Analysis of IEEE 802.11i WLAN Security Protocol
View/ Open
Author(s)
Sithirasenan, Elankayer
Zafar, Saad
Muthukkumarasamy, Vallipuram
Year published
2008
Metadata
Show full item recordAbstract
As wireless LAN (WLAN) deployments increase, so does the challenge to provide these networks with adequate security. Business organizations, educational institutions and government co-operations are becoming more and more concerned about their e-security. The need for reliable and robust security mechanisms for WLANs is increasing. The latest WLAN security protocol IEEE 802.11i guarantees robust security with improved authentication, authorization and key distribution mechanisms. However, though the newest security protocol assures dependable communication sessions, the credibility of the three connection phases; ...
View more >As wireless LAN (WLAN) deployments increase, so does the challenge to provide these networks with adequate security. Business organizations, educational institutions and government co-operations are becoming more and more concerned about their e-security. The need for reliable and robust security mechanisms for WLANs is increasing. The latest WLAN security protocol IEEE 802.11i guarantees robust security with improved authentication, authorization and key distribution mechanisms. However, though the newest security protocol assures dependable communication sessions, the credibility of the three connection phases; security policy selection, authentication and key distribution needs further investigation. The loosely coupled state machines of the participating components can pave the way to security breaches. In this study we have investigated the integrity of these three phases. The analysis is carried out in two stages. Initially, the three phases are modeled using Genetic Software Engineering (GSE) methodology and then formally verified with Symbolic Analysis Laboratory (SAL) tools. We established several Linear Temporal Logic (LTL) formulas to model check our models. We have also examined and analyzed possible security threats due to various issues arising from software implementations and intruder behaviors.
View less >
View more >As wireless LAN (WLAN) deployments increase, so does the challenge to provide these networks with adequate security. Business organizations, educational institutions and government co-operations are becoming more and more concerned about their e-security. The need for reliable and robust security mechanisms for WLANs is increasing. The latest WLAN security protocol IEEE 802.11i guarantees robust security with improved authentication, authorization and key distribution mechanisms. However, though the newest security protocol assures dependable communication sessions, the credibility of the three connection phases; security policy selection, authentication and key distribution needs further investigation. The loosely coupled state machines of the participating components can pave the way to security breaches. In this study we have investigated the integrity of these three phases. The analysis is carried out in two stages. Initially, the three phases are modeled using Genetic Software Engineering (GSE) methodology and then formally verified with Symbolic Analysis Laboratory (SAL) tools. We established several Linear Temporal Logic (LTL) formulas to model check our models. We have also examined and analyzed possible security threats due to various issues arising from software implementations and intruder behaviors.
View less >
Journal Title
ISAST Transactions on Computers and Software Engineering
Volume
2
Issue
1
Publisher URI
Copyright Statement
© 2008 ISAST. The attached file is reproduced here in accordance with the copyright policy of the publisher. Please refer to the journal's website for access to the definitive, published version.
Subject
Information and Computing Sciences not elsewhere classified