Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of
scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other
copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying
this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without
the explicit permission of the copyright holder.
show main publications
A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005 @ARTICLE{YNNYr, title = {{A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005}}, author = {{Ender} {Y\"uksel} and {Hanne Riis} {Nielson} and {Christoffer Rosenkilde} {Nielsen} and {Mehmet B\"ulent} {\"Orencik}}, journal = {FCS-ARSPA'07}, note = {Informal Proceedings}, abstract = {Static analysis is successfully used for automatically validating
security properties of classical cryptographic protocols. In this paper,
we shall employ the same technique to a modern security protocol
for wireless networks, namely the latest version of the Privacy and Key
Management protocol for IEEE 802.16e, PKMv2. This protocol seems
to have an exaggerated mixture of security features. Thus, we iteratively
investigate which components are necessary for upholding the security
properties and which can be omitted safely. This approach is based on
the LySa process calculus and employs the corresponding automated
analysis tool, the LySaTool.}, url = {http://rap.dsi.unifi.it/sensoriasite/pkmv2.pdf}, address = {Informatics and Mathematical Modelling, Technical University}, institution = {Technical University of Denmark}, keywords = {LySa, process calculi, verification, Wireless Protocols}, task = {T3.1}, }
|