Modeling and Verification of Extensible Authentication Protocol for Transport Layer Security in Wireless LAN Environment

Today complex edge services are positioned on the Wireless LAN, different cryptographic protocols with complex as well as reactive communication models and event dependencies are increasingly being specified and adopted. To ensure that such protocols (and compositions thereof with existing protocols) do not result in unacceptable behaviors (e.g., deadlocks or live locks); a methodology is desirable for the automated checking of the "Correctness" of these protocols. In this paper, the authors present ingredients of such a methodology.

Provided by: Institute of Electrical and Electronics Engineers Topic: Mobility Date Added: Oct 2011 Format: PDF

Find By Topic