scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
08 Oct 2007
TL;DR: A hybrid TDMA MAC protocol comprising of two component protocols - a contention protocol that provides effective operation under high density condition, and a TDMA allocation protocol that manages stable communication between reader and tags is presented.
Abstract: Active RFID can be well used in identifying, tracking and recording objects. Proper MAC protocol is needed for channel access and tag communication schedule. This paper presents a hybrid TDMA MAC protocol comprising of two component protocols - a contention protocol that provides effective operation under high density condition, and a TDMA allocation protocol that manages stable communication between reader and tags. Analysis shows that such protocol also provides well energy conserving. We also design an active RFID system platform suitable for such MAC protocol and other applications.

8 citations

Proceedings ArticleDOI
16 Jul 2013
TL;DR: This paper presents a powerful algorithm to further enhance the security of the three-stage protocol by provisioning an initialization vector between the two communicating parties and postulated that the concept can be extended to an electronic implementation with minor enhancement.
Abstract: A recent paper has discussed the implementation of the three-stage protocol as a multi-photon tolerant protocol. In this paper, we present a powerful algorithm to further enhance the security of the three-stage protocol. Using this algorithm, the three-stage protocol will be provided with yet another layer of security by provisioning an initialization vector between the two communicating parties. The addition of this contrivance makes it theoretically impossible for any intruder to recover the plaintext except under the condition when the intruder has simultaneous real-time access to four elements in the implementation of the protocol. In this paper, it is postulated that the concept can be extended to an electronic implementation with minor enhancement.

8 citations

Proceedings ArticleDOI
01 Mar 2009
TL;DR: A lightweight authentication protocol in mobile RFID is proposed and complied with EPC Class-1 Gen-2 norms, which effectively achieves forward security with preventing replay, Man-in-the-Middle (MITM), eavesdropping, and counterfeit tag attacks.
Abstract: In recent years the mobile RFID was developed due to its wide convenience by integrating the communication devices like PDA and mobile phone, it also directly applicable to the purchasing transaction or small amount payment. However, current RFID authentication schemes are not suitable to use in mobile RFID environment since the proposed authentication schemes result in computing load to the low cost tag and provide insufficient protection to the information privacy. Therefore, we propose a lightweight authentication protocol in mobile RFID and complied with EPC Class-1 Gen-2 norms, which effectively achieves forward security with preventing replay, Man-in-the-Middle (MITM), eavesdropping, and counterfeit tag attacks.

8 citations

Proceedings ArticleDOI
TL;DR: This paper presents a secure and efficient key agreement protocol, which enables two mobile devices to establish a shared secret key for D2D communications without prior knowledge, and integrates it into the existing Wi-Fi Direct protocol.
Abstract: With the rapid growth of smartphone and tablet users, Device-to-Device (D2D) communications have become an attractive solution for enhancing the performance of traditional cellular networks. However, relevant security issues involved in D2D communications have not been addressed yet. In this paper, we investigate the security requirements and challenges for D2D communications, and present a secure and efficient key agreement protocol, which enables two mobile devices to establish a shared secret key for D2D communications without prior knowledge. Our approach is based on the Diffie-Hellman key agreement protocol and commitment schemes. Compared to previous work, our proposed protocol introduces less communication and computation overhead. We present the design details and security analysis of the proposed protocol. We also integrate our proposed protocol into the existing Wi-Fi Direct protocol, and implement it using Android smartphones.

8 citations

Proceedings ArticleDOI
29 Jun 2010
TL;DR: A flaw in a recently proposed RFID authentication protocol that needs O(1) time complexity to find out the identifier of the RFID tag irrespective of the total number of the tags is exhibited and it makes the scheme vulnerable to tracking attack, tag impersonation attack and denial of service attack.
Abstract: In this paper, we investigate the security of a recently proposed RFID authentication protocol that needs O(1) time complexity to find out the identifier of the RFID tag irrespective of the total number of the tags. We exhibit a flaw which has gone unnoticed in design of the protocol and show that it makes the scheme vulnerable to tracking attack, tag impersonation attack and denial of service attack, if the attacker has the possibility to tamper with only one RFID tag. Because low-cost devices are not tamper-resistant, such an attack could be feasible and we can apply the resulting attacks on authentication, untraceability and desynchronization resistance of the protocol.

8 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795