• DocumentCode
    652349
  • Title

    Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks

  • Author

    Ramezani, Khosrow ; Sithirasenan, E. ; Muthukkumarasamy, Vallipuram

  • Author_Institution
    Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia
  • fYear
    2013
  • fDate
    16-18 July 2013
  • Firstpage
    1735
  • Lastpage
    1740
  • Abstract
    Today we are moving towards a Post-PC era where people prefer to use hand held devices such as tablets or smart phones to maintain their presence in the E-communication world. Most of this communication is possible because of technologies such as Wireless Local Area Network (WLAN), WiMAX or LTE etc. Although the wireless hand held devices are capable of effectively connecting with their native network they often fail to maintain robust connectivity in unfamiliar networks. Therefore the need for collaborative and complementary usage has to be explored. With the range of approaches that are used to validate the mobile devices in heterogeneous wireless networks, the need for a user friendly, flexible and reliable method to interconnect and utilize the different classes of wireless networks is becoming inevitable. Wireless network users prefer to access different types of networks either independently or cooperatively. In either case, adequate security provision is critical to the successful operation of the networks. Moreover, emerging technologies should provide seamless migration between the varied networks. Hence the ability to use a single but unique set of credentials to authenticate the wireless devices in heterogeneous wireless networks would make the post-PC era more effective. In this paper we present details of the formal analysis carried out on our proposed coordinated robust authentication (CRA) protocol.
  • Keywords
    authorisation; cryptographic protocols; formal verification; radio networks; smart phones; telecommunication security; CRA protocol; E-communication world; LTE; WLAN; WiMAX; coordinated robust authentication protocol; formal analysis; formal verification; heterogeneous wireless networks; smart phones; tablets; wireless device authentication; wireless hand held devices; wireless local area network; wireless network interconnection; wireless network users; wireless networks; Authentication; Communication system security; Protocols; Servers; WiMAX; Wireless networks; Access Control; Authentication; Behavior tree; Formal Verification; Heterogeneous Networks; Linear Temporal Logict; Symbolic Analysis Laboratory; Wireless Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • DOI
    10.1109/TrustCom.2013.239
  • Filename
    6681044