2008 IEEE International Symposium on Wireless Communication Systems 2008
DOI: 10.1109/iswcs.2008.4726137
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Verifying security protocols using Casper/FDR. The proposed protocols are verified using formal methods based on CSP [9], which is a formal language to describe the interactions and states in concurrent systems, it has been used to model communicating and security protocols as in [4,17,18] and [19]. To verify the CSP models, model checkers such as the FDR [10] is used.…”
Section: Something You Havementioning
confidence: 99%
“…Verifying security protocols using Casper/FDR. The proposed protocols are verified using formal methods based on CSP [9], which is a formal language to describe the interactions and states in concurrent systems, it has been used to model communicating and security protocols as in [4,17,18] and [19]. To verify the CSP models, model checkers such as the FDR [10] is used.…”
Section: Something You Havementioning
confidence: 99%
“…Casper/FDR has been used to model communication and security protocols as in [7], [8], [9]. The CASPER's input file that describes the systems consists of eight headers as explained in Table I: B. Desired Security Features for AKA protocols…”
Section: Related Work a Verifying Security Protocols Using Caspementioning
confidence: 99%
“…Security verification of protocols using communication sequential process (CSP) [20], failure divergence refinement (FDR) [21] and Symbolic Analysis Laboratory (SAL) [22] in discovering attacks have been applied in some studies such as [23] and [24]. However, the modeling of protocols and associated properties in CSP or SAL is very error prone and complicated.…”
Section: Introductionmentioning
confidence: 99%