Topic
Otway–Rees protocol
About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: To validate the improved version of the protocol a technique of formal modeling and verification is used by the utilization of established Model Checker I-SPIN and PROMELA language for validation of Trusted Optimized link state Protocol (TOLSR).
Abstract: An ad hoc network is a momentary network set up by the self-managed nodes that operate and communicate randomly with or without a little support of a network infrastructure. Due to security vulnerabilities ad hoc networks are defenseless against attacks of malicious nodes as the nodes in these networks are not secured by firewalls. In order to enhance the security of conventional OLSR Protocol trust is incorporated as additional security measure in the functioning of the protocol. To validate the improved version of the protocol a technique of formal modeling and verification is used by the utilization of established Model Checker I-SPIN and PROMELA language for validation of Trusted Optimized link state Protocol (TOLSR).
••
28 Nov 2015
TL;DR: A random number and hash function based RFID bi-directional authentication protocol that can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack is proposed.
Abstract: On the basis of the analysis of commonly used RFID authentication protocols' shortcomings, this paper proposes a random number and hash function based RFID bi-directional authentication protocol. This protocol can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack.
••
01 Dec 2014TL;DR: An experimentation on assessing security of a well-established biometric authentication protocol using the gold standard in software reliability, which identifies security vulnerabilities in a system but also pinpoints those vulnerabilities at real risk to optimize resource allocation.
Abstract: Biometric sensor/actuators communicating via wireless body area networks has surged wide applications. From seamless healthcare to driverless transportation, biologically inspired systems benefit with productivity growth, energy efficiency, user convenience, and cost reduction. However, their invasive nature raises concerns. Security becomes the urgent task to realize biologically-enabled systems. Biological phenomena, nevertheless, can also play a vital role to secure software. Recently, several biometric authentication protocols have emerged to verify endpoints, promising one-time key for premium security. In spite of bio-enabled security advances, lack of security analysis theories and tools causes uncertainty of their safety.
This paper pioneers an experimentation on assessing security of a well-established biometric authentication protocol. Using the gold standard in software reliability, the work exploits the attack surface leveraging path analysis. The test not only identifies security vulnerabilities in a system but also pinpoints those vulnerabilities at real risk to optimize resource allocation. The automated holistic examination of the authentication process reveals a weakness in the biometric authentication protocol at study. The attack map directs its improvement validated with reexamination. The work also studies the computational complexity of the protocol, thereby, recommends the key length suitable to biometric authentication for wireless body area networks.
••
••
31 Jul 2006TL;DR: It is shown that two n-party key agreement protocols based on multi-linear forms are completely insecure, being vulnerable to impersonation attacks.
Abstract: Lee et al. recently presented a collection of n + 1 different n-party key agreement protocols based on multi-linear forms. Here we show that n − 2 of the protocols are completely insecure, being vulnerable to impersonation attacks.