Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking

Il Gon Kim, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based security protocols formally with Casper and CSP, and then verify their security properties such as secrecy and authentication using FDR. We also show that they are vulnerable to the man-in-the-middle attack. Finally we discuss their security weakness and potential countermeasures related to PAP and EAP-MD5 protocols.

Original languageEnglish
Title of host publicationProceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers)
EditorsL. Barolli
Pages264-269
Number of pages6
Publication statusPublished - 2004
EventProceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 - Fukuoka, Japan
Duration: 2004 Mar 292004 Mar 31

Publication series

NameProceedings - International Conference on Advanced Information Networking and Application (AINA)
Volume2

Other

OtherProceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004
CountryJapan
CityFukuoka
Period04/3/2904/3/31

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking'. Together they form a unique fingerprint.

  • Cite this

    Kim, I. G., & Choi, J. Y. (2004). Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking. In L. Barolli (Ed.), Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers) (pp. 264-269). (Proceedings - International Conference on Advanced Information Networking and Application (AINA); Vol. 2).