CN103096310A - Sensor network communication method and device and sensor network panel point device and gateway device - Google Patents
Sensor network communication method and device and sensor network panel point device and gateway device Download PDFInfo
- Publication number
- CN103096310A CN103096310A CN2011103499291A CN201110349929A CN103096310A CN 103096310 A CN103096310 A CN 103096310A CN 2011103499291 A CN2011103499291 A CN 2011103499291A CN 201110349929 A CN201110349929 A CN 201110349929A CN 103096310 A CN103096310 A CN 103096310A
- Authority
- CN
- China
- Prior art keywords
- node
- key
- sensor network
- gateway
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a sensor network communication method and a device and a sensor network panel point device and a gateway device. According to the implement scheme, a sensor network comprises a plurality of panel joints and at least one gateway. The sensor network communication method comprises a step of distributing a common first secret key for the panel joints, a step of distributing different second secret keys for the panel joints, a step of encrypting broadcast data in the sensor network by means of the common first secret key, and a step of encrypting business data between the specific panel joints and the gateway by means of the second secret keys of specific panel joints. In the sensor network communication method, each panel joint can save the common first secret key and respective second secret key, and the gateway saves the first secret key and second secret keys of all panel joints. According to the sensor network communication method and the device, complexity of encryption communication in the sensor network can be reduced, and safety of the sensor network communication is improved.
Description
Technical field
The application relates to wireless communication field, relates in particular to Sensor Network communication means and device and sensing net node device and gateway device.
Background technology
In existing Sensor Network, the node of Sensor Network sends broadcast data packet by periodicity, collects the link quality information of node on every side, to select the via node of packet redirect.
For the communication security of Sensor Network, can adopt cipher mode to carry out data communication.Existing ZigBee-network cipher mode mainly contains two kinds: first kind of way is to adopt single key, that is, each node uses same communication key.Another kind of mode is that each node adopts different communication keys.
For first kind of way, if public key is acquired, the information of transmitting between all nodes in Sensor Network all will be stolen.And for the second way, each node need be preserved the communication key of all nodes, can increase like this node burden and key management difficulty.For example, if carry out the communication key upgrading of certain node, will be to the communication key upgrading of this node of preserving in all nodes.
Summary of the invention
For the fail safe that solves Sensor Network coded communication in prior art and the problem of difficulty, the application has proposed a kind of Sensor Network communication means and device and sensing net node device and gateway device.
An aspect according to the application has proposed a kind of Sensor Network communication means, and wherein, described Sensor Network can comprise a plurality of nodes and at least one gateway.This Sensor Network communication means can comprise: be that described a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in described a plurality of nodes; And, with the broadcast data in described the first described Sensor Network of secret key encryption, with the described specific node of the second secret key encryption of specific node in described a plurality of nodes and the business datum between described gateway.Wherein, each node can be preserved described the first key and the second key separately, and described gateway can be preserved the second key of described the first key and each node.
According to another aspect of the application, a kind of Sensor Network communicator has been proposed, wherein, described Sensor Network comprises a plurality of nodes and at least one gateway.This Sensor Network communicator can comprise: distribution module is that described a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in described a plurality of nodes; And encrypting module, with the broadcast data in described the first described Sensor Network of secret key encryption, with the business datum between the described specific node of the second secret key encryption of the specific node in described a plurality of nodes and described gateway.Wherein, each node can be preserved described the first key and the second key separately, and described gateway can be preserved the second key of described the first key and each node.
Another aspect according to the application, a kind of sensing net node device has been proposed, can comprise: key is preserved module, preserve the first key and the second key, wherein, all node apparatus of Sensor Network are assigned with the first public key, and each specific node apparatus is assigned with the second key that differs from one another; And encrypting module, with the data encryption of the first key to node apparatus broadcasting, with the second key, the business datum between node apparatus and gateway is encrypted.
According to another aspect of the application, a kind of sensor network gateway equipment has been proposed, wherein, Sensor Network can comprise management server and a plurality of node.This gateway device can comprise: the key reception module receives the first key and for the second key of specific node from management server; Key is preserved module, preserves the first key and the second key; The key sending module sends to each node in described a plurality of node with the first key, and the second key is sent to described specific node; And encrypting module, with the data encryption of the first key to gateway device broadcasting, with the second key, the business datum between gateway device and described specific node is encrypted.
According to the application's method and apparatus, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
Description of drawings
Fig. 1 is the flow chart according to the Sensor Network communication means of an embodiment of the application;
Fig. 2 is the flow chart according to the Sensor Network communication means of another embodiment of the application;
Fig. 3 is the block diagram according to the Sensor Network communicator of an embodiment of the application;
Fig. 4 is the block diagram according to the Sensor Network communicator of another embodiment of the application;
Fig. 5 is the block diagram according to the sensing net node device of an embodiment of the application;
Fig. 6 is the block diagram according to the sensor network gateway equipment of an embodiment of the application;
Fig. 7 is the flow chart that the broadcast key according to the application's specific embodiment issues;
Fig. 8 is the flow chart according to the business datum delivering key of the application's specific embodiment; And
Fig. 9 is the flow chart according to the blacklist Reconfigurations of the application's specific embodiment.
Embodiment
With reference to the accompanying drawings, the application's embodiment is elaborated.
In this application, Sensor Network can comprise a plurality of nodes and at least one gateway.The node of Sensor Network is positioned at Sensor Network inside, can be responsible for information gathering, and with communication to gateway.The node of Sensor Network can send broadcast data packet by periodicity, collects the link quality information of node on every side, to select the via node of packet redirect.The gateway of Sensor Network can carry out with the node of Sensor Network communicating by letter of the data such as image data information, parameter configuration or control command information as the part of Sensor Network.In Sensor Network, except gateway and node, for Sensor Network is managed operation, also can further comprise management server, perhaps also can be known as management platform.
At first the below sees figures.1.and.2, and describes the Sensor Network communication means according to the application's first aspect.
With reference to Fig. 1, in the Sensor Network communication means according to an embodiment of the application, at step S1002, a plurality of nodes that can be in Sensor Network distribute the first public key, for each node in these nodes distributes the second key that differs from one another.Then at step S1004, with the broadcast data in the first public secret key encryption Sensor Network of a plurality of nodes, with exclusive this node of the second secret key encryption of each node and the business datum between gateway.In method as shown in Figure 1, each node is all preserved the first public key and the second key separately, and gateway is preserved the first public key and the second key of each node.
Can find out, according to method shown in Figure 1, in a plurality of nodes, each all preserves the first public key, like this, when certain node receive other node broadcasts, during in order to the broadcast data after the encryption of measuring link-quality, can the broadcast data of encrypting be decrypted with the first public key of preserving.In addition, each node is only preserved the second key of oneself, is used for the business datum between this node and gateway is encrypted and deciphers, and like this, when the second key to individual node upgrades, will can not exert an influence to other nodes, is convenient to key management.Therefore, method shown in Figure 1 can reduce the complexity of coded communication in Sensor Network, improves the fail safe of Sensor Network communication.
Hereinafter, in order to have described convenience, the first key that a plurality of nodes in Sensor Network are shared is called " broadcast key ", and the second key that each node is exclusive is called " business datum key ".
In the Sensor Network communication means according to the application's embodiment, if first node is received the business datum secret key encryption with Section Point, the business datum to gateway to be sent, first node only carries out route according to the destination address of the business datum after encrypting, and the content of this business datum is not processed.
Next with reference to Fig. 2, the Sensor Network communication means according to another embodiment of the application is described.
Step S2002 as shown in Figure 2 and S2004 and step S1002 and S1004 shown in Figure 1 are similar, repeat no more herein.
In step S2006 shown in Figure 2, the list (that is, blacklist) that includes at least one trustless node can be sent to the trusted node outside trustless node in the gateway of Sensor Network and a plurality of node.Then at step S2008, the trusted node is when carrying out Route Selection, and trustless node that will not be included in blacklist is elected to be via node.A non-limiting example according to this embodiment, node is when selecting route, can first select the node of link-quality best path, then judge that this node is whether in blacklist, as being not or not father node carries out route selecting it, otherwise, continue to judge that the node in link-quality second-best path is whether in the route blacklist, by that analogy.In addition, at step S2008, the trusted node is not processed it when the packet of receiving from trustless node, directly abandons this packet.
Because Sensor Network uses ad hoc network usually, generally be difficult to the human intervention network topology structure.If certain node is invaded, may threaten the communication security of other node datas take this node as route.By the route blacklist being issued to each node of Sensor Network, make node data not sent to invaded trustless node when selecting route, forward without trustless node when namely controlling other node the transmission of datas, thereby the invaded node in Sensor Network is isolated, to improve the communications security of Sensor Network.
When being appreciated that at blacklist and changing (for example, new trustless node detected or certain trustless node becomes the trusted node), can upgrade operation to blacklist, the blacklist after upgrading is resend to gateway and each trusted node.As a kind of selection, also can be only the change information of new blacklist and old blacklist be sent to gateway and each trusted node of Sensor Network, by gateway and node to the blacklist operation of modifying.
Although step S2006 shown in Figure 2 and S2008 carry out after step S2002 and S2004, but be appreciated that, the execution of step S2006 and S2008 and step S2002 and S2004 there is no inevitable sequencing, also can first execution in step S2006 and the blacklist communication mechanism of S2008, and then execution in step S2002 and S2004 cipher key distribution mechanisms.
Next with reference to Fig. 3 and Fig. 4, the Sensor Network communicator according to the application's second aspect is described.
As shown in Figure 3, the Sensor Network communicator 30 according to an embodiment of the application can comprise encryption key distribution module 302 and key sending module 304.Encryption key distribution module 302 can be used for for a plurality of nodes in Sensor Network distribute public the first key (or " broadcast key "), and is the second key (or " business datum key ") that each node distribution in a plurality of nodes differs from one another.Key sending module 304 can send to gateway with the first key, and sends to each node in a plurality of nodes via gateway, the second key of each node in a plurality of nodes is sent to gateway, and send to corresponding node via gateway.Therefore, each node can be preserved public broadcast key, and preserves separately its exclusive business datum key, and gateway had both been preserved the business datum key that broadcast key is preserved each node.
Be appreciated that Sensor Network communicator 30 shown in Figure 3 can realize on the management platform of Sensor Network, manage control so that the encryption key distribution in Sensor Network and key are sent.
By Sensor Network communicator shown in Figure 3, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
Next with reference to Fig. 4, the Sensor Network communicator 40 according to another embodiment of the application is described.
The blacklist module 406 of Sensor Network communicator 40 can send to the blacklist that comprises at least one trustless node the gateway of Sensor Network, and sends to the trusted node except trustless node in a plurality of nodes via gateway.
By blacklist module 406, when can there be invaded node in Sensor Network communicator 40 in Sensor Network, inform all trusted nodes, the node that has potential safety hazard is isolated, thus the communications security of raising Sensor Network.
Next with reference to Fig. 5, the sensing net node device according to the application's embodiment is described.
Sensing net node device 50 as shown in Figure 5 can comprise key preservation module 502 and encrypting module 504.Key is preserved module 502 and can be preserved for the first public key of all node apparatus in Sensor Network (" broadcast key ") with for the second exclusive key of each node apparatus (" business datum key ").The broadcast data that encrypting module 504 can use the first key that node apparatus is broadcasted is encrypted, and uses the second key that the business datum between node apparatus and gateway is encrypted.
By sensing net node device 50 shown in Figure 5, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
According to an embodiment, if the first node device is received the business datum with the second secret key encryption of Section Point device, the first node device can only carry out route according to the destination address of the data of receiving, and content is not processed.
A kind of modification as sensing net node device 50 shown in Figure 5, except key is preserved module and encrypting module, the sensing net node device can comprise further that also blacklist is preserved the module (not shown), route is screened module (not shown) and data discard module (not shown).
The blacklist of sensing net node device is preserved module can preserve blacklist, and wherein, blacklist comprises at least one trustless node.When carrying out Route Selection, route screening module is not elected to be via node with trustless node.The data discard module when receiving the data that trustless node sends, abandons this data.
By the blacklist treatment mechanism of the present embodiment, in Sensor Network communication, can isolate the node that has potential safety hazard, thus the communications security of raising Sensor Network.
Below with reference to Fig. 6, the sensor network gateway equipment according to the application's embodiment is described.
As shown in Figure 6, sensor network gateway equipment 60 can comprise key reception module 602, key preservation module 604, key sending module 606 and encrypting module 608.Wherein, key reception module 602 receives the first key and the second key from management server, and wherein, the first key is the public broadcast key of a plurality of nodes in Sensor Network, and the second key is the business datum key for certain specific node.Key is preserved module 604 and can be preserved the first key and the second key that receive.Key sending module 606 can send to the first key each node of Sensor Network, and the second key is sent to corresponding specific node.The data that encrypting module 608 can use the first key that gateway device is broadcasted are encrypted, and with the second key, gateway device are encrypted to the business datum that specific node sends.
By above-mentioned gateway device, can reduce the complexity of coded communication in Sensor Network, improve the fail safe of Sensor Network communication.
According to a kind of modified embodiment, except module shown in Figure 6, sensor network gateway equipment also can further comprise: blacklist receiver module (not shown), blacklist are preserved module (not shown) and blacklist sending module (not shown).Wherein, the blacklist receiver module can receive the list that includes at least one trustless node, i.e. blacklist from management server.Blacklist is preserved module can preserve received blacklist.The blacklist sending module can send to blacklist the trusted node of Sensor Network, i.e. other nodes except the node that blacklist comprises.
By the blacklist treatment mechanism of the present embodiment, in Sensor Network communication, can isolate the node that has potential safety hazard, thus the communications security of raising Sensor Network.
Next arrive Fig. 9 with reference to Fig. 7, the broadcast key of describing in detail according to the application's specific embodiment issues flow process, business datum delivering key flow process and blacklist configuration flow.
The broadcast key that Fig. 7 shows according to specific embodiment issues flow process.
At first, Sensor Network communicator 702 generates broadcast key KeyB at step S7002, and it is stored in this locality, then by for example mobile radio communication, broadcast key KeyB is synchronized to gateway 704 at step S7004.Gateway 704 is resolved the information of receiving at step S7006, and stored broadcast key K eyB, then utilizes the Sensor Network agreement at step S7008, and broadcast key KeyB is synchronized to inner all nodes (only showing node 706 in figure) of Sensor Network.Node 706 carries out this locality storage at step S7010 with the broadcast key KeyB that receives, and returns success message to gateway 704 at step S7012.Gateway 704 sends success message to Sensor Network communicator 702 at step S7014 after receiving the success message of all nodes.
Fig. 8 shows the business datum delivering key flow process according to specific embodiment.
At first, Sensor Network communicator 802 generates the business datum key K eyD1 of node 806 at step S8002, and it is stored in this locality, then by for example mobile radio communication, business datum key K eyD1 is synchronized to gateway 804 at step S8004.Gateway 804 is resolved the information of receiving at step S8006, and storage service data key KeyD1, then utilizes the Sensor Network agreement at step S8008, and business datum key K eyD1 is synchronized to node 806.Node 806 carries out this locality storage at step S8010 with the business datum key K eyD1 that receives, and returns success message to gateway 804 at step S8012.Gateway 804 sends success message to Sensor Network communicator 802 at step S8014 after the success message of receiving node 806.
Fig. 9 shows the blacklist Reconfigurations flow process according to specific embodiment.
Abovely be described with reference to the exemplary embodiment of accompanying drawing to the application.It should be appreciated by those skilled in the art that above-mentioned embodiment is only the example of lifting for illustrative purposes, rather than be used for limiting.All in the application instruction and the claim protection range under do any modification, be equal to replacement etc., all should be included in the claimed scope of the application.
Claims (10)
1. Sensor Network communication means, wherein, described Sensor Network comprises a plurality of nodes and at least one gateway, described method comprises:
Be that described a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in described a plurality of nodes; And
With the broadcast data in described the first described Sensor Network of secret key encryption, with the described specific node of the second secret key encryption of specific node in described a plurality of nodes and the business datum between described gateway,
Wherein, each node is preserved described the first key and the second key separately, and described gateway is preserved the second key of described the first key and each node.
2. Sensor Network communication means as claimed in claim 1, wherein, if first node is received the business datum with the second secret key encryption of Section Point, described first node only carries out route according to the destination address of described business datum, and the content of described business datum is not processed.
3. Sensor Network communication means as claimed in claim 1 or 2 further comprises:
The list that will comprise at least one trustless node sends to the trusted node in described gateway and described a plurality of node; And
Described trusted node is not elected to be via node with trustless node when carrying out Route Selection, and described trusted node abandons this data when receiving the data that trustless node sends.
4. Sensor Network communicator, wherein, described Sensor Network comprises a plurality of nodes and at least one gateway, described device comprises:
The encryption key distribution module is that a plurality of nodes distribute the first public key, the second key that differs from one another for each distribution in a plurality of nodes; And
The key sending module sends to the first key gateway and sends to each in a plurality of nodes via gateway, and the second key of each specific node is sent to gateway and sends to this specific node via gateway,
Wherein, the first key is in order to encrypt the broadcast data in Sensor Network, and the second key of a node is in order to encrypt the business datum between this node and gateway.
5. Sensor Network communicator as claimed in claim 4 further comprises:
Blacklist module, the list that will comprise at least one trustless node send to gateway and send to trusted node in a plurality of nodes via gateway.
6. sensing net node device comprises:
Key is preserved module, preserves the first key and the second key; And
Encrypting module with the data encryption of the first key to node apparatus broadcasting, is encrypted the business datum between node apparatus and gateway with the second key.
7. node apparatus as claimed in claim 6, wherein, if the first node device is received the business datum with the second secret key encryption of Section Point device, the first node device only carries out route according to the destination address of the data of receiving, and content is not processed.
8. node apparatus as described in claim 6 or 7 further comprises:
Blacklist is preserved module, preserves the list that includes at least one trustless node;
Route screening module, when carrying out Route Selection, described route screening module is not elected to be via node with trustless node; And
The data discard module when receiving the data that trustless node sends, abandons this data.
9. sensor network gateway equipment, wherein, described Sensor Network comprises management server and a plurality of node, described gateway device comprises:
The key reception module receives the first key and for the second key of specific node from management server;
Key is preserved module, preserves the first key and the second key;
The key sending module sends to each node in described a plurality of node with the first key, and the second key is sent to described specific node; And
Encrypting module with the data encryption of the first key to gateway device broadcasting, is encrypted the business datum between gateway device and described specific node with the second key.
10. gateway device as claimed in claim 9 further comprises:
The blacklist receiver module receives the list that includes at least one trustless node from management server;
Blacklist is preserved module, preserves the described list that includes at least one trustless node; And
The blacklist sending module sends to trusted node in described a plurality of node with the described list that includes at least one trustless node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103499291A CN103096310A (en) | 2011-11-08 | 2011-11-08 | Sensor network communication method and device and sensor network panel point device and gateway device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103499291A CN103096310A (en) | 2011-11-08 | 2011-11-08 | Sensor network communication method and device and sensor network panel point device and gateway device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103096310A true CN103096310A (en) | 2013-05-08 |
Family
ID=48208328
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011103499291A Pending CN103096310A (en) | 2011-11-08 | 2011-11-08 | Sensor network communication method and device and sensor network panel point device and gateway device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103096310A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105827587A (en) * | 2015-01-27 | 2016-08-03 | 瑞萨电子株式会社 | Relay apparatus, terminal apparatus, and communication method |
CN108494726A (en) * | 2018-02-02 | 2018-09-04 | 大势至(北京)软件工程有限公司 | Network access control method and system based on ARP replacement and filtration drive |
CN113453224A (en) * | 2020-03-24 | 2021-09-28 | 阿里巴巴集团控股有限公司 | Gateway, data transmission method and data processing method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159748A (en) * | 2007-11-14 | 2008-04-09 | 北京科技大学 | Entity authentication method in wireless sensor network |
CN101699873A (en) * | 2009-10-21 | 2010-04-28 | 南京邮电大学 | Classification security-based broadcast authentication design method |
CN102186170A (en) * | 2010-11-24 | 2011-09-14 | 北京天融信科技有限公司 | Method and device for managing secret keys in wireless sensor network |
US20110238976A1 (en) * | 2010-03-25 | 2011-09-29 | Buffalo Inc. | Wireless lan relay device, wireless communication system, and method for controlling wireless lan relay device |
-
2011
- 2011-11-08 CN CN2011103499291A patent/CN103096310A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159748A (en) * | 2007-11-14 | 2008-04-09 | 北京科技大学 | Entity authentication method in wireless sensor network |
CN101699873A (en) * | 2009-10-21 | 2010-04-28 | 南京邮电大学 | Classification security-based broadcast authentication design method |
US20110238976A1 (en) * | 2010-03-25 | 2011-09-29 | Buffalo Inc. | Wireless lan relay device, wireless communication system, and method for controlling wireless lan relay device |
CN102186170A (en) * | 2010-11-24 | 2011-09-14 | 北京天融信科技有限公司 | Method and device for managing secret keys in wireless sensor network |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105827587A (en) * | 2015-01-27 | 2016-08-03 | 瑞萨电子株式会社 | Relay apparatus, terminal apparatus, and communication method |
CN108494726A (en) * | 2018-02-02 | 2018-09-04 | 大势至(北京)软件工程有限公司 | Network access control method and system based on ARP replacement and filtration drive |
CN113453224A (en) * | 2020-03-24 | 2021-09-28 | 阿里巴巴集团控股有限公司 | Gateway, data transmission method and data processing method |
CN113453224B (en) * | 2020-03-24 | 2024-01-02 | 阿里巴巴集团控股有限公司 | Gateway, data transmission method and data processing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6825689B2 (en) | Distributed unit | |
US7907734B2 (en) | Key distribution control apparatus, radio base station apparatus, and communication system | |
US8838972B2 (en) | Exchange of key material | |
CN112671809A (en) | Data transmission method, signal source end and receiving end | |
EP2912869B1 (en) | Method and device for managing security key for communication authentication of subscriber station used in cooperative communication of multiple base station in radio communication system | |
CN109309920A (en) | Safety implementation method, relevant apparatus and system | |
US20070064948A1 (en) | Methods and apparatus for the utilization of mobile nodes for state transfer | |
CN103327519A (en) | AP (Access Point) and system based AP and AC (AP Controller) architecture | |
CA2603968C (en) | Roaming encryption key rekeying apparatus and method | |
CN101310480A (en) | Methods and apparatus for the utilization of mobile nodes for state transfer | |
KR20130054911A (en) | Method and apparatus for handling security key to authenticate with a mobile station in a radio communication system | |
KR20110119785A (en) | Un-ciphered network operation solution | |
CN101981892A (en) | Systems and methods for group key distribution and management for wireless communications systems | |
CN101779519A (en) | System and method for acquiring or distributing information related to one or more alternate ad hoc service providers | |
US20220255736A1 (en) | Quantum key distribution method, device, and system | |
CN101779520A (en) | Ad hoc service provider topology | |
US20170164244A1 (en) | Path switching method, mobility anchor, and base station | |
US20050047600A1 (en) | Encryption key rekeying apparatus and method | |
US7907949B2 (en) | Radio communication system, adjacent station information management method for this system, and management apparatus therefor | |
CN105517102A (en) | Method, device and equipment for enabling wireless network equipment to be connected with hot spot | |
CN103096310A (en) | Sensor network communication method and device and sensor network panel point device and gateway device | |
JP5043928B2 (en) | Method and apparatus for processing keys used for encryption and integrity | |
US20180198605A1 (en) | Key Distribution and Receiving Method, Key Management Center, First Network Element, and Second Network Element | |
WO2016135252A1 (en) | Setup of an x2 link using virtual terminals | |
JP6158697B2 (en) | Communication system and software update method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130508 |
|
RJ01 | Rejection of invention patent application after publication |