scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
10 Nov 2016
TL;DR: This paper proposes an efficient trust-ticket based authentication protocol for multi-domain applications in WSNs and demonstrates the robustness of the protocol against some well known attacks.
Abstract: With the increasing popularity of Wireless Sensor Networks (WSNs) in versatile domains demand crucial security concerns. Secure communication mechanisms in WSNs have been widely deployed to ensure confidentiality, authenticity and integrity of exchanging data. The authentication issue related to such networks has become a crucial service because the nodes are typically deployed in an unattended environment leaving them open to attack. Moreover, this is due to the resource-constrained nature of the sensor nodes, which are limited in computing power, data storage and communication capabilities. Any authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we propose an efficient trust-ticket based authentication protocol for multi-domain applications in WSNs. Through the security analysis, we demonstrate the robustness of our protocol against some well known attacks. Moreover, we perform an overall evaluation of our protocol through simulations in function of the network size, where we consider two scenarios according to the trusted authority number. The simulation results highlight the advantages of our protocol in terms of energy consumption.
Journal ArticleDOI
TL;DR: A multiple security authentication protocol is proposed to overcome the disadvantage of being vulnerable to cyber attacks and shows that this approach is of good security and privacy, low cost, and high efficiency.
Abstract: Weak security of RFID system is concerned by more and more people because of the fast development of internet of things. Some existing RFID authentications protocols begin to be analyzed, such as Mutual three-pass authentication, randomized Hash-Lock, which has some problem of being difficult to resist a variety of network attacks such as forgery tag attacks and a new bidirectional security authentication protocol,A multiple security authentication protocol is proposed to overcome the disadvantage of being vulnerable to cyber attacks. Analysis shows that this approach is of good security and privacy, low cost, and high efficiency.
Proceedings ArticleDOI
05 Sep 2004
TL;DR: A new energy saving routing algorithm is discussed, which uses cache based routing and also incorporates interferenceJailed communication and levels of security.
Abstract: Minimizing energy consumption is important for prolonging the life of battery powered sensor nodes. A major portion of the power consumption is spent in communication with other nodes. In this paper we discuss a new energy saving routing algorithm, which uses cache based routing and also incorporates interferenceJailed communication and levels of security.
Journal ArticleDOI
TL;DR: A new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP is proposed, which is not only has the same security properties as the original protocol, but also avoids the weakness in the original Protocol.
Abstract: In this paper, we propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the user identity privacy, mutual authentication, nonrepudiation. This study also presents an enhanced protocol, which is not only has the same security properties as the original protocol, but also avoids the weakness in the original protocol. Therefore this scheme enjoys both computational and communicational efficiency.
Posted Content
TL;DR: This paper proves the impossibility of secret key transportation from a principal to another entity in a network by using the three pass protocol over public Abelian groups.
Abstract: Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The three-pass protocol is a key transport protocol developed by Adi Shamir in 1980 where Alice wants to transport a secret message to Bob over an insecure channel, and they do not have any pre-shared secret information. In this paper, we prove the impossibility of secret key transportation from a principal to another entity in a network by using the three pass protocol over public Abelian groups. If it were possible to employ public Abelian groups to implement the three-pass protocol, we could use it in post-quantum cryptography for transporting keys providing information theoretic security without relying on any computationally difficult problem.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795