Title
Formal Verification Of 802.11I Using Strand Space Formalism
Abstract
Despite an appealing desire to shift from wired to wireless domain and substantial deployment of wireless applications, wireless security is still a stumbling block. As a remedy, IEEE has designed a new protocol, 802.11i, for wireless local area networks addressing security issues. Formal analysis is important to ensure that protocols work properly without having to resort to tedious testing and debugging which can only show the presence of errors, never their absence. We analyze the protocol model for 802.11i in a formal setting. We translate the 802.11i protocol into Strand Space Model for protocol verification. We prove the authentication property of the resulting model using the Strand Space formalism. The Intruder is imbued with powerful capabilities and repercussion to possible attacks are evaluated. Our analysis proves that authentication is not compromised in the presented model. © 2006 IEEE.
Publication Date
11-17-2006
Publication Title
Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies,ICN/ICONS/MCL'06
Volume
2006
Number of Pages
-
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/ICNICONSMCL.2006.101
Copyright Status
Unknown
Socpus ID
33750932000 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/33750932000
STARS Citation
Furqan, Zeeshan; Muhammad, Shahabuddin; and Guha, Ratan K., "Formal Verification Of 802.11I Using Strand Space Formalism" (2006). Scopus Export 2000s. 8139.
https://stars.library.ucf.edu/scopus2000/8139