributed to research in topics: Authentication protocol & Authentication. The author has an hindex of 7, co-authored 18 publications receiving 173 citations. Previous affiliations of Mahdi R. Alagheband include Sharif University of Technology & Ryerson University.

Papers
More filters
Journal ArticleDOI

Dynamic and secure key management model for hierarchical heterogeneous sensor networks

TL;DR: A dynamic key management framework based on elliptical curve cryptography and signcryption method for heterogeneous WSNs and both periodic authentication and a new registration mechanism are proposed through prevention of SN compromise.
Journal ArticleDOI

Design of a secure communication system between base transmitter station and mobile equipment based on finite-time chaos synchronisation

TL;DR: A combination of the chaotic encryption method as multi-shift cipher encryption and double chaotic masking has been suggested to enhance security in the communication system.
Book ChapterDOI

Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard

TL;DR: It is shown that the proposed protocol does not have cited security features properly, and the whole security of the protocol is broken, and Yeh et al.'s Protocol does not assure the untraceabilitiy and backwarduntraceabilitative attributes.
Journal ArticleDOI

Unified privacy analysis of new‐found RFID authentication protocols

TL;DR: Although the authors of the schemes claimed that their protocols completely resist privacy attacks, it is formally proved that all of them suffer from the family of traceability attacks.
Journal ArticleDOI

Simulation-Based Traceability Analysis of RFID Authentication Protocols

TL;DR: The privacy weaknesses of three new-found RFID authentication protocols are analysed in formal privacy models and three improved protocols are proposed to prevent the aforementioned attacks.