Topic
Otway–Rees protocol
About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: An ultra-lightweight mutual authentication protocol based on the message authentication code algorithm that can provide mutual authentication of the communicating parties, resist several attacks with small amount of calculation and simple protocol and can meet the resource requirements of the distribution terminal.
Abstract: With the development of information technology in power industry, information security of the distribution automation system is facing increasing challenge. To meet the device authentication demand and the limited resources in power distribution terminal, the concept of distribution terminal fingerprint is presented according to the physical and behavioral features in terminal. And then, an ultra-lightweight mutual authentication protocol based on the message authentication code algorithm is proposed. The message authentication code of the messages sent by both communication parties is calculated with the distribution terminal fingerprint as the key to achieve mutual authentication of the terminal and the master station without any cryptosystems. Finally, security and performance analysis is given. The results show that the proposed protocol can provide mutual authentication of the communicating parties, resist several attacks with small amount of calculation and simple protocol. Therefore, it can meet the resource requirements of the distribution terminal.
1 citations
••
10 Dec 2002
TL;DR: An authentication architecture which uses a network management protocol and extensible authentication protocol on a smart card to perform authentication over the wireless network to manage security and QoS for user mobility is proposed.
Abstract: Mechanisms for security and quality of service (QoS) used in fixed networks cannot be adapted for mobile networks. The mobility of users makes problems in authentication and QoS conservation during handoffs. We focus on the management of security and QoS for user mobility. We propose an authentication architecture which uses a network management protocol (common open policy services) standardized by the Internet Engineering Task Force and extensible authentication protocol on a smart card to perform authentication over the wireless network.
1 citations
••
TL;DR: A new protocol for quantum secure communication with authentication with authentication has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon.
Abstract: A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. The security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security.
1 citations
•
TL;DR: A new authentication and key agreement protocol is presented, different from the complicated public key scheme, which overcomes the drawbacks of transferring the IMSI(international mobile station identity) by plaintext, and achieves authentication of WLAN-AN and secure transfer of message between W LAN-AN to HSS.
Abstract: The procedure and security of the authentication and key agreement protocol adopted by 3GPP-WLAN are analyzed,and the vulnerability and attacks for the protocol is presented,especially,the identity of the user will be exposed when the adversary carries out the location privacy attack,and there exists the redirection attack in the protocol. To solve such security problems for the protocol,a new authentication and key agreement protocol is presented,different from the complicated public key scheme,which overcomes the drawbacks of transferring the IMSI(international mobile station identity) by plaintext,and achieves authentication of WLAN-AN and secure transfer of message between WLAN-AN to HSS. Finally,an authentication test verification based on the strand space model is made.
1 citations
••
10 Dec 2010TL;DR: Compared to identity-based authentication protocol under other standard models, this protocol has lower computation complexity, so it is fit for application in resources-constrained environment of manufacturing grid.
Abstract: In order to improve the security and performance of authentication protocol in manufacturing grid, identity-based authentication protocol under standard model is constructed. Combining with the environment of manufacturing grid, this protocol can work under escrow and non-escrow models and different trust domains model. By introducing pseudo random function set, new authentication protocol realizes explicit double authentication under standard model. Compared to identity-based authentication protocol under other standard models, this protocol has lower computation complexity, so it is fit for application in resources-constrained environment of manufacturing grid. At last, based on hypothesis of difficulty, the safety of new authentication protocol is proved under standard model.
1 citations