scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings Article
27 May 2006
TL;DR: Using the message-exchange forms and information that is inferred from a latest topological orders of the trigger-graph, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.
Abstract: A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological orders of the trigger-graph. Based on these methods, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.

3 citations

Journal Article
TL;DR: The new protocol used one-way Hash function value instead of label identifier, and designed independent authentication key for each pair between the reader and the tag in the certification process, which has obvious advantages in enhancing the tag identity privacy and resisting the threat from within the system.
Abstract: Wireless transmission,broadcast of signals,resource-constraint disturb the reliability of Radio Frequency Identification(RFID) system and block the deployment progress of RFID techniques.Through the analysis of current common RFID authentication protocol,an authentication protocol based on Hash function and key array was proposed.The new protocol used one-way Hash function value instead of label identifier,and designed independent authentication key for each pair between the reader and the tag in the certification process.It could resist several possible attacks,including eavesdropping,location tracking,re-transmission attacks,Denial of Service(DoS),tampering and other attacks.It has obvious advantages in enhancing the tag identity privacy,and resisting the threat from within the system.

3 citations

Proceedings ArticleDOI
09 Sep 2010
TL;DR: An improved authentication process is presented and how to prevent the user name attacks is discussed, and the design flaws of 802.1X system are analyzed.
Abstract: -Network security plays an important part in LAN system. The 802.1X protocol provides a port-based network access control to the LAN. In this paper, three cases of user name attacks against the 802.1X are given firstly. Then, the design flaws of 802.1X system are analyzed. At last, an improved authentication process is presented and how to prevent the user name attacks is discussed.

3 citations

Proceedings Article
01 Jan 2008
TL;DR: This paper first provides an analysis of the problems in EEAP-PW and then a new attribute-based authenticated key agreement protocol, denoted byEEAP-AK, is proposed to solve the problems.
Abstract: User authentication and key agreement are very important components to provide secure home network service. Although the TTA adopted the EEAP-PW protocol as a user authentication and key transmission standard, it has some problems including not to provide forward secrecy. This paper first provides an analysis of the problems in EEAP-PW and then proposes a new attribute-based authenticated key agreement protocol, denoted by EEAP-AK. to solve the problems. The proposed protocol supports the different level of security by diversifying network accessibility for the user attribute after the user attribute-based authentication and key agreement protocol steps. It efficiently solves the security problems in the EEAP-PW and we could support more secure home network service than the EEAP-AK.

3 citations

Journal Article
TL;DR: It is shown that this protocol can't resist the extending key-compromise-impersonate attack, and an improvement of the identity-based protocol was proposed based on the original scheme.
Abstract: This paper extended the definition of key-compromise-impersonate attack according to a new kind of identity-based key exchange protocol presented by Wang in 2007,then showed that this protocol can't resist the extending key-compromise-impersonate attack.This paper also conducted a detailed analysis on the flaw.To avoid this shortcoming,an improvement of the identity-based protocol was proposed based on the original scheme.

3 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795