WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/10060,
	  title     = {Authentication Analysis of the 802.11i Protocol},
	  author    = {Zeeshan Furqan and  Shahabuddin Muhammad and  Ratan Guha},
	  country	= {},
	  institution	= {},
	  abstract     = {IEEE has designed 802.11i protocol to address the
security issues in wireless local area networks. Formal analysis is
important to ensure that the protocols work properly without having
to resort to tedious testing and debugging which can only show the
presence of errors, never their absence. In this paper, we present
the formal verification of an abstract protocol model of 802.11i.
We translate the 802.11i protocol into the Strand Space Model and
then prove the authentication property of the resulting model using
the Strand Space formalism. The intruder in our model is imbued
with powerful capabilities and repercussions to possible attacks are
evaluated. Our analysis proves that the authentication of 802.11i is
not compromised in the presented model. We further demonstrate
how changes in our model will yield a successful man-in-the-middle
attack.},
	    journal   = {International Journal of Electronics and Communication Engineering},
	  volume    = {2},
	  number    = {12},
	  year      = {2008},
	  pages     = {2768 - 2774},
	  ee        = {https://publications.waset.org/pdf/10060},
	  url   	= {https://publications.waset.org/vol/24},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 24, 2008},
	}