scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Patent
19 Dec 2012
TL;DR: In this article, the authors present an authentication protocol for secure data on an electronic device with a memory (MEM) for storing a secure data (DS) and a communication unit for enabling communication with a reader (1) for application of authentication protocol.
Abstract: The device (102) has a memory (MEM) for storing a secure data (DS) i.e. biometric data, and a communication unit for enabling communication with a reader (1) for application of an authentication protocol e.g. VAT protocol, and another authentication protocol e.g. PACE protocol. Each of the authentication protocol is operable and able to reach the secure data. A blocking unit is arranged to block the former protocol without blocking the latter protocol on reception of information. An error message is sent to the reader if the former protocol is blocked. An independent claim is also included for a process for securing an electronic device.
Proceedings ArticleDOI
27 May 2011
TL;DR: This paper formally analyzes the WMEN authenticated key agreement scheme SKE using protocol composition logic (PCL) and detects interleaving attack exists in the protocol and shows that the new scheme is identity-authenticated, key-secretive and forward-secure and can defense the interleaves attack effectively.
Abstract: This paper formally analyzes the WMEN authenticated key agreement scheme SKE using protocol composition logic (PCL) and detects interleaving attack exists in the protocol. According to identity-based key agreement, a novel WMEN security authenticated and key agreement protocol is deduced based on the protocol derivation system (PDS). Modular correctness and security of the novel protocol are proved by protocol composition logic (PCL). At the same time, the new scheme is analyzed and compared with the original scheme. Experiments show that the new scheme is identity-authenticated, key-secretive and forward-secure. Besides, it can defense the interleaving attack effectively.
Book ChapterDOI
24 Sep 2014
TL;DR: By analyzing the differential property on \(Z_{2^{k-1}\), it is shown that the protocol is resistant to the man-in-the-middle attack and the performance analysis shows the protocol meets the demands of the large-scale RFID systems.
Abstract: HB+ family protocols that based on LPN problem are effective and well suited for the Internet of Things. However, the HB+ family protocols have vulnerability on the man-in-the-middle attack. In this paper, we propose a new privacy preserving RFID authentication protocol based on the multiplication on \(Z_{2^k-1}\). By analyzing the differential property on \(Z_{2^{k}-1}\), we show that the protocol is resistant to the man-in-the-middle attack. Moreover, the performance analysis shows the protocol meets the demands of the large-scale RFID systems.
Book ChapterDOI
14 Sep 2016
TL;DR: This paper proposes a three factor based mutual authentication protocol using smart card in distributed networks, which resists all possible attacks and is suitable for hand held devices due to the low computational and communicational cost.
Abstract: In distributed networks, one major security drawback is to identify the legitimate remote users of a web service on the Internet. To eliminate this security problem, many researchers have been proposed smart card based remote user authentication for secure communication in wireless networks. The wireless networks mostly use password based protocols that are based on two factors-smart card and PIN. But, this type of authentication protocols are susceptible to password guessing attack, stolen verifier attack, replay attack etc. In this paper, we propose a three factor based mutual authentication protocol using smart card in distributed networks, which resists all possible attacks. This protocol is suitable for hand held devices due to the low computational and communicational cost.
Proceedings ArticleDOI
19 Jun 2007
TL;DR: This paper introduces the PN formation protocol (PFP), an imprinting protocol that is extensible to three parties and considers the use of imprinting through an out-of-band channel performed by the user itself in the bipartite and tripartite versions of the protocol.
Abstract: Trust establishment in pervasive environments, where distributed and resource-limited devices need to establish secure connections, has triggered much effort in the last years. One way to bring trust into a personal network (PN) is the use of imprinting, which consists in an agreement on a shared secret without any prior knowledge, giving expression to the trust relationship that links a pair of devices. In this paper, we introduce the PN formation protocol (PFP), an imprinting protocol that is extensible to three parties. We considered the use of imprinting through an out-of-band channel performed by the user itself in the bipartite version and an autonomic and collaborative one in the tripartite version of the protocol. We describe its implementation, test results as well as the proof of its security goals through an automatic protocol analyzer.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795