Abstract | ||
---|---|---|
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a developed key hierarchy and full protocol definitions. This paper examines the correctness and security of the MSA proposal and its corresponding protocols. We utilize Protocol Composition Logic (PCL) to prove individual protocols secure, as well as their composition. We add to the structure of PCL, generalizing it for peer-to-peer applications. We also discuss two security issues we discovered with original versions of the proposals and our proposed remedies. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/CSF.2008.23 | CSF |
Keywords | Field | DocType |
protocol composition logic,peer-to-peer application,mesh security architecture,msa proposal,corresponding protocol,full protocol definition,correctness proof,security issue,key hierarchy,original version,individual protocol,logic,wireless mesh network,security architecture,computer security,cryptography,authentication,information security,computer architecture,working group,security,protocols | Authentication,Peer-to-peer,Cryptography,Computer science,Correctness,Information security,Computer network,Wireless mesh network,Enterprise information security architecture,Hierarchy,Distributed computing | Conference |
Citations | PageRank | References |
7 | 0.82 | 14 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Doug Kuhlman | 1 | 14 | 1.84 |
Ryan Moriarty | 2 | 45 | 2.97 |
Tony Braskich | 3 | 12 | 1.66 |
Steve Emeott | 4 | 53 | 6.32 |
Mahesh V. Tripunitara | 5 | 558 | 33.06 |