Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA

被引:6
|
作者
Narayana, Prasad [1 ]
Chen, Ruiming [1 ]
Zhao, Yao [1 ]
Chen, Yan [1 ]
Fu, Zhi [2 ]
Zhou, Hai [1 ]
机构
[1] Northwestern Univ, Evanston, IL 60208 USA
[2] Motorola Lab, Schaumburg, IL USA
关键词
D O I
10.1109/NPSEC.2006.320346
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vulnerability analysis is indispensably the first step towards securing a network protocol, but currently remains mostly a best effort manual process with no completeness guarantee. Formal methods are proposed for vulnerability analysis and most existing work focus on security properties such as perfect forwarding secrecy and correctness of authentication. However, it remains unclear how to apply these methods to analyze more subtle vulnerabilities such as denial-of-service (DoS) attacks. To address this challenge, in this paper, we propose use of TLA+ to automatically check DoS vulnerability of network protocols with completeness guarantee. In particular, we develop new schemes to avoid state space explosion in property checking and to model attackers' capabilities for finding realistic attacks. As a case study, we successfully identify threats to IEEE 802.16 air interface protocols.
引用
收藏
页码:44 / +
页数:2
相关论文
共 50 条
  • [21] Coverage Analysis for IEEE 802.16e/WiMAX Systems
    Jalloul, Louay M. A.
    Alex, Sam P.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (11) : 4627 - 4634
  • [22] On the complexity of sequential rectangle placement in IEEE 802.16/WiMAX systems
    Israeli, Amos
    Rawitz, Dror
    Sharon, Oran
    [J]. INFORMATION AND COMPUTATION, 2008, 206 (11) : 1334 - 1345
  • [23] Simulation of WiMAX Physical Layer: IEEE 802.16e
    Mohamed, M. A.
    Zaki, F. W.
    Mosbeh, R. H.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 49 - 55
  • [24] Security Issues in Mobile WiMAX (IEEE 802.16e)
    Frank, A. Ibikunle
    [J]. MWS: 2009 IEEE MOBILE WIMAX SYMPOSIUM, 2009, : 117 - 122
  • [25] System Level Evaluation for WiMAX IEEE 802.16m
    Mourad, Alain
    Gutierrez, Ismael
    [J]. 2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 418 - 424
  • [26] Delay and throughput performance of IEEE 802.16 WiMax mesh networks
    Li, Y.
    Wang, C.
    You, X.
    Chen, H. -H.
    She, W.
    [J]. IET COMMUNICATIONS, 2012, 6 (01) : 107 - 115
  • [27] The Future of WiMAX: Multihop Relaying with IEEE 802.16j
    Peters, Steven W.
    Heath, Robert W., Jr.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (01) : 104 - 111
  • [28] Interference-aware IEEE 802.16 WiMax mesh networks
    Wei, HY
    Ganguly, S
    Izmailov, R
    Haas, ZJ
    [J]. VTC2005-SPRING: 2005 IEEE 61ST VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2005, : 3102 - 3106
  • [29] On the complexity of sequential rectangle placement in IEEE 802.16/WiMAX systems
    Israeli, Amos
    Rawitz, Dror
    Sharon, Oran
    [J]. ALGORITHMS - ESA 2007, PROCEEDINGS, 2007, 4698 : 570 - +
  • [30] A PMP-friendly MANET networking approach for WiMAX/IEEE 802.16™
    Sherman, Matthew
    McNeill, Kevin M.
    Conner, Keith
    Khuu, Phong
    McNevin, Tim
    [J]. MILCOM 2006, VOLS 1-7, 2006, : 2792 - +