An Improved Secure Authentication Protocol for WiMAX with Formal Verification

被引:0
|
作者
Rai, Anjani Kumar [1 ]
Mishra, Shivendu [1 ]
Tripathi, Pramod Narayan [2 ]
机构
[1] Indian Inst Informat Technol, Motilal Nehru Natl Inst Technol, Dept Comp Sci & Engn, Allahabad, Uttar Pradesh, India
[2] Dept Elect Engn, Allahabad, Uttar Pradesh, India
关键词
AVISPA; privacy and key management protocol; IEEE; 802.16; SPAN; WiMAX;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy and Key management protocols (PKM) is used in WiMAX for providing authentication and key management. Basic PKM protocol provides one way authentication between SS and BS results many flaws. However, PKM protocol version 2 (PKMv2) solves the major security problems but new flaws have emerged. This paper analyzes the PKM protocol and its later versions using AVISPA which is a push button tool for the automated validation of security protocol. A secure authentication protocol has also been proposed and analyzed, results show that proposed protocol does not have any security flaws.
引用
收藏
页码:407 / +
页数:2
相关论文
共 50 条
  • [1] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [2] Formal Verification of a Secure Mobile Banking Protocol
    Huy Hoang Ngo
    Dandash, Osama
    Phu Dung Le
    Srinivasan, Bala
    Wilson, Campbell
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 410 - 421
  • [3] FORMAL VERIFICATION OF THE SECURE SOCKETS LAYER PROTOCOL
    Tobarra, Llanos
    Cazorla, Diego
    Pardo, J. Jose
    Cuartero, Fernando
    [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 246 - 252
  • [4] Design and Formal Verification of a VANET Lightweight Authentication Protocol
    Zhao, Guolei
    Wang, Ruinyun
    Wang, Xuejian
    Zhu, Xianwei
    [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 513 - 517
  • [5] Communication space reduction for formal verification of secure authentication protocols
    Kim, K
    Abraham, JA
    [J]. THIRD INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 225 - 227
  • [6] Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)
    Singh, Ninni
    Saini, Hemraj
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 375 - 388
  • [7] Formal Specifications and Verification of a Secure Communication Protocol Model
    Xia Yang 1
    2. Research Center for Information Network Security
    [J]. Journal of Systems Engineering and Electronics, 2003, (02) : 90 - 97
  • [8] Formal Verification of Cryptographic Protocol for Secure RFID System
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Kim, Ju-Bae
    Jeong, Yeon-Oh
    Choi, Jin-Young
    [J]. NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
  • [9] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    [J]. International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [10] Formal verification of IEEE 802.11w authentication protocol
    Kumari, Valli V.
    Raju, Krishnam K., V
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 716 - 722