Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA

被引:6
|
作者
Narayana, Prasad [1 ]
Chen, Ruiming [1 ]
Zhao, Yao [1 ]
Chen, Yan [1 ]
Fu, Zhi [2 ]
Zhou, Hai [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
[2] Motorola Lab, Schaumburg, IL USA
关键词
D O I
10.1109/NPSEC.2006.320346
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vulnerability analysis is indispensably the first step towards securing a network protocol, but currently remains mostly a best effort manual process with no completeness guarantee. Formal methods are proposed for vulnerability analysis and most existing work focus on security properties such as perfect forwarding secrecy and correctness of authentication. However, it remains unclear how to apply these methods to analyze more subtle vulnerabilities such as denial-of-service (DoS) attacks. To address this challenge, in this paper, we propose use of TLA+ to automatically check DoS vulnerability of network protocols with completeness guarantee. In particular, we develop new schemes to avoid state space explosion in property checking and to model attackers' capabilities for finding realistic attacks. As a case study, we successfully identify threats to IEEE 802.16 air interface protocols.
引用
收藏
页码:44 / +
页数:2
相关论文
共 50 条
  • [1] Performance evaluation of IEEE 802.16 WiMAX link with respect to higher layer Protocols
    Yousaf, Faqir Zarrar
    Daniel, Kai
    Wietfeld, Christian
    [J]. 2007 FOURTH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 337 - 341
  • [2] IEEE802.16和WiMAX
    雷震洲
    [J]. 现代电信科技, 2004, (07) : 2 - 7
  • [3] Networking Technologies Based on IEEE 802.16 and WiMAX
    Wang Bin L Dengfang Ma Fengguo (Institute of Xi’an
    [J]. ZTE Communications, 2006, (02) : 23 - 28
  • [4] EESM for IEEE 802.16e: WiMax
    Mumtaz, Shahid
    Gamerio, Atilio
    Rodriguez, Jonathan
    [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 361 - 366
  • [5] Cellular WiMAX/IEEE 802.16 Capacity Estimation
    Murawwat, Sadia
    Ahmed, Kazi
    [J]. 2009 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2009, : 459 - 464
  • [6] Checking Cache-Coherence Protocols with TLA+
    Rajeev Joshi
    Leslie Lamport
    John Matthews
    Serdar Tasiran
    Mark Tuttle
    Yuan Yu
    [J]. Formal Methods in System Design, 2003, 22 : 125 - 131
  • [7] Research on bandwidth reservation in IEEE 802.16 (WiMAX) networks
    Sun, Yi
    Song, Yilin
    Shi, Jinglin
    Dutkiewicz, Eryk
    [J]. ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 638 - +
  • [8] QoS Differentiation for IEEE 802.16 WiMAX Mesh Networking
    Yan Zhang
    Honglin Hu
    Hsiao-Hwa Chen
    [J]. Mobile Networks and Applications, 2008, 13 : 19 - 37
  • [9] QoS differentiation for IEEE 802.16 WiMAX mesh networking
    Zhang, Yan
    Hu, Honglin
    Chen, Hsiao-Hwa
    [J]. MOBILE NETWORKS & APPLICATIONS, 2008, 13 (1-2): : 19 - 37
  • [10] Performance of WiMAX/IEEE 802.16 with Different Modulation and Coding
    Chaudhary, Shubhangi R.
    [J]. INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 440 - 444