scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
26 Oct 2009
TL;DR: This work introduces the eavesdropping attack on Bennett’s B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM) and demonstrates efficiency of suggested attack and compares it with efficiencies of alternative attacks proposed before.
Abstract: Success of any eavesdropping attack on a quantum cryptographic protocol can be reduced by the legitime users if they partially compare their data. It is important to know for the legitime users what is (necessary and enough) amount of data which should be compared to ensure that (possible) illegitime user has an arbitrary small information about the rest of data. To obtain such amount the legitime users need to know efficiencies of all possible attacks for particular cryptographic protocol. In this work we introduce the eavesdropping attack on Bennett’s B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM). We demonstrate efficiency of suggested attack and compare it with efficiencies of alternative attacks proposed before.

1 citations

Proceedings ArticleDOI
01 Dec 2009
TL;DR: Hardware implementations of crypto protocol elements for secured data communication in two wired networks of security system detectors and hardware tools for the network controller and the network server that support this protocol were developed.
Abstract: This paper describes hardware implementations of crypto protocol elements for secured data communication in two wired networks of security system detectors. Those elements are basic to crypto protocol development for that type of network. In addition, hardware tools for the network controller and the network server that support this protocol were developed. These tools will allow us to test and debug the proposed security elements and the crypto protocol.

1 citations

Journal ArticleDOI
TL;DR: A secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values.
Abstract: Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner However, a significant challenge in the practical application of these networks exists in credible authentication and network security This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio The results shows that the proposed protocol possesses many advantages against the popular black hole attack This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN)

1 citations

Proceedings ArticleDOI
Guangwei Liu1, Jian Xu1, Mengmeng Cao1, Fucai Zhou1, Bin Zhang1 
25 Apr 2009
TL;DR: A fault-tolerant and secure multicast key management protocol (FTS) with using the fault-Tolerant algorithm and the password authentication mechanism is proposed in this paper and shows that the protocol not only avoids the single-point failure but also improves the comprehensive performance.
Abstract: As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point failure. In order to settle the issues mentioned above, a fault-tolerant and secure multicast key management protocol (FTS, for short) with using the fault-tolerant algorithm and the password authentication mechanism is proposed in this paper. In our protocol, legal members are able to agree on a key despite failures of other members. The protocol can also prevent man-in-the-middle attacks. Finally, we evaluate the security of FTS, and compare our protocol with the FTKM through performance analysis. The analytic results show that the protocol not only avoids the single-point failure but also improves the comprehensive performance.

1 citations

Proceedings Article
01 Jan 2008
TL;DR: In this article, the authors proposed an enhanced authentication protocol based on Bresson et al.'s group key protocol, which only requires simple hash operations in providing mutual authentication between a mobile node and access points.
Abstract: Reducing handoff latency is essential in providing seamless multimedia service in Wireless LAN based on the IEEE 802.11 standard. Reducing authentication delay is critical in reducing handoff latency. To this end, several authentication protocols for fBst handoff have been proposed. Mishra et al. used proactive key distribution to improve the authentication delay incurred in the current standard and Park et al. proposed a new authentication protocol based on Blom's key pre-distribution scheme. In this paper, we propose an enhanced authentication protocol based on Bresson et al.'s group key protocol. If a mobile node has previously access the network, our proposed protocol only requires simple hash operations in providing mutual authentication between a mobile node and access points. Our protocol is more efficient than Park et al.'s and Mishra et al.'s technique can be used in our protocol to further enhance our protocol.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795