The handover procedure in secure communication wireless networks is an extremely time-consuming phase and it represents a critical issue in relation to time constraints required by certain real time traffic applications. In particular, in the case of IEEE 802.1X model, most of the time needed for a handover is used for packet exchanges necessary for authentication protocols, such as EAP-TLS, that needs an 8- way handshake. Designing secure re-authentication protocols to reduce the number of packets needed during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking, requiring real-time traffic and mobility. This paper presents the 802.1X model and evaluates its application to ad-hoc networks based on IEEE 802.11i or IEEE 802.16e standards, focusing on the problems that must be evaluated when designing handover procedures and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.
Analysis of Secure handover for IEEE 802.1X based Ad-Hoc Networks / R. FANTACCI; L. MACCARI; T. PECORELLA; F. FROSALI. - In: IEEE WIRELESS COMMUNICATIONS. - ISSN 1536-1284. - STAMPA. - 14:(2007), pp. 21-29. [10.1109/MWC.2007.4396939]
Analysis of Secure handover for IEEE 802.1X based Ad-Hoc Networks
FANTACCI, ROMANO;MACCARI, LEONARDO;PECORELLA, TOMMASO;
2007
Abstract
The handover procedure in secure communication wireless networks is an extremely time-consuming phase and it represents a critical issue in relation to time constraints required by certain real time traffic applications. In particular, in the case of IEEE 802.1X model, most of the time needed for a handover is used for packet exchanges necessary for authentication protocols, such as EAP-TLS, that needs an 8- way handshake. Designing secure re-authentication protocols to reduce the number of packets needed during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking, requiring real-time traffic and mobility. This paper presents the 802.1X model and evaluates its application to ad-hoc networks based on IEEE 802.11i or IEEE 802.16e standards, focusing on the problems that must be evaluated when designing handover procedures and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.File | Dimensione | Formato | |
---|---|---|---|
secure-handover-2.pdf
Accesso chiuso
Tipologia:
Altro
Licenza:
Tutti i diritti riservati
Dimensione
257.12 kB
Formato
Adobe PDF
|
257.12 kB | Adobe PDF | Richiedi una copia |
I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.