The handover procedure in secure communication wireless networks is an extremely time-consuming phase and it represents a critical issue in relation to time constraints required by certain real time traffic applications. In particular, in the case of IEEE 802.1X model, most of the time needed for a handover is used for packet exchanges necessary for authentication protocols, such as EAP-TLS, that needs an 8- way handshake. Designing secure re-authentication protocols to reduce the number of packets needed during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking, requiring real-time traffic and mobility. This paper presents the 802.1X model and evaluates its application to ad-hoc networks based on IEEE 802.11i or IEEE 802.16e standards, focusing on the problems that must be evaluated when designing handover procedures and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.

The handover procedure in secure communication wireless networks is an extremely time-consuming phase, and it represents a critical issue in relation to the time constraints required by certain real-time traffic applications. In particular, in the case of the IEEE 802.1X model, most of the time required for a handover is used for packet exchanges that are required for authentication protocols, such as Extensible Authentication Protocol Transport Layer Security (EAP-TLS), that require an eight-way handshake. Designing secure re-authentication protocols to reduce the number of packets required during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking that requires real-time traffic and mobility. This article presents the 802.1X model and evaluates its application to ad hoc networks based on IEEE 802.11i or IEEE 802.16e standards, focusing on the problems that must be evaluated when designing handover procedures, and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.

Analysis of Secure handover for IEEE 802.1X based Ad-Hoc Networks

MACCARI, LEONARDO;
2007-01-01

Abstract

The handover procedure in secure communication wireless networks is an extremely time-consuming phase, and it represents a critical issue in relation to the time constraints required by certain real-time traffic applications. In particular, in the case of the IEEE 802.1X model, most of the time required for a handover is used for packet exchanges that are required for authentication protocols, such as Extensible Authentication Protocol Transport Layer Security (EAP-TLS), that require an eight-way handshake. Designing secure re-authentication protocols to reduce the number of packets required during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking that requires real-time traffic and mobility. This article presents the 802.1X model and evaluates its application to ad hoc networks based on IEEE 802.11i or IEEE 802.16e standards, focusing on the problems that must be evaluated when designing handover procedures, and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.
File in questo prodotto:
File Dimensione Formato  
secure-handover.pdf

non disponibili

Tipologia: Documento in Post-print
Licenza: Copyright dell'editore
Dimensione 257.12 kB
Formato Adobe PDF
257.12 kB Adobe PDF   Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/5100010
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 17
  • ???jsp.display-item.citation.isi??? 7
social impact