CFP last date
20 January 2025
Reseach Article

Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL)

by Rajeev Singh, Teek Parval Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 12
Year of Publication: 2013
Authors: Rajeev Singh, Teek Parval Sharma
10.5120/13913-1791

Rajeev Singh, Teek Parval Sharma . Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL). International Journal of Computer Applications. 80, 12 ( October 2013), 18-26. DOI=10.5120/13913-1791

@article{ 10.5120/13913-1791,
author = { Rajeev Singh, Teek Parval Sharma },
title = { Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL) },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 12 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number12/13913-1791/ },
doi = { 10.5120/13913-1791 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:22.317825+05:30
%A Rajeev Singh
%A Teek Parval Sharma
%T Proof of the Authentication Property of Secure WLAN Authentication Scheme (SWAS) using Protocol Composition Logic (PCL)
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 12
%P 18-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is one of the essential tools available for security in WLANs. Access control authentication mechanisms provides entity authentication, access into the network and key evolving for data frames protection. Secure WLAN Authentication Scheme (SWAS) is one such access control authentication mechanism. It provides entity authentication along with per frame authentication. All the participating entities in the scheme i. e. STA, AP and AS authenticate each other. The scheme makes use of cryptographic measure like delegation, key management, encryption and MIC for securing the scheme. The security properties of the scheme need to be validated for effectiveness. In this paper, a formal tool i. e. Protocol Composition Logic (PCL) is used for proving the authentication property of the scheme.

References
  1. Johnson, H. , Nilsson, A. , Fu, J. , Wu, S. F. , Chen A. , Huang, H. 2002. SOLA: A One bit Identity Authentication Protocol for Access Control in IEEE 802. 11. In Proc. IEEE Global Telecommns Conference, GLOBECOM'02, pp. 768 – 772.
  2. Wu, F. , Jonson, H. , Nilson, A. , 2004. SOLA: Lightweight Security for Access Control in IEEE 802. 11, Wireless Security, May/June,10-16
  3. Wang, H. , Velayutham, A. , Guan, Y. 2003. A Lightweight Authentication Protocol for Access Control in IEEE 802. 11. In Proc. IEEE Global Telecommunications Conference, GLOBECOM'03, pp. 1384 – 1388.
  4. Wang, H. , Cardo, J. , Guan, Y. 2005. Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs. Computer Communications, 28, 1618-1630.
  5. Ren, K. , Lee, H. , Park, J. , Kim, K. 2004. An Enhanced Lightweight Authentication Protocol for Access Control in Wireless LANs. In Proc. 4th International Conference on Networks, ICON'04, Daejeon, South Korea, pp. 444 – 450.
  6. Lee, Y-S. , Chien, H-T. , Tsai, W-N. 2009. Using Random Bit Authentication to defend IEEE 802. 11 DoS attacks. Journal of Information Science and Engineering, 25, 1485-1500.
  7. Pepyne, D. L. , Ho, Y-C. , Zheng, Q. 2003. SPRiNG: Synchronized Random Numbers for Wireless Security. In Proc. IEEE Wireless Communications and Networking, WCNC'03, pp. 2027-2032.
  8. Arbaugh, W. A. , Shankar, N. , Wang, J. , Zhang, K. Your 802. 11 network has no clothes, IEEE Wireless Commn. Magazine, 9 (2002) 44 - 51.
  9. Bittau, A. , Handley, M. , Lackey, J. 2006. The Final Nail in WEP's Coffin, in: Proc. of the IEEE Symp. on Security and Privacy (S&P' 06), , pp. 386-400.
  10. E. Tews, R. Weinmann, A. Pyshkin, Breaking 104 bit WEP in less than 60 seconds, in: Proc. Int. Conf. on Info. Sec. Appl. WISA, 2007, pp. 188-202.
  11. He, C. and Mitchell, J. C. 2005. Security Analysis and Improvements for IEEE 802. 11i, in: Proc. of the Annual Network and Distr. Syst. Sec. Symp. (NDSS'05), pp. 90-110.
  12. IEEE 802. 11i, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements, IEEE Standard, 2004.
  13. IEEE Standard 802. 1X-2001. IEEE Standard for Local and metropolitan area networks – Port-Based Network Access Control. June, 2001.
  14. Holt, A. and Huang, CY. 2010. 802. 11 Wireless Networks: Security and Analysis, Springer-Verlag.
  15. Singh, R. Sharma, T. P. 2013. A Secure WLAN Authentication Scheme, in IEEK Transaction of Smart Processing and Computing, vol 2, no. 3.
  16. Lee, W-B. , Yeh, C-K. 2005. A New Delegation-Based Authentication Protocol for Use in Portable Communication Systems, IEEE Transaction on Wireless Commn. 4:1, 57-64.
  17. Tang, C. and Wu, D. O. , 2008. An Ef?cient Mobile Authentication for Wireless Networks, IEEE Transactions on Wirel. Commn. 7:4, 1408-1416.
  18. He, C. 2005. Analysis of Security Protocols for Wireless Networks, Ph. D. Dissertation.
  19. He, C. , Sundararajan, M. , Datta, A. , Derek, A. ,. Mitchell, J. C. 2005. A Modular Correctness Proof of IEEE 802. 11i and TLS, 12th ACM conference on Computer and communications security(CCS'05), Pages 2 – 15.
  20. Datta, A. , Mitchell, J. C. , Roy, A. , Stiller, S-H. 2011. Protocol Composition Logic (PCL) book chapter in V. Cortier and S. Kremer (Editors), Formal Models and Techniques for Analyzing Security Protocols, IOS Press.
  21. Datta, A. , Derek, A. , Mitchell, J. C. , Roy, A. 2007. Protocol Composition Logic (PCL) Electronic Notes in Theoretical Computer Science 172, 311–358.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Access control Protocol Composition Logic (PCL).