scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
01 Nov 2022
TL;DR: In this paper , a secure access protocol based on Chip ID, access software and Locking SIB (LSIB) has been proposed to improve the security of the IJTAG network.
Abstract: The modern-day SoCs have various instruments and proprietary data embedded on chip for test, diagnosis, post-silicon debug, in-field health monitoring, authentication, counterfeit detection, etc. The testing infrastructure such as IEEE Std. 1687 (IJTAG) is incorporated into the ICs for flexible access to these on-chip instruments. However, this standard can be illegitimately used by malicious users for instigating side-channel attacks. In order to improve the security of the IJTAG network, a secure access protocol based on Chip ID, access software and Locking SIB (LSIB) has been proposed. Although this protocol elevates the security of the IJTAG network, in recent works, it has been shown that the secure access protocol is vulnerable to machine learning attack and differential analysis attack. In this work, a new secure access protocol is proposed which is built over the existing secure access protocol. The proposed protocol uses multiple templates which are selected randomly for embedding the key bits. It is shown that the proposed protocol can mitigate the efficacy of machine learning attack and differential analysis attack significantly. Moreover, it is simple to implement and incurs a marginal overhead in terms of area.
Proceedings ArticleDOI
01 Nov 2016
TL;DR: A novel lightweight low power mutual authentication protocol is proposed in this paper which is based on a multi-function circuit and can be used to manufacture tags in a very cost effective way.
Abstract: In any wireless communication system, it is the need of the hour that the sender and the receiver should prove their genuineness. In any portable security systems based on RFIDs, a process called mutual authentication need to be performed before the confidential communication between a tag and reader starts. A novel lightweight low power mutual authentication protocol is proposed in this paper which is based on a multi-function circuit. The proposed protocol is a less complex circuit with low power dissipation compared to the earlier and existing mutual authentication protocols. It also provides a higher level of security. The proposed protocol is described using Verilog HDL. It is simulated using Altera Quartus II software. Also the functional block in the proposed mutual authentication scheme is implemented using Altera DE2 FPGA kit. The proposed protocol can be used to manufacture tags in a very cost effective way.
15 Sep 2005
TL;DR: This paper proposes a new routing protocol which it is called as BT_AODV protocol, which makes use of Blacklist table method to isolate the malicious node from the network and alleviates the effects of DOS attacks.
Abstract: In this paper we analyze attacks that deny channel access by causing pockets of congestion in mobile networks Such attacks would essentially prevent one or more nodes from accessing or providing specific services Here we focus on the properties of the most commonly used routing protocol, the AODV, which enables such attacks We propose a new routing protocol which we call as BT_AODV protocol to mitigate these DOS attacks We make use of Blacklist table method to isolate the malicious node from the network The malicious node is circumvented at various stages of the routing protocol In this method the intruder's node is denied all the services provided by the network Our analysis and simulation show that providing BT_ AODV protocol with blacklist table method alleviates the effects of such attacks
Journal ArticleDOI
TL;DR: The Consistent History Protocol introduces a registry of certified operations from which it descends the authentication and the consequent proof of identity, which results negligible with respect a classical strong authentication method built around the OpenSSL library.
Abstract: Traditional strong authentication systems rely on a certification chain to delegate the authority of trusting an intermediate end. However, in some practical life scenarios a relayed authentication is not accepted and thus it would be advisable a straight proof of trustiness with a direct interaction with the involved party. Our protocol introduces a registry of certified operations from which it descends the authentication and the consequent proof of identity. Despite the fact that such system requires for registrar initialization, the Consistent History Protocol provides a reasonable degree of reliability in identifying subjects at the steady state. As application, we deployed the protocol in the indirect electronic data collection scenario, where large data flows have to be exchanged and certified among a set of mutually trusted Institutions. The experimental results report the processing overhead introduced by the authentication protocol, which results negligible with respect a classical strong authentication method built around the OpenSSL library.
Journal ArticleDOI
TL;DR: The results show that, the proposed protocol have better performance than the existing secure protocols for cluster-based wireless sensor networks, in terms of security overhead and energy consumption.
Abstract: Efficient data transmission is an issue for wireless sensor networks. Efficient means providing security for data transmission and providing efficiency in data transmission for cluster based wireless sensor networks. Clustering is an effective way to enhance the system performance of wireless sensor networks. In this, the clusters are formed dynamically and periodically. The Identity based digital signature protocol is introduced in order to provide reliable data transmission for cluster-based wireless sensor networks. The Identity based digital signature protocol relies on the hardness of the Diffie- Hellman problem to provide security and also, identity based online-offline signature protocol introduced in order to avoid the security overhead in the identity based signature, identity based online-offline signature reduces the computational overhead of the protocol using discrete logarithm problem. This paper includes the feasibility of the protocol with respect to security requirements and security analysis over several attacks and deal with orphan node problem. The calculations and simulations are provided to illustrate the efficiency of the proposed protocol. The results show that, the proposed protocol have better performance than the existing secure protocols for cluster-based wireless sensor networks, in terms of security overhead and energy consumption.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795