scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An ultra-lightweight mutual authentication protocol based on the message authentication code algorithm that can provide mutual authentication of the communicating parties, resist several attacks with small amount of calculation and simple protocol and can meet the resource requirements of the distribution terminal.
Abstract: With the development of information technology in power industry, information security of the distribution automation system is facing increasing challenge. To meet the device authentication demand and the limited resources in power distribution terminal, the concept of distribution terminal fingerprint is presented according to the physical and behavioral features in terminal. And then, an ultra-lightweight mutual authentication protocol based on the message authentication code algorithm is proposed. The message authentication code of the messages sent by both communication parties is calculated with the distribution terminal fingerprint as the key to achieve mutual authentication of the terminal and the master station without any cryptosystems. Finally, security and performance analysis is given. The results show that the proposed protocol can provide mutual authentication of the communicating parties, resist several attacks with small amount of calculation and simple protocol. Therefore, it can meet the resource requirements of the distribution terminal.

1 citations

Proceedings ArticleDOI
10 Dec 2002
TL;DR: An authentication architecture which uses a network management protocol and extensible authentication protocol on a smart card to perform authentication over the wireless network to manage security and QoS for user mobility is proposed.
Abstract: Mechanisms for security and quality of service (QoS) used in fixed networks cannot be adapted for mobile networks. The mobility of users makes problems in authentication and QoS conservation during handoffs. We focus on the management of security and QoS for user mobility. We propose an authentication architecture which uses a network management protocol (common open policy services) standardized by the Internet Engineering Task Force and extensible authentication protocol on a smart card to perform authentication over the wireless network.

1 citations

Journal ArticleDOI
TL;DR: A new protocol for quantum secure communication with authentication with authentication has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon.
Abstract: A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. The security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security.

1 citations

Journal Article
Shi Qing-hua1
TL;DR: A new authentication and key agreement protocol is presented, different from the complicated public key scheme, which overcomes the drawbacks of transferring the IMSI(international mobile station identity) by plaintext, and achieves authentication of WLAN-AN and secure transfer of message between W LAN-AN to HSS.
Abstract: The procedure and security of the authentication and key agreement protocol adopted by 3GPP-WLAN are analyzed,and the vulnerability and attacks for the protocol is presented,especially,the identity of the user will be exposed when the adversary carries out the location privacy attack,and there exists the redirection attack in the protocol. To solve such security problems for the protocol,a new authentication and key agreement protocol is presented,different from the complicated public key scheme,which overcomes the drawbacks of transferring the IMSI(international mobile station identity) by plaintext,and achieves authentication of WLAN-AN and secure transfer of message between WLAN-AN to HSS. Finally,an authentication test verification based on the strand space model is made.

1 citations

Proceedings ArticleDOI
10 Dec 2010
TL;DR: Compared to identity-based authentication protocol under other standard models, this protocol has lower computation complexity, so it is fit for application in resources-constrained environment of manufacturing grid.
Abstract: In order to improve the security and performance of authentication protocol in manufacturing grid, identity-based authentication protocol under standard model is constructed. Combining with the environment of manufacturing grid, this protocol can work under escrow and non-escrow models and different trust domains model. By introducing pseudo random function set, new authentication protocol realizes explicit double authentication under standard model. Compared to identity-based authentication protocol under other standard models, this protocol has lower computation complexity, so it is fit for application in resources-constrained environment of manufacturing grid. At last, based on hypothesis of difficulty, the safety of new authentication protocol is proved under standard model.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795