scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Dissertation
27 Feb 2006
TL;DR: This thesis introduces, specifies and evaluates a novel key establishment mechanism to enable seamless authenticated handovers in IP networks called Inter-Domain Key Exchange Protocol (IDKE), and specifies security properties for authentication and secrecy and verifies the IDKE protocol by model checking.
Abstract: This thesis introduces, specifies and evaluates a novel key establishment mechanism to enable seamless authenticated handovers in IP networks called Inter-Domain Key Exchange Protocol (IDKE). The task of the IDKE protocol is to quickly re-establish trust and a shared session-key between the mobile node and the access network. This is implemented after a mobile node s handover by forwarding the session-key from the previous to the new access network. IDKE s major strength is in providing a secured key forwarding even when the two domains initially do not trust each other. The purpose of the transferred key is to secure the access link, thus providing confidentiality, integrity and access control. Generally such keys are obtained from the mobile node s home network, whereas the IDKE protocol forwards the key locally in between access networks via an exclusively established and secured communication channel. This work specifies security properties for authentication and secrecy and verifies the IDKE protocol by model checking. The protocol is modeled by Communication Sequential Processes (CSP); formal security verification is performed by Failure Divergence Refinement (FDR). Furthermore, the function for handling concurrent protocol runs is added to the IDKE protocol. The extended specification is simulated and verified by utilizing the Specification and Description Language (SDL) in order to analyze the robustness and the scalability of the protocol. Finally, the performance is compared to other approaches such as the Global System for Mobile Communications (GSM) and the Wireless Shared Key Exchange Protocol (W-SKE) using the discrete event simulator OPNET Modeler.

1 citations

Journal ArticleDOI
TL;DR: Security transaction problem between the client and the server was solved by a network identity authentication protocol that guarantees every specific legitimate user rights and prevents the hacker from attacking network data.
Abstract: Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user’s fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.

1 citations

Proceedings ArticleDOI
01 Oct 2012
TL;DR: This paper addresses behavior chains of the protocols, and proposes a novel method based on behavior chain to identify some kinds of protocols.
Abstract: Protocol identification is critical for managing the network, from traffic classification to intrusion detection. However, the traditional protocol identification techniques have become less effective as more and more new network applications have adopted complex interaction and encrypted techniques in recent years. In this paper, we address behavior chains of the protocols, and propose a novel method based on behavior chain to identify some kinds of protocols. The experimental results show that the protocol behavior chain exists and can be used to identify the different application.

1 citations

Journal Article
Meng Xue-jun1
TL;DR: The paper implements users authentication below the Ethernet based on 802.1x by analyzing 802.
Abstract: The precondition for the management and security of infonnation on the broadband Ethernet is authentication. The paper implements users authentication below the Ethernet based on 802.1x by analyzing 802.1x protocol, authentication protocol and relationship with them.

1 citations

Book ChapterDOI
15 Dec 2010
TL;DR: A fast and secure authentication protocol that the foreign network can authenticate the mobile user (MU) without checking with the home network (HN) and can effectively enhance the network performance.
Abstract: Rapid developments in wireless technologies in terms of speed, quality and coverage are great motivations that lead to an increase in the use of mobile devices such as laptops and smart phones. These developments facilitate exchanging information anywhere any time. However, some concerns have been raised especially when the mobile users want to access services that provided by foreign networks. These issues can be classified as security and performance matters. This paper proposes a fast and secure authentication protocol. The new feature about this protocol is that the foreign network (FN) can authenticate the mobile user (MU) without checking with the home network (HN). This feature can effectively enhance the network performance as just two messages are required to authenticate the MU. Moreover, we will demonstrate the strengths of this protocol against the common security attacks and we will compare the protocol performance with the previous protocols to ensure efficiency.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795