A secure and performant token-based authentication for infrastructure and mesh 802.1X networks

نویسندگان

  • Romano Fantacci
  • Leonardo Maccari
  • Tommaso Pecorella
  • Federico Frosali
چکیده

This work deals with the design of secure handoff protocols for wireless networks using the security model introduced by IEEE 802.1X standard. The key exchange model introduced in the standard might be implemented in multiple ways each one carrying advantages and disadvantages in terms of security and performance when applied to reauthentication protocol. After the analysis of different model of reauthentication we introduce a novel scheme based on token exchange to speed up the handoff phase. This protocol variant was designed and implemented as a prototype in a joint project between University of Florence and Telecom Italia Laboratories, and proved better performances than standard protocols while maintaining a high security level.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Securing Wireless Local Area Networks Based on Ieee 802.1x and X.509 Certificates

Deploying a secure WLAN is an especial challenge, because there are a number of extremely risks. These risks will have to be thwarted by the use of stronger security mechanisms while keeping an adequate level of network performance. The 802.1X authentication standard provides a method to protect the network behind the access point based on Extensible Authentication Protocol (EAP). Moreover, in ...

متن کامل

Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

متن کامل

Cross-organisational roaming on wireless LANs based on the 802.1X framework Author:

Introduction Most institutions within the SURFnet constituency are deploying or have concrete plans to deploy wireless LAN (WLAN) services for their students and employees. At the same time there is an increasing awareness of the risks involved in deploying these kinds of services. SURFnet, in turn, has the ambition to provide an infrastructure for crossinstitutional (both nationally and intern...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006