scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
08 Aug 2012
TL;DR: Probe-I (sensor network Protocol behavior Inspector), a novel tool to obtain, visualize, and verify the behaviors of WSN protocols after their field deployments, shows that it can substantially facilitate WSN protocol verification.
Abstract: Wireless communication protocols are centric to Wireless Sensor Network (WSN) applications. However, WSN protocols are prune to defects, even after their field deployments. A convenient tool that can facilitate the detection of post-deployment protocol defects is of great importance to WSN practitioners. This paper presents Probe-I (sensor network Protocol behavior Inspector), a novel tool to obtain, visualize, and verify the behaviors of WSN protocols after their field deployments. Probe-I collects the protocol behaviors in a non-intrusive manner, i.e., via passively listening to the packet exchanges in the target network. Then with a role-oriented behavior modeling approach, Probe-I models the protocol behaviors node by node based on the sniffed packets, which well reflects how the target protocol performs in each node. This allows the WSN practitioners to readily see if the target protocol behaves as intended by simply verifying the correctness of the behavior metrics in a simple, baseline test. Finally, the verified metrics allow Probe-I to automatically check the protocol behaviors from time to time during the network lifetime. The suggested behavior discrepancy can unveil potential protocol defects. We apply Probe-I to verify two WSN data collection protocols, and find their design defects. It shows that Probe-I can substantially facilitate WSN protocol verification.
Proceedings ArticleDOI
01 Jan 2017
TL;DR: This research has presented a new handshake scheme in the Data Forwarding Phase (DFP) of the RAEED protocol which is proved to be more resilient towards DoS attacks such as black hole attacks, sink hole attacks etc.
Abstract: Wireless and Ad-Hoc networks are affected by Denial of Service (DoS) attacks during data routing. Different protocols have different degree of resilience to DoS attacks. In our earlier research we have discussed weaknesses in existing routing protocols used in wireless and ad hoc networks. As a solution we presented the RAEED protocol. In this research, we have presented a new handshake scheme in the Data Forwarding Phase (DFP) of the RAEED protocol. The new protocol RAEED-NEHA is proved to be more resilient towards DoS attacks such as black hole attacks, sink hole attacks etc. The proof is established using the methodology introduced in our earlier research which is a combination of formal verification, computer aided simulation and observance of response of the protocol running on MicaZ motes.
Book ChapterDOI
TL;DR: Lee et al. as mentioned in this paper proposed a secure and efficient three-factor authentication protocol for wireless sensor networks based on a honey list and claimed that their protocol can withstand various attacks, however, this paper still proves that Lee et al.'s protocol is insecure against known session-specific temporary information exposure attacks.
Abstract: AbstractIn 2020, Lee et al. Proposed a secure and efficient three-factor authentication protocol for wireless sensor networks based on a honey list. They claim that their protocol can withstand various attacks. However, this paper still proves that Lee et al. protocol is insecure against known session-specific temporary information exposure attacks.
Patent
12 Aug 2008
TL;DR: In this article, a new registration and authentication protocol for between a Mobile Node and a Home Agent is proposed, which uses a novel messaging sequence to request registration, authentication and authorization of the Mobile Node when it is located on a foreign network.
Abstract: The invention consists of a new registration and authentication protocol for between a Mobile Node and a Home Agent. The new protocol uses a novel messaging sequence to request registration, authentication and authorization of the Mobile Node when it is located on a foreign network, and the novel protocol will avoid some of the standard registration and authentication protocol messages in order to eliminate the problems associated with re-transmission errors.
Journal Article
TL;DR: An improved RSA-based remote user two-factor authentication protocol is put forward and formally proved secure under the RSA assumption in the random oracle model and is the first one that can achieve provable security while keeping the merit of high performance.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795