Formal Analysis of the PKMv3 Protocol

  • Xiaoran Zhu
  • , Yuanmin Xu
  • , Xin Li
  • , Jian Guo*
  • , Huibiao Zhu
  • , Phan Cong Vinh
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

WiMax (Worldwide Interoperability for Microwave Access, IEEE 802.16) is a standard-based wireless technology, which uses Privacy Key Management (PKM) protocol to provide authentication and key management. Three versions of PKM protocol have been released and the third one (PKMv3) strengthens the security by enhancing the message management. In this paper, a formal analysis of PKMv3 protocol is presented. Both the Subscriber Station (SS) and the Base Station (BS) are modeled as processes in our framework. Besides, we introduce an intruder model where the intruder has capabilities of overhearing, intercepting and faking messages. Discrete time describes the lifetime of the Authorization Key (AK) and the Transmission Encryption Key (TEK). Moreover, the PKMv3 model is constructed through the discrete-time PROMELA (DT-PROMELA) language and the tool DT-Spin implements the PKMv3 model with lifetime. Finally, we simulate communications between SS and BS and verify some properties, such as liveness, succession and message consistency, which are extracted from the PKMv3 protocol and specified using Linear Temporal Logic (LTL) formulae and assertions. The simulation and verification results demonstrate that the attacks may exist in our model of the PKMv3 protocol.

Original languageEnglish
Pages (from-to)44-56
Number of pages13
JournalMobile Networks and Applications
Volume23
Issue number1
DOIs
StatePublished - 1 Feb 2018

Keywords

  • DT-PROMELA
  • DT-Spin
  • Linear temporal logic
  • PKMv3

Fingerprint

Dive into the research topics of 'Formal Analysis of the PKMv3 Protocol'. Together they form a unique fingerprint.

Cite this