Date Added: Aug 2012
The rise in the use of the Internet and other communication technologies like WiMAX which are vulnerable to network attacks has necessitated the implementation of security protocols. Developing secure protocols has proved to be a difficult task as is evident from the presence of flaws in published protocols such as the Needham-Schroeder public key authentication protocol. Security protocols can be validated with formal verification techniques, increasing confidence in their use. The Initial Network Entry procedure in an IEEE 802.16 (WiMAX) network has security defects which can be exploited by the Man-In-The-Middle (MITM) attack, requiring the implementation of a suitable security protocol.