Wireless networks that support client mobility have to face the challenge of providing a secure, performant handoff between different access points. IEEE 802.1X model provides a secure mechanism used by many standard protocols to securely generate keying material between two peer hosts when one of the two is accessing the network for first time, but that is hardly usable for reauthentication during handoff procedures without loss of performance. This paper deals with the proposal of a novel scheme to transport authentication credentials during handoff that uses a two-way only exchange with the backend authentication server maintaining the security of the system. As a high-level method it can be applied to different types of network, such as IEEE 802.11i infrastructure or ad-hoc mode networks in a mesh environment.
Secure, fast handhoff techniques for 802.1X based wireless network / LEONARDO MACCARI; ROMANO FANTACCI; T. PECORELLA; FEDERICO FROSALI. - STAMPA. - 9:(2006), pp. 3917-3922. (Intervento presentato al convegno International Conference on Communications (ICC) tenutosi a Istanbul nel June) [10.1109/ICC.2006.255693].
Secure, fast handhoff techniques for 802.1X based wireless network
MACCARI, LEONARDO;FANTACCI, ROMANO;PECORELLA, TOMMASO;
2006
Abstract
Wireless networks that support client mobility have to face the challenge of providing a secure, performant handoff between different access points. IEEE 802.1X model provides a secure mechanism used by many standard protocols to securely generate keying material between two peer hosts when one of the two is accessing the network for first time, but that is hardly usable for reauthentication during handoff procedures without loss of performance. This paper deals with the proposal of a novel scheme to transport authentication credentials during handoff that uses a two-way only exchange with the backend authentication server maintaining the security of the system. As a high-level method it can be applied to different types of network, such as IEEE 802.11i infrastructure or ad-hoc mode networks in a mesh environment.I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.