Title :
A Correctness Proof of a Mesh Security Architecture
Author :
Kuhlman, Doug ; Moriarty, Ryan ; Braskich, Tony ; Emeott, Steve ; Tripunitara, Mahesh
Abstract :
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a developed key hierarchy and full protocol definitions. This paper examines the correctness and security of the MSA proposal and its corresponding protocols. We utilize Protocol Composition Logic (PCL) to prove individual protocols secure, as well as their composition. We add to the structure of PCL, generalizing it for peer-to-peer applications. We also discuss two security issues we discovered with original versions of the proposals and our proposed remedies.
Keywords :
Computer architecture; Computer security; Cryptography; Information security; Logic; Peer to peer computing; Proposals; Protocols; Wireless mesh networks; Yarn; 802.11s; Mesh Security Architecture (MSA); Protocol Composition Logic (PCL); peer-to-peer;
Conference_Titel :
Computer Security Foundations Symposium, 2008. CSF '08. IEEE 21st
Conference_Location :
Pittsburgh, PA, USA
Print_ISBN :
978-0-7695-3182-3
DOI :
10.1109/CSF.2008.23