scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Simulation proves the protocol satisfies both authentication and identity privacy requirements, and protocol analysis indicates the protocol is easy to cooperate with role-based authorization and is safer than multi-server authentication schema.
Abstract: The paper proposes a new role-based authentication protocol, which is different from identity-based authentication model. The protocol does not disclose any unique identifier that is bound to user's identity. By verifying user's role the protocol can convince service the user is valid and his role is acceptable. Protocol can achieve the goal of authentication and meet identity privacy requirement at the same time. Protocol analysis indicates the protocol is easy to cooperate with role-based authorization and is safer than multi-server authentication schema. Simulation proves the protocol satisfies both authentication and identity privacy requirements. Protocol is safe and easy to realize. Copyright © 2010 John Wiley & Sons, Ltd.
Book ChapterDOI
TL;DR: In 2019, Yu et al. as mentioned in this paper proposed a secure, lightweight three-factors user authentication protocol named SLUA-WSA for wireless sensor networks, which can effectively prevent security threats, ensure anonymity, untraceability, and mutual authentication.
Abstract: AbstractIn 2020, Yu et al. proposed a secure, lightweight three-factors user authentication protocol named SLUA-WSA for wireless sensor networks. SLUA-WSA can effectively prevent security threats, ensure anonymity, untraceability, and mutual authentication. However, in this paper, we demonstrate that Yu et al.’s protocol is still vulnerable to known session-specific temporary information attacks.
Journal ArticleDOI
TL;DR: An authentication protocol safe against intruders’ attacks when RFID/USN technology is applied to implantable medical devices is proposed, based on hash-function operation and adopts session keys and random numbers to prevent re-encryption.
Abstract: Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers’ hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients’ medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders’ attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.
Journal Article
TL;DR: The areas of security and attacks in SIP are discussed, the authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified.
Abstract: In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.
Journal ArticleDOI
Yung Cheng Lee1
TL;DR: It is shown that the Yoon et al.
Abstract: Password authentication protocols are widely used mechanisms to authenticate identities in networks. In 2006, Yoon et al. proposed a secure password authentication protocol in wireless networks that fixed the drawback of Ma et al.’s protocol. In this article we show that the Yoon et al.’s protocol is still vulnerable to the off-line password guessing attack. We propose an improvement to solve the problem. The improvement protocol is secure while the computation cost is the same with Yoon et al.’s protocol.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795