A secure handover protocol design in wireless networks with formal verification

Sun Hee Lim, Ki Seok Bang, Okyeon Yi, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.

Original languageEnglish
Title of host publicationWired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings
Pages67-78
Number of pages12
Publication statusPublished - 2007 Dec 1
Event5th International Conference on Wired/Wireles Internet Communications, WWIC 2007 - Coimbra, Portugal
Duration: 2007 May 232007 May 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4517 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Wired/Wireles Internet Communications, WWIC 2007
CountryPortugal
CityCoimbra
Period07/5/2307/5/25

    Fingerprint

Keywords

  • AVISPA
  • Authentication
  • Handover
  • Security
  • Wireless

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Lim, S. H., Bang, K. S., Yi, O., & Lim, J. (2007). A secure handover protocol design in wireless networks with formal verification. In Wired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings (pp. 67-78). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4517 LNCS).