scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
01 Jan 2012
TL;DR: A new stronger formal security model of three-party authentication and key distribution protocol is defined by “efficient AP” according to the rules of 802.11i standard, and a new provable secure EAP-TLS protocol is presented in this model.
Abstract: This paper analyzes the existing formal security models of three-party authentication and key distribution protocol for 802.11i, which are extended BR and Extended CK models. We propose the flaw about the definition of session identifier in Extended CK model and present the limitation of matching conversation defined in Extended BR model .In order to fix these problems and provide a perfect model for provable security protocol, a new stronger formal security model of three-party authentication and key distribution protocol is defined by “efficient AP” according to the rules of 802.11i standard, and we present a new provable secure EAP-TLS protocol in our model. The new formal security model proposes a better method to design provable security three-party authentication and key distribution protocol in WLAN. In addition, this paper also suggests an idea to define the authentication relationships in special application environment.

4 citations

Journal Article
TL;DR: The basic prin-ciples of the newly-issued version of Kerberos are described, the detailed procedure of the protocol is introduced and by being compared with the previous version, the improvement and faults of kerberos 5.0 are analyzed.
Abstract: Kerberos is a widely-adopted network authentication protocol,which provides secure authentication service based on the trusted third-party.By exploiting a shared key,Kerberos ensures the confidentiality and integrity for a session.This paper describes the basic prin-ciples of the newly-issued version,introduces the detailed procedure of the protocol and by being compared with the previous version,analyze the improvement and faults of Kerberos 5.

3 citations

Proceedings Article
01 Apr 2013
TL;DR: A key management protocol is proposed based on authentication and data encryption preventing from node capture attacks and is efficient in points of the cost and memory size.
Abstract: In this paper we focus on physical attacks on sensor nodes in a wireless sensor networks. Node capture attacks is one of the most dangerous attacks applied to WSNs which aims to capture a node in the network and try to steal some secret information. To be more specific we first survey node capture attacks and then a novel security mechanism to deal with these types of attacks will be presented. For this purpose a key management protocol is proposed based on authentication and data encryption preventing from node capture attacks. The key of protocol is generated by embedded PUF on sensor nodes chip. This key is unique and all tasks in protocol performed by this key and its products. The proposed solution is resistant against node capture attacks and is efficient in points of the cost and memory size.

3 citations

Proceedings ArticleDOI
01 Aug 2016
TL;DR: The result of the trust model analysis indicates that the model can improve the model's ability of withstanding attacks from the malicious nodes and demonstrates that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols.
Abstract: As sensor nodes are usually installed in harsh environments and nobody attends them, the character means it's easy for the networks to be subjected to all kinds of attacks. Moreover, the networks have limited computer power, communication power and energies. Therefore, in the environment, a well-organized and lightweight user authentication is a vital issue when a user possesses right to use the data from sensor nodes. In this article, a new user authentication protocol using trust model and elliptic curve cryptography (ECC) for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model's ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols.

3 citations

Proceedings ArticleDOI
15 Feb 2010
TL;DR: A mutual authenticated group key agreement protocol based on RSA, discrete logarithms (DL) and one-way hash function (OHF) assumptions is proposed, which is more secure and efficient than previously proposed protocols for unbalanced wireless mobile networks.
Abstract: In 2004, Bresson et al. proposed an authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.’s protocol. However, both protocols are insecure against the so-called impersonation attacks. This paper proposes a mutual authenticated group key agreement protocol based on RSA, discrete logarithms (DL) and one-way hash function (OHF) assumptions. The proposed protocol is more secure and efficient than previously proposed protocols for unbalanced wireless mobile networks.

3 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795