scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An authentication protocol based on zero-knowledge protocol and hashing in mobile RFID environment is proposed which effectively achieves forward security with preventing replay, eavesdropping, and counterfeit tag attacks.
Abstract: The integration of RFID technology and mobile smart device stimulates the daily increasing popularity of mobile RFID-based applications, which makes its way to become a new hot zone for research and development. The primary mitigation strategies of RFID systems are ensuring that all devices are behind the corporate firewall, and physically securing the network itself. But due to the portable nature of an RFID Mobile device, as well as the potential to use wireless or internet connections for communications, Mobile RFID systems have specific security concerns that need to be addressed. In this paper, an authentication protocol based on zero-knowledge protocol and hashing in mobile RFID environment is proposed which effectively achieves forward security with preventing replay, eavesdropping, and counterfeit tag attacks.

3 citations

Proceedings ArticleDOI
19 Dec 2015
TL;DR: A securely efficient cloud computing user authentication protocol is proposed, which is based on certificateless cryptology scheme without bilinear pairings to minimize the authentication time and user anonymity service is achieved via a temporary identity provided by ID provider.
Abstract: Recently, many user authentication schemes for cloud computing have been proposed. However, most of the proposed schemes have security flows and high computation costs. In this paper, a securely efficient cloud computing user authentication protocol is proposed, which is based on certificateless cryptology scheme without bilinear pairings to minimize the authentication time. Moreover, user anonymity service is achieved via a temporary identity (TID) provided by ID provider, instead of user's true identity. Additional replay protection from an attacker is included in the authentication phase to prevent a possible replay attack. Compared with the related works, the proposed scheme has higher security levels, which is more practical in cloud computing environment.

3 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A Moving Target Defense method is proposed by utilizing the protocol customization ability of Protocol-Oblivious Forwarding to greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.
Abstract: This paper addresses mainly the problem of private data protection in network communication against eavesdropping attacks. As this kind of attacks is stealthy and untraceable, it is barely detectable for those feature detection or static configuration based passive defense approaches. We propose a Moving Target Defense(MTD) method by utilizing the protocol customization ability of Protocol-Oblivious Forwarding (POF). The novel full protocol stack randomization MTD can greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.

3 citations

Journal Article
TL;DR: In the protocol, a mobile user can be provided with anonymous service and neither Visited networks nor eavesdroppers know the information of the user’s real identity, preserving the privacy of real Identity, current location and movement patterns information of users.
Abstract: This article analyzes an efficient protocol for anonymous mutual authentication and key agreement. In the protocol, a mobile user can be provided with anonymous service and neither Visited networks nor eavesdroppers know the information of the user’s real identity, preserving the privacy of real identity, current location and movement patterns information of users. This scheme can realize mutual authentication and the session key established by the protocol is fair for both side of communication.

2 citations

Journal ArticleDOI
Min-Sup Kang1
TL;DR: Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attacks, and replay attack, and forgery resistance, compared with conventional some protocols.
Abstract: This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.

2 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795