CN103096310A - Sensor network communication method and device and sensor network panel point device and gateway device - Google Patents

Sensor network communication method and device and sensor network panel point device and gateway device Download PDF

Info

Publication number
CN103096310A
CN103096310A CN2011103499291A CN201110349929A CN103096310A CN 103096310 A CN103096310 A CN 103096310A CN 2011103499291 A CN2011103499291 A CN 2011103499291A CN 201110349929 A CN201110349929 A CN 201110349929A CN 103096310 A CN103096310 A CN 103096310A
Authority
CN
China
Prior art keywords
node
key
sensor network
gateway
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103499291A
Other languages
Chinese (zh)
Inventor
匡尚超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN2011103499291A priority Critical patent/CN103096310A/en
Publication of CN103096310A publication Critical patent/CN103096310A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a sensor network communication method and a device and a sensor network panel point device and a gateway device. According to the implement scheme, a sensor network comprises a plurality of panel joints and at least one gateway. The sensor network communication method comprises a step of distributing a common first secret key for the panel joints, a step of distributing different second secret keys for the panel joints, a step of encrypting broadcast data in the sensor network by means of the common first secret key, and a step of encrypting business data between the specific panel joints and the gateway by means of the second secret keys of specific panel joints. In the sensor network communication method, each panel joint can save the common first secret key and respective second secret key, and the gateway saves the first secret key and second secret keys of all panel joints. According to the sensor network communication method and the device, complexity of encryption communication in the sensor network can be reduced, and safety of the sensor network communication is improved.

Description

Sensor Network communication means and device and sensing net node device and gateway device
Technical field
The application relates to wireless communication field, relates in particular to Sensor Network communication means and device and sensing net node device and gateway device.
Background technology
In existing Sensor Network, the node of Sensor Network sends broadcast data packet by periodicity, collects the link quality information of node on every side, to select the via node of packet redirect.
For the communication security of Sensor Network, can adopt cipher mode to carry out data communication.Existing ZigBee-network cipher mode mainly contains two kinds: first kind of way is to adopt single key, that is, each node uses same communication key.Another kind of mode is that each node adopts different communication keys.
For first kind of way, if public key is acquired, the information of transmitting between all nodes in Sensor Network all will be stolen.And for the second way, each node need be preserved the communication key of all nodes, can increase like this node burden and key management difficulty.For example, if carry out the communication key upgrading of certain node, will be to the communication key upgrading of this node of preserving in all nodes.
Summary of the invention
For the fail safe that solves Sensor Network coded communication in prior art and the problem of difficulty, the application has proposed a kind of Sensor Network communication means and device and sensing net node device and gateway device.
An aspect according to the application has proposed a kind of Sensor Network communication means, and wherein, described Sensor Network can comprise a plurality of nodes and at least one gateway.This Sensor Network communication means can comprise: be that described a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in described a plurality of nodes; And, with the broadcast data in described the first described Sensor Network of secret key encryption, with the described specific node of the second secret key encryption of specific node in described a plurality of nodes and the business datum between described gateway.Wherein, each node can be preserved described the first key and the second key separately, and described gateway can be preserved the second key of described the first key and each node.
According to another aspect of the application, a kind of Sensor Network communicator has been proposed, wherein, described Sensor Network comprises a plurality of nodes and at least one gateway.This Sensor Network communicator can comprise: distribution module is that described a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in described a plurality of nodes; And encrypting module, with the broadcast data in described the first described Sensor Network of secret key encryption, with the business datum between the described specific node of the second secret key encryption of the specific node in described a plurality of nodes and described gateway.Wherein, each node can be preserved described the first key and the second key separately, and described gateway can be preserved the second key of described the first key and each node.
Another aspect according to the application, a kind of sensing net node device has been proposed, can comprise: key is preserved module, preserve the first key and the second key, wherein, all node apparatus of Sensor Network are assigned with the first public key, and each specific node apparatus is assigned with the second key that differs from one another; And encrypting module, with the data encryption of the first key to node apparatus broadcasting, with the second key, the business datum between node apparatus and gateway is encrypted.
According to another aspect of the application, a kind of sensor network gateway equipment has been proposed, wherein, Sensor Network can comprise management server and a plurality of node.This gateway device can comprise: the key reception module receives the first key and for the second key of specific node from management server; Key is preserved module, preserves the first key and the second key; The key sending module sends to each node in described a plurality of node with the first key, and the second key is sent to described specific node; And encrypting module, with the data encryption of the first key to gateway device broadcasting, with the second key, the business datum between gateway device and described specific node is encrypted.
According to the application's method and apparatus, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
Description of drawings
Fig. 1 is the flow chart according to the Sensor Network communication means of an embodiment of the application;
Fig. 2 is the flow chart according to the Sensor Network communication means of another embodiment of the application;
Fig. 3 is the block diagram according to the Sensor Network communicator of an embodiment of the application;
Fig. 4 is the block diagram according to the Sensor Network communicator of another embodiment of the application;
Fig. 5 is the block diagram according to the sensing net node device of an embodiment of the application;
Fig. 6 is the block diagram according to the sensor network gateway equipment of an embodiment of the application;
Fig. 7 is the flow chart that the broadcast key according to the application's specific embodiment issues;
Fig. 8 is the flow chart according to the business datum delivering key of the application's specific embodiment; And
Fig. 9 is the flow chart according to the blacklist Reconfigurations of the application's specific embodiment.
Embodiment
With reference to the accompanying drawings, the application's embodiment is elaborated.
In this application, Sensor Network can comprise a plurality of nodes and at least one gateway.The node of Sensor Network is positioned at Sensor Network inside, can be responsible for information gathering, and with communication to gateway.The node of Sensor Network can send broadcast data packet by periodicity, collects the link quality information of node on every side, to select the via node of packet redirect.The gateway of Sensor Network can carry out with the node of Sensor Network communicating by letter of the data such as image data information, parameter configuration or control command information as the part of Sensor Network.In Sensor Network, except gateway and node, for Sensor Network is managed operation, also can further comprise management server, perhaps also can be known as management platform.
At first the below sees figures.1.and.2, and describes the Sensor Network communication means according to the application's first aspect.
With reference to Fig. 1, in the Sensor Network communication means according to an embodiment of the application, at step S1002, a plurality of nodes that can be in Sensor Network distribute the first public key, for each node in these nodes distributes the second key that differs from one another.Then at step S1004, with the broadcast data in the first public secret key encryption Sensor Network of a plurality of nodes, with exclusive this node of the second secret key encryption of each node and the business datum between gateway.In method as shown in Figure 1, each node is all preserved the first public key and the second key separately, and gateway is preserved the first public key and the second key of each node.
Can find out, according to method shown in Figure 1, in a plurality of nodes, each all preserves the first public key, like this, when certain node receive other node broadcasts, during in order to the broadcast data after the encryption of measuring link-quality, can the broadcast data of encrypting be decrypted with the first public key of preserving.In addition, each node is only preserved the second key of oneself, is used for the business datum between this node and gateway is encrypted and deciphers, and like this, when the second key to individual node upgrades, will can not exert an influence to other nodes, is convenient to key management.Therefore, method shown in Figure 1 can reduce the complexity of coded communication in Sensor Network, improves the fail safe of Sensor Network communication.
Hereinafter, in order to have described convenience, the first key that a plurality of nodes in Sensor Network are shared is called " broadcast key ", and the second key that each node is exclusive is called " business datum key ".
In the Sensor Network communication means according to the application's embodiment, if first node is received the business datum secret key encryption with Section Point, the business datum to gateway to be sent, first node only carries out route according to the destination address of the business datum after encrypting, and the content of this business datum is not processed.
Next with reference to Fig. 2, the Sensor Network communication means according to another embodiment of the application is described.
Step S2002 as shown in Figure 2 and S2004 and step S1002 and S1004 shown in Figure 1 are similar, repeat no more herein.
In step S2006 shown in Figure 2, the list (that is, blacklist) that includes at least one trustless node can be sent to the trusted node outside trustless node in the gateway of Sensor Network and a plurality of node.Then at step S2008, the trusted node is when carrying out Route Selection, and trustless node that will not be included in blacklist is elected to be via node.A non-limiting example according to this embodiment, node is when selecting route, can first select the node of link-quality best path, then judge that this node is whether in blacklist, as being not or not father node carries out route selecting it, otherwise, continue to judge that the node in link-quality second-best path is whether in the route blacklist, by that analogy.In addition, at step S2008, the trusted node is not processed it when the packet of receiving from trustless node, directly abandons this packet.
Because Sensor Network uses ad hoc network usually, generally be difficult to the human intervention network topology structure.If certain node is invaded, may threaten the communication security of other node datas take this node as route.By the route blacklist being issued to each node of Sensor Network, make node data not sent to invaded trustless node when selecting route, forward without trustless node when namely controlling other node the transmission of datas, thereby the invaded node in Sensor Network is isolated, to improve the communications security of Sensor Network.
When being appreciated that at blacklist and changing (for example, new trustless node detected or certain trustless node becomes the trusted node), can upgrade operation to blacklist, the blacklist after upgrading is resend to gateway and each trusted node.As a kind of selection, also can be only the change information of new blacklist and old blacklist be sent to gateway and each trusted node of Sensor Network, by gateway and node to the blacklist operation of modifying.
Although step S2006 shown in Figure 2 and S2008 carry out after step S2002 and S2004, but be appreciated that, the execution of step S2006 and S2008 and step S2002 and S2004 there is no inevitable sequencing, also can first execution in step S2006 and the blacklist communication mechanism of S2008, and then execution in step S2002 and S2004 cipher key distribution mechanisms.
Next with reference to Fig. 3 and Fig. 4, the Sensor Network communicator according to the application's second aspect is described.
As shown in Figure 3, the Sensor Network communicator 30 according to an embodiment of the application can comprise encryption key distribution module 302 and key sending module 304.Encryption key distribution module 302 can be used for for a plurality of nodes in Sensor Network distribute public the first key (or " broadcast key "), and is the second key (or " business datum key ") that each node distribution in a plurality of nodes differs from one another.Key sending module 304 can send to gateway with the first key, and sends to each node in a plurality of nodes via gateway, the second key of each node in a plurality of nodes is sent to gateway, and send to corresponding node via gateway.Therefore, each node can be preserved public broadcast key, and preserves separately its exclusive business datum key, and gateway had both been preserved the business datum key that broadcast key is preserved each node.
Be appreciated that Sensor Network communicator 30 shown in Figure 3 can realize on the management platform of Sensor Network, manage control so that the encryption key distribution in Sensor Network and key are sent.
By Sensor Network communicator shown in Figure 3, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
Next with reference to Fig. 4, the Sensor Network communicator 40 according to another embodiment of the application is described.
Sensor Network communicator 40 can comprise encryption key distribution module 402, key sending module 404 and blacklist module 406, wherein, encryption key distribution module 402 and key sending module 404 are similar with encryption key distribution module 302 and key sending module 304 shown in Figure 3, repeat no more herein.
The blacklist module 406 of Sensor Network communicator 40 can send to the blacklist that comprises at least one trustless node the gateway of Sensor Network, and sends to the trusted node except trustless node in a plurality of nodes via gateway.
By blacklist module 406, when can there be invaded node in Sensor Network communicator 40 in Sensor Network, inform all trusted nodes, the node that has potential safety hazard is isolated, thus the communications security of raising Sensor Network.
Next with reference to Fig. 5, the sensing net node device according to the application's embodiment is described.
Sensing net node device 50 as shown in Figure 5 can comprise key preservation module 502 and encrypting module 504.Key is preserved module 502 and can be preserved for the first public key of all node apparatus in Sensor Network (" broadcast key ") with for the second exclusive key of each node apparatus (" business datum key ").The broadcast data that encrypting module 504 can use the first key that node apparatus is broadcasted is encrypted, and uses the second key that the business datum between node apparatus and gateway is encrypted.
By sensing net node device 50 shown in Figure 5, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
According to an embodiment, if the first node device is received the business datum with the second secret key encryption of Section Point device, the first node device can only carry out route according to the destination address of the data of receiving, and content is not processed.
A kind of modification as sensing net node device 50 shown in Figure 5, except key is preserved module and encrypting module, the sensing net node device can comprise further that also blacklist is preserved the module (not shown), route is screened module (not shown) and data discard module (not shown).
The blacklist of sensing net node device is preserved module can preserve blacklist, and wherein, blacklist comprises at least one trustless node.When carrying out Route Selection, route screening module is not elected to be via node with trustless node.The data discard module when receiving the data that trustless node sends, abandons this data.
By the blacklist treatment mechanism of the present embodiment, in Sensor Network communication, can isolate the node that has potential safety hazard, thus the communications security of raising Sensor Network.
Below with reference to Fig. 6, the sensor network gateway equipment according to the application's embodiment is described.
As shown in Figure 6, sensor network gateway equipment 60 can comprise key reception module 602, key preservation module 604, key sending module 606 and encrypting module 608.Wherein, key reception module 602 receives the first key and the second key from management server, and wherein, the first key is the public broadcast key of a plurality of nodes in Sensor Network, and the second key is the business datum key for certain specific node.Key is preserved module 604 and can be preserved the first key and the second key that receive.Key sending module 606 can send to the first key each node of Sensor Network, and the second key is sent to corresponding specific node.The data that encrypting module 608 can use the first key that gateway device is broadcasted are encrypted, and with the second key, gateway device are encrypted to the business datum that specific node sends.
By above-mentioned gateway device, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
According to a kind of modified embodiment, except module shown in Figure 6, sensor network gateway equipment also can further comprise: blacklist receiver module (not shown), blacklist are preserved module (not shown) and blacklist sending module (not shown).Wherein, the blacklist receiver module can receive the list that includes at least one trustless node, i.e. blacklist from management server.Blacklist is preserved module can preserve received blacklist.The blacklist sending module can send to blacklist the trusted node of Sensor Network, i.e. other nodes except the node that blacklist comprises.
By the blacklist treatment mechanism of the present embodiment, in Sensor Network communication, can isolate the node that has potential safety hazard, thus the communications security of raising Sensor Network.
Next arrive Fig. 9 with reference to Fig. 7, the broadcast key of describing in detail according to the application's specific embodiment issues flow process, business datum delivering key flow process and blacklist configuration flow.
The broadcast key that Fig. 7 shows according to specific embodiment issues flow process.
At first, Sensor Network communicator 702 generates broadcast key KeyB at step S7002, and it is stored in this locality, then by for example mobile radio communication, broadcast key KeyB is synchronized to gateway 704 at step S7004.Gateway 704 is resolved the information of receiving at step S7006, and stored broadcast key K eyB, then utilizes the Sensor Network agreement at step S7008, and broadcast key KeyB is synchronized to inner all nodes (only showing node 706 in figure) of Sensor Network.Node 706 carries out this locality storage at step S7010 with the broadcast key KeyB that receives, and returns success message to gateway 704 at step S7012.Gateway 704 sends success message to Sensor Network communicator 702 at step S7014 after receiving the success message of all nodes.
Fig. 8 shows the business datum delivering key flow process according to specific embodiment.
At first, Sensor Network communicator 802 generates the business datum key K eyD1 of node 806 at step S8002, and it is stored in this locality, then by for example mobile radio communication, business datum key K eyD1 is synchronized to gateway 804 at step S8004.Gateway 804 is resolved the information of receiving at step S8006, and storage service data key KeyD1, then utilizes the Sensor Network agreement at step S8008, and business datum key K eyD1 is synchronized to node 806.Node 806 carries out this locality storage at step S8010 with the business datum key K eyD1 that receives, and returns success message to gateway 804 at step S8012.Gateway 804 sends success message to Sensor Network communicator 802 at step S8014 after the success message of receiving node 806.
Fig. 9 shows the blacklist Reconfigurations flow process according to specific embodiment.
Sensor Network communicator 902 will increase trustless node newly at step S9002 and add blacklist, then by for example mobile radio communication, the blacklist lastest imformation will be synchronized to gateway 904 at step S9004.Gateway 904 is at the information analysis of step S9006 to receiving, and will increase trustless node newly and add blacklist, and utilize the Sensor Network agreement that the blacklist lastest imformation is synchronized to all trusted nodes (namely at step S9008, node the node that comprises in blacklist only shows node 906 in figure).Node 906 will increase trustless node newly at step S9010 and add blacklist, and return success message at step S9012.Gateway 904 sends success message to Sensor Network communicator 902 at step S9014 after receiving that the blacklist that removes the trusted node is updated successfully message.
Abovely be described with reference to the exemplary embodiment of accompanying drawing to the application.It should be appreciated by those skilled in the art that above-mentioned embodiment is only the example of lifting for illustrative purposes, rather than be used for limiting.All in the application instruction and the claim protection range under do any modification, be equal to replacement etc., all should be included in the claimed scope of the application.

Claims (10)

1. Sensor Network communication means, wherein, described Sensor Network comprises a plurality of nodes and at least one gateway, described method comprises:
Be that described a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in described a plurality of nodes; And
With the broadcast data in described the first described Sensor Network of secret key encryption, with the described specific node of the second secret key encryption of specific node in described a plurality of nodes and the business datum between described gateway,
Wherein, each node is preserved described the first key and the second key separately, and described gateway is preserved the second key of described the first key and each node.
2. Sensor Network communication means as claimed in claim 1, wherein, if first node is received the business datum with the second secret key encryption of Section Point, described first node only carries out route according to the destination address of described business datum, and the content of described business datum is not processed.
3. Sensor Network communication means as claimed in claim 1 or 2 further comprises:
The list that will comprise at least one trustless node sends to the trusted node in described gateway and described a plurality of node; And
Described trusted node is not elected to be via node with trustless node when carrying out Route Selection, and described trusted node abandons this data when receiving the data that trustless node sends.
4. Sensor Network communicator, wherein, described Sensor Network comprises a plurality of nodes and at least one gateway, described device comprises:
The encryption key distribution module is that a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in a plurality of nodes; And
The key sending module sends to the first key gateway and sends to each in a plurality of nodes via gateway, and the second key of each specific node is sent to gateway and sends to this specific node via gateway,
Wherein, the first key is in order to encrypt the broadcast data in Sensor Network, and the second key of a node is in order to encrypt the business datum between this node and gateway.
5. Sensor Network communicator as claimed in claim 4 further comprises:
Blacklist module, the list that will comprise at least one trustless node send to gateway and send to trusted node in a plurality of nodes via gateway.
6. sensing net node device comprises:
Key is preserved module, preserves the first key and the second key; And
Encrypting module with the data encryption of the first key to node apparatus broadcasting, is encrypted the business datum between node apparatus and gateway with the second key.
7. node apparatus as claimed in claim 6, wherein, if the first node device is received the business datum with the second secret key encryption of Section Point device, the first node device only carries out route according to the destination address of the data of receiving, and content is not processed.
8. node apparatus as described in claim 6 or 7 further comprises:
Blacklist is preserved module, preserves the list that includes at least one trustless node;
Route screening module, when carrying out Route Selection, described route screening module is not elected to be via node with trustless node; And
The data discard module when receiving the data that trustless node sends, abandons this data.
9. sensor network gateway equipment, wherein, described Sensor Network comprises management server and a plurality of node, described gateway device comprises:
The key reception module receives the first key and for the second key of specific node from management server;
Key is preserved module, preserves the first key and the second key;
The key sending module sends to each node in described a plurality of node with the first key, and the second key is sent to described specific node; And
Encrypting module with the data encryption of the first key to gateway device broadcasting, is encrypted the business datum between gateway device and described specific node with the second key.
10. gateway device as claimed in claim 9 further comprises:
The blacklist receiver module receives the list that includes at least one trustless node from management server;
Blacklist is preserved module, preserves the described list that includes at least one trustless node; And
The blacklist sending module sends to trusted node in described a plurality of node with the described list that includes at least one trustless node.
CN2011103499291A 2011-11-08 2011-11-08 Sensor network communication method and device and sensor network panel point device and gateway device Pending CN103096310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103499291A CN103096310A (en) 2011-11-08 2011-11-08 Sensor network communication method and device and sensor network panel point device and gateway device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103499291A CN103096310A (en) 2011-11-08 2011-11-08 Sensor network communication method and device and sensor network panel point device and gateway device

Publications (1)

Publication Number Publication Date
CN103096310A true CN103096310A (en) 2013-05-08

Family

ID=48208328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103499291A Pending CN103096310A (en) 2011-11-08 2011-11-08 Sensor network communication method and device and sensor network panel point device and gateway device

Country Status (1)

Country Link
CN (1) CN103096310A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827587A (en) * 2015-01-27 2016-08-03 瑞萨电子株式会社 Relay apparatus, terminal apparatus, and communication method
CN108494726A (en) * 2018-02-02 2018-09-04 大势至(北京)软件工程有限公司 Network access control method and system based on ARP replacement and filtration drive
CN113453224A (en) * 2020-03-24 2021-09-28 阿里巴巴集团控股有限公司 Gateway, data transmission method and data processing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159748A (en) * 2007-11-14 2008-04-09 北京科技大学 Entity authentication method in wireless sensor network
CN101699873A (en) * 2009-10-21 2010-04-28 南京邮电大学 Classification security-based broadcast authentication design method
CN102186170A (en) * 2010-11-24 2011-09-14 北京天融信科技有限公司 Method and device for managing secret keys in wireless sensor network
US20110238976A1 (en) * 2010-03-25 2011-09-29 Buffalo Inc. Wireless lan relay device, wireless communication system, and method for controlling wireless lan relay device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159748A (en) * 2007-11-14 2008-04-09 北京科技大学 Entity authentication method in wireless sensor network
CN101699873A (en) * 2009-10-21 2010-04-28 南京邮电大学 Classification security-based broadcast authentication design method
US20110238976A1 (en) * 2010-03-25 2011-09-29 Buffalo Inc. Wireless lan relay device, wireless communication system, and method for controlling wireless lan relay device
CN102186170A (en) * 2010-11-24 2011-09-14 北京天融信科技有限公司 Method and device for managing secret keys in wireless sensor network

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827587A (en) * 2015-01-27 2016-08-03 瑞萨电子株式会社 Relay apparatus, terminal apparatus, and communication method
CN108494726A (en) * 2018-02-02 2018-09-04 大势至(北京)软件工程有限公司 Network access control method and system based on ARP replacement and filtration drive
CN113453224A (en) * 2020-03-24 2021-09-28 阿里巴巴集团控股有限公司 Gateway, data transmission method and data processing method
CN113453224B (en) * 2020-03-24 2024-01-02 阿里巴巴集团控股有限公司 Gateway, data transmission method and data processing method

Similar Documents

Publication Publication Date Title
JP6825689B2 (en) Distributed unit
US7907734B2 (en) Key distribution control apparatus, radio base station apparatus, and communication system
US8838972B2 (en) Exchange of key material
CN112671809A (en) Data transmission method, signal source end and receiving end
EP2912869B1 (en) Method and device for managing security key for communication authentication of subscriber station used in cooperative communication of multiple base station in radio communication system
CN109309920A (en) Safety implementation method, relevant apparatus and system
US20070064948A1 (en) Methods and apparatus for the utilization of mobile nodes for state transfer
CN103327519A (en) AP (Access Point) and system based AP and AC (AP Controller) architecture
CA2603968C (en) Roaming encryption key rekeying apparatus and method
CN101310480A (en) Methods and apparatus for the utilization of mobile nodes for state transfer
KR20130054911A (en) Method and apparatus for handling security key to authenticate with a mobile station in a radio communication system
KR20110119785A (en) Un-ciphered network operation solution
CN101981892A (en) Systems and methods for group key distribution and management for wireless communications systems
CN101779519A (en) System and method for acquiring or distributing information related to one or more alternate ad hoc service providers
US20220255736A1 (en) Quantum key distribution method, device, and system
CN101779520A (en) Ad hoc service provider topology
US20170164244A1 (en) Path switching method, mobility anchor, and base station
US20050047600A1 (en) Encryption key rekeying apparatus and method
US7907949B2 (en) Radio communication system, adjacent station information management method for this system, and management apparatus therefor
CN105517102A (en) Method, device and equipment for enabling wireless network equipment to be connected with hot spot
CN103096310A (en) Sensor network communication method and device and sensor network panel point device and gateway device
JP5043928B2 (en) Method and apparatus for processing keys used for encryption and integrity
US20180198605A1 (en) Key Distribution and Receiving Method, Key Management Center, First Network Element, and Second Network Element
WO2016135252A1 (en) Setup of an x2 link using virtual terminals
JP6158697B2 (en) Communication system and software update method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130508

RJ01 Rejection of invention patent application after publication