Model checking of RADIUS protocol in wireless networks

Il Gon Kim, Jin Young Choi

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)

    Abstract

    Authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify RADIUS security protocol in wireless networks with Casper and CSP, and then verify their security properties such as secrecy and authentication using FOR. We also show that RADIUS protocol is vulnerable to the man-in-the-middle attack. In addition, we discuss its security weakness and potential countermeasures related with RADIUS. Finally, we fix it and propose a modified RADIUS protocol against the man-in-the-middle attack.

    Original languageEnglish
    Pages (from-to)397-398
    Number of pages2
    JournalIEICE Transactions on Communications
    VolumeE88-B
    Issue number1
    DOIs
    Publication statusPublished - 2005 Jan

    Keywords

    • CSP
    • Casper
    • FDR
    • Model checking
    • RADIUS

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Model checking of RADIUS protocol in wireless networks'. Together they form a unique fingerprint.

    Cite this