scispace - formally typeset
Open AccessJournal ArticleDOI

Formal Verification of IEEE 802.11w Authentication Protocol

V. Valli Kumari, +1 more
- 01 Jan 2012 - 
- Vol. 6, pp 716-722
TLDR
This paper models IEEE802.11w authentication protocol by formal verification using CasperFDR and analyzes the output, finding a few attacks in this protocol.
About
This article is published in Procedia Technology.The article was published on 2012-01-01 and is currently open access. It has received 7 citations till now. The article focuses on the topics: Authentication protocol & Otway–Rees protocol.

read more

Citations
More filters
Book ChapterDOI

Secure Improved Cloud-Based RFID Authentication Protocol

TL;DR: It is shown that the Xie et al. protocol is vulnerable to reader impersonation attacks, location tracking and tag’s data privacy invasion, and the results indicate that the proposed protocol achieves data secrecy and authentication for RFID tags.
Journal ArticleDOI

Evolution of Wi-Fi Protected Access: Security Challenges

TL;DR: Where in the previous versions these weaknesses originated and how in the new version they are rectified are explained and if there is still room for improvement, especially in security algorithms introduced in thenew version of WPA3 is checked.
Proceedings ArticleDOI

Modified RAP-WOTA for Preventing Man in the Middle and Replay Attacks

TL;DR: A modified RAP-WOTA is proposed that prevent MTM and replay attacks by adding some nonces or timestamps and analysis using Scyther Tool showed that this modification is secure against MTMand replay attacks.
Proceedings ArticleDOI

Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4

TL;DR: A web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks).
References
More filters
Journal ArticleDOI

Communicating sequential processes

TL;DR: It is suggested that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method.

Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR

TL;DR: This paper uses FDR, a refinement checker for CSP to discover an attack upon the Needham-Schroeder Public-Key Protocol, which allows an intruder to impersonate another agent, and adapt the protocol, and uses FDR to show that the new protocol is secure, at least for a small system.
Proceedings Article

802.11 denial-of-service attacks: real vulnerabilities and practical solutions

TL;DR: This paper provides an experimental analysis of 802.11-specific attacks - their practicality, their efficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities.
Book ChapterDOI

Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR

TL;DR: In this article, the authors analyse the Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP, and discover an attack upon the protocol, which allows an intruder to impersonate another agent.
Related Papers (5)