scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: To validate the improved version of the protocol a technique of formal modeling and verification is used by the utilization of established Model Checker I-SPIN and PROMELA language for validation of Trusted Optimized link state Protocol (TOLSR).
Abstract: An ad hoc network is a momentary network set up by the self-managed nodes that operate and communicate randomly with or without a little support of a network infrastructure. Due to security vulnerabilities ad hoc networks are defenseless against attacks of malicious nodes as the nodes in these networks are not secured by firewalls. In order to enhance the security of conventional OLSR Protocol trust is incorporated as additional security measure in the functioning of the protocol. To validate the improved version of the protocol a technique of formal modeling and verification is used by the utilization of established Model Checker I-SPIN and PROMELA language for validation of Trusted Optimized link state Protocol (TOLSR).
Proceedings ArticleDOI
28 Nov 2015
TL;DR: A random number and hash function based RFID bi-directional authentication protocol that can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack is proposed.
Abstract: On the basis of the analysis of commonly used RFID authentication protocols' shortcomings, this paper proposes a random number and hash function based RFID bi-directional authentication protocol. This protocol can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack.
Proceedings ArticleDOI
01 Dec 2014
TL;DR: An experimentation on assessing security of a well-established biometric authentication protocol using the gold standard in software reliability, which identifies security vulnerabilities in a system but also pinpoints those vulnerabilities at real risk to optimize resource allocation.
Abstract: Biometric sensor/actuators communicating via wireless body area networks has surged wide applications. From seamless healthcare to driverless transportation, biologically inspired systems benefit with productivity growth, energy efficiency, user convenience, and cost reduction. However, their invasive nature raises concerns. Security becomes the urgent task to realize biologically-enabled systems. Biological phenomena, nevertheless, can also play a vital role to secure software. Recently, several biometric authentication protocols have emerged to verify endpoints, promising one-time key for premium security. In spite of bio-enabled security advances, lack of security analysis theories and tools causes uncertainty of their safety. This paper pioneers an experimentation on assessing security of a well-established biometric authentication protocol. Using the gold standard in software reliability, the work exploits the attack surface leveraging path analysis. The test not only identifies security vulnerabilities in a system but also pinpoints those vulnerabilities at real risk to optimize resource allocation. The automated holistic examination of the authentication process reveals a weakness in the biometric authentication protocol at study. The attack map directs its improvement validated with reexamination. The work also studies the computational complexity of the protocol, thereby, recommends the key length suitable to biometric authentication for wireless body area networks.
Journal ArticleDOI
31 Jul 2006
TL;DR: It is shown that two n-party key agreement protocols based on multi-linear forms are completely insecure, being vulnerable to impersonation attacks.
Abstract: Lee et al. recently presented a collection of n + 1 different n-party key agreement protocols based on multi-linear forms. Here we show that n − 2 of the protocols are completely insecure, being vulnerable to impersonation attacks.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795