Title :
Formal analysis of PKM using scyther tool
Author :
Kahya, Noudjoud ; Ghoualmi, Nacira ; Lafourcade, Pascal
Author_Institution :
Networks & Syst. Lab. (LRS), Badji Mokhtar Univ., Annaba, Algeria
Abstract :
Owing to the natural characteristics of wireless communication, anyone can intercept or inject frames, making wireless communication much more vulnerable to attacks than its wired equivalents. In this paper we focused on the PKM protocol which provides the authorization process and secure distribution of keying data from the base station to mobile station. Concentrating on PKMv2, we give a formal analysis of this version and we found that is vulnerable to replay, DoS, Man-in-the middle attacks. We propose a new methodology to prevent the authorization protocol from such attacks by using nonce and timestamp together.
Keywords :
WiMax; authorisation; computer network security; formal specification; protocols; DoS; PKM protocol; PKMv2; attacks vulnerability; authorization process; authorization protocol; base station; formal analysis; man-in-the middle attacks; mobile station; nonce; scyther tool; secure keying data distribution; timestamp; wireless communication; Authentication; Authorization; Cryptography; IEEE 802.16 Standards; Protocols; WiMAX; Analyze formal; IEEE 802.16; PKMv2; Scyther tool; revised PKM; vulnerability;
Conference_Titel :
Information Technology and e-Services (ICITeS), 2012 International Conference on
Conference_Location :
Sousse
Print_ISBN :
978-1-4673-1167-0
DOI :
10.1109/ICITeS.2012.6216598