Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR

IEEE 802.16 is the standard for broadband wireless access. The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control, in which the Privacy and Key Management (PKM) protocols are specified. This paper models the PKM protocols using Casper and analyzes the CSP output with FDR, which are formal analysis tools based on the model checker. Later versions of PKM protocols are also modeled and analyzed. Attacks are found in each version and the results are discussed.

[1]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[2]  Gavin Lowe Casper: a compiler for the analysis of security protocols , 1998 .

[3]  Gavin Lowe Analyzing a Library of Security Protocols using Casper and FDR , 1999 .

[4]  Ieee Microwave Theory,et al.  Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems — Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands , 2003 .

[5]  Pang Liaojun,et al.  Key Management Protocol of the IEEE 802.16e , 2007 .

[6]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[7]  Chin-Tser Huang,et al.  Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.

[8]  Manton M. Matthews,et al.  Security protocols in wirelessman , 2008 .

[9]  Steve A. Schneider Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[10]  Chris Mitchell,et al.  Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.

[11]  Ender Yuksel,et al.  Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .

[12]  A. W. Roscoe Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[13]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.

[14]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[15]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[16]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[17]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..