Federico Frosali

Learn More
— This work deals with the design of secure handoff protocols for wireless networks using the security model introduced by IEEE 802.1X standard. The key exchange model introduced in the standard might be implemented in multiple ways each one carrying advantages and disadvantages in terms of security and performance when applied to reauthentication protocol.(More)
— Wireless networks that support client mobility have to face the challenge of providing a secure, performant handoff between different access points. IEEE 802.1X [1] model provides a secure mechanism used by many standard protocols to securely generate keying material between two peer hosts when one of the two is accessing the network for first time, but(More)
During last years modern telecommunication systems have achieved important results in terms of reliability, coverage and data rate, allowing a high variety of applications services. Among others, TETRA (Terrestrial Trunked Radio) is one of the most important in the professional market; in particular, the DMO (Direct Mode Operation) mode allows half-duplex(More)
  • 1