Federico Frosali

Learn More
This work deals with the design of secure handoff protocols for wireless networks using the security model introduced by IEEE 802.1X standard. The key exchange model introduced in the standard might be implemented in multiple ways each one carrying advantages and disadvantages in terms of security and performance when applied to reauthentication protocol.(More)
Wireless networks that support client mobility have to face the challenge of providing a secure, performant handoff between different access points. IEEE 802.1X [1] model provides a secure mechanism used by many standard protocols to securely generate keying material between two peer hosts when one of the two is accessing the network for first time, but(More)
The handover procedure in secure communication wireless networks is an extremely timeconsuming phase, and it represents a critical issue in relation to the time constraints required by certain real-time traffic applications. In particular, in the case of the IEEE 802.1X model, most of the time required for a handover is used for packet exchanges that are(More)
During last years modern telecommunication systems have achieved important results in terms of reliability, coverage and data rate, allowing a high variety of applications services. Among others, TETRA (Terrestrial Trunked Radio) is one of the most important in the professional market; in particular, the DMO (Direct Mode Operation) mode allows half-duplex(More)
  • 1