Model checking of RADIUS protocol in wireless networks

Il Gon Kim, Jin Young Choi

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)


Authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify RADIUS security protocol in wireless networks with Casper and CSP, and then verify their security properties such as secrecy and authentication using FOR. We also show that RADIUS protocol is vulnerable to the man-in-the-middle attack. In addition, we discuss its security weakness and potential countermeasures related with RADIUS. Finally, we fix it and propose a modified RADIUS protocol against the man-in-the-middle attack.

Original languageEnglish
Pages (from-to)397-398
Number of pages2
JournalIEICE Transactions on Communications
Issue number1
Publication statusPublished - 2005 Jan


  • CSP
  • Casper
  • FDR
  • Model checking

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Model checking of RADIUS protocol in wireless networks'. Together they form a unique fingerprint.

Cite this