A secure handover protocol design in wireless networks with formal verification

Sun Hee Lim, Ki Seok Bang, Okyeon Yi, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.

Original languageEnglish
Title of host publicationWired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings
PublisherSpringer Verlag
Pages67-78
Number of pages12
ISBN (Print)9783540726944
DOIs
Publication statusPublished - 2007
Event5th International Conference on Wired/Wireles Internet Communications, WWIC 2007 - Coimbra, Portugal
Duration: 2007 May 232007 May 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4517 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Wired/Wireles Internet Communications, WWIC 2007
CountryPortugal
CityCoimbra
Period07/5/2307/5/25

Keywords

  • AVISPA
  • Authentication
  • Handover
  • Security
  • Wireless

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A secure handover protocol design in wireless networks with formal verification'. Together they form a unique fingerprint.

  • Cite this

    Lim, S. H., Bang, K. S., Yi, O., & Lim, J. (2007). A secure handover protocol design in wireless networks with formal verification. In Wired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings (pp. 67-78). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4517 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-540-72697-5_6