scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A strong mutual authentication protocol based on a lightweight public-key cryptosystem: NTRU is proposed, which assures the confidentiality of the RFID system by encrypting the messages communicated between tags and readers and the freshness of the messages by using pseudorandom number generator.
Abstract: RFID is a key technology that can be used to create the ubiquitous society. However, this technology may suffer from some serious threats such as privacy disclosure. In order to solve these secure problems we propose a strong mutual authentication protocol based on a lightweight public-key cryptosystem: NTRU. The protocol assures the confidentiality of the RFID system by encrypting the messages communicated between tags and readers and the freshness of the messages by using pseudorandom number generator. Otherwise, the protocol can also prevent replay attack, tracing, and eavesdropping effectively. This authentication protocol uses less computing and memory resources, and it is very suitable to some low-cost RFID systems. DOI : http://dx.doi.org/10.11591/telkomnika.v12i3.4517 Full Text: PDF

5 citations

Journal ArticleDOI
TL;DR: An authenticated key agreement protocol which is secure against Man in the middle attack is proposed and the authors prove security issues of this protocol.
Abstract: Diffie and Hellman in their path breaking paper (5) proposed a two party key agreement protocol based on finite field. Diffie - Hellman Key Exchange Protocol (DH protocol) has unique importance in two party wireless communication scenarios. After this protocol several protocols have been proposed which were based on DH protocol but the Man in the middle attack raises a serious security concern on this protocol. Researchers have been working to overcome this security concern to design a new protocol. This paper proposes an authenticated key agreement protocol which is secure against Man in the middle attack. The authors also prove security issues of this protocol.

5 citations

Proceedings ArticleDOI
Min Li1, Xin Lv1, Wei Song, Wenhuan Zhou1, Qi Rongzhi1, Huaizhi Su 
24 Nov 2014
TL;DR: The analysis shows that the improved authentication protocol is fit for wireless Mesh network, which can make identity authentication more secure and efficient.
Abstract: The traditional Kerberos protocol exists some limitations in achieving clock synchronization and storing key, meanwhile, it is vulnerable from password guessing attack and attacks caused by malicious software. In this paper, a new authentication scheme is proposed for wireless mesh network. By utilizing public key encryption techniques, the security of the proposed scheme is enhanced. Besides, timestamp in the traditional protocol is replaced by random numbers to implementation cost. The analysis shows that the improved authentication protocol is fit for wireless Mesh network, which can make identity authentication more secure and efficient.

4 citations

Proceedings ArticleDOI
30 Nov 2009
TL;DR: This paper analyzes storage awareness RFID authentication protocol based on sparse tree structure and proposes a new protocol that provides tag information privacy and tag location privacy, and resists replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation with an efficient key-lookup.
Abstract: In this paper, we analyze storage awareness RFID authentication protocol based on sparse tree structure (SAPA), which provides backward untraceability and reduces the space for storing key sequence. We discover that SAPA does not provide location and information privacy between successful authentication sessions and does not resist denial of service attacks, forward traceability, and server impersonation. We analyze the weaknesses of SAPA and propose a new RFID authentication protocol. The proposed protocol provides better protection against privacy and security threats than those before. Our proposed protocol provides tag information privacy and tag location privacy, and resists replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation with an efficient key-lookup. Furthermore, our protocol has the least computation and communication load on both the tag and the server side compared to other tree based protocols.

4 citations

Posted Content
TL;DR: A specifc attack on the protocol is proposed by which, an adversary can break the secret already shared between Alice and Bob when he (adversary) runs the protocol few times, and shows that there is a gap in authentication procedure of the protocol.
Abstract: We analyze the security of a quantum secure direct communication protocol equipped with authentication. We first propose a specifc attack on the protocol by which, an adversary can break the secret already shared between Alice and Bob, when he (adversary) runs the protocol few times. The attack shows that there is a gap in authentication procedure of the protocol, and by doing so the adversary can obtain the key without remaining any trace. We then give the modification of the protocol and analyze the security of it, and show how the modified protocol can close the gap.

4 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795