scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
21 Apr 2008
TL;DR: The proposed protocol is a dynamic ID-based mutual authentication protocol designed to meet requirements of both indistinguishability and forward security by ensuring the unlinkability of tag responses among sessions.
Abstract: The recently proposed Radio Frequency Identification (RFID) authentication protocol based on a hashing function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag. In this study we classify the RFID authentication protocol into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses and the previous protocols in the static/dynamic ID-based perspectives. Also, we define four security requirements that must be considered in designing the RFID authentication protocol including mutual authentication, confidentiality, indistinguishability and forward security. Based on these requirements, we suggest a secure and efficient mutual authentication protocol. The proposed protocol is a dynamic ID-based mutual authentication protocol designed to meet requirements of both indistinguishability and forward security by ensuring the unlinkability of tag responses among sessions. Thus, the protocol can provide more strengthened user privacy compared to previous protocols and recognizes a tag efficiently in terms of the operation quantity of tags and database.

31 citations

Patent
07 Jul 2011
TL;DR: In this article, the authors present a tool that converts the definition of a protocol to executable form, such as computer source code, and also applies reverse-engineering countermeasures to the protocol definition as expressed in source code.
Abstract: In the field of computer science, communications protocols (such as computer network protocols) are hardened (secured) against reverse engineering attacks by hackers using a software tool which is applied to a high level definition of the protocol. The tool converts the definition to executable form, such as computer source code, and also applies reverse-engineering countermeasures to the protocol definition as now expressed in source code, to prevent hackers from recovering useful details of the protocol. This conversion process also allows preservation of backwards version compatibility of the protocol definition.

31 citations

Proceedings ArticleDOI
24 May 2006
TL;DR: This paper presents the design of secure-SPIN, a secure extension for the SPIN protocol, and shows that this secure protocol may increase the data communication security in wireless sensor networks.
Abstract: Many routing protocols have been proposed for sensor network, but most of them have not designed with security as a goal. Sensor protocol for information via negotiation (SPIN) protocol is a basic data centric routing protocol of sensor networks. In this paper, we present the design of secure-SPIN, a secure extension for the SPIN protocol. We divide secure-SPIN into three phases and use some cryptographic functions that require small memory and processing power to create an efficient, practical protocol. Then we give security analyses of this protocol. It shows that this secure protocol may increase the data communication security in wireless sensor networks.

30 citations

Proceedings ArticleDOI
06 Aug 2008
TL;DR: A hybrid approach of nonce and timestamp has been proposed to prevent the authorization protocol from such attacks and existing solutions for providing security along with enhanced proposed security solution for mentioned attacks are described.
Abstract: Security is highly critical in wireless communication, as wireless media is vulnerable to attacks. Mobile WiMAX is a new standard and it opens new horizons for security researchers. In this paper, authorization protocol for both versions of PKM in WiMAX has been analyzed. Possible attacks are also considered including interleaving, replay and suppress replay attack and a methodology is presented to prevent these attacks. It also describes WiMAX architecture, privacy and key management (PKM) protocols, their shortcomings and existing solutions for providing security along with enhanced proposed security solution for mentioned attacks. Existing solutions address these problems using timestamp or nonce. A hybrid approach of nonce and timestamp has been proposed to prevent the authorization protocol from such attacks.

30 citations

Book ChapterDOI
26 Mar 2011
TL;DR: This work uses the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type and proves that the enhanced protocol satisfies this property for asynchronous, unreliable, order-preserving communication whereas the original protocol does not.
Abstract: WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show that the protocol, as described in the standard specification, violates correct operation by reaching invalid states for all underlying communication media except for the perfect FIFO. Based on this result, we propose changes to the protocol. A further investigation of the modified protocol suggests that messages should be received in the same order as they are sent so that a correct protocol behaviour is preserved. Another important property of communication protocols is that all parties always reach their final states. Based on the verification with different communication models, we prove that our enhanced protocol satisfies this property for asynchronous, unreliable, order-preserving communication whereas the original protocol does not.

30 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795