scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
24 Sep 2014
TL;DR: Basic protocols are used as building blocks for the construction of complex protocol to accomplish computational tasks collaboratively without revealing the participants’ private data.
Abstract: Privacy protection has become a crucial issue in the information era. In recent years, many protocols have been developed to accomplish computational tasks collaboratively without revealing the participants’ private data. However, developing protocols for each individual application would not be practical. The more natural and efficient approach would be utilizing basic protocols as building blocks for the construction of complex protocol.

3 citations

Proceedings ArticleDOI
01 Feb 2017
TL;DR: An authentication protocol is proposed to mutually authenticate sensor nodes in wireless sensor networks based on tokens that is light in weight and reduces much of computational, communicational and storage overheads.
Abstract: Wireless sensor networks (WSN) are being used worldwide in many areas. As the application areas of the WSN are increasing at the same rate the security threats are also increasing. Intruders are applying various mechanisms to access the sensible and confidential data from sensors. Hence, strong security measures are much needed to immune WSNs from various attacks. Authentication is a security mechanism that protects WSNs from wide range of security attacks. In this paper, an authentication protocol is proposed to mutually authenticate sensor nodes in wireless sensor networks. The proposed protocol is based on tokens. Any node when deployed in WSN is embedded with base station's public key and through the corresponding cluster head; it requests and acquires its token for authentication from the base station. The generated token is light in weight and reduces much of computational, communicational and storage overheads. The proposed protocol is verified for its security both formally and automatically. The proposed protocol is proved to be secure by evaluation in BAN logic and found SAFE by AVISPA-a model checker tool for testing authentication protocol.

3 citations

Proceedings ArticleDOI
23 Apr 2006
TL;DR: Conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol are investigated.
Abstract: We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces formalism, but the results apply to all protocol analysis techniques, and should be of particular value to those using model checking.The implications of the central result are discussed.

3 citations

Proceedings ArticleDOI
01 May 2016
TL;DR: This protocol collaborates with other neighboring mobile devices to generate the trusted proofs and is more secure than previous methods since it can resist more potential attacks.
Abstract: In this paper, we propose a condition-based location authentication protocol for mobile devices to authenticate users' location claims. This protocol collaborates with other neighboring mobile devices to generate the trusted proofs. This protocol does not require any extra equipment built in mobile devices, thus, it is easy to use and deploy. Through the security analysis, our protocol is more secure than previous methods since it can resist more potential attacks.

3 citations

01 Jan 2003
TL;DR: This line attempts to convince us that there are some measures the authors normally take after an attack takes place in the real world, and to apply these very same concepts to the world of security protocols and see what they can get out of it.

3 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795