scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This study employs biometrics to design a lightweight privacy preserving authentication protocol for SIP based on symmetric encryption that can fully protect the privacy of biometric characteristics and data identity.
Abstract: Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from the viewpoint of both performance and security, because performance and security as two critical factors affecting SIP applications always seem contradictory. In this study, we employ biometrics to design a lightweight privacy preserving authentication protocol for SIP based on symmetric encryption, achieving a delicate balance between performance and security. In addition, the proposed authentication protocol can fully protect the privacy of biometric characteristics and data identity, which has not been considered in previous work. The completeness of the proposed protocol is demonstrated by Gong, Needham, and Yahalom (GNY) logic. Performance analysis shows that our proposed protocol increases efficiency significantly in comparison with other related protocols.

13 citations

Journal ArticleDOI
TL;DR: Numerical analysis to compare the performance of the proposed protocol to that of existing authentication protocols in terms of authentication cost and authentication message transmission latency confirmed that the proposed caTBUA protocol yields a better performance than the existing BU authentication protocols.
Abstract: SUMMARY Existing binding update (BU) authentication protocols do not consider context information, such as trust, location, and current time, when verifying a mobile node’s care-of address (CoA). Instead, the correspondent node executes its own CoA validation in spite of facing a highly trusted situation or simply bypasses the CoA validation, making it difficult to maintain a reasonable trade-off between security and efficiency. This paper applies the context-aware concept to the BU process and proposes a new contextaware ticket-based binding update authentication (caTBUA) protocol. The proposed protocol dynamically performs an appropriate CoA validation based on the context information to achieve a good balance between security and efficiency. Utilizing numerical analysis to compare the performance of the proposed protocol to that of existing authentication protocols in terms of authentication cost and authentication message transmission latency confirmed that the proposed caTBUA protocol yields a better performance than the existing BU authentication protocols. Copyright q 2010 John Wiley & Sons, Ltd.

13 citations

Proceedings ArticleDOI
30 Aug 2011
TL;DR: This paper presents a novel cryptographic authentication protocol that is fully secure and it fills the security holes imposed by RFID technology and has a significantly lower cost in terms of computation, memory and communication as compared to most of the existing RFID protocols.
Abstract: Authentication of products and humans is one of the main applications of RFID technology. In this paper, we present a novel cryptographic authentication protocol that is fully secure and it fills the security holes imposed by RFID technology. Our proposed authentication protocol has a significantly lower cost in terms of computation, memory and communication as compared to most of the existing RFID protocols. We compare our protocol with the existing protocols by implementing all these authentication protocols first time on a passive, computation capable RFID tag developed by Intel known as WISP.

13 citations

Proceedings ArticleDOI
01 Jan 2001
TL;DR: This work uses simulation to show that the modified protocol is more effective than the original protocol when a severe reordering of messages occurs and reduces the number of discarded good messages by up to 70%.
Abstract: The anti-replay window protocol is used to secure IP against an adversary that can insert (possibly replayed) messages in the message stream from a source computer to a destination computer in the Internet. We discuss this important protocol and point out a potential problem faced by the protocol, in which severe reordering of messages can cause the protocol to discard a lot of good messages. We then introduce a controlled shift mechanism that can reduce the number of discarded good messages by sacrificing a relatively small number of messages. We use simulation to show that the modified protocol is more effective than the original protocol when a severe reordering of messages occurs. In particular, we show that the modified protocol reduces the number of discarded good messages by up to 70%.

13 citations

Proceedings ArticleDOI
01 Nov 2007
TL;DR: A quantum authentication protocol is presented in this paper which is based on the correlations of the EPR(Einstain-Podolski-Rosen) pair which is a two-qubit system in one of the four Bell states.
Abstract: A quantum authentication protocol is presented in this paper. It is based on the correlations of the EPR(Einstain-Podolski-Rosen) pair which is a two-qubit system in one of the four Bell states. The two parties share a sequence of EPR pairs as the authentication key. To authenticate each other, they need to create auxiliary particles and make them interact with the authentication key. Then one can affirm the other's identity by performing the Bell states measurement. No one without the authentication key can pass the authentication process. So the protocol is secure. No classical channel and classical information exchange is needed in the authentication process. After the authentication process, the authentication key can be turned into the origin state. So the authentication key can be reused.

13 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795