Formal Verification of the IEEE 802.11i WLAN Security Protocol

Loading...
Thumbnail Image
File version
Author(s)
Sithirasenan, Elankayer
Zafar, Saad
Muthukkumarasamy, Vallipuram
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Jun Han, Mark Staples

Date
2006
Size

249346 bytes

39481 bytes

File type(s)

application/pdf

text/plain

Location

Sydney, AUSTRALIA

License
Abstract

With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security protocol, the IEEE 802.11i assures rigid security for wireless networks with the support of IEEE 802.1X protocol for authentication, authorization and key distribution. In this study we investigate the integrity of the security model developed by us based on 802.11i Robust Security Mechanism (RSN), strengthening our desire towards establishing a secure wireless network environment. We have used the Symbolic Analysis Laboratory (SAL) tools to formally verify the Behavior Tree models. This paper presents the several Linear Temporal Logic (LTL) formulas established to prove the credibility of our model. We also discuss probable software issues that could arise during implementation. By examining all possible execution traces of the security protocol we have proved our implementation model to be complete and consistent.

Journal Title
Conference Title

2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS

Book Title
Edition
Volume

2006

Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Item Access Status
Note
Access the data
Related item(s)
Subject
Persistent link to this record
Citation