scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: According to the qualitative performance analyses, the proposed security protocol provides effectiveness in terms of authentication security, attacking node detection, and replay attack resilience when compared to the conventional method.
Abstract: Due to the resource limitations of sensor nodes, providing a security protocol is a particular challenge in sensor networks. One popular method is the neighborhood-based key agreement protocol (NEKAP). NEKAP is an efficient and lightweight protocol, but it includes loopholes through which adversaries may launch replay attacks by successfully masquerading as legitimate nodes. In this paper, we present a modified security protocol for wireless sensor networks. We provide four types of keys for each node, which adapt to different security requirements; and an improvement is made to alleviate the replay attack. According to our qualitative performance analyses, the proposed security protocol provides effectiveness in terms of authentication security, attacking node detection, and replay attack resilience when compared to the conventional method.
Book ChapterDOI
01 Jan 2019
TL;DR: The aim of this paper is to provide efficient key distribution and mutual authentication mechanism using MNSOR (Modified Needham–Schroeder and Otway Rees), between cloud service user and cloud service provider to ensure timelines of interaction without clock synchronization.
Abstract: Cloud environment recent appearance radically amended the opinion regarding infrastructure, software delivery, architectures and development models. Cloud environment provides a number of services, and for which many computing environments exist on a single platform for different applications and services with the use of insecure communication channels. By keeping strike about the security issues in consideration, every cloud user is looking for strong authentic public key distribution and mutual authentication in cloud environment. The aim of this paper is to provide efficient key distribution and mutual authentication mechanism using MNSOR (Modified Needham–Schroeder and Otway Rees), between cloud service user and cloud service provider to ensure timelines of interaction without clock synchronization, man-in-the-middle attack protection and responsibility of key obtaining from trusted third-party shift from cloud service user to cloud service provider end.
Journal ArticleDOI
TL;DR: A brand new authentication protocol to ensure secure message transmission and reduce computation overload is proposed, catering to the aim of decreasing management burden for the key distribution center and expediting the validation process efficiently.
Abstract: To guarantee stable convenience and feasibility of the widely applied wireless network, the handover technique is playing an important role nowadays to meet the epidemic mobile device usage. As is known, the wireless network authentication protocol can decide security for whole operating scheme and help protect rights of legal users, while there are still some flaws that prevent entire architecture from working favorably. Considering such flaws including computation overload as well as the key management burden, we propose a brand new authentication protocol to ensure secure message transmission and reduce computation overload. The proposed mechanism can be used both in the intra-domain and inter-domain, catering to the aim of decreasing management burden for the key distribution center and expediting the validation process efficiently. Furthermore, we provide the formal security analysis of BAN logic to demonstrate the applicability of the protocol.
Journal ArticleDOI
TL;DR: From the analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication.
Abstract: Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.
Ren Xuping1, Xuping Ren1, Haiping Zhang, Yunfa Li, Xindong You 
01 Jan 2014
TL;DR: The analysis shows that the proposed scalable authentication protocol need less computation requirement and memory with acceptable communication overload and is reliable and more scalable in RFID-based sensor systems.
Abstract: Because of vast highly sensitive business information within RFID system, there is an urgent need for an effective and secure protocol to ensure the interests of various stakeholders. In this paper, we propose a scalable authentication protocol to provide classification protection. GNY logic formal approach is used to verify the design correctness of the protocol. The performance is evaluated and compared with other related protocols in three aspects: storage, computation requirement and communication overload. The analysis shows that the proposed protocol need less computation requirement and memory with acceptable communication overload. The conclusion indicates that the protocol is reliable and more scalable in RFID-based sensor systems.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795