Show simple item record

dc.contributor.convenorIan Gortonen_AU
dc.contributor.authorSithirasenan, Elankayeren_US
dc.contributor.authorZafar, Saaden_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.editorJun Han, Mark Staplesen_US
dc.date.accessioned2017-05-03T13:58:37Z
dc.date.available2017-05-03T13:58:37Z
dc.date.issued2006en_US
dc.date.modified2011-04-28T07:06:26Z
dc.identifier.refurihttp://www.aswec.orgen_AU
dc.identifier.doi10.1109/ASWEC.2006.29en_AU
dc.identifier.urihttp://hdl.handle.net/10072/11509
dc.description.abstractWith the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security protocol, the IEEE 802.11i assures rigid security for wireless networks with the support of IEEE 802.1X protocol for authentication, authorization and key distribution. In this study we investigate the integrity of the security model developed by us based on 802.11i Robust Security Mechanism (RSN), strengthening our desire towards establishing a secure wireless network environment. We have used the Symbolic Analysis Laboratory (SAL) tools to formally verify the Behavior Tree models. This paper presents the several Linear Temporal Logic (LTL) formulas established to prove the credibility of our model. We also discuss probable software issues that could arise during implementation. By examining all possible execution traces of the security protocol we have proved our implementation model to be complete and consistent.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent249346 bytes
dc.format.extent39481 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherIEEE Computer Societyen_US
dc.publisher.placePiscataway, NJ, USAen_US
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencename2006 Australian Software Engineering Conferenceen_US
dc.relation.ispartofconferencetitleProceedings of 2006 Australian Software Engineering Conferenceen_US
dc.relation.ispartofdatefrom2006-04-18en_US
dc.relation.ispartofdateto2006-04-21en_US
dc.relation.ispartoflocationSydney, Australiaen_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchcode289999en_US
dc.titleFormal Verification of the IEEE 802.11i WLAN Security Protocolen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.rights.copyrightCopyright 2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_AU
gro.date.issued2006
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record