The handover procedure in secure communication wireless networks is an extremely time-consuming phase and it represents a critical issue in relation to time constraints required by certain real time traffic applications. In particular, in the case of IEEE 802.1X model, most of the time needed for a handover is used for packet exchanges necessary for authentication protocols, such as EAP-TLS, that needs an 8- way handshake. Designing secure re-authentication protocols to reduce the number of packets needed during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking, requiring real-time traffic and mobility. This paper presents the 802.1X model and evaluates its application to ad-hoc networks based on IEEE 802.11i or IEEE 802.16e standards, focusing on the problems that must be evaluated when designing handover procedures and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.

Analysis of Secure handover for IEEE 802.1X based Ad-Hoc Networks / R. FANTACCI; L. MACCARI; T. PECORELLA; F. FROSALI. - In: IEEE WIRELESS COMMUNICATIONS. - ISSN 1536-1284. - STAMPA. - 14:(2007), pp. 21-29. [10.1109/MWC.2007.4396939]

Analysis of Secure handover for IEEE 802.1X based Ad-Hoc Networks

FANTACCI, ROMANO;MACCARI, LEONARDO;PECORELLA, TOMMASO;
2007

Abstract

The handover procedure in secure communication wireless networks is an extremely time-consuming phase and it represents a critical issue in relation to time constraints required by certain real time traffic applications. In particular, in the case of IEEE 802.1X model, most of the time needed for a handover is used for packet exchanges necessary for authentication protocols, such as EAP-TLS, that needs an 8- way handshake. Designing secure re-authentication protocols to reduce the number of packets needed during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking, requiring real-time traffic and mobility. This paper presents the 802.1X model and evaluates its application to ad-hoc networks based on IEEE 802.11i or IEEE 802.16e standards, focusing on the problems that must be evaluated when designing handover procedures and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.
2007
14
21
29
R. FANTACCI; L. MACCARI; T. PECORELLA; F. FROSALI
File in questo prodotto:
File Dimensione Formato  
secure-handover-2.pdf

Accesso chiuso

Tipologia: Altro
Licenza: Tutti i diritti riservati
Dimensione 257.12 kB
Formato Adobe PDF
257.12 kB Adobe PDF   Richiedi una copia

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/252296
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 15
  • ???jsp.display-item.citation.isi??? 5
social impact