scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
16 May 2022
TL;DR: In this paper , a lightweight EAP-based authentication protocol for IEEE 802.11 WLAN is proposed that not only addresses the security issues in the existing WLAN authentication protocols but is also cost-effective.
Abstract: The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant’s identity who attempts to connect his wireless device to an access point (AP) of an organization’s WLAN. Many of these protocols use the Extensible Authentication Protocol (EAP) framework. These protocols are either vulnerable to attacks such as violation of perfect forward secrecy, replay attack, synchronization attack, privileged insider attack, and identity theft or require high computational and communication costs. In this paper, a lightweight EAP-based authentication protocol for IEEE 802.11 WLAN is proposed that not only addresses the security issues in the existing WLAN authentication protocols but is also cost-effective. The security of the proposed protocol is verified using BAN logic and the Scyther tool. Our analysis shows that the proposed protocol is safe against all the above attacks and attacks defined in RFC-4017. A comparison of the computational and communication costs of the proposed protocol with other existing state-of-the-art protocols shows that the proposed protocol is lightweight than existing solutions.

1 citations

Journal Article
TL;DR: The paper proposes the module transfer security(MTS) protocol based on TCP, which includes the handshake protocol and the cryptograph transfer protocol, the former provides identify authentication and negotiation about conversation key, and the latter guarantees data secure transmission.
Abstract: The current secure communication protocols can not completely meet the secure requirements of communication between modules in the distributed intrusion detection system,which is reliability,confidentiality,identify authentication,data integrity and freshness.The paper proposes the module transfer security(MTS) protocol based on TCP,which includes the handshake protocol and the cryptograph transfer protocol,the former provides identify authentication and negotiation about conversation key,and the latter guarantees data secure transmission.At last,it verifies the security of MTS protocol,and then implements it in ODIDS.

1 citations

Proceedings ArticleDOI
10 Jun 2010
TL;DR: This work presents the use of formal verification over a protocol proposed for wireless sensor networks in order to correctly authenticate the user before allowing him to access the services of the network.
Abstract: Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification through model checking is a technique that can perform this demonstration with high accuracy. We present the use of formal verification over a protocol proposed for wireless sensor networks in order to correctly authenticate the user before allowing him to access the services of the network. Casper/FDR2 approach was used with success in proving that the desired security properties of the protocol were verified.

1 citations

Proceedings ArticleDOI
16 Mar 2009
TL;DR: This paper presents an enhancement of the HB-protocol family with mutual authentication to have only the legal readers obtain the legal reader's data.
Abstract: Radio frequency identification (RFID) is a popular technology, but some problems still need to be overcome. Hopper and Blum proposed a light-weight authentication protocol, HB protocol, which is especially suitable for devices with low computation ability such as passive RFID tags. Later, HB protocol was proven to be insecure, and Munilla and Peinado amended it by proposing HB-MP and HB-MP¢ protocols. However, only the tag is authenticated by the reader in these protocols. In this paper, we will present an enhancement of the HB-protocol family with mutual authentication to have only the legal reader obtain the legal reader's data. The proposed protocol is light-weight because only scalar dot product operation of binary vectors and XOR operation are adopted. Moreover, it is computational secure since its security is based on solving LPN problem, an NP-complete problem.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795