Skip to main content

Formal Verification of IEEE802.11i WPA-GPG Authentication Protocol

  • Conference paper
Information Technology and Mobile Communication (AIM 2011)

Abstract

IEEE802.11i is the standard designed to provide secured communication of wireless LAN. The IEEE802.11i specification contains WPA-GPG authentication protocol. It allows a wireless station to gain access to a protected wireless network managed by access point. This paper models the WPA-GPG authentication protocol by formal verification using CasperFDR and analyzes the output. A few attacks are found in this protocol. The specifications through which these attacks are found are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE 802.11i. WLAN Security Standards, http://www.javvin.com/protocol80211i.html

  2. WPA-GPG. Wireless authentication using GPG Key, Gabriele Monti, December 9 (2009)

    Google Scholar 

  3. Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6, 53–84 (1998)

    Article  Google Scholar 

  4. Hoare, C.A.R.: Communicating sequential processes. Commun. ACM 21(8), 666–677 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  5. Hoare, C.A.R. (ed.): Communicating Sequential Processes. Prentice Hall International (1985)

    Google Scholar 

  6. Johnston, D., Walker, J.: Overview of IEEE 802.16 security. IEEE Security & Privacy (2004)

    Google Scholar 

  7. Xu, S., Matthews, M.M., Huang, C.-T.: Modeling and Analysis of IEEE 802.16 PKM Protocols using CasperFDR. In: IEEE ISWCS 2008 (2008)

    Google Scholar 

  8. Krishnam Raju, K.V., Valli kumari, V., Sandeep varma, N., Raju, K.V.S.V.N: Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR. In: International Conference on advances in information and communication technologies, ICT 2010, Kerala, India (September 2010)

    Google Scholar 

  9. Wpa-Wpa2, http://www.lylebackemort.com/blog/2008/5/10/wpa-wpa2-as-insecure-as-i-expected (accessed on March 14, 2010)

  10. Xu, S., Huang, C.-T., Matthews, M.M.: Modeling and Analysis of IEEE 802.16 PKM Protocol using CasperFDR. University of South California, Columbia SC, 29208

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Krishnam Raju, K.V., Valli Kumari, V. (2011). Formal Verification of IEEE802.11i WPA-GPG Authentication Protocol. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds) Information Technology and Mobile Communication. AIM 2011. Communications in Computer and Information Science, vol 147. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20573-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20573-6_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20572-9

  • Online ISBN: 978-3-642-20573-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics