Formal Verification of IEEE 802.11w Authentication Protocol
TLDR
This paper models IEEE802.11w authentication protocol by formal verification using CasperFDR and analyzes the output, finding a few attacks in this protocol.About:
This article is published in Procedia Technology.The article was published on 2012-01-01 and is currently open access. It has received 7 citations till now. The article focuses on the topics: Authentication protocol & Otway–Rees protocol.read more
Citations
More filters
Book ChapterDOI
Secure Improved Cloud-Based RFID Authentication Protocol
TL;DR: It is shown that the Xie et al. protocol is vulnerable to reader impersonation attacks, location tracking and tag’s data privacy invasion, and the results indicate that the proposed protocol achieves data secrecy and authentication for RFID tags.
Journal ArticleDOI
Evolution of Wi-Fi Protected Access: Security Challenges
Songhui Kwon,Hyoung-Kee Choi +1 more
TL;DR: Where in the previous versions these weaknesses originated and how in the new version they are rectified are explained and if there is still room for improvement, especially in security algorithms introduced in thenew version of WPA3 is checked.
Proceedings ArticleDOI
Modified RAP-WOTA for Preventing Man in the Middle and Replay Attacks
TL;DR: A modified RAP-WOTA is proposed that prevent MTM and replay attacks by adding some nonces or timestamps and analysis using Scyther Tool showed that this modification is secure against MTMand replay attacks.
Proceedings ArticleDOI
Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4
Andreea Scurtu,Mihai-Lica Pura +1 more
TL;DR: A web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks).
References
More filters
Journal ArticleDOI
Communicating sequential processes
TL;DR: It is suggested that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method.
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
TL;DR: This paper uses FDR, a refinement checker for CSP to discover an attack upon the Needham-Schroeder Public-Key Protocol, which allows an intruder to impersonate another agent, and adapt the protocol, and uses FDR to show that the new protocol is secure, at least for a small system.
Proceedings Article
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
John Bellardo,Stefan Savage +1 more
TL;DR: This paper provides an experimental analysis of 802.11-specific attacks - their practicality, their efficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities.
Book ChapterDOI
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TL;DR: In this article, the authors analyse the Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP, and discover an attack upon the protocol, which allows an intruder to impersonate another agent.