Formal Verification of IEEE 802.11 Authentication Protocols

نویسندگان

  • K. V. Krishnam Raju
  • Valli Kumari Vatsavayi
چکیده

IEEE 802.11 is the standard designed to provide secured communication in wireless LAN. The IEEE 802.11i specification contains both WPA-PSK, WPA-GPG authentication protocols. IEEE 802.11w authentication protocol enhances the IEEE802.11i security for selected management frames. These protocols allow a wireless station to gain access to a protected wireless network managed by an access point. In this paper, a section of the protocols is chosen for modeling and verification. Communicating Sequential Process (CSP) is used for modeling and the verification is performed using CasperFDR. It can perform an exhaustive verification that can establish with mathematical certainty whether or not a given behavior is error-free and used to specify a system behavior in a formal validation model that defines interactions between the processes. We have analyzed and verified secrecy and authentication properties of the WPAPSK, WPA-GPG and IEEE802.11w authentication protocols. This paper models both IEEE802.11i and IEEE802.11w authentication protocols by formal verification and analyzes the output. A few attacks are found in these protocols. The specifications through which these attacks were found are presented. The IEEE 802.11w authentication protocol is also modified in such a way that it is strong against to the attacks performed by intruder.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Efficient authentication for fast handover in wireless mesh networks

We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh networks. The authentication server does not need to be involved in the handover authentication process. Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. Numerical analysis and...

متن کامل

Authentication Analysis of the 802.11i Protocol

IEEE has designed 802.11i protocol to address the security issues in wireless local area networks. Formal analysis is important to ensure that the protocols work properly without having to resort to tedious testing and debugging which can only show the presence of errors, never their absence. In this paper, we present the formal verification of an abstract protocol model of 802.11i. We translat...

متن کامل

A Detailed Exploration of Usability Statistics and Application Rating Based on Wireless Protocols

A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013