Topic
Otway–Rees protocol
About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.
Papers published on a yearly basis
Papers
More filters
••
23 Oct 2017
TL;DR: This paper analyzes both examples that were previously analyzed by hand or using other tools, and finds novel attacks using the Tamarin prover, to find multi-protocol attacks.
Abstract: When trying to prove the security of a protocol, one usually analyzes the protocol in isolation, i.e., in a network with no other protocols. But in reality, there will be many protocols operating on the same network, maybe even sharing data including keys, and an intruder may use messages of one protocol to break another. We call that a multi-protocol attack. In this paper, we try to find such attacks using the Tamarin prover. We analyze both examples that were previously analyzed by hand or using other tools, and find novel attacks.
2 citations
••
13 Sep 2006TL;DR: This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way based on Mutual Verification scheme and demonstrates the effectiveness of the protocol by introducing a theorem and the proof of the theorem.
Abstract: A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant Broadcast Protocol based on Mutual Verification scheme guarantees that no forged information can be propagated to the network if an intruder is assumed to not compromise the base station. We show that our proposed protocol successfully runs and also demonstrate the effectiveness of the protocol by introducing a theorem and the proof of the theorem.
2 citations
••
01 Sep 2009TL;DR: This paper presents an application of this formal approach to a newly designed authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations.
Abstract: Despite advances in network security, malicious attacks have shown a significant increase in recent times. Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, given sufficient time, well-equipped intruders succeed in breaking encryptions and compromising system security. The protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. Communicating Sequential Processes (CSP) is an abstract language designed especially for the description of communication patterns. A notion of rank functions is introduced for analysing purposes as well. This paper presents an application of this formal approach to a newly designed authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results of the designed protocol are presented and discussed.
2 citations
••
08 Oct 2015TL;DR: This work created a reference implementation of the UPACS protocol and performed a security analysis designed to determine the protocol's resilience to several known forms of security attack.
Abstract: The Universal Physical Access Control System (UPACS) is a communication protocol designed to provide secure access to remote physical devices over untrusted communication networks, where it could be subjected to eavesdropping, unauthorized modification of its messages, and other forms of tampering by attackers. We created a reference implementation of the UPACS protocol and performed a security analysis designed to determine the protocol’s resilience to several known forms of security attack. Our implementation prevented several attempted security attacks, including Privilege Elevation Attacks and unauthorized registration, addition and deletion of physical device controller nodes.
2 citations
••
TL;DR: A secure dynamic identify based Single Sign-On authentication protocol using smart card which can resist several kinds of attacks, such as replay attack, impersonation attack, stolen smart card attack, leak-of-verifier attack and can provide user's anonymity.
Abstract: In the current Internet world, most of the Internet services are based on the single server model and use the password identity authentication to provide application service for the users, this means that the user must enter the identity and password, before his/her wants to login in the application service server. It is extremely hard for user to remember the different ID and password, so the single sign-on (SSO) system has been proposed to solve this problem. There many Authentication protocol proposed for the SSO system. In this paper, we first introduced the SSO system and expounded the importance of the authentication protocol in the SSO system. Then we researched on some authentication protocols which can be used in the SSO system, but there are some serious secure problems in their schemes. So we propose a secure dynamic identify based Single Sign-On authentication protocol using smart card. Our protocol can resist several kinds of attacks, such as replay attack, impersonation attack, stolen smart card attack, leak-of-verifier attack and can provide user's anonymity. In our proposed protocol, it removes the aforementioned weaknesses of their protocols and only uses the one-way hash functions and XOR operations which make the protocol very effectively. Index Terms—Single sign-on, Authentication, Dynamic identity, Smart card, Password
2 citations