2002
DOI: 10.21236/ada462295
|View full text |Cite
|
Sign up to set email alerts
|

On Preventing Replay Attacks on Security Protocols

Abstract: Abstract-Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts to address these attacks have been largely incomplete, lacking generality and many times in fact, proven unsuccessful. In this paper we address these issues and prove the efficacy of a simple and general scheme in defending a protocol against these attacks. We believe that our work will be particularly useful in security critical applications and to protocol analyzers that are unable to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(30 citation statements)
references
References 19 publications
0
30
0
Order By: Relevance
“…How ever, we also consider the threat posed by RsM, as one of our design goals is to ensure the pseudonymity of User. The aim of our security analysis was to address common attacks on authentication protocols [20,14,32,11,6]. These attacks in clude replay, collusion,reflection, denial-of-service, and typ ing.…”
Section: Security Analysismentioning
confidence: 99%
“…How ever, we also consider the threat posed by RsM, as one of our design goals is to ensure the pseudonymity of User. The aim of our security analysis was to address common attacks on authentication protocols [20,14,32,11,6]. These attacks in clude replay, collusion,reflection, denial-of-service, and typ ing.…”
Section: Security Analysismentioning
confidence: 99%
“…Services can use location verification (see section 5) to aid in the prevention of replay and spoofing attacks. Other methods of preventing replay attacks are summarized in [30].…”
Section: Attacks and Defenses In Camsn Servicesmentioning
confidence: 99%
“…Since tags themselves will reveal information about a message to a penetrator there are several refinements of this tagging approach to minimize the set of subterms of a message that have to be tagged (e.g. [13,14]). The second area is concerned with the verification of protocols that may contain type-flaw attacks.…”
Section: Related Workmentioning
confidence: 99%