scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
01 Nov 2013
TL;DR: A novel link-layer encryption protocol for wireless sensor networks that includes a unique security feature of hiding the packet header information, which demonstrates that the C-Sec protocol outperforms other protocols in terms of energy savings.
Abstract: This paper presents a novel link-layer encryption protocol for wireless sensor networks. The protocol design aims to reduce energy consumption by reducing security related communication overhead. This is done by merging security related data of consecutive packets. The merging (or combining packets) based on simple mathematical operations helps to reduce energy consumption by eliminating the requirement to send security related fields in headers and trailers. We name our protocol as the Compact Security Protocol referred to as C-Sec. In addition to energy savings, the C-Sec protocol also includes a unique security feature of hiding the packet header information. This feature makes it more difficult to trace the flow of wireless communication, and helps to minimize the cost of defending against replay attacks. We performed rigorous testing of the C-Sec protocol and compared it with well-known protocols including TinySec, MiniSec, SNEP and Zigbee. Our performance evaluation demonstrates that the C-Sec protocol outperforms other protocols in terms of energy savings. We also evaluated our protocol with respect to other performance metrics including queuing delay and error probability.

4 citations

Journal ArticleDOI
TL;DR: It is shown that Jung's protocol is vulnerable to attacks of malicious insiders.
Abstract: Recently, Jung (2006), proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders

4 citations

Proceedings ArticleDOI
He Liu, Xiao Liang, Lei Fang, Bo Zhang, Jin-Wen Zhao 
13 Dec 2014
TL;DR: The security analysis and the simulating results show that the proposed protocol can provide secure and efficient service for electric vehicle.
Abstract: This paper proposes a new access authentication protocol for electric vehicle in a secure and efficient way. The proposed protocol employs identity based aggregate signatures to achieve access authentication. It has the characteristics of local signals, identity based, etc. For security, the new protocol can support mutual authentication, message integrity and replay attack resistance. For efficiency, the proposed scheme wins high performance due to no involved pairing operations. In particular, a batch verification mechanism is designed to reduce AP's burden, which can greatly enhance the protocol efficiency. The security analysis and the simulating results show that the proposed protocol can provide secure and efficient service for electric vehicle.

4 citations

Book ChapterDOI
21 May 1995
TL;DR: The security of a 3-round protocol is proved and a new easy implementable construction which has a key size close to the fundamental lower bound for even extremely long messages is given.
Abstract: Gemmell and Naor proposed a new protocol for unconditionally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable construction which has a key size close to the fundamental lower bound for even extremely long messages. Furthermore, we give a proof of a secure multiround protocol for an arbitrary number of rounds.

4 citations

Journal ArticleDOI
13 Aug 2012
TL;DR: The paper presents verification of privacy preserving authentication protocol for VANETs using SPIN tool and described the impact of known attack on the protocol, graphically specification, its behavior in terms of reliability and its correctly verification using the integrated specification verifying JSPIN tool.
Abstract: The paper presents the verification of a privacy preserving authentication protocol using a finite state model checker SPIN. Authentication of various entities, vehicles and road side units, is vital for accepting the authenticity of messages broadcast by them. These messages are critical and actions taken by vehicles are related to human life. The authentication protocol is a distributed and asynchronous in nature. In the present work, the correctness of the protocol is verified using SPIN and its structure is depicted using finite state and sequence diagram. The results indicate that the proposed protocol is correct and meet the requirements of VANET.

4 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795