Show simple item record

dc.contributor.authorSithirasenan, Elankayeren_US
dc.contributor.authorZafar, Saaden_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.editorJyrki Joutsensaloen_US
dc.date.accessioned2017-05-03T13:58:44Z
dc.date.available2017-05-03T13:58:44Z
dc.date.issued2008en_US
dc.date.modified2012-09-06T22:11:55Z
dc.identifier.issn17971152en_US
dc.identifier.urihttp://hdl.handle.net/10072/23505
dc.description.abstractAs wireless LAN (WLAN) deployments increase, so does the challenge to provide these networks with adequate security. Business organizations, educational institutions and government co-operations are becoming more and more concerned about their e-security. The need for reliable and robust security mechanisms for WLANs is increasing. The latest WLAN security protocol IEEE 802.11i guarantees robust security with improved authentication, authorization and key distribution mechanisms. However, though the newest security protocol assures dependable communication sessions, the credibility of the three connection phases; security policy selection, authentication and key distribution needs further investigation. The loosely coupled state machines of the participating components can pave the way to security breaches. In this study we have investigated the integrity of these three phases. The analysis is carried out in two stages. Initially, the three phases are modeled using Genetic Software Engineering (GSE) methodology and then formally verified with Symbolic Analysis Laboratory (SAL) tools. We established several Linear Temporal Logic (LTL) formulas to model check our models. We have also examined and analyzed possible security threats due to various issues arising from software implementations and intruder behaviors.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_US
dc.format.extent143817 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_US
dc.publisherInternational Society for Advanced Science and Technologyen_US
dc.publisher.placeFinlanden_US
dc.publisher.urihttp://www.isastorganization.org/tcse.htmlen_US
dc.relation.ispartofstudentpublicationNen_US
dc.relation.ispartofpagefrom13en_US
dc.relation.ispartofpageto25en_US
dc.relation.ispartofissue1en_US
dc.relation.ispartofjournalISAST Transactions on Computers and Software Engineeringen_US
dc.relation.ispartofvolume2en_US
dc.rights.retentionYen_US
dc.subject.fieldofresearchInformation and Computing Sciences not elsewhere classifieden_US
dc.subject.fieldofresearchcode089999en_US
dc.titleAnalysis of IEEE 802.11i WLAN Security Protocolen_US
dc.typeJournal articleen_US
dc.type.descriptionC1 - Peer Reviewed (HERDC)en_US
dc.type.codeC - Journal Articlesen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.rights.copyrightCopyright 2008 ISAST. The attached file is reproduced here in accordance with the copyright policy of the publisher. Please refer to the journal's website for access to the definitive, published version.en_US
gro.date.issued2008
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record