scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal Article
TL;DR: The result of this study suggests that RAPSER can be significant for RFID authentication protocol design and verification.
Abstract: Many RFID authentication protocols have been designed by intuition and experience. Since they lack systematic theory support, these protocols often have a number of vulnerabilities. This paper proposes a series of rules called RFID authentication protocol security enhanced rules (RAPSER), used to provide systematic theory support for RFID authentication protocol design and verification. After a comprehensive and systematic analysis of the essence of RFID security issues and requirements, we propose RAPSER, and then axiomatise its foundation, and formalise its original proposition and negative proposition. By Chien's and Khan's protocol, we demonstrate how RAPSER can be implemented to design and verify RFID authentication protocols. We justified why the popular protocol does not offer sufficient security and privacy protection, and thereafter, proposed a stronger protocol to fix these security holes with RAPSER. The result of this study suggests that RAPSER can be significant for RFID authentication protocol design and verification.

2 citations

Proceedings ArticleDOI
Jin-Oh Jeon1, Su-Bong Ryu1, Tae-Min Chang1, Ho-Yong Choi, Min-Sup Kang 
06 Dec 2007
TL;DR: From implementation results, it is found that the proposed scheme is well suite to implement robust RFID system against active attacks such as the man-in-the-middle attack.
Abstract: In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol which uses cryptographic hash algorithm is based on a three-way challenge response authentication scheme. In addition, we will show how the three different types of protocol frame formats are formed by extending the ISO/IEC 18000-3 standard[3] for implementing the proposed authentication protocol in RFID system environment. The system has been described in Verilog HDL and also synthesized using Synopsys Design Compiler with Hynix 0.25 mum standard-cell library. From implementation results, we found that the proposed scheme is well suite to implement robust RFID system against active attacks such as the man-in-the-middle attack.

2 citations

Journal Article
TL;DR: A deniable authentication protocol based on the bivariate function hard problem (BFHP) cryptographic primitive is suggested since the problem of the BFHP provides the needed security elements plus its fast execution time and the proposed protocol has properties of completeness, deniability, security of forgery attack and security of impersonation attack.
Abstract: A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interactive deniable authentication protocols have been proposed So, it is very necessary to design a deniable authentication protocol which is non-interactive, secure and efficient This paper proposes a deniable authentication protocol based on the bivariate function hard problem (BFHP) cryptographic primitive An improvement based on the BFHP is suggested since the problem of the BFHP provides the needed security elements plus its fast execution time At the same time, the proposed protocol has properties of completeness, deniability, security of forgery attack, security of impersonation attack and security man-in-the-middle attack also has been proved

2 citations

Proceedings ArticleDOI
17 Nov 2012
TL;DR: A length identification method of unknown data frame is proposed based on characteristic searching of bit stream of unknown protocol, which can analyzes and researches protocols unknown from physical layer to application layer and determines the length of frame effectively.
Abstract: Unknown protocol identification is widely used in the field of network and information security. Most previous researches focus on known protocol identification and analysis of network layer and above. However, the research on unknown protocol is an essential part for ensuring the safety of information system. In this work, a length identification method of unknown data frame is proposed based on characteristic searching of bit stream of unknown protocol, which can analyzes and researches protocols unknown from physical layer to application layer and determines the length of frame effectively. This method can adapt to the identification of unknown communication protocol and is significant to network and information security.

2 citations

21 Aug 2019
TL;DR: The presented performance analysis shows that N SLA protocol satisfies low computation overhead and the security analysis proves that NSLA protocol has an immunity against replay attack, brute force attack, denial of service attack, and others types of attacks.
Abstract: As mobile applications grow, securing these applications become an important factor for their success. Especially, when these applications are related to financial transactions. Nowadays, mobile payment that is based on NFC technology is considered one of these important topics. In this paper, we propose A New Secure and Lightweight Authentication Protocol for NFC mobile Payment (NSLA) protocol. NSLA protocol presents a new method to update the users’ identities and the valid session keys, which preserves the privacy and ensures the integrity of the system. The presented performance analysis shows that NSLA protocol satisfies low computation overhead. Moreover, the security analysis proves that NSLA protocol has an immunity against replay attack, brute force attack, denial of service attack, and others types of attacks.

2 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795