Ali Mahani

Learn More
Recently Qian et al. [38] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags' private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack,(More)
—The lifetime of wireless sensor networks (WSNs) is an important issue of much recent researches. A practical and widely used approach to prolong the lifetime of WSN is multi-mode protocols in which the sensor nodes are switched between active and sleep modes. But there is no work so far to study the multi-mode structures from reliability viewpoint. In this(More)
Recently Lo et al. have proposed an ownership transfer protocol for RFID objects using lightweight computing operators and claim their protocol provides stronger security robustness and higher performance efficiency in comparison with existing solutions. However, in this paper we show that their claim unfortunately does not hold. More precisely , we present(More)
This paper describes the application of Imperialist Competitive Algorithm (ICA) to design and optimization of combinational logic circuits. Imperialist Competitive Algorithm is a new socio-politically motivated global search strategy that recently has been introduced for dealing with different optimization tasks. We proposed a cost function to evolve(More)