scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a broadcast authentication protocol, namely Paralleling Broadcast Authentication Protocol (PBAP), aiming at enhancing energy efficiency and providing network security in the direct communication between vehicles and WSNs, and demonstrates that the protocol can effectively extend lifetime of W SNs.
Abstract: Internet of Vehicles (IoVs) is coming and will grow in next few years, VANETs (Vehicular Ad Hoc Networks) is evolving into the era of IoVs. Inevitably, VANETs need to communicate with WSNs (Wireless Sensor Networks). Real-time data transmission between vehicles and road-side sensor nodes has many application scenarios. However, due to different characteristics of VANETs and WSNs, real-time traffic data transmission is too complicated and slow when emergencies occurred in many RSUs-sparse (Road Side Units) areas. In this paper, we propose a broadcast authentication protocol, namely Paralleling Broadcast Authentication Protocol (PBAP), aiming at enhancing energy efficiency and providing network security in the direct communication between vehicles and WSNs. The simulation results demonstrate that the protocol can effectively extend lifetime of WSNs by improving the utilization rate of the keys and show nice properties in different channel loss ratio and different degrees of DoS attacks. The protocol can work well even in the area without RSUs.

13 citations

Journal ArticleDOI
TL;DR: An efficient and practical authenticated key agreement protocol based on the line of geometry that provides mutual authentication between the user and the server and enables them to establish a common session key to provide message confidentiality for each other is proposed.
Abstract: An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. In the proposed protocol, the authorized user can access multi-servers securely by keeping only a weak password and a smart card. Owing to the limited memory of the smart card, the secret information stored in the smart card has a size independent of the number of servers to which it connects. The proposed protocol provides mutual authentication between the user and the server and enables them to establish a common session key to provide message confidentiality for each other. It can also resist the replay attack, the impersonation attack, the off-line dictionary attack, the known key attack, the unknown key share attack, the stolen verifier attack and the insider attack. The security of the proposed protocol will be demonstrated by the random oracle model. Furthermore, we use the logic analysis method to analyze the proposed protocol. This protocol does not use any overload cryptographic operations and requires less communicational and computational costs than the results obtained previously from the existing scholarship.

13 citations

Proceedings ArticleDOI
08 Dec 2008
TL;DR: This paper introduces the SLAP protocol, an efficient mutual authentication method by which a given tag and the back-end can authenticate each other easily, quickly and securely even if large amount of tags are stored in the database.
Abstract: Since tags have very limited memory and very low computational capacity a so-called lightweight authentication is needed. The earlier suggested algorithms do not satisfy all of the security requirements. In this paper we introduce our SLAP protocol which meets all the security requirements. Our solution provides an efficient mutual authentication method by which a given tag and the back-end can authenticate each other easily, quickly and securely even if large amount of tags are stored in the database. The protocol can defy the well-known attacks and does not demand high computational capacity.

13 citations

Proceedings ArticleDOI
27 Jun 2011
TL;DR: The objective of the protocol is to guarantee reliability by recovering lost packets while dealing with the limited energy, processing and memory capabilities of the devices typically used in Wireless Multimedia Sensor Networks (WMSNs).
Abstract: In this paper, an implementation of a transport protocol to be used in Wireless Multimedia Sensor Networks (WMSNs) is presented. The objective of the protocol is to guarantee reliability by recovering lost packets while dealing with the limited energy, processing and memory capabilities of the devices typically used in these networks. The implemented protocol was Distributed Transport for Sensor Networks (DTSN) and the target device was the embedded device Silex SX-560 using WiFi technology. The implementation was done in C language under the Linux operating system. Following the requirements of the project, additional mechanisms were implemented to enhance the protocol's performance for multimedia data and to provide a certain level of security (authentication and integrity) to the control packets. Results show that the implementation is semantically correct and the protocol is efficient in reducing the total number of transmissions, maintaining a low overhead.

13 citations

Journal ArticleDOI
TL;DR: This paper proposes a two-factor remote authentication protocol based on elliptic curve cryptography, which not only satisfies the criteria but also bears low computational cost.
Abstract: In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels. Recently, Chun-Ta Li proposed a password authentication and user anonymity protocol by using smart cards, and they claimed that their protocol has satisfied all criteria required by remote authentication. However, we have found that his protocol cannot provide mutual authentication between clients and the remote server. To realize `real' mutual authentication, we propose a two-factor remote authentication protocol based on elliptic curve cryptography in this paper, which not only satisfies the criteria but also bears low computational cost. Detailed analysis shows our proposed protocol is secure and more suitable for practical application.

13 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795