The handover procedure in secure communication wireless networks is
an extremely time-consuming phase, and it represents a critical issue
in relation to the time constraints required by certain real-time
traffic applications. In particular, in the case of the IEEE 802.1X
model, most of the time required for a handover is used for packet
exchanges that are required for authentication protocols, such as
Extensible Authentication Protocol Transport Layer Security (EAP-TLS),
that require an eight-way handshake. Designing secure re-authentication
protocols to reduce the number of packets required during a handover
is an open issue that is gaining interest with the advent of a pervasive
model of networking that requires realtime traffic and mobility.
This article presents the 802.1X model and evaluates its application
to ad hoc networks based on IEEE 802.11 i or IEEE 802.1 be standards,
focusing on the problems that must be evaluated when designing handover
procedures, and suggesting guidelines for securing handover procedures.
It also presents a novel protocol to perform secure handovers that
is respectful of the previous analysis and that has been implemented
in a mesh environment.
%0 Journal Article
%1 fantacci2007analysis
%A Fantacci, Romano
%A Maccari, Leonardo
%A Pecorella, Tommaso
%A Frosali, Federico
%D 2007
%J IEEE Wireless Commun.
%K 802.1 802.1X IEEE X-based ad applications;secure authentication communication eight-way environment;packet exchanges;real-time handover;secure handshake;mesh hoc layer model;extensible networks;IEEE networks;protocols;telecommunication networks;secure protocol protocols;IEEE re-authentication security security;telecommunication standards;ad traffic traffic; transport wireless
%N 5
%P 21--29
%R 10.1109/MWC.2007.4396939
%T Analysis of secure handover for IEEE 802.1X based wireless ad-hoc networks
%V 14
%X The handover procedure in secure communication wireless networks is
an extremely time-consuming phase, and it represents a critical issue
in relation to the time constraints required by certain real-time
traffic applications. In particular, in the case of the IEEE 802.1X
model, most of the time required for a handover is used for packet
exchanges that are required for authentication protocols, such as
Extensible Authentication Protocol Transport Layer Security (EAP-TLS),
that require an eight-way handshake. Designing secure re-authentication
protocols to reduce the number of packets required during a handover
is an open issue that is gaining interest with the advent of a pervasive
model of networking that requires realtime traffic and mobility.
This article presents the 802.1X model and evaluates its application
to ad hoc networks based on IEEE 802.11 i or IEEE 802.1 be standards,
focusing on the problems that must be evaluated when designing handover
procedures, and suggesting guidelines for securing handover procedures.
It also presents a novel protocol to perform secure handovers that
is respectful of the previous analysis and that has been implemented
in a mesh environment.
@article{fantacci2007analysis,
abstract = {The handover procedure in secure communication wireless networks is
an extremely time-consuming phase, and it represents a critical issue
in relation to the time constraints required by certain real-time
traffic applications. In particular, in the case of the IEEE 802.1X
model, most of the time required for a handover is used for packet
exchanges that are required for authentication protocols, such as
Extensible Authentication Protocol Transport Layer Security (EAP-TLS),
that require an eight-way handshake. Designing secure re-authentication
protocols to reduce the number of packets required during a handover
is an open issue that is gaining interest with the advent of a pervasive
model of networking that requires realtime traffic and mobility.
This article presents the 802.1X model and evaluates its application
to ad hoc networks based on IEEE 802.11 i or IEEE 802.1 be standards,
focusing on the problems that must be evaluated when designing handover
procedures, and suggesting guidelines for securing handover procedures.
It also presents a novel protocol to perform secure handovers that
is respectful of the previous analysis and that has been implemented
in a mesh environment.},
added-at = {2018-08-27T17:11:07.000+0200},
author = {Fantacci, Romano and Maccari, Leonardo and Pecorella, Tommaso and Frosali, Federico},
bdsk-file-1 = {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},
bdsk-url-1 = {http://dx.doi.org/10.1109/MWC.2007.4396939},
biburl = {https://www.bibsonomy.org/bibtex/239a0318a0f061025822ad651fac2e08d/tpecorella},
date-added = {2007-08-07 12:46:38 +0200},
date-modified = {2007-12-06 10:42:51 +0100},
doi = {10.1109/MWC.2007.4396939},
file = {:/Users/pecos/Documents/Personalia/pubblicazioni/Pubblicazioni/secure-handover.pdf:PDF},
interhash = {ab085b6df1cb67bb191187ba4876e22f},
intrahash = {39a0318a0f061025822ad651fac2e08d},
issn = {1536-1284},
journal = {{IEEE} Wireless Commun.},
keywords = {802.1 802.1X IEEE X-based ad applications;secure authentication communication eight-way environment;packet exchanges;real-time handover;secure handshake;mesh hoc layer model;extensible networks;IEEE networks;protocols;telecommunication networks;secure protocol protocols;IEEE re-authentication security security;telecommunication standards;ad traffic traffic; transport wireless},
month = {Oct.},
number = 5,
pages = {21--29},
timestamp = {2018-08-27T17:11:07.000+0200},
title = {Analysis of secure handover for {IEEE 802.1X} based wireless ad-hoc networks},
volume = 14,
year = 2007
}