scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a simple and rapid authentication scheme in mobile networks that applies the Elliptic Curve Diffie–Hellman key agreement protocol to exchange the session key safely and ElliptIC Curve Digital Signature Algorithm to improve the mobile security.
Abstract: Recently, mobile networks are more and more popular in providing the most pursuing pervasive networking services. Many technologies are deployed in mobile networks, such as Universal Mobile Telecommunication System (UMTS). In these communication systems, user secrecy and privacy are important issues and should be managed seriously. To avoid security threats, many studies on authentication in the mobile networks are proposed. In 2008, Juang and Wu introduced an authentication scheme with user privacy protection in UMTS networks. It resisted and avoided many security attacks and threats, but there are still some problems, such as the incomplete defense against the impersonation attack and data with International Mobile Subscriber Identity exchanged outside home networks. In this paper, we proposed a simple and rapid authentication scheme in mobile networks. The proposal applies the Elliptic Curve Diffie–Hellman key agreement protocol to exchange the session key safely and Elliptic Curve Digital Signature Algorithm to improve the mobile security. It also deploys the temporary key mechanism to speed up the authentication while user is roaming in the mobile networks. The analysis shows that our mechanism not only improves Juang and Wu's proposal but also is a more secure and simple authentication protocol. Copyright © 2011 John Wiley & Sons, Ltd.

1 citations

01 Jan 2010
TL;DR: A universally composable security authenticated key exchange protocol NB-AKE is proposed to set up shared keys between sensor nodes and base stations and it is of forward security and concurrent security.
Abstract: The unique set of security requirements for a medical care system based on wireless sensor network is identified,and an ideal functionality of authenticated key exchange for medical sensor network is defined in the universal composability model.The ideal functionality guarantees strong security and availability properties.A universally composable security authenticated key exchange protocol NB-AKE is proposed to set up shared keys between sensor nodes and base stations.The implementation of NB-AKE protocol requires the use of pseudo-random function.NB-AKE protocol provides anonymous authentication,and it is of forward security and concurrent security.The new protocol has simpler structure,lower communication overhead,and lower computational burden on nodes.

1 citations

Proceedings ArticleDOI
01 Jul 2007
TL;DR: This paper introduces a protocol MDB-PWD -an improved variant of the protocol DB-P WD and analyzes its security in the security framework formalized by Bellare et al. in both the ideal cipher model and the random oracle model under CDH assumption.
Abstract: Recently, Kim et al. proposed a very efficient provably secure group key agreement protocol KLL, security of which relies on the Computational Diffie-Hellman (CDH) assumption in the presence of random oracles. In our earlier work, we embed the protocol KLL into password-based environment - yielding the protocol DB-PWD. In this paper, we detect certain flaws in the protocol DB-PWD and take suitable measures to overcome these attacks. We introduce a protocol MDB-PWD - an improved variant of the protocol DB-PWD and analyze its security in the security framework formalized by Bellare et al. in both the ideal cipher model and the random oracle model under CDH assumption.

1 citations

Journal ArticleDOI
TL;DR: It is found that the leakage of values AV and BV in the CLC protocol will make a man-in-the-middle attack feasible in practice, where AV andBV are the authentication information chosen by the server for the participants A and B.
Abstract: The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values AV and BV in the CLC protocol will make a man-in-the-middle attack feasible in practice, where AV and BV are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.

1 citations

Journal Article
TL;DR: This paper introduces a design of RFID middleware authentication protocol based on symmetrical cryptographic algorithm by GNY logic validation by demonstrating is the security of the two-way authentication.
Abstract: The authentication protocol is one of the basic means to ensure safe RFID communication.This paper introduces a design of RFID middleware authentication protocol based on symmetrical cryptographic algorithm by GNY logic validation,demonstrate is the security of the two-way authentication.And the safety,performance is analyzed,analysis shows that the protocol has content privacy,location privacy,resistance to replay attack、resistance to fake attack.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795