scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
01 Aug 2016
TL;DR: By combining with CAN data compression algorithm, it is shown that the efficiency of the proposed algorithm can be significantly increased and the results indicate that the proposed security protocol is suitable for use in real-time in-vehicle system.
Abstract: Controller area network (CAN) is the most extensively used embedded network protocol in vehicles. However, CAN is vulnerable to malicious security attacks as it enables unauthorized access in a relatively straightforward manner. In the last ten years, security attacks in vehicles have been increasing and reported in several documents. In this paper, we propose a security protocol for CAN system based on AES-128 encryption and HMAC function. In addition, by combining with CAN data compression algorithm, it is shown that the efficiency of the proposed algorithm can be significantly increased. We simulate the proposed security protocol using the CANoe software. The CAN bus load is measured using CANcaseXL device. Experimental results show that the average message delay with 20 ECUs is within 0.13ms and the bus load can be reduced by 18.41% using the proposed security protocol compared with the uncompressed message. Our results indicate that the proposed security protocol is suitable for use in real-time in-vehicle system.

18 citations

Proceedings ArticleDOI
27 Sep 2004
TL;DR: This paper addresses the authentication problem and proposes an efficient authentication protocol to let 3G subscribers can connect WLAN with higher data rate and can withstand guessing, replay and impersonation attacks.
Abstract: Cellular (3G or 2.5G) networks provide wider service areas and ubiquitous connectivity with low data rates. WLAN networks offer higher data rates and the easy compatibility of wired Internet, but cover smaller areas. 3G and WLAN possess complementary properties. Integrating 3G and WLAN networks may offer subscribers high-speed wireless data services and ubiquitous connectivity. For integrating two different networks, there are several problems should be concerned, such as authentication, billing, quality of service, and seamless roaming between 3G and WLAN networks. In this paper, we address the authentication problem and propose an efficient authentication protocol to let 3G subscribers can connect WLAN with higher data rate. Certainly, the protocol is also suitable for 2.5G. The authentication protocol utilizes a one-time password approach to authenticate subscribers. It can withstand guessing, replay and impersonation attacks. A simulation result is given to validate our protocol.

18 citations

Proceedings ArticleDOI
26 Apr 2007
TL;DR: The proposed protocol achieves faster re- authentication by locally performing the authentication procedure and a new keying framework is introduced to minimize authentication delays during re-authentication and handover operations.
Abstract: Many advantages are attained by integrating 3G and WLAN systems to form a 3G-WLAN interworking architecture. However, securing the architecture is a great challenge because of the number of vulnerabilities introduced. EAP-AKA is the authentication solution adopted by the 3GPP to secure accesses to 3G-WLAN architectures. Two types of EAP-AKA authentication are available, full authentication and fast re-authentication. This paper presents a localized fast re-authentication protocol to substitute the standard fast re-authentication protocol. The proposed protocol achieves faster re- authentication by locally performing the authentication procedure. A new keying framework is introduced to minimize authentication delays during re-authentication and handover operations.

18 citations

Journal ArticleDOI
TL;DR: This investigation provides a solution of authentication techniques for GLOMONET in order to prevent this weakness from happening and presents a secure authentication protocol for roaming services.
Abstract: Numerous authentication approaches have been proposed recently for the global mobility network (GLOMONET), which provides mobile users with global roaming services. In these authentication schemes, the home network operators can easily obtain the authentication key and wiretap the confidentiality between the roaming user and the visited network. This investigation provides a solution of authentication techniques for GLOMONET in order to prevent this weakness from happening and presents a secure authentication protocol for roaming services. In addition, a round-efficient version of the same authentication protocol is presented. Comparing with other related approaches, the proposed authentication protocol involves fewer messages and rounds in communication.

18 citations

Patent
08 May 2007
TL;DR: In this article, a protocol is provided for communicating data between two applications by associating an extensible markup language (XML) document with a data envelope and sending the data envelope to a disparate application.
Abstract: A protocol is provided for communicating data between two applications. The protocol can support communication of an extensible markup language (XML) document over hypertext transfer protocol (HTTP) by associating the XML document with a data envelope and sending the data envelope to a disparate application. The data envelope can comprise a header, which can specify supported compression methods, encryption keys, and/or data specific to the disparate application and/or the sending application. The protocol adds a layer of security to the communication and can prevent malicious requests and other attacks. This protocol can also be used in conjunction with a health integration network.

18 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795