scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Patent
06 Jul 2001
TL;DR: In this article, a method and system for using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed is described, where the session encryption key is used for encrypting communication traffic, providing a solution to the potential communication traffic replay threat.
Abstract: A method and system for using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed is described. In one embodiment, the primary authentication protocol comprises a strong, secure, computationally complex authentication protocol. Moreover, the secondary authentication protocol comprises a less complex (compared to the primary authentication protocol) and less secure (compared to the primary authentication protocol) authentication protocol which can be performed in a length of time that is shorter than a length of time required to perform the primary authentication protocol. In an embodiment, the key lease includes context information. Moreover, a new session encryption key is computed after each time a quick re-authentication is performed by executing the secondary authentication protocol using the key lease, whereas the session encryption key is used for encrypting communication traffic, providing a solution to the potential communication traffic replay threat.

26 citations

01 Jan 2006
TL;DR: This paper presents a generic security solution based on packet level authentication that can be used for authentication, access control, firewall applications, denial-of-service prevention, and so on and briefly describes the prototype implementation.
Abstract: Some of the worst problems in heterogeneous military networks are related to security. Several solutions have been proposed to ensure that the network is able to perform its tasks, namely to transport the right packets to the right place at the right time, however, the solutions have typically been tailored to specific protocols or made assumptions that are not realistic. In this paper, we present a generic security solution based on packet level authentication and briefly describe our prototype implementation. The architecture can be used for authentication, access control, firewall applications, denial-of-service prevention, and so on. It also secures all routing protocols.

26 citations

Posted Content
TL;DR: A new security 2-AK protocol is presented, which is more secure and more efficient than previously proposed ones and compared with others in terms of computational cost and security properties.
Abstract: We first present a new security 2-AK protocol, which is more secure and more efficient than previously proposed ones. Meanwhile, we point that Xie's ID-2-AK protocol modified from McCullagh-Barreto in CT-RSA 2005 doesn't provide protection against KCI attack likewise, and finally utilize the modular arithmetic, first proposed in MQV and also used in Kim, to get a modified new ID-2-AK protocol. On second thoughts, we give another ID-2-AK protocol utilizing the operation of addition in finite field like our forenamed 2-AK protocol . The two ID-2-AK protocols are in possession of all the desired security attributes. We also compare our new protocols with others in terms of computational cost and security properties.

26 citations

Journal Article
TL;DR: A number of attacks on published and/or widely used protocols that are not feasible against the protocol running in isolation but become feasible in some application environments are demonstrated.
Abstract: Most work on requirements in the area of authentication protocols has concentrated on identifying requirements for the protocol without much consideration of context. Little work has concentrated on assumptions about the environment, for example, the applications that make use of authenticated keys. We will show in this paper how the interaction between a protocol and its environment can have a major effect on a protocol. Specifically we will demonstrate a number of attacks on published and/or widely used protocols that are not feasible against the protocol running in isolation (even with multiple runs) but become feasible in some application environments. We will also discuss the tradeoff between putting constraints on a protocol and putting constraints on the environment in which it operates.

26 citations

Journal ArticleDOI
TL;DR: The authors propose a distributed key array authentication protocol (KAAP) that provides classified security protection and indicates that the protocol is reliable and scalable in advanced RFID-based sensor systems.
Abstract: Radio frequency identification (RFID)-based sensor systems are emerging as a new generation of wireless sensor networks by inherently integrating identification, sensing, communications and computation capabilities. Security and privacy are critical issues in dealing with a large amount of sensed data. In the study, the authors propose a distributed key array authentication protocol (KAAP) that provides classified security protection. KAAP is synthetically analysed in three aspects: logic, security and performance. The logic analysis includes messages formalisation, initial assumptions and anticipant goals based on GNY Logic formal method to verify the design correctness of the protocol. The security analysis with respect to confidentiality, integrity, authentication, anonymity and availability is performed via the simulated attacks, which involves supposing the attacker's identity, simulating the attacker's authentication process and creating compromised conditions. Such analysis ensures that the protocol has an ability to resist both external attacks (spoofing, replay, tracking and Denial of Service) and internal forgery attacks. Additionally, the performance is evaluated and compared with other related protocols to show that KAAP can improve the reliability and efficiency of sensor systems with insignificantly increased complexity. The result indicates that the protocol is reliable and scalable in advanced RFID-based sensor systems.

26 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795