A secure handover protocol design in wireless networks with formal verification

Sun H. Lim, Ki Seok Bang, Okyeon Yi, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages67-78
Number of pages12
Volume4517 LNCS
Publication statusPublished - 2007 Dec 1
Event5th International Conference on Wired/Wireles Internet Communications, WWIC 2007 - Coimbra, Portugal
Duration: 2007 May 232007 May 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4517 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other5th International Conference on Wired/Wireles Internet Communications, WWIC 2007
CountryPortugal
CityCoimbra
Period07/5/2307/5/25

Fingerprint

Handover
Formal Verification
Wireless Networks
Wireless networks
Network protocols
Defects
Design
Formal verification

Keywords

  • Authentication
  • AVISPA
  • Handover
  • Security
  • Wireless

ASJC Scopus subject areas

  • Biochemistry, Genetics and Molecular Biology(all)
  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Lim, S. H., Bang, K. S., Yi, O., & Lim, J. I. (2007). A secure handover protocol design in wireless networks with formal verification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4517 LNCS, pp. 67-78). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4517 LNCS).

A secure handover protocol design in wireless networks with formal verification. / Lim, Sun H.; Bang, Ki Seok; Yi, Okyeon; Lim, Jong In.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4517 LNCS 2007. p. 67-78 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4517 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lim, SH, Bang, KS, Yi, O & Lim, JI 2007, A secure handover protocol design in wireless networks with formal verification. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4517 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4517 LNCS, pp. 67-78, 5th International Conference on Wired/Wireles Internet Communications, WWIC 2007, Coimbra, Portugal, 07/5/23.
Lim SH, Bang KS, Yi O, Lim JI. A secure handover protocol design in wireless networks with formal verification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4517 LNCS. 2007. p. 67-78. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Lim, Sun H. ; Bang, Ki Seok ; Yi, Okyeon ; Lim, Jong In. / A secure handover protocol design in wireless networks with formal verification. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4517 LNCS 2007. pp. 67-78 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{300c5b530dab46f0bc6ed32fb756c6f6,
title = "A secure handover protocol design in wireless networks with formal verification",
abstract = "This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.",
keywords = "Authentication, AVISPA, Handover, Security, Wireless",
author = "Lim, {Sun H.} and Bang, {Ki Seok} and Okyeon Yi and Lim, {Jong In}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9783540726944",
volume = "4517 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "67--78",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - A secure handover protocol design in wireless networks with formal verification

AU - Lim, Sun H.

AU - Bang, Ki Seok

AU - Yi, Okyeon

AU - Lim, Jong In

PY - 2007/12/1

Y1 - 2007/12/1

N2 - This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.

AB - This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.

KW - Authentication

KW - AVISPA

KW - Handover

KW - Security

KW - Wireless

UR - http://www.scopus.com/inward/record.url?scp=38049061125&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38049061125&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:38049061125

SN - 9783540726944

VL - 4517 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 67

EP - 78

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -