scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
14 Oct 2011
TL;DR: This paper proposes an efficient AKA protocol for mobile devices in this paper, which has lower computation and communication loads, can prevent DoS attack and does not require a verification table in the server.
Abstract: Authentication with key agreement protocol (AKA) can provide mutual authentication and create a session key between two communication parties. In 2005, Chen and Yeh proposed an AKA protocol based on one-way hash function and exclusive-or (XOR) operations. Having the feature of fast processing, their protocol is more efficient than previously related works. However, we discover that Chen and Yehi¦s protocol cannot withstand denial of service (DoS) attack. Moreover, their protocol has redundant communication rounds such that it is not efficient for mobile devices. Therefore, we propose an efficient AKA protocol for mobile devices in this paper, which has lower computation and communication loads. Moreover, our protocol can prevent DoS attack and does not require a verification table in the server. In a word, our AKA protocol is efficient and practical for mobile devices.

1 citations

Proceedings ArticleDOI
01 Jul 2017
TL;DR: An improved authentication protocol dependent on RC for multiserver environment is proposed, which can effectively avoid server spoofing attack and only uses nonce, one-way hash function and exclusive-OR operation in its implementation, and is much more secure and practical.
Abstract: In many protocols, registration center (RC) is just responsible for users' and servers' registration, so a malicious server may cheat users to serve as another legal server. It's necessary to verify the legality of both users and servers with the help of a third trusted party such as RC. In 2012, Li et al. proposed a dynamic identity based authentication protocol for multiserver environment. But their protocol is susceptible to insider attack, eavesdropping attack, masquerade attack and password guessing attack. Besides, their protocol can't provide user's anonymity. In this paper, we propose an improved authentication protocol dependent on RC for multiserver environment to remedy the aforementioned security flaws. Compared with previous protocols independent on RC, in our protocol RC is one of parties in authentication phase to verify the legality of users and servers, which can effectively avoid server spoofing attack. Our protocol only uses nonce, one-way hash function and exclusive-OR operation in its implementation, and it is much more secure and practical.

1 citations

Book ChapterDOI
11 Jul 2007
TL;DR: This paper proposes a smart card based secret-key exponential key agreement protocol called SEKA, which provides mutual authentication and key agreement over an insecure channel between user and server.
Abstract: The smart card based remote user authentication and key agreement protocol is a very practical solution to create a secure distributed computer environment. In this paper, we propose a smart card based secret-key exponential key agreement protocol called SEKA, which provides mutual authentication and key agreement over an insecure channel between user and server. The computational complexity that the client must perform is just one exponentiation and two hash functions during the runtime of the protocol.

1 citations

Journal ArticleDOI
TL;DR: A new bidirectional authentication and key agreement protocol based on the MYK-NTRUSign signature algorithm that can overcome the security flaws of authentication protocols based on secret-key, but also support greater security attributes and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes.
Abstract: In this paper, we propose a new bidirectional authentication and key agreement protocol based on the MYK-NTRUSign signature algorithm. The AES encryption algorithm and hash techniques were adopted to build our protocol. To implement the mutual authentication and session key agreement, the proposed protocol includes two phases: namely initial phase and mutual authentication with key agreement phase. As the MYK-NTRUSign signature algorithm is applied, our protocol not only can overcome the security flaws of authentication protocols based on secret-key, but also support greater security attributes and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes.

1 citations

Journal Article
TL;DR: The authentication system based on IEEE802.1x protocol has more advantages in LAN access,but it still has some problems and flaws based on the practice of network management, so an amelioration of the authentication system is presented.
Abstract: The authentication system based on IEEE802.1x protocol has more advantages in LAN access,but it still has some problems and flaws based on the practice of network management.This paper gives a brief introduction to authentication architecture of the 802.1x protocol,the whole work theory,authentication mechanism and process of the system based on 802.1x and RADIUS protocol is discussed.An amelioration of the authentication system is presented.As a new element,the network flux is added to participate in its authentication.The project has advantages of automatic authentication and high efficiency in control.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795