scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents a security protocol, which enhances Kempf-Koodli's one with the help of the AAA infrastructure, and achieves secure distribution of a handover key through the SEcure Neighbor Discovery protocol.
Abstract: Recently, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to the SEND protocol, it suffers from denial of service attacks and expensive computational cost. In this paper, we present a security protocol, which enhances Kempf-Koodli's one with the help of the AAA infrastructure.

3 citations

Journal ArticleDOI
04 Dec 2008-Sensors
TL;DR: Security and performance analysis shows that the novel re-keying function protocol (NRFP) is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.
Abstract: This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

3 citations

Proceedings ArticleDOI
01 Sep 2013
TL;DR: This paper proposes a generic strategy to analyze authentication protocols based on Distributed Temporal Protocol Logic and demonstrates the ease with which this proposed strategy can be used by applying these tests on famous Needham-Shroeder Public Key (NSPK) authentication protocol.
Abstract: Authentication protocols ensure that participants in a distributed environment verify their identities before sending sensitive information to each other. If an authentication protocol has a design flaw, it may fail to reveal the true identities of distributed participants. To verify that an authentication protocol achieves its objectives, we have developed Authentication Tests based on Distributed Temporal Protocol Logic (DTPL). In this paper, we propose a generic strategy to analyze authentication protocols based on these Authentication Tests. We demonstrate the ease with which our proposed strategy can be used by applying these tests on famous Needham-Shroeder Public Key (NSPK) authentication protocol. We also demonstrate how the inability to prove a security property can lead us to identifying Man-In-The-Middle attack on such protocols.

3 citations

Journal ArticleDOI
TL;DR: This paper identifies the major weakness, i.e., session key disclosure, of a recently published protocol and proposes a novel authentication scheme for a multi-server environment and gives formal analysis proofs for security guarantees.
Abstract: Numerous smart card based authentication protocols have been proposed to provide strong system security and robust individual privacy for communication between parties these days Nevertheless, most of them do not provide formal analysis proof, and the security robustness is doubtful Chang and Cheng (2011) proposed an efficient remote authentication protocol with smart cards and claimed that their proposed protocol could support secure communication in a multi-server environment Unfortunately, there are opportunities for security enhancement in current schemes In this paper, we identify the major weakness, ie, session key disclosure, of a recently published protocol We consequently propose a novel authentication scheme for a multi-server environment and give formal analysis proofs for security guarantees

3 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795