Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Luciana Costa is active.

Publication


Featured researches published by Luciana Costa.


international symposium on computers and communications | 2015

Formal verification of LTE-UMTS handover procedures

Piergiuseppe Bettassa Copet; Guido Marchetto; Riccardo Sisto; Luciana Costa

Long Term Evolution (LTE) is the most recent standard in mobile communications, introduced by 3rd Generation Partnership Project (3GPP). Most of the formal security analysis works in literature about LTE analyze authentication procedures, while interoperability is far less considered. This paper presents a formal security analysis of the interoperability procedures between LTE and the older Universal Mobile Telecommunications System (UMTS) networks, when mobile devices seamlessly switch between the two technologies. The ProVerif tool has been used to conduct the verification. The analysis shows that security properties (secrecy of keys, including backward/forward secrecy, immunity from off-line guessing attacks and network components authentication) hold almost as expected, if all the protections allowed by the LTE standard are adopted. If backhauling traffic is not protected with IPSec, which is a common scenario since the use of IPSec is not mandatory, some security properties still hold while others are compromised. Consequently, users traffic and networks nodes are exposed to attacks in this scenario.


Computer Standards & Interfaces | 2017

Formal verification of LTE-UMTS and LTE-LTE handover procedures

Piergiuseppe Bettassa Copet; Guido Marchetto; Riccardo Sisto; Luciana Costa

Long Term Evolution (LTE) is the most recent standard in mobile communications, introduced by 3rd Generation Partnership Project (3GPP). Most of the works in literature about LTE security analyze authentication procedures, while handover procedures are far less considered. This paper focuses on the procedures that are activated when a mobile device moves between different LTE cells and between LTE and the older Universal Mobile Telecommunications System (UMTS) networks and completes previous results with a deeper formal analysis of these procedures. The analysis shows that security properties (secrecy of keys, including backward/forward secrecy, immunity from off-line guessing attacks, and network components authentication) hold almost as expected in nominal conditions, i.e. when all backhaul links are secured and all backhaul nodes are trusted. The paper also analyses how these security properties are affected by possible anomalous situations, such as a compromised backhaul node or a misconfiguration by which a backhaul link becomes not protected and can be accessed by an attacker. The analysis shows that some security properties hold even in these adverse cases while other properties are compromised. HighlightsWe formally model four handover procedures between LTE-UMTS and LTE-LTE nodes.The standards define some optional security features, and operator can ignore them.All the possible combinations of security policies have been considered.The analysis found vulnerabilities when optional security mechanism are disabled.


Innovations in Systems and Software Engineering | 2011

Malware Detection and Prevention Platform: Telecom Italia Case Study

Luciana Costa; Roberta D’Amico

This paper illustrates the botnet problem, its impact and the need of security measures. By reviewing the existing literature regarding the botnet detection solutions the paper evidences the important role an ISP could take to better safeguard the user reducing in the meantime the spreading of the botnet phenomenon. The malware detection and prevention platform that Telecom Italia has defined is described. The aim is to minimize the potential harm that bots can inflict upon Internet infrastructure and to provide a detection and notification way to the users when their machines try to access a malware domain or when there is evidence that their computers have been compromised.


Archive | 2006

Method and system for enforcing security polices in manets

Luciana Costa; Giorgio Freguglia; Federico Frosali


Archive | 2004

Method and system for controlling access to communication networks, related network and computer program therefor

Luciana Costa; Simone Ruffino; Patrick Stupar


Archive | 2005

Method and system for automated and secure provisioning of service access credentials for on-line services to users of mobile communication terminals

Luciana Costa; Paolo De Lutiis; Federico Frosali


Archive | 2005

Short authentication procedure in wireless data communications networks

Luciana Costa; Giorgio Freguglia; Federico Frosali; Romano Fantacci; Leonardo Maccari; Tommaso Pecorella


Archive | 2003

Method for network selection in communication networks, related network and computer program product therefor

Antonio Ascolese; Luciana Costa; Luca Dell'Uomo; Simone Ruffino; Marco Spini


Archive | 2008

Method for Increasing Security in a Passive Optical Network

Luciana Costa; Roberta D'Amico; Paolo De Lutiis; Manuel Leone; Maurizio Valvo; Paolo Solina


Archive | 2008

Method for localizing an optical termination device in a passive optical network

Luciana Costa; Roberta D'Amico; Paolo De Lutiis; Luca Viale

Collaboration


Dive into the Luciana Costa's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge