Title
A Correctness Proof of a Mesh Security Architecture
Abstract
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a developed key hierarchy and full protocol definitions. This paper examines the correctness and security of the MSA proposal and its corresponding protocols. We utilize Protocol Composition Logic (PCL) to prove individual protocols secure, as well as their composition. We add to the structure of PCL, generalizing it for peer-to-peer applications. We also discuss two security issues we discovered with original versions of the proposals and our proposed remedies.
Year
DOI
Venue
2008
10.1109/CSF.2008.23
CSF
Keywords
Field
DocType
protocol composition logic,peer-to-peer application,mesh security architecture,msa proposal,corresponding protocol,full protocol definition,correctness proof,security issue,key hierarchy,original version,individual protocol,logic,wireless mesh network,security architecture,computer security,cryptography,authentication,information security,computer architecture,working group,security,protocols
Authentication,Peer-to-peer,Cryptography,Computer science,Correctness,Information security,Computer network,Wireless mesh network,Enterprise information security architecture,Hierarchy,Distributed computing
Conference
Citations 
PageRank 
References 
7
0.82
14
Authors
5
Name
Order
Citations
PageRank
Doug Kuhlman1141.84
Ryan Moriarty2452.97
Tony Braskich3121.66
Steve Emeott4536.32
Mahesh V. Tripunitara555833.06