DocumentCode :
2317086
Title :
Formal analysis of PKM using scyther tool
Author :
Kahya, Noudjoud ; Ghoualmi, Nacira ; Lafourcade, Pascal
Author_Institution :
Networks & Syst. Lab. (LRS), Badji Mokhtar Univ., Annaba, Algeria
fYear :
2012
fDate :
24-26 March 2012
Firstpage :
1
Lastpage :
6
Abstract :
Owing to the natural characteristics of wireless communication, anyone can intercept or inject frames, making wireless communication much more vulnerable to attacks than its wired equivalents. In this paper we focused on the PKM protocol which provides the authorization process and secure distribution of keying data from the base station to mobile station. Concentrating on PKMv2, we give a formal analysis of this version and we found that is vulnerable to replay, DoS, Man-in-the middle attacks. We propose a new methodology to prevent the authorization protocol from such attacks by using nonce and timestamp together.
Keywords :
WiMax; authorisation; computer network security; formal specification; protocols; DoS; PKM protocol; PKMv2; attacks vulnerability; authorization process; authorization protocol; base station; formal analysis; man-in-the middle attacks; mobile station; nonce; scyther tool; secure keying data distribution; timestamp; wireless communication; Authentication; Authorization; Cryptography; IEEE 802.16 Standards; Protocols; WiMAX; Analyze formal; IEEE 802.16; PKMv2; Scyther tool; revised PKM; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology and e-Services (ICITeS), 2012 International Conference on
Conference_Location :
Sousse
Print_ISBN :
978-1-4673-1167-0
Type :
conf
DOI :
10.1109/ICITeS.2012.6216598
Filename :
6216598
Link To Document :
بازگشت