DocumentCode :
494904
Title :
Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool
Author :
Taha, Ahmed M. ; Abdel-Hamid, Amr T. ; Tahar, Sofiène
Author_Institution :
Fac. of Inf. Eng. & Technol., German Univ. in Cairo, Cairo, Egypt
fYear :
2009
fDate :
24-26 June 2009
Firstpage :
1
Lastpage :
5
Abstract :
WiMAX (IEEE 802.16) is a standard-based wireless technology that provides high-throughput broadband connections over long distances. WiMAX is used for a number of applications, including "last mile" broadband connections, hotspots and cellular backhaul, and high-speed enterprise connectivity. The former IEEE 802.16 standards used the Privacy and Key Management (PKM) protocol which had many critical drawbacks. In IEEE 802.16e, a new version of this protocol called PKMv2 is released. This paper overviews IEEE 802.16e security, formally analyzes its improvements in contrast with IEEE 802.16-2004 security and potential security flaws. The formal analysis has been conducted using a specialized model checker Scyther, that provides formal proofs of the security protocols.
Keywords :
WiMax; broadband networks; cryptographic protocols; formal verification; telecommunication security; IEEE 802.16 security sublayer; PKMv2 protocol; Scyther tool; WiMAX; formal verification; high-throughput broadband connection; standard-based wireless technology; Access protocols; Authentication; Communication system security; Cryptography; Data security; Formal verification; Information security; Privacy; WiMAX; Wireless application protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and Service Security, 2009. N2S '09. International Conference on
Conference_Location :
Paris
Print_ISBN :
978-2-9532-4431-1
Type :
conf
Filename :
5161661
Link To Document :
بازگشت