Topic
Otway–Rees protocol
About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.
Papers published on a yearly basis
Papers
More filters
•
27 May 2006TL;DR: Using the message-exchange forms and information that is inferred from a latest topological orders of the trigger-graph, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.
Abstract: A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological orders of the trigger-graph. Based on these methods, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.
3 citations
•
TL;DR: The new protocol used one-way Hash function value instead of label identifier, and designed independent authentication key for each pair between the reader and the tag in the certification process, which has obvious advantages in enhancing the tag identity privacy and resisting the threat from within the system.
Abstract: Wireless transmission,broadcast of signals,resource-constraint disturb the reliability of Radio Frequency Identification(RFID) system and block the deployment progress of RFID techniques.Through the analysis of current common RFID authentication protocol,an authentication protocol based on Hash function and key array was proposed.The new protocol used one-way Hash function value instead of label identifier,and designed independent authentication key for each pair between the reader and the tag in the certification process.It could resist several possible attacks,including eavesdropping,location tracking,re-transmission attacks,Denial of Service(DoS),tampering and other attacks.It has obvious advantages in enhancing the tag identity privacy,and resisting the threat from within the system.
3 citations
••
09 Sep 2010TL;DR: An improved authentication process is presented and how to prevent the user name attacks is discussed, and the design flaws of 802.1X system are analyzed.
Abstract: -Network security plays an important part in LAN system. The 802.1X protocol provides a port-based network access control to the LAN. In this paper, three cases of user name attacks against the 802.1X are given firstly. Then, the design flaws of 802.1X system are analyzed. At last, an improved authentication process is presented and how to prevent the user name attacks is discussed.
3 citations
•
01 Jan 2008
TL;DR: This paper first provides an analysis of the problems in EEAP-PW and then a new attribute-based authenticated key agreement protocol, denoted byEEAP-AK, is proposed to solve the problems.
Abstract: User authentication and key agreement are very important components to provide secure home network service. Although the TTA adopted the EEAP-PW protocol as a user authentication and key transmission standard, it has some problems including not to provide forward secrecy. This paper first provides an analysis of the problems in EEAP-PW and then proposes a new attribute-based authenticated key agreement protocol, denoted by EEAP-AK. to solve the problems. The proposed protocol supports the different level of security by diversifying network accessibility for the user attribute after the user attribute-based authentication and key agreement protocol steps. It efficiently solves the security problems in the EEAP-PW and we could support more secure home network service than the EEAP-AK.
3 citations
•
TL;DR: It is shown that this protocol can't resist the extending key-compromise-impersonate attack, and an improvement of the identity-based protocol was proposed based on the original scheme.
Abstract: This paper extended the definition of key-compromise-impersonate attack according to a new kind of identity-based key exchange protocol presented by Wang in 2007,then showed that this protocol can't resist the extending key-compromise-impersonate attack.This paper also conducted a detailed analysis on the flaw.To avoid this shortcoming,an improvement of the identity-based protocol was proposed based on the original scheme.
3 citations