scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
11 Jul 2001
TL;DR: This paper proposes a new authentication protocol based on the design of a new network component that is called CRL-agent and analyzes and evaluates the security strength of the proposed protocol.
Abstract: Mobile commerce is becoming more and more commonplace, but security is still a major concern. To provide security, theWAP (Wireless Application Protocol) forum suggests theWAP security architecture. However, it needs theWAP gateway for intermediate process between the WTLS (Wireless Transport Layer Security) and the SSL (Secure Socket Layer) protocol, and it does not guarantee end-to-end security between the mobile devices and the WAP servers. In this paper, we propose a new authentication protocol to solve this problem. Our solution is based on the design of a new network component that is called CRL-agent. Furthermore, we also analyze and evaluate the security strength of the proposed protocol.

2 citations

Proceedings ArticleDOI
08 May 2006
TL;DR: This work successfully included the establishment of mutual end-to-end authentication, the prevention of node identity fabrication, and the secure distribution of provisional session keys using certification threshold key configuration by CCH (control cluster head).
Abstract: Initial studies in mobile ad hoc routing has considered only the problem of providing efficient routing protocols for finding paths in very dynamic networks, without considering security. Because of this, ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure based wireless networks. Our proposed protocol incorporates an end-to-end authentication protocol that relies on a mutual trust between nodes in other clusters. The scheme strategy takes advantage of the threshold certification based end-to-end authentication protocol in large ad hoc networks. Our proposed authentication protocol uses certificates containing an asymmetric key using the threshold cryptography scheme. We present detailed security threats against multilayer cluster routing scheme. We successfully included the establishment of mutual end-to-end authentication, the prevention of node identity fabrication, and the secure distribution of provisional session keys using certification threshold key configuration by CCH (control cluster head).

2 citations

Proceedings ArticleDOI
15 Apr 2008
TL;DR: The proposed evolutionary time spread multiple access protocol is based on protocol threading technique and a novel contention schedule with reservation and carrier sense and can control each node to utilize its assigned slots and its non-assigned slots effectively.
Abstract: In this paper, we propose an evolutionary time spread multiple access (E-TSMA) protocol which is independent of topology changes for ad hoc networks. Our proposed protocol is based on protocol threading technique and a novel contention schedule with reservation and carrier sense. According to the topology density of the network and the transmission requirement, our proposed protocol can control each node to utilize its assigned slots and its non-assigned slots effectively. The protocol improves upon the existing threaded time spread multiple access (T-TSMA) protocol while preserving the advantage of the topology transparency and eliminating the maximum nodal degree constraint. In this paper we present the protocol and analyze the performance of it. Simulation results show that our proposed E-TSMA protocol is better than the T-TSMA protocol.

2 citations

Journal Article
TL;DR: This paper proves that EAP-AKA protocol can ensure the mutual authentication between WLAN-UE and 3GPP AAA and authentication tests is a method based on the strand space model for analyzing and verifying the security protocols.
Abstract: EAP-AKA(Extensible Authentication Protocol-Authentication and Key Agreement) is authentication and key agreement protocol of WLAN;Authentication tests is a method based on the strand space model for analyzing and verifying the security protocols.This paper uses authentication tests to analyze EAP-AKA protocol,and proves that EAP-AKA protocol can ensure the mutual authentication between WLAN-UE and 3GPP AAA.

2 citations

Journal ArticleDOI
TL;DR: An improvement to overcome some security flaws in the proposed deniable authentication protocol based on the Deffie-Hellman key agreement protocol is proposed.
Abstract: In 2002, Fan et al. proposed a deniable authentication protocol based on the Deffie-Hellman key agreement protocol. They guaranteed that the proposed protocol, which is deniable, can authenticate the source of the message and resist the person-in-the-middle(PIM) attack. However, the receiver is not authenticated in the proposed deniable authentication protocol, which will result in some security flaws. As a result, we propose an improvement to overcome these drawbacks in this paper.

2 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795