Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties (Dataset) Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.4722682
This dataset repository is part of the research paper "Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties". The IEEE 802.11 standard defines a 4-way handshake between a supplicant and an authenticator for secure communication. Many attacks such as KRACK, cipher downgrades, and key recovery attacks have been recently discovered against it. These attacks raise the question as to whether the implementation violates one of the required security properties or whether the security properties are insufficient. To the best of our knowledge, this is the first work that shows how to answer this question using formal methods. We model and analyze a variety of these attacks using the Tamarin prover against the security properties mandated by the standard for the 4-way handshake. This lets us see which security properties are violated. We find that our Tamarin models vulnerable to the KRACK attacks do not violate any of the standard’s security properties, indicating that the properties, as specified by the standard, are insufficient. We propose an additional security property and show that it is violated by systems vulnerable to KRACK attacks and that enforcing this property is successful in stopping them. We demonstrate how to use Tamarin to automatically test the adequacy of a set of security properties against attacks, and that the suggested mitigations make 802.11 secure against these attacks.
Related Topics
- Type
- dataset
- Language
- en
- Landing Page
- https://doi.org/10.5281/zenodo.4722682
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4393660657
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4393660657Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.4722682Digital Object Identifier
- Title
-
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties (Dataset)Work title
- Type
-
datasetOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-09-16Full publication date if available
- Authors
-
Rajiv R. P. Singh, José Moreira, Tom Chothia, Mark RyanList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.4722682Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.4722682Direct OA link when available
- Concepts
-
Handshake, Computer science, Computer security, Computer network, Asynchronous communicationTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4393660657 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.4722682 |
| ids.doi | https://doi.org/10.5281/zenodo.4722682 |
| ids.openalex | https://openalex.org/W4393660657 |
| fwci | |
| type | dataset |
| title | Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties (Dataset) |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12734 |
| topics[0].field.id | https://openalex.org/fields/14 |
| topics[0].field.display_name | Business, Management and Accounting |
| topics[0].score | 0.8827000260353088 |
| topics[0].domain.id | https://openalex.org/domains/2 |
| topics[0].domain.display_name | Social Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1404 |
| topics[0].subfield.display_name | Management Information Systems |
| topics[0].display_name | Information Systems and Technology Applications |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2778000800 |
| concepts[0].level | 3 |
| concepts[0].score | 0.9454227685928345 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q830043 |
| concepts[0].display_name | Handshake |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5634332895278931 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5077705979347229 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C31258907 |
| concepts[3].level | 1 |
| concepts[3].score | 0.275877445936203 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[3].display_name | Computer network |
| concepts[4].id | https://openalex.org/C151319957 |
| concepts[4].level | 2 |
| concepts[4].score | 0.0 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q752739 |
| concepts[4].display_name | Asynchronous communication |
| keywords[0].id | https://openalex.org/keywords/handshake |
| keywords[0].score | 0.9454227685928345 |
| keywords[0].display_name | Handshake |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5634332895278931 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.5077705979347229 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/computer-network |
| keywords[3].score | 0.275877445936203 |
| keywords[3].display_name | Computer network |
| language | en |
| locations[0].id | doi:10.5281/zenodo.4722682 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | |
| locations[0].raw_type | dataset |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.4722682 |
| indexed_in | datacite |
| authorships[0].author.id | https://openalex.org/A5003031006 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-1808-3433 |
| authorships[0].author.display_name | Rajiv R. P. Singh |
| authorships[0].countries | GB |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I79619799 |
| authorships[0].affiliations[0].raw_affiliation_string | University of Birmingham |
| authorships[0].institutions[0].id | https://openalex.org/I79619799 |
| authorships[0].institutions[0].ror | https://ror.org/03angcq70 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I79619799 |
| authorships[0].institutions[0].country_code | GB |
| authorships[0].institutions[0].display_name | University of Birmingham |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | R. Ranjan Singh |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | University of Birmingham |
| authorships[1].author.id | https://openalex.org/A5025248429 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3210-4504 |
| authorships[1].author.display_name | José Moreira |
| authorships[1].countries | GB |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I79619799 |
| authorships[1].affiliations[0].raw_affiliation_string | University of Birmingham |
| authorships[1].institutions[0].id | https://openalex.org/I79619799 |
| authorships[1].institutions[0].ror | https://ror.org/03angcq70 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I79619799 |
| authorships[1].institutions[0].country_code | GB |
| authorships[1].institutions[0].display_name | University of Birmingham |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | J. Moreira |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | University of Birmingham |
| authorships[2].author.id | https://openalex.org/A5020004082 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-9381-1368 |
| authorships[2].author.display_name | Tom Chothia |
| authorships[2].countries | GB |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I79619799 |
| authorships[2].affiliations[0].raw_affiliation_string | University of Birmingham |
| authorships[2].institutions[0].id | https://openalex.org/I79619799 |
| authorships[2].institutions[0].ror | https://ror.org/03angcq70 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I79619799 |
| authorships[2].institutions[0].country_code | GB |
| authorships[2].institutions[0].display_name | University of Birmingham |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | T. Chothia |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | University of Birmingham |
| authorships[3].author.id | https://openalex.org/A5055690957 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-1632-497X |
| authorships[3].author.display_name | Mark Ryan |
| authorships[3].countries | GB |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I79619799 |
| authorships[3].affiliations[0].raw_affiliation_string | University of Birmingham |
| authorships[3].institutions[0].id | https://openalex.org/I79619799 |
| authorships[3].institutions[0].ror | https://ror.org/03angcq70 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I79619799 |
| authorships[3].institutions[0].country_code | GB |
| authorships[3].institutions[0].display_name | University of Birmingham |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | M. D. Ryan |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | University of Birmingham |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.4722682 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2024-04-03T00:00:00 |
| display_name | Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties (Dataset) |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T12734 |
| primary_topic.field.id | https://openalex.org/fields/14 |
| primary_topic.field.display_name | Business, Management and Accounting |
| primary_topic.score | 0.8827000260353088 |
| primary_topic.domain.id | https://openalex.org/domains/2 |
| primary_topic.domain.display_name | Social Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1404 |
| primary_topic.subfield.display_name | Management Information Systems |
| primary_topic.display_name | Information Systems and Technology Applications |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W2358991869, https://openalex.org/W4285173741, https://openalex.org/W1486050759, https://openalex.org/W2309292492, https://openalex.org/W2735105689, https://openalex.org/W1482833264, https://openalex.org/W2106545930, https://openalex.org/W3207859108, https://openalex.org/W1981032420 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5281/zenodo.4722682 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | dataset |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.4722682 |
| primary_location.id | doi:10.5281/zenodo.4722682 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | |
| primary_location.raw_type | dataset |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.4722682 |
| publication_date | 2020-09-16 |
| publication_year | 2020 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 25, 29, 103, 204 |
| abstract_inverted_index.To | 78 |
| abstract_inverted_index.We | 99, 133, 164, 192 |
| abstract_inverted_index.an | 32, 166 |
| abstract_inverted_index.as | 40, 59, 157 |
| abstract_inverted_index.by | 117, 159, 176 |
| abstract_inverted_index.do | 144 |
| abstract_inverted_index.in | 189 |
| abstract_inverted_index.is | 3, 85, 174, 187 |
| abstract_inverted_index.it | 173 |
| abstract_inverted_index.of | 5, 10, 17, 66, 81, 105, 148, 203, 206 |
| abstract_inverted_index.or | 71 |
| abstract_inverted_index.to | 60, 92, 140, 179, 195, 198 |
| abstract_inverted_index.us | 126 |
| abstract_inverted_index.The | 20 |
| abstract_inverted_index.and | 15, 31, 44, 101, 170, 182, 211 |
| abstract_inverted_index.any | 147 |
| abstract_inverted_index.are | 76, 131, 162 |
| abstract_inverted_index.for | 34, 120 |
| abstract_inverted_index.how | 91, 194 |
| abstract_inverted_index.it. | 53 |
| abstract_inverted_index.key | 45 |
| abstract_inverted_index.not | 145 |
| abstract_inverted_index.one | 65 |
| abstract_inverted_index.our | 82, 136 |
| abstract_inverted_index.see | 127 |
| abstract_inverted_index.set | 205 |
| abstract_inverted_index.the | 6, 57, 62, 67, 73, 79, 86, 109, 113, 118, 121, 141, 149, 155, 160, 201, 213 |
| abstract_inverted_index.use | 196 |
| abstract_inverted_index.IEEE | 21 |
| abstract_inverted_index.Many | 37 |
| abstract_inverted_index.This | 0, 124 |
| abstract_inverted_index.been | 49 |
| abstract_inverted_index.best | 80 |
| abstract_inverted_index.find | 134 |
| abstract_inverted_index.have | 48 |
| abstract_inverted_index.lets | 125 |
| abstract_inverted_index.make | 216 |
| abstract_inverted_index.part | 4 |
| abstract_inverted_index.show | 171 |
| abstract_inverted_index.such | 39 |
| abstract_inverted_index.test | 200 |
| abstract_inverted_index.that | 89, 135, 154, 172, 183, 212 |
| abstract_inverted_index.this | 84, 94, 185 |
| abstract_inverted_index.work | 88 |
| abstract_inverted_index.4-Way | 12 |
| abstract_inverted_index.4-way | 26, 122 |
| abstract_inverted_index.KRACK | 142, 180 |
| abstract_inverted_index.These | 54 |
| abstract_inverted_index.first | 87 |
| abstract_inverted_index.model | 100 |
| abstract_inverted_index.paper | 8 |
| abstract_inverted_index.raise | 56 |
| abstract_inverted_index.shows | 90 |
| abstract_inverted_index.them. | 191 |
| abstract_inverted_index.these | 106, 220 |
| abstract_inverted_index.using | 96, 108 |
| abstract_inverted_index.which | 128 |
| abstract_inverted_index.802.11 | 11, 22, 217 |
| abstract_inverted_index.KRACK, | 41 |
| abstract_inverted_index.answer | 93 |
| abstract_inverted_index.cipher | 42 |
| abstract_inverted_index.formal | 97 |
| abstract_inverted_index.models | 138 |
| abstract_inverted_index.prover | 111 |
| abstract_inverted_index.secure | 35, 218 |
| abstract_inverted_index.Attacks | 14 |
| abstract_inverted_index.Tamarin | 110, 137, 197 |
| abstract_inverted_index.against | 52, 112, 209, 219 |
| abstract_inverted_index.analyze | 102 |
| abstract_inverted_index.attacks | 38, 47, 55, 107, 143, 181 |
| abstract_inverted_index.between | 28 |
| abstract_inverted_index.dataset | 1 |
| abstract_inverted_index.defines | 24 |
| abstract_inverted_index.propose | 165 |
| abstract_inverted_index.systems | 177 |
| abstract_inverted_index.variety | 104 |
| abstract_inverted_index.violate | 146 |
| abstract_inverted_index.whether | 61, 72 |
| abstract_inverted_index.Analysis | 16 |
| abstract_inverted_index.Security | 18 |
| abstract_inverted_index.adequacy | 202 |
| abstract_inverted_index.attacks, | 210 |
| abstract_inverted_index.attacks. | 221 |
| abstract_inverted_index.mandated | 116 |
| abstract_inverted_index.methods. | 98 |
| abstract_inverted_index.property | 169, 186 |
| abstract_inverted_index.question | 58, 95 |
| abstract_inverted_index.recently | 50 |
| abstract_inverted_index.recovery | 46 |
| abstract_inverted_index.required | 68 |
| abstract_inverted_index.research | 7 |
| abstract_inverted_index.security | 69, 74, 114, 129, 151, 168, 207 |
| abstract_inverted_index.standard | 23, 119 |
| abstract_inverted_index.stopping | 190 |
| abstract_inverted_index.violated | 175 |
| abstract_inverted_index.violates | 64 |
| abstract_inverted_index.Handshake | 13 |
| abstract_inverted_index.enforcing | 184 |
| abstract_inverted_index.handshake | 27 |
| abstract_inverted_index.specified | 158 |
| abstract_inverted_index.standard, | 161 |
| abstract_inverted_index.suggested | 214 |
| abstract_inverted_index.violated. | 132 |
| abstract_inverted_index."Modelling | 9 |
| abstract_inverted_index.additional | 167 |
| abstract_inverted_index.discovered | 51 |
| abstract_inverted_index.handshake. | 123 |
| abstract_inverted_index.indicating | 153 |
| abstract_inverted_index.knowledge, | 83 |
| abstract_inverted_index.properties | 70, 75, 115, 130, 208 |
| abstract_inverted_index.repository | 2 |
| abstract_inverted_index.successful | 188 |
| abstract_inverted_index.supplicant | 30 |
| abstract_inverted_index.vulnerable | 139, 178 |
| abstract_inverted_index.demonstrate | 193 |
| abstract_inverted_index.downgrades, | 43 |
| abstract_inverted_index.mitigations | 215 |
| abstract_inverted_index.properties, | 152, 156 |
| abstract_inverted_index.Properties". | 19 |
| abstract_inverted_index.standard’s | 150 |
| abstract_inverted_index.authenticator | 33 |
| abstract_inverted_index.automatically | 199 |
| abstract_inverted_index.insufficient. | 77, 163 |
| abstract_inverted_index.communication. | 36 |
| abstract_inverted_index.implementation | 63 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |