Title :
Formal verification of the IEEE 802.11i WLAN security protocol
Author :
Sithirasenan, Elankayer ; Zafar, Saad ; Muthukkumarasamy, Vallipuram
Author_Institution :
Inst. for Integrated & Intelligent Syst., Griffith Univ., Brisbane, Qld., Australia
Abstract :
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security protocol, the IEEE 802.11i assures rigid security for wireless networks with the support of IEEE 802.1X protocol for authentication, authorization and key distribution. In this study we investigate the integrity of the security model developed by us based on 802.11i robust security mechanism (RSN), strengthening our desire towards establishing a secure wireless network environment. We have used the symbolic analysis laboratory (SAL) tools to formally verify the behavior tree models. This paper presents the several linear temporal logic (LTL) formulas established to prove the credibility of our model. We also discuss probable software issues that could arise during implementation. By examining all possible execution traces of the security protocol we have proved our implementation model to be complete and consistent.
Keywords :
IEEE standards; authorisation; formal verification; message authentication; protocols; temporal logic; wireless LAN; 802.11i robust security mechanism; IEEE 802.11i WLAN security protocol; LTL formula; RSN; SAL tool; authentication; authorization; behavior tree model; formal verification; key distribution; linear temporal logic; symbolic analysis laboratory; wireless network security; Authentication; Authorization; Educational institutions; Formal verification; Logic; Robustness; Security; Wireless LAN; Wireless application protocol; Wireless networks;
Conference_Titel :
Software Engineering Conference, 2006. Australian
Print_ISBN :
0-7695-2551-2
DOI :
10.1109/ASWEC.2006.29