scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal Article
TL;DR: By carefully analyzing an RFID authentication protocol,an RFID anthenticated key exchange protocol, and an authenticated key exchange Protocol for mobile satellite communication systems, attacks of data synchronization to these protocols were found respectively.
Abstract: Data synchronization is a basic requirement for authentication protocols and authenticated key exchange protocols,but it is much trickier and many times overlooked.By carefully analyzing an RFID authentication protocol,an RFID anthenticated key exchange protocol,and an authenticated key exchange protocol for mobile satellite communication systems which were found to be provably secure at present,attacks of data synchronization to these protocols were found respectively.These attacks destroy the availability of protocols.Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed.

1 citations

Book ChapterDOI
03 Sep 2013
TL;DR: This work is articulated on the formal automatic verification of RFID protocols by two different tools, firstly, the Open-source Fixedpoint Model Checker (OFMC) tool, secondary, the Constraint Logic based Attack Searcher (Cl-Atse) tool.
Abstract: One of the most important challenges related to RFID systems is the verification of security proprieties in RFID authentication protocols Among the important attacks in RFID systems, we speak about the Algebraic Replay Attack on Authentication (ARA) Common characteristic between the verified protocols cannot resist algebraic replay attacks Our work is articulated on the formal automatic verification of RFID protocols by two different tools, firstly, the Open-source Fixedpoint Model Checker (OFMC) tool, secondary, the Constraint Logic based Attack Searcher (Cl-Atse) tool These tools sufficient for detecting the attach of type ARA

1 citations

Journal Article
TL;DR: It is demonstrated how careful visualization design can enhance not only the security but also the usability of authentication, to propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol.
Abstract: In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements. Keywords — Authentication; Smartphone; Malicious code; Keylogger

1 citations

Journal Article
TL;DR: Analytical results showed that the protocol model is highly secure and reliable,thus enabling the server in application to access and control so as to ensure the network security.
Abstract: A new cross-domain authentication protocol model is developed on hypercube basis,where the structural features of hypercube support the reversible entity authentication between different trust domains. Compared with the conventional cross-domain authentication model,the proposed model is able to not only reduce the registration workload but also simplify the distribution and management of shared cipher keys among authentication servers. In addition,the model can avoid the network bottleneck and single-point collapse due to the authentication by a single authority. Analytical results showed that the protocol model is highly secure and reliable,thus enabling the server in application to access and control so as to ensure the network security.

1 citations

Proceedings ArticleDOI
21 Jan 1998
TL;DR: This study intended to verify GMAP's robust characteristics, involves an implementation of a security simulator (SS/AG) which generates a number of attack patterns to check safety of the message transmission and reception performance using the authentication protocol against these attacks.
Abstract: In the global mobile computing environment the ideal is that the user accesses to the resources on the authorized network where the person is registered through any unauthorized network where the person is not registered from any location of transit. To make this ideal a reality, the user authentication system based on a third party authentication is vital at the access point of any unauthorized network on which the user is not registered. To achieve this goal, we have proposed the Global Mobile Authentication Protocol (GMAP) which reduces the use of the radio network to a minimum and enables user confirmation without leaking the user information. This study intended to verify GMAP's robust characteristics, involves an implementation of a security simulator (SS/AG) which generates a number of attack patterns to check safety of the message transmission and reception performance using the authentication protocol against these attacks. SS/AG is capable of generating the third party attacks on the network randomly or systematically. Moreover SS/AG is also characterized by the ability to allow each computer relating to the protocol to check the reaction to certain attack patterns or allow checking on the reaction of the entire authentication protocol.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795