ACM Transactions on Computer Systems (TOCS)
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01
Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i
Mobility '06 Proceedings of the 3rd international conference on Mobile technology, applications & systems
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Enhancing MISP with Fast Mobile IPv6 Security
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
In 2004, the MIS and MISAUTH protocols (shortly MISP) were proposed for secure and fast connection in Wireless LAN (WLAN). Since then, several studies were conducted to evaluate MISP. However, because of the lack of formal security analysis, the security measures provided by them cannot be trusted to be precise and reasonable. Motivated by this, we formally analyse MISP based on both BAN-logic and the Automated Validation of Internet Security Protocols and Applications (AVISPAS) tool. This analysis clearly shows that MISP suffers from weak Session Key (SK) while being vulnerable to Denial of Service (DoS) attack. We discuss these weaknesses and related attacks in detail, and also provide considerable comments for implementation of MISP.