{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T20:17:32Z","timestamp":1758053852469,"version":"3.44.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030598167"},{"type":"electronic","value":"9783030598174"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59817-4_1","type":"book-chapter","created":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T13:03:17Z","timestamp":1600174997000},"page":"3-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1808-3433","authenticated-orcid":false,"given":"Rajiv Ranjan","family":"Singh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3210-4504","authenticated-orcid":false,"given":"Jos\u00e9","family":"Moreira","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Chothia","sequence":"additional","affiliation":[]},{"given":"Mark D.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,16]]},"reference":[{"key":"1_CR1","unstructured":"IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. IEEE Std. 802.11-1997, November 1997"},{"key":"1_CR2","unstructured":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 6. IEEE Std. 802.11i-2004, July 2004"},{"key":"1_CR3","unstructured":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. IEEE Std. 802.11-2016, December 2016"},{"key":"1_CR4","unstructured":"IEEE Standard for Local and Metropolitan Area Networks-Port-Based Network Access Control. IEEE Std. 802.1X-2020, February 2020"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1145\/373243.360213","volume":"36","author":"M Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. ACM SIGPLAN Not. 36(3), 104\u2013115 (2001)","journal-title":"ACM SIGPLAN Not."},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 93","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232\u2013249. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_21"},{"key":"1_CR7","unstructured":"Blanchet, B., Smyth, B., Cheval, V., Sylvestre, M.: ProVerif 2.02: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial, July 2020"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Cremers, C.: On the protocol composition logic PCL. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS), Tokyo, Japan, pp. 66\u201376, March 2008","DOI":"10.1145\/1368310.1368324"},{"key":"1_CR9","unstructured":"Cremers, C., Kiesl, B., Medinger, N.: A formal analysis of IEEE 802.11\u2019s WPA2: countering the kracks caused by cracking the counters. In: Proceedings of the USENIX Security Symposium (USENIX Security), pp. 1\u201317. Virtual Event, August 2020 (to appear)"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.entcs.2007.02.012","volume":"172","author":"A Datta","year":"2007","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (PCL). Electron. Notes Theor. Comput. Sci. 172, 311\u2013358 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"2","key":"1_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR12","unstructured":"Harkins, D., Malinen, J.: Addressing the issue of nonce reuse in 802.11 implementations, October 2017. https:\/\/mentor.ieee.org\/802.11\/dcn\/17\/11-17-1602-03-000m-nonce-reuse-prevention.docx"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"He, C., Mitchell, J.C.: Analysis of the 802.11i 4-way handshake. In: Proceedings of the ACM Workshop on Wireless Security (WiSe), Philadelphia, PA, pp. 43\u201350, October 2004","DOI":"10.1145\/1023646.1023655"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"He, C., Sundararajan, M., Datta, A., Derek, A., Mitchell, J.C.: A modular correctness proof of IEEE 802.11i and TLS. In: ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, pp. 2\u201315, November 2005","DOI":"10.1145\/1102120.1102124"},{"key":"1_CR15","unstructured":"Joux, A.: Authentication failures in NIST version of GCM. Pub. C. to NIST (2006)"},{"issue":"5","key":"1_CR16","doi-asserted-by":"publisher","first-page":"583","DOI":"10.3233\/JCS-160556","volume":"24","author":"S Kremer","year":"2016","unstructured":"Kremer, S., K\u00fcnnemann, R.: Automated analysis of security protocols with global state. J. Comput. Secur. 24(5), 583\u2013616 (2016)","journal-title":"J. Comput. Secur."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of the IEEE Computer Security Foundations Workshop (CSFW), Rockport, MA, pp. 31\u201343, June 1997","DOI":"10.1109\/CSFW.1997.596782"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-642-39799-8_48","volume-title":"Computer Aided Verification","author":"S Meier","year":"2013","unstructured":"Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696\u2013701. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_48"},{"key":"1_CR19","unstructured":"Singh, R.R., Moreira, J., Chothia, T., Ryan, M.D.: TAMARIN prover models of attacks on the 802.11 4-way handshake to verify security properties (source code and proofs) (2020). http:\/\/people.du.ac.in\/~rrsingh\/wpa2models"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-319-99073-6_16","volume-title":"Computer Security","author":"C McMahon Stone","year":"2018","unstructured":"McMahon Stone, C., Chothia, T., de Ruiter, J.: Extending automated protocol state learning for the 802.11 4-way handshake. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 325\u2013345. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99073-6_16"},{"key":"1_CR21","unstructured":"Vanhoef, M., Piessens, F.: Predicting, decrypting, and abusing WPA2\/802.11 group keys. In: Proceedings of the USENIX Security Symposium, pp. 673\u2013688 (2016)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Piessens, F.: Key reinstallation attacks: forcing nonce reuse in WPA2. In: Proceedings of the ACM Conference on Computer and Communications Security (CSS), Dallas, TX, pp. 1313\u20131328 (2017)","DOI":"10.1145\/3133956.3134027"},{"key":"1_CR23","unstructured":"Wi-Fi Alliance: Security update october 2017, October 2017. https:\/\/www.wi-fi.org\/security-update-october-2017"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59817-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,14]],"date-time":"2025-09-14T22:03:00Z","timestamp":1757887380000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59817-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030598167","9783030598174"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59817-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"16 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Security and Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guildford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iit.cnr.it\/stm2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}