Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Federico Frosali is active.

Publication


Featured researches published by Federico Frosali.


IEEE Wireless Communications | 2007

Analysis of secure handover for IEEE 802.1x-based wireless ad hoc networks

Romano Fantacci; Leonardo Maccari; Tommaso Pecorella; Federico Frosali

The handover procedure in secure communication wireless networks is an extremely time-consuming phase, and it represents a critical issue in relation to the time constraints required by certain real-time traffic applications. In particular, in the case of the IEEE 802.1X model, most of the time required for a handover is used for packet exchanges that are required for authentication protocols, such as Extensible Authentication Protocol Transport Layer Security (EAP-TLS), that require an eight-way handshake. Designing secure re-authentication protocols to reduce the number of packets required during a handover is an open issue that is gaining interest with the advent of a pervasive model of networking that requires realtime traffic and mobility. This article presents the 802.1X model and evaluates its application to ad hoc networks based on IEEE 802.11 i or IEEE 802.1 be standards, focusing on the problems that must be evaluated when designing handover procedures, and suggesting guidelines for securing handover procedures. It also presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment.


international conference on communications | 2006

Secure, fast handhoff techniques for 802.1X based wireless network

Leonardo Maccari; Romano Fantacci; Tommaso Pecorella; Federico Frosali

Wireless networks that support client mobility have to face the challenge of providing a secure, performant handoff between different access points. IEEE 802.1X [1] model provides a secure mechanism used by many standard protocols to securely generate keying material between two peer hosts when one of the two is accessing the network for first time, but that is hardly usable for reauthentication during handoff procedures without loss of performance. This paper deals with the proposal of a novel scheme to transport authentication credentials during handoff that uses a two-way only exchange with the backend authentication server maintaining the security of the system. As a high-level method it can be applied to different types of network, such as IEEE 802.11i [2] infrastructure or ad-hoc mode networks in a mesh environment.


international conference on wireless communications and mobile computing | 2010

Analysis and design of a TETRA-DMO and IEEE 802.11 integrated network

Luca Adamo; Romano Fantacci; Matteo Rosi; Daniele Tarchi; Federico Frosali

During last years modern telecommunication systems have achieved important results in terms of reliability, coverage and data rate, allowing a high variety of applications services. Among others, TETRA (Terrestrial Trunked Radio) is one of the most important in the professional market; in particular, the DMO (Direct Mode Operation) mode allows half-duplex direct communications among users without the need of an infrastructure. However, TETRA-DMO cannot perform multi-hop communications, limiting both the coverage and the scalability of the whole network. The idea behind our proposal is an integration between TETRA-DMO and another more flexible wireless system (e.g., IEEE 802.11), where the TETRA-DMO is the access technology, thus allowing the use of standard TETRA-DMO terminals, while the IEEE 802.11 technology can be used as a flexible multi-hop meshed backbone technology for interconnecting remote TETRA-DMO areas.


Archive | 2006

Method and system for enforcing security polices in manets

Luciana Costa; Giorgio Freguglia; Federico Frosali


Archive | 2004

Method and System for Detecting Attacks in Wireless Data Communications Networks

Luigi Sperti; Maria José Mollo; Federico Frosali; Giorgio Freguglia


Archive | 2003

Method and apparatus for monitoring operation of processing systems, related network and computer program product therefor

Gianluca Cangini; Gerardo Lamastra; Francesco Coda Zabetta; Paolo Abeni; Madalina Baltatu; Rosalia D'Alessandro; Stefano Brusotti; Sebastiano Di Paola; Manuel Leone; Federico Frosali


Archive | 2005

Method and system for automated and secure provisioning of service access credentials for on-line services to users of mobile communication terminals

Luciana Costa; Paolo De Lutiis; Federico Frosali


Archive | 2005

Short authentication procedure in wireless data communications networks

Luciana Costa; Giorgio Freguglia; Federico Frosali; Romano Fantacci; Leonardo Maccari; Tommaso Pecorella


Archive | 2006

Verfahren und system zum durchsetzen von sicherheitsrichtlinien in manets

Luciana Costa; Giorgio Freguglia; Federico Frosali


Archive | 2005

Method and system for automated and secure provisioning of service access credentials for on-line services

Luciana Costa; Lutiis Paolo De; Federico Frosali

Collaboration


Dive into the Federico Frosali's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge