Model checking of RADIUS protocol in wireless networks

Il Gon Kim, Jin Young Choi

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify RADIUS security protocol in wireless networks with Casper and CSP, and then verify their security properties such as secrecy and authentication using FOR. We also show that RADIUS protocol is vulnerable to the man-in-the-middle attack. In addition, we discuss its security weakness and potential countermeasures related with RADIUS. Finally, we fix it and propose a modified RADIUS protocol against the man-in-the-middle attack.

Original languageEnglish
Pages (from-to)397-398
Number of pages2
JournalIEICE Transactions on Communications
VolumeE88-B
Issue number1
DOIs
Publication statusPublished - 2005 Jan 1

Fingerprint

Model checking
Wireless networks
Network protocols
Authentication
Servers

Keywords

  • Casper
  • CSP
  • FDR
  • Model checking
  • RADIUS

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Model checking of RADIUS protocol in wireless networks. / Kim, Il Gon; Choi, Jin Young.

In: IEICE Transactions on Communications, Vol. E88-B, No. 1, 01.01.2005, p. 397-398.

Research output: Contribution to journalArticle

@article{a12d580491214588ac5de67cab1bd276,
title = "Model checking of RADIUS protocol in wireless networks",
abstract = "Authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify RADIUS security protocol in wireless networks with Casper and CSP, and then verify their security properties such as secrecy and authentication using FOR. We also show that RADIUS protocol is vulnerable to the man-in-the-middle attack. In addition, we discuss its security weakness and potential countermeasures related with RADIUS. Finally, we fix it and propose a modified RADIUS protocol against the man-in-the-middle attack.",
keywords = "Casper, CSP, FDR, Model checking, RADIUS",
author = "Kim, {Il Gon} and Choi, {Jin Young}",
year = "2005",
month = "1",
day = "1",
doi = "10.1093/ietcom/E88-B.1.397",
language = "English",
volume = "E88-B",
pages = "397--398",
journal = "IEICE Transactions on Communications",
issn = "0916-8516",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "1",

}

TY - JOUR

T1 - Model checking of RADIUS protocol in wireless networks

AU - Kim, Il Gon

AU - Choi, Jin Young

PY - 2005/1/1

Y1 - 2005/1/1

N2 - Authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify RADIUS security protocol in wireless networks with Casper and CSP, and then verify their security properties such as secrecy and authentication using FOR. We also show that RADIUS protocol is vulnerable to the man-in-the-middle attack. In addition, we discuss its security weakness and potential countermeasures related with RADIUS. Finally, we fix it and propose a modified RADIUS protocol against the man-in-the-middle attack.

AB - Authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify RADIUS security protocol in wireless networks with Casper and CSP, and then verify their security properties such as secrecy and authentication using FOR. We also show that RADIUS protocol is vulnerable to the man-in-the-middle attack. In addition, we discuss its security weakness and potential countermeasures related with RADIUS. Finally, we fix it and propose a modified RADIUS protocol against the man-in-the-middle attack.

KW - Casper

KW - CSP

KW - FDR

KW - Model checking

KW - RADIUS

UR - http://www.scopus.com/inward/record.url?scp=27544437020&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=27544437020&partnerID=8YFLogxK

U2 - 10.1093/ietcom/E88-B.1.397

DO - 10.1093/ietcom/E88-B.1.397

M3 - Article

AN - SCOPUS:27544437020

VL - E88-B

SP - 397

EP - 398

JO - IEICE Transactions on Communications

JF - IEICE Transactions on Communications

SN - 0916-8516

IS - 1

ER -