scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
30 Jun 2003
TL;DR: This paper presents a novel asymmetric end-to-end authentication protocol that is based on the concept of using the wireless access home network of a mobile station to assist its authentication with a service provider.
Abstract: The users of mobile devices that have access to the Internet services increases while they are on the move (i.e. anywhere and at any time). This results in a new phenomenon- mobile electronic commerce, or m-commerce. Security provision for m-commerce community is a challenging task due to insecure air interface of wireless access networks, limited computational capability and battery of life of mobile devices, and the mobility of users. This paper presents a novel asymmetric end-to-end authentication protocol that is based on the concept of using the wireless access home network of a mobile station to assist its authentication with a service provider. The security of the proposed protocol is analysed and its performance against other related work is evaluated.

13 citations

Proceedings ArticleDOI
15 Mar 2010
TL;DR: It is concluded that smaller-key sizes are sufficient for the NLHB protocol to achieve the same level of passive attack security as the HB Protocol, enabling authentication on very low-cost devices like RFID tags.
Abstract: In this paper, we propose a light-weight provably-secure authentication protocol called the NLHB protocol, which is a variant of the HB protocol [6]. The HB protocol uses the complexity of decoding linear codes for security against passive attacks. In contrast, security for the NLHB protocol is proved by reducing the provably hard problem of decoding a class of nonlinear codes to passive attacks. We demonstrate that the existing passive attacks([10],[3]) on the HB protocol family, which have contributed to considerable reduction in its effective key-size, do not work against the NLHB protocol. From the evidence, we conclude that smaller-key sizes are sufficient for the NLHB protocol to achieve the same level of passive attack security as the HB Protocol. Further, for this choice of parameters, we provide an implementation instance for the NLHB protocol for which the Prover/Verifier complexity is lower than the HB protocol, enabling authentication on very low-cost devices like RFID tags.

13 citations

Journal ArticleDOI
TL;DR: Through simulation testing, it is seen that the authentication protocol is more lightweight and efficient than SAP, especially the more lightweight user side, which contributes to the larger grid scalability.

13 citations

Journal ArticleDOI
TL;DR: In this article, a modified version of the QKD protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, is presented.

13 citations

Proceedings ArticleDOI
28 Feb 2011
TL;DR: A unique batch authentication protocol UBAPV2G that takes into account the characteristics of vehicle communication is proposed that can reduce authentication delay, and achieve less computational cost and less communication traffic compared with the one-by-one authentication scheme.
Abstract: "Vehicle-to-Grid" (V2G) power will be a new green energy scheme in which electric or plug-in hybrid vehicles communicate with the Smart Grid to sell demand response services by either delivering electricity into the grid or by throttling their charging rate. Due to high vehicular speed, sporadic connection, limited communication range, and large volume of data that need to be transmitted, V2G communications have the crucial requirements of fast authentication and encryption/decryption. This paper proposes a unique batch authentication protocol UBAPV2G that takes into account the characteristics of vehicle communication. Security analysis shows that UBAPV2G is strong to against the security attacks. The experimental results show that UBAPV2G can reduce authentication delay, and achieve less computational cost and less communication traffic compared with the one-by-one authentication scheme. Thus, UBAPV2G protocol is suitable for the stringent requirement of real time V2G communication.

13 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795