Loading...
Search for: standard-assumptions
0.003 seconds

    Security analysis of SKI protocol

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 2014 , pp. 199-203 ; ISBN: 9781479953837 Babvey, P ; Yajam, H. A ; Eghlidos, T ; Sharif University of Technology
    Abstract
    A great number of authentication protocols used in several applications such as payment systems are inherently vulnerable against relay attacks. Distance bounding protocols provide practical solutions against such attacks; some of which are lightweight and implementable on cheap RFID tags. In recent years, numerous lightweight distance bounding protocols have been proposed; however, a few of them appeared to be resistant against the existing attacks up to the present. One of most well-known protocols in this field is the SKI protocol which has a security proof based on a non-standard strong assumption named Circular Keying. In this paper, we demonstrate that without this strong and... 

    Robust adaptive fault-tolerant control for leader-follower flocking of uncertain multi-agent systems with actuator failure

    , Article ISA Transactions ; Volume 71 , 2017 , Pages 227-234 ; 00190578 (ISSN) Yazdani, S ; Haeri, M ; Sharif University of Technology
    Abstract
    In this work, we study the flocking problem of multi-agent systems with uncertain dynamics subject to actuator failure and external disturbances. By considering some standard assumptions, we propose a robust adaptive fault tolerant protocol for compensating of the actuator bias fault, the partial loss of actuator effectiveness fault, the model uncertainties, and external disturbances. Under the designed protocol, velocity convergence of agents to that of virtual leader is guaranteed while the connectivity preservation of network and collision avoidance among agents are ensured as well. © 2017 ISA