scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper shows that Shao's MQV protocol is vulnerable to unknown key-share attacks and points out its another potential weakness.

7 citations

Book ChapterDOI
07 Feb 2005
TL;DR: This paper will argue that for the analysis of the kind of protocols developed today, more specific models of the communications network are required.
Abstract: For protocol analysis, we have to capture the protocol specification, the security goals of the protocol, and the communications environment it is expected to run in. In the research literature, the emphasis is usually on verification techniques and on the modelling of security properties, while in most cases the default for the communications environment is an unstructured network totally controlled by the attacker. This paper will argue that for the analysis of the kind of protocols developed today, more specific models of the communications network are required. To support this argument, a number of recently proposed security protocols with novel features will be briefly discussed.

7 citations

Proceedings ArticleDOI
01 Sep 2012
TL;DR: This paper presents a low-cost and efficiency security protocol based on Physical Unclonable Functions (PUF), which solved the problems of existing security authentication protocol and can resist eavesdropping attack, replay attack, physical attack and tracking attack, with forward-security and backward-security.
Abstract: RFID(Radio Frequency Identification) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised many privacy and security concerns.Known privacy and security cryptographic defenses are too hardware-expensive to incorporate into low-cost RFID tags.This paper presents a low-cost and efficiency security protocol based on Physical Unclonable Functions(PUF), which solved the problems of existing security authentication protocol and can resist eavesdropping attack, replay attack, physical attack and tracking attack, with forward-security and backward-security.

7 citations

Journal ArticleDOI
Shuai Chen1, Bing Li1, Ziheng Chen1, Yan Zhang1, Caicai Wang1, Cheng Tao1 
TL;DR: Li et al. as mentioned in this paper proposed a mutual authentication protocol based on Shamir's secret sharing (SSS), which is suitable for the noisy PUFs in the Internet of Things (IoT).
Abstract: Physical Unclonable Function (PUF) has emerged as an attractive hardware-primitive for lightweight authentication in the Internet of Things (IoT). However, strong-PUF-based authentication schemes are threatened by powerful machine learning attacks. Therefore, dedicated lightweight protocols are required to preserve the privacy of the embedded strong PUF. In this paper, we show that the “availability” and “reliability” features of Shamir’s secret sharing (SSS) can be applied to address the security issue. In protocol A, the mappings between challenges and responses are randomly shuffled to resist the machine learning attacks. Leveraging the “availability” feature of SSS, the verification process is unaffected by the randomized challenge-response pairs (CRPs) at the server end. Moreover, the “reliability” feature of SSS provides the error-tolerant characteristic in our protocol which is suitable for the noisy PUFs. Protocol A also presented a method to securely store the CRPs at the server-side. The improved protocol A optimizes protocol A by eliminating the response storage and matching process at the server end. In protocol B, we present a mutual authentication protocol where no response is exposed to the adversary. Protocol B can be classified as the lightweight protocol because it can avoid the use of cryptographic algorithms and error-correcting codes. We rigorously analyze and prove the security of our protocols with formal security proofs, informal security analysis, and several selected machine learning techniques, including Logistic Regression (LR), Deep Neural Network (DNN), Approximate attack, AutoGluon-Tabular, and a new brute-force machine learning attack. Furthermore, we present an efficient implementation of our protocols on FPGA. The experimental results shown the feasibility and practicability of our protocols under different parameters.

7 citations

Journal ArticleDOI
01 Apr 2013
TL;DR: A novel protocol named Fast Iterative Localized Re- Authentication (FIL Re-authentication) is proposed to replace the fast re-authentications in EAP-AKA protocol, which makes use of iterative process and localized re-Authentication process for speeding up re- authentication times and reducing intra-domain handover authentication delays in 3G/UMTS-WLAN interworking networks.
Abstract: 3G/UMTS-WLAN heterogeneous mobile network is a complementary platform for the trend of Beyond-3G (B3G) wireless communications. However, the design of a secured and fast re-authentication protocol in 3G/UMTS-WLAN interworking networks is a challenging task. Although EAP authentication and key agreement (EAP-AKA) protocol is adopted by the third generation partnership protocol (3GPP) to achieve authentication and security services in 3G/UMTS-WLAN interworking networks, it still suffers two main drawbacks. One is high re-authentication delays due to centralized re-authentication sessions within the RADIUS server and unnecessary multiple rounds of challenge-response messages traveling between the RADIUS server and the mobile station. The other is high intra-domain handover authentication delay incurred by EAP-AKA protocol without supporting intra-domain handover authentication. Thus, this paper proposes a novel protocol named Fast Iterative Localized Re-authentication (FIL Re-authentication) to replace the fast re-authentication in EAP-AKA protocol. Furthermore, FIL Re-authentication makes use of iterative process and localized re-authentication process for speeding up re-authentication times and reducing intra-domain handover authentication delays in 3G/UMTS-WLAN interworking networks. Additional, the simulation model based on Network Simulator 2 (NS-2) is used to provide a valid implementation and finally the performance evaluation shows that proposed protocol surpasses standard EAP-AKA protocol in terms of authentication session time, authentication delay and handover authentication delay.

7 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795