Formal Verification of the IEEE 802.11i WLAN Security Protocol
Files
File version
Author(s)
Zafar, Saad
Muthukkumarasamy, Vallipuram
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Jun Han, Mark Staples
Date
Size
249346 bytes
39481 bytes
File type(s)
application/pdf
text/plain
Location
Sydney, AUSTRALIA
License
Abstract
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security protocol, the IEEE 802.11i assures rigid security for wireless networks with the support of IEEE 802.1X protocol for authentication, authorization and key distribution. In this study we investigate the integrity of the security model developed by us based on 802.11i Robust Security Mechanism (RSN), strengthening our desire towards establishing a secure wireless network environment. We have used the Symbolic Analysis Laboratory (SAL) tools to formally verify the Behavior Tree models. This paper presents the several Linear Temporal Logic (LTL) formulas established to prove the credibility of our model. We also discuss probable software issues that could arise during implementation. By examining all possible execution traces of the security protocol we have proved our implementation model to be complete and consistent.
Journal Title
Conference Title
2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS
Book Title
Edition
Volume
2006
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.