By Topic

Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Il-Gon Kim ; Dept. of Comput. Sci. & Eng., Korea Univ., Seoul, South Korea ; Jin-Young Choi

IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. We specify PAP and EAP-MD5 based security protocols formally with Casper and CSP, and then verify their security properties such as secrecy and authentication using FDR. We also show that they are vulnerable to the man-in-the-middle attack. Finally we discuss their security weakness and potential countermeasures related to PAP and EAP-MD5 protocols.

Published in:

Advanced Information Networking and Applications, 2004. AINA 2004. 18th International Conference on  (Volume:2 )

Date of Conference:

29-31 March 2004