scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
23 Oct 2017
TL;DR: This paper analyzes both examples that were previously analyzed by hand or using other tools, and finds novel attacks using the Tamarin prover, to find multi-protocol attacks.
Abstract: When trying to prove the security of a protocol, one usually analyzes the protocol in isolation, i.e., in a network with no other protocols. But in reality, there will be many protocols operating on the same network, maybe even sharing data including keys, and an intruder may use messages of one protocol to break another. We call that a multi-protocol attack. In this paper, we try to find such attacks using the Tamarin prover. We analyze both examples that were previously analyzed by hand or using other tools, and find novel attacks.

2 citations

Book ChapterDOI
13 Sep 2006
TL;DR: This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way based on Mutual Verification scheme and demonstrates the effectiveness of the protocol by introducing a theorem and the proof of the theorem.
Abstract: A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant Broadcast Protocol based on Mutual Verification scheme guarantees that no forged information can be propagated to the network if an intruder is assumed to not compromise the base station. We show that our proposed protocol successfully runs and also demonstrate the effectiveness of the protocol by introducing a theorem and the proof of the theorem.

2 citations

Book ChapterDOI
01 Sep 2009
TL;DR: This paper presents an application of this formal approach to a newly designed authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations.
Abstract: Despite advances in network security, malicious attacks have shown a significant increase in recent times. Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, given sufficient time, well-equipped intruders succeed in breaking encryptions and compromising system security. The protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. Communicating Sequential Processes (CSP) is an abstract language designed especially for the description of communication patterns. A notion of rank functions is introduced for analysing purposes as well. This paper presents an application of this formal approach to a newly designed authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results of the designed protocol are presented and discussed.

2 citations

Proceedings ArticleDOI
08 Oct 2015
TL;DR: This work created a reference implementation of the UPACS protocol and performed a security analysis designed to determine the protocol's resilience to several known forms of security attack.
Abstract: The Universal Physical Access Control System (UPACS) is a communication protocol designed to provide secure access to remote physical devices over untrusted communication networks, where it could be subjected to eavesdropping, unauthorized modification of its messages, and other forms of tampering by attackers. We created a reference implementation of the UPACS protocol and performed a security analysis designed to determine the protocol’s resilience to several known forms of security attack. Our implementation prevented several attempted security attacks, including Privilege Elevation Attacks and unauthorized registration, addition and deletion of physical device controller nodes.

2 citations

Journal ArticleDOI
Qingqi Pei1, Jie Yu1
TL;DR: A secure dynamic identify based Single Sign-On authentication protocol using smart card which can resist several kinds of attacks, such as replay attack, impersonation attack, stolen smart card attack, leak-of-verifier attack and can provide user's anonymity.
Abstract: In the current Internet world, most of the Internet services are based on the single server model and use the password identity authentication to provide application service for the users, this means that the user must enter the identity and password, before his/her wants to login in the application service server. It is extremely hard for user to remember the different ID and password, so the single sign-on (SSO) system has been proposed to solve this problem. There many Authentication protocol proposed for the SSO system. In this paper, we first introduced the SSO system and expounded the importance of the authentication protocol in the SSO system. Then we researched on some authentication protocols which can be used in the SSO system, but there are some serious secure problems in their schemes. So we propose a secure dynamic identify based Single Sign-On authentication protocol using smart card. Our protocol can resist several kinds of attacks, such as replay attack, impersonation attack, stolen smart card attack, leak-of-verifier attack and can provide user's anonymity. In our proposed protocol, it removes the aforementioned weaknesses of their protocols and only uses the one-way hash functions and XOR operations which make the protocol very effectively. Index Terms—Single sign-on, Authentication, Dynamic identity, Smart card, Password

2 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795