Topic
Otway–Rees protocol
About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.
Papers published on a yearly basis
Papers
More filters
••
24 Sep 2014
TL;DR: Basic protocols are used as building blocks for the construction of complex protocol to accomplish computational tasks collaboratively without revealing the participants’ private data.
Abstract: Privacy protection has become a crucial issue in the information era. In recent years, many protocols have been developed to accomplish computational tasks collaboratively without revealing the participants’ private data. However, developing protocols for each individual application would not be practical. The more natural and efficient approach would be utilizing basic protocols as building blocks for the construction of complex protocol.
3 citations
••
01 Feb 2017
TL;DR: An authentication protocol is proposed to mutually authenticate sensor nodes in wireless sensor networks based on tokens that is light in weight and reduces much of computational, communicational and storage overheads.
Abstract: Wireless sensor networks (WSN) are being used worldwide in many areas. As the application areas of the WSN are increasing at the same rate the security threats are also increasing. Intruders are applying various mechanisms to access the sensible and confidential data from sensors. Hence, strong security measures are much needed to immune WSNs from various attacks. Authentication is a security mechanism that protects WSNs from wide range of security attacks. In this paper, an authentication protocol is proposed to mutually authenticate sensor nodes in wireless sensor networks. The proposed protocol is based on tokens. Any node when deployed in WSN is embedded with base station's public key and through the corresponding cluster head; it requests and acquires its token for authentication from the base station. The generated token is light in weight and reduces much of computational, communicational and storage overheads. The proposed protocol is verified for its security both formally and automatically. The proposed protocol is proved to be secure by evaluation in BAN logic and found SAFE by AVISPA-a model checker tool for testing authentication protocol.
3 citations
••
23 Apr 2006TL;DR: Conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol are investigated.
Abstract: We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces formalism, but the results apply to all protocol analysis techniques, and should be of particular value to those using model checking.The implications of the central result are discussed.
3 citations
••
01 May 2016TL;DR: This protocol collaborates with other neighboring mobile devices to generate the trusted proofs and is more secure than previous methods since it can resist more potential attacks.
Abstract: In this paper, we propose a condition-based location authentication protocol for mobile devices to authenticate users' location claims. This protocol collaborates with other neighboring mobile devices to generate the trusted proofs. This protocol does not require any extra equipment built in mobile devices, thus, it is easy to use and deploy. Through the security analysis, our protocol is more secure than previous methods since it can resist more potential attacks.
3 citations
01 Jan 2003
TL;DR: This line attempts to convince us that there are some measures the authors normally take after an attack takes place in the real world, and to apply these very same concepts to the world of security protocols and see what they can get out of it.
3 citations