scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal Article
TL;DR: This paper makes security analysis and proves that the protocol is secure against stolen-verifer and replay-attacks and the-middle-people attacks.
Abstract: Summarizes the authentication methods and protocols,and then gives a protocol based on USB-KEY from the side of cryptology and network security which is aiming at localization of biology authentication and high cost of PKI.With the feature that USB-KEY hardware produces randomicity and calculates and restores data,the protocol uses randomicity,asynchronous time mark,DES cryptoguard,and MD5 algorithm to accomplish data integrality,data security and session key to make the protocol easy and useful and safety.At last,this paper makes security analysis and proves that the protocol is secure against stolen-verifer and replay-attacks and the-middle-people attacks.

3 citations

Journal ArticleDOI
05 Dec 2013
TL;DR: This article offers a secure and practical noncommutative analogue of the Diffie–Hellman protocol that is reliably protected not only against “man in the middle” attack but also against the quantum computer attack.
Abstract: . Classical Diffie-Hellman protocol of the key establishment was the basis of the development of several key exchange protocols. But this protocol is not secure and it is not protected against the “man in the middle” attack. The purpose of this article is to offer a secure and practical noncommutative analogue of the Diffie–Hellman protocol that is reliably protected not only against “man in the middle” attack but also against the quantum computer attack

3 citations

Book ChapterDOI
23 Mar 2010
TL;DR: This paper introduces Authentication-based Medium Access Control (A-MAC) to prevent Virtual Carrier Sense (VCS) Jamming attack and De-authentication / Disassociation Jamming Attack that are typical Protocol Jamming Attacks in 802.11 based wireless systems.
Abstract: Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it has inherent security weaknesses due to wireless characteristics. For this reason, security-sensitive groups are still unwilling to use WLAN. There are several types of attacks to degrade the wireless network throughput using security weakness, especially Protocol Jamming Attacks are critical. These attacks consume little energy and can be easily implemented. In this paper, we introduce Authentication-based Medium Access Control (A-MAC) to prevent Virtual Carrier Sense (VCS) Jamming Attack and De-authentication / Disassociation Jamming Attack that are typical Protocol Jamming Attacks in 802.11 based wireless systems. The proposed scheme can authenticate frames using Universal Hashing Message Authentication Codes (UMAC-32) and Hidden Sequence Number (SN). A-MAC frequently changes the key and SN using shift row and shift column processes to overcome the weakness of short 32 bits hashing codes. A-MAC can achieve integrity, authentication, and anti-replay attack security features. It can prevent Protocol Jamming Attacks that degrade wireless network throughput. Our simulation shows A-MAC can sustain throughput under Protocol Jamming Attacks.

3 citations

Journal Article
TL;DR: A new simple and efficient wireless authentication protocol providing user anonymity, based on hash function and smart cards, and it takes only one round of messages exchange between the mobile user and the visited network.
Abstract: This paper presents a new simple and efficient wireless authentication protocol providing user anonymity Our protocol is based on hash function and smart cards, and mobile users only do symmetric encryption and decryption In our protocol, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network The most significant feature is one-time use of key between mobile users and visited networks

3 citations

Journal ArticleDOI
TL;DR: The security analysis proves the efficiency of the presented protocol against the known types of attacks, and the performance analysis proves that a significant improvement in computation and communication overhead is achieved.

3 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795