scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
Radia J. Perlman1
30 Aug 2010
TL;DR: This talk will discuss some of the lessons I've discovered about network protocol design; how to make protocols self-stabilizing,How to make networks self-configuring, how to provide optional configuration in such a way that misconfiguration does no harm, and how to design within constraints such as backward compatibility and politics.
Abstract: In this talk I will discuss some of the lessons I've discovered about network protocol design; how to make protocols self-stabilizing, how to make networks self-configuring, how to provide optional configuration in such a way that misconfiguration does no harm, and how to design within constraints such as backward compatibility and politics. I'll also talk about some of my recent work. It is confusing enough that forwarding is done at both layers 2 and 3. Why am I designing a layer 2 1/2? And having spent most of my life in the world of computer network communication protocol design, I will share my observations about ways in which communication protocols in other areas could be improved.

1 citations

Book ChapterDOI
01 Jan 2013
TL;DR: A hybrid authentication protocol that is based on Elliptic Curve Cryptography which is, actually, the suitable technique for mobile devices because of its small key size and high security.
Abstract: The growing area of lightweight devices, such as mobile cell phones, PDA conduct to the rapid growth of mobile networks, they are playing important role in everyone’s day. Mobile Networks offer unrestricted mobility and tender important services like M-business, M-Learning, where, such services need to keep security of data as a top concern. The root cause behind the eavesdroppers in these networks is the un-authentication. Designing authentication protocol for mobile networks is a challenging task, because, mobile device’s memory, processing power, bandwidths are limited and constrained. Cryptography is the important technique to identify the authenticity in mobile networks. The authentication schemes for this networks use symmetric or asymmetric mechanisms. In this paper, we propose a hybrid authentication protocol that is based on Elliptic Curve Cryptography which is, actually, the suitable technique for mobile devices because of its small key size and high security.

1 citations

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a secure and anonymous authentication protocol for wireless medical sensor networks (WMSNs), which can prevent sensor capture, guessing, and man-in-the-middle attacks.
Abstract: Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have enabled medical professionals to identify patients’ health information in real time to identify and diagnose their conditions. However, since wireless communication is performed through an open channel, an attacker can steal or manipulate the transmitted and received information. Because these attacks are directly related to the patients’ lives, it is necessary to prevent these attacks upfront by providing the security of WMSN communication. Although authentication protocols are continuously developed to establish the security of WMSN communication, they are still vulnerable to attacks. Recently, Yuanbing et al. proposed a secure authentication scheme for WMSN. They emphasized that their protocol is able to resist various attacks and can ensure mutual authentication. Unfortunately, this paper demonstrates that Yuanbing et al.’s protocol is vulnerable to smart card stolen attacks, ID/password guessing attacks, and sensor node capture attacks. In order to overcome the weaknesses and effectiveness of existing studies and to ensure secure communication and user anonymity of WMSN, we propose a secure and anonymous authentication protocol. The proposed protocol can prevent sensor capture, guessing, and man-in-the-middle attacks. To demonstrate the security of the proposed protocol, we perform various formal and informal analyses using AVISPA tools, ROR models, and BAN logic. Additionally, we compare the security aspects with related protocols to prove that the proposed protocol has excellent security. We also prove the effectiveness of our proposed protocol compared with related protocols in computation and communication costs. Our protocol has low or comparable computation and communication costs compared to related protocols. Thus, our protocol can provide services in the WMSN environment.

1 citations

Book ChapterDOI
01 Jan 2012
TL;DR: A smartcard-based user authentication protocol over home network is proposed, which provides both authentication and key agreement and is based on the similar security requirements against password guessing attack, impersonation attack, replay attack and so on.
Abstract: Recently, as home network service is popularized, the security concerns are growing up for the home network. User authentication is the first step in any cryptographic solutions. There are protocols for the user authentication including TTA’s standard EEAP-PW. However, they still have security problems. Thereby, this paper proposes a smartcard-based user authentication protocol over home network to solve the problems in the previous researches. The proposed protocol has the same purposes with the other previous researches, which provides both authentication and key agreement and is based on the similar security requirements against password guessing attack, impersonation attack, replay attack and so on.

1 citations

Xu Ke1
01 Jan 2009
TL;DR: A secure E-mail protocol is defined and proposed for the first time in this paper and shows that the scheme not only provides the basic security mechanism but also guarantees the perfect forward secrecy.
Abstract: E-mail has been an important application to transfer the data of communication on Internet.In order to securely and efficiently transfer the E-mail message,many researchers focus on the issues of providing basic encryption function for E-mail protocol or certified E-mail schemes.However,these schemes only meet part of the security requirements for a secure E-mail protocol,and fail to provide a complete solution from the view of a practical secure E-mail protocol.A secure E-mail protocol is defined and proposed for the first time in this paper.In this protocol,the message is encrypted by the short-term encryption keys which are negotiated by the Diffie-Hellman algorithm.The security analysis shows that the scheme not only provides the basic security mechanism but also guarantees the perfect forward secrecy.In addition,this protocol resolves the problems of certification,timeliness and sensitivity,which are strongly needed by a secure E-mail protocol.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795