WO2012090332A1 - Key setting method, node, server, and network system - Google Patents

Key setting method, node, server, and network system Download PDF

Info

Publication number
WO2012090332A1
WO2012090332A1 PCT/JP2010/073814 JP2010073814W WO2012090332A1 WO 2012090332 A1 WO2012090332 A1 WO 2012090332A1 JP 2010073814 W JP2010073814 W JP 2010073814W WO 2012090332 A1 WO2012090332 A1 WO 2012090332A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
setting
gateway
node
decryption
Prior art date
Application number
PCT/JP2010/073814
Other languages
French (fr)
Japanese (ja)
Inventor
伊豆 哲也
武仲 正彦
和快 古川
尚 兒島
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to PCT/JP2010/073814 priority Critical patent/WO2012090332A1/en
Priority to JP2012550662A priority patent/JP5494829B2/en
Publication of WO2012090332A1 publication Critical patent/WO2012090332A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to a key setting method for setting a key for encrypting data, a node, a server, and a network system.
  • An ad hoc network is a type of self-configuring network that is linked by wireless communication.
  • An ad hoc network is composed of a plurality of nodes. Each node in the ad hoc network transmits and receives packets by multi-hop communication. Multi-hop communication is a technique in which nodes that do not exist within each other's communication area communicate with each other via another node that exists within the communication area of each node.
  • ad hoc network when connecting an ad hoc network and another network such as the Internet, LAN (Local Area Network), WAN (Wide Area Network), etc., communication between networks is transferred using a relay device called a gateway.
  • LAN Local Area Network
  • WAN Wide Area Network
  • the processing is distributed by providing a plurality of gateways.
  • ad hoc network in multi-hop communication in an ad hoc network, communication between nodes is performed autonomously through a route selected by a relaying node, and therefore the route changes every moment depending on the state of each node and the communication environment.
  • a node communicates with another network, which gateway is relayed generally varies depending on the state of the network.
  • the ad hoc network has a feature that it has autonomy and robustness by such free route selection.
  • a node capable of wireless communication is incorporated into a power meter in each home, and a worker performs work such as meter confirmation via an ad hoc network without going to the site.
  • a node capable of wireless communication is incorporated into a power meter in each home, and a worker performs work such as meter confirmation via an ad hoc network without going to the site.
  • an ad hoc network that handles personal information such as the amount of power used in each home, it is required to perform secure communication from the viewpoint of confidentiality and tampering prevention.
  • secure communication is ensured by encrypting packets transmitted and received between nodes in the ad hoc network. At this time, it is generally performed that secure communication is performed by using one encryption key used in the system and each node or gateway holding this key.
  • the new node when the new node is initially introduced into the system, the new node cannot communicate securely with other nodes in the ad hoc network until the encryption key is set. For this reason, it is difficult to automatically set an encryption key to a new node via an ad hoc network, and an operator may go to the site to set the encryption key.
  • Patent Document 1 there is a technique for managing an encryption key of a network that performs communication by broadcast (see, for example, Patent Document 1 below). There is also a technique for stably performing key exchange at the start of communication in an ad hoc network (see, for example, Patent Document 2 below). There is also a technique for each node in an ad hoc network to select an adaptive gateway (see, for example, Patent Document 3 below).
  • the above-described prior art has a problem that when the encryption key set for each node in the ad hoc network is changed for each gateway, it is difficult to specify the gateway to which the new node belongs at the initial introduction of the new node. It was. For example, even if the candidate gateways can be narrowed down from the address of the installation location of the new node, the communication status changes depending on factors such as the weather and the positional relationship with a nearby building. For this reason, it is necessary for the worker to go to the site to check which gateway is actually communicable, and there is a problem in that the work time and work load required for the work of setting the encryption key of the worker are increased. .
  • An object of one aspect of the present invention is to improve the efficiency of setting work of encryption keys used by nodes in an ad hoc network.
  • the purpose is to increase the efficiency of communication by maintaining the autonomy and robustness of ad hoc networks by dynamically adding encryption keys in response to the establishment or removal of other ad hoc networks.
  • a node in any one of the ad hoc networks that performs encryption and decryption with a gateway-specific first key in any one of a plurality of ad hoc networks is received by the encrypted packet
  • a gateway that is a destination or a transmission source is detected for each encrypted packet, and the number of failures in which the encrypted packet could not be decrypted with the first key is counted for each detected gateway. It is determined for each gateway whether the number is greater than or equal to a threshold value related to key acquisition, and a second key acquisition request specific to the gateway determined to be equal to or greater than the threshold value Send it to the server that stores the key unique to each gateway via one of the above ad hoc networks.
  • the second key stored in the server is received from the server via any one of the ad hoc networks, and the received second key is encrypted and
  • a key setting method, a node, and a network system for setting a key for decryption are proposed.
  • a node in any one of the ad hoc networks that performs encryption and decryption with a first key unique to a gateway in any one of a plurality of ad hoc networks is received encryption.
  • a destination address or source gateway of the encrypted packet is detected for each encrypted packet, and the number of successful decryptions of the encrypted packet with the first key is counted for each detected gateway.
  • the number of failures that could not decrypt the encrypted packet with the first key is counted for each gateway, and the difference obtained by subtracting the number of successes from the number of failures counted is greater than or equal to a threshold for key acquisition.
  • a key setting method, a node, and a network system are proposed in which a key is received from the server via any one of the ad hoc networks, and the received second key is set as a key for encryption and decryption. .
  • encryption and decryption are performed using a first key specific to a gateway in an ad hoc network of any one of a plurality of ad hoc networks and a second key specific to another gateway in another ad hoc network.
  • the node in any one of the ad hoc networks to perform counts the number of successes that can be decrypted with the first key and counts the number of successes that can be decrypted with the second key for each received encrypted packet Then, it is determined whether each counted number of successes is less than or equal to a threshold value related to canceling the setting.
  • a key setting method, a node, and a network system for setting a key to a key that does not perform encryption and decryption are proposed.
  • encryption and decryption are performed using a first key specific to a gateway in an ad hoc network of any one of a plurality of ad hoc networks and a second key specific to another gateway in another ad hoc network.
  • the node in any one of the ad hoc networks to perform counts the number of successes that can be decrypted with the first key and counts the number of successes that can be decrypted with the second key for each received encrypted packet.
  • a key setting method, a node, and a network system are proposed in which the key with the smaller number of successes out of the first key and the second key is set as a key that does not perform the encryption and decryption. .
  • a server capable of communicating with each gateway of a plurality of ad hoc networks stores the gateway identification information and the gateway-specific key for each gateway, and the plurality of ad hoc networks
  • the second key is extracted based on the identification information of the gateway using the second key included in the received second key acquisition request received, and the extracted second Key setting method for transmitting the key of the server to the node via any one of the ad hoc networks, , And the network system is proposed.
  • node node, server, and network system, it is possible to improve the efficiency of setting the encryption key used by the nodes in the ad hoc network. Further, by dynamically adding an encryption key in accordance with the establishment or removal of another ad hoc network, there is an effect that it is possible to maintain the autonomy and robustness of the ad hoc network and improve the efficiency of communication.
  • FIG. 1 is an explanatory diagram illustrating a first example of a network system.
  • FIG. 2 is an explanatory diagram illustrating a second example of the network system.
  • FIG. 3 is an explanatory diagram showing a third example of the network system.
  • FIG. 4 is an explanatory diagram illustrating a fourth example of the network system.
  • FIG. 5 is an explanatory diagram showing an embodiment of the network system.
  • FIG. 6 is an explanatory diagram showing an example of introducing a new node of the downstream type into the network system according to the present embodiment.
  • FIG. 7 is a sequence diagram (part 1) illustrating an operation example of the network system at the time of introducing a new node of the downstream type according to the embodiment.
  • FIG. 8 is a sequence diagram (part 2) illustrating an operation example of the network system at the time of introducing a new node of the downstream type according to the embodiment.
  • FIG. 9 is an explanatory diagram showing an example of introducing an upstream type new node into the network system according to the present embodiment.
  • FIG. 10 is a sequence diagram illustrating an operation example of the network system when a new node is introduced.
  • FIG. 11 is an explanatory diagram (part 1) of an example of adding an encryption key to a boundary node in the network system.
  • FIG. 12 is an explanatory diagram (part 2) of an example of adding an encryption key to a boundary node in the network system.
  • FIG. 13 is an explanatory diagram (part 3) illustrating an example of adding the encryption key to the boundary node in the network system.
  • FIG. 14 is an explanatory diagram (part 4) illustrating an example of adding the encryption key to the boundary node in the network system.
  • FIG. 15 is an explanatory diagram (part 5) of an example of adding the encryption key to the boundary node in the network system.
  • FIG. 16 is an explanatory diagram (part 6) of an example of adding the encryption key to the boundary node in the network system.
  • FIG. 17 is a block diagram illustrating a hardware configuration example of the management server.
  • FIG. 18 is a block diagram illustrating a hardware configuration example such as a node.
  • FIG. 19 is an explanatory diagram showing an example of the contents stored in the encryption key DB.
  • FIG. 20 is a block diagram illustrating a functional configuration example of a node.
  • FIG. 20 is a block diagram illustrating a functional configuration example of a node.
  • FIG. 21 is an explanatory diagram (part 1) of a data structure example of an encrypted packet encrypted with an encryption key.
  • FIG. 22 is an explanatory diagram (part 2) of a data structure example of an encrypted packet encrypted with an encryption key.
  • FIG. 23 is an explanatory diagram of an exemplary data structure of an acquisition request packet.
  • FIG. 24 is an explanatory diagram (part 1) illustrating an example of storage contents of a management table in a node.
  • FIG. 25 is an explanatory diagram (part 2) of an example of stored contents of the management table in the node.
  • FIG. 26 is an explanatory diagram (part 3) of an example of stored contents of the management table in the node.
  • FIG. 27 is a flowchart showing a packet transfer processing procedure of a node (boundary node).
  • FIG. 28 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG.
  • FIG. 29 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG.
  • FIG. 30 is a flowchart (part 1) illustrating the encryption key addition processing procedure of the node.
  • FIG. 31 is a flowchart (part 2) illustrating the encryption key addition processing procedure of the node.
  • FIG. 32 is a block diagram illustrating a functional configuration example of the management server.
  • FIG. 33 is an explanatory diagram of an example of decryption of the encryption acquisition request packet.
  • FIG. 34 is an explanatory diagram of a specific example of history information.
  • FIG. 35 is an explanatory diagram of a data structure example of a response packet.
  • FIG. 36 is a flowchart (No. 1) showing the key provision processing procedure of the management server.
  • FIG. 37 is a flowchart of a detailed process procedure of the decryption process (step S3602) depicted in FIG.
  • FIG. 38 is a flowchart (part 2) illustrating the key provision processing procedure of the management server.
  • FIG. 39 is a flowchart (part 1) illustrating a detailed processing procedure of the validity determination processing (step S3800).
  • FIG. 40 is a flowchart (part 2) illustrating the detailed processing procedure of the validity determination processing (step S3800).
  • FIG. 41 is a flowchart (part 3) illustrating a detailed processing procedure of the validity determination processing (step S3800).
  • FIG. 42 is an explanatory diagram (part 1) of an example of updating the node management table T.
  • FIG. 43 is an explanatory diagram (part 2) of an example of updating the node management table T.
  • FIG. 44 is a flowchart (No. 1) showing the node key setting release processing procedure.
  • FIG. 45 is a flowchart (part 2) of the node key setting release processing procedure.
  • An ad hoc network is an autonomous distributed wireless network configured by a group of nodes that can be connected wirelessly without requiring an access point such as a wireless LAN.
  • a gateway (so-called sink node) is also included in the ad hoc network.
  • the encryption key set in each node in the ad hoc network may be changed for each gateway for security or the like.
  • autonomous which is possible in an ad hoc network that does not consider security (that is, the encryption key is not used) or an ad hoc network in which all nodes share one encryption key.
  • a situation occurs where the gateway cannot be selected. Therefore, there is a possibility that the communication efficiency may be reduced by reducing the robustness that is one of the features of the ad hoc network.
  • a gateway-specific encryption key in each ad hoc network is assigned to each node located at the boundary of the plurality of ad hoc networks. At this time, when one encryption key has already been assigned and the other encryption key has not been assigned yet, the node located at the boundary acquires the other encryption key securely and automatically.
  • the gateway located at the boundary can autonomously select the gateway, and the communication efficiency of the ad hoc network can be improved.
  • it demonstrates using drawing.
  • FIG. 1 is an explanatory diagram showing a first example of a network system.
  • the management server 101 and the gateway Ga can communicate with each other via the network NW1.
  • the number of gateways is one and the number of nodes is two.
  • the gateway Ga and the nodes Na and Nc constituting the ad hoc network Aa hold an encryption key Ka unique to the gateway Ga.
  • the gateway Na broadcasts the encrypted packet SPa encrypted with the encryption key Ka, so that the node Na receives the encrypted packet SPa. Since the node Na can decrypt the received encrypted packet SPa with the encryption key Ka, multi-hop communication is realized by transferring the encrypted packet SPa to the node Nc. The node Nc also decrypts the encrypted packet SPa with the encryption key Ka. As a result, the data embedded in the encrypted packet SPa is distributed to the nodes Na and Nc.
  • the encrypted packet SPa is transmitted to the gateway Ga to reach the gateway Ga by multi-hop communication.
  • FIG. 2 is an explanatory diagram showing a second example of the network system.
  • the second example shown in FIG. 2 is an example in which an ad hoc network Ab is further installed after the ad hoc network Aa shown in FIG. 1 is installed.
  • the ad hoc network Ab is composed of one gateway Gb and one node Nb.
  • the gateway Gb and the node Nb hold an encryption key Kb unique to the gateway Gb.
  • the encrypted packet SPb encrypted with the encryption key Kb also circulates within the ad hoc network Ab.
  • node Nc and the node Nb are within communication range.
  • the node Nc since the node Nc is the only neighboring node (the node within the communication range) of the node Nc, the node Nc communicates with the node Na.
  • the node Nb in the ad hoc network Ab Is installed the node Nb may be closer to the node Nc than the node Na. In such a case, it is more efficient to upload the data of the node Nc to the management server 101 via the node Nb and the gateway Gb, but the node Nc does not hold the encryption key Kb. For this reason, the node Nc has to upload data to the management server 101 via the node Na and the gateway Ga for security, although the node Nb is located closer.
  • FIG. 3 is an explanatory diagram showing a third example of the network system.
  • the third example shown in FIG. 3 shows an example in which the encryption key Kb is assigned to the node Nc in the second example of FIG.
  • the node Nc by adding the encryption key Kb unique to the gateway Gb of the ad hoc network Ab to the node Nc that holds only the encryption key Ka, the node Nc
  • the gateways Ga and Gb can be selected autonomously and the data of the node Nc can be uploaded to the management server 101.
  • FIG. 4 is an explanatory diagram showing a fourth example of the network system.
  • the fourth example shown in FIG. 4 shows an example in which the ad hoc network Aa is removed in the third example of FIG. Even when the ad hoc network Aa is removed, if the encryption key Ka is left in the node Nc, the node Nc tries to encrypt or decrypt with the encryption key Ka. Even if the encrypted packet SPa encrypted with the encryption key Ka is transmitted, it is eventually discarded at the node Nb. Therefore, the encryption process with the encryption key Ka and the transmission of the encrypted packet SPa are useless.
  • the encryption key Ka of the removed ad hoc network Aa is deleted at the node Nc. Therefore, useless encryption processing and communication processing can be eliminated, and the efficiency of communication within the remaining ad hoc network Ab can be improved.
  • FIG. 5 is an explanatory diagram showing an embodiment of the network system.
  • the network system 100 includes a management server 101, gateways G1 to Gn, nodes N1-1 to N1-m1,..., Ni-1 to Ni-mi, ..., Nn-1 to Nn-mn, It is the structure containing.
  • the management server 101 and the gateways G1 to Gn are connected to each other via a network NW1 such as the Internet, LAN, or WAN.
  • NW1 such as the Internet, LAN, or WAN.
  • the management server 101 is a computer that includes an encryption key DB (database) 110 and manages encryption keys unique to the gateways G1 to Gn.
  • the encryption key unique to the gateway Gi (hereinafter referred to as “encryption key Ki”) is key information for encrypting packets transmitted and received between nodes in the ad hoc network Ai to which the gateway Gi belongs.
  • encryption key Ki is key information for encrypting packets transmitted and received between nodes in the ad hoc network Ai to which the gateway Gi belongs.
  • the gateway Gi is a relay device that connects the ad hoc network Ai and the network NW1.
  • the gateway Gi understands both the protocol of the ad hoc network Ai and the protocol of the network NW1, and transfers communication between the ad hoc network Ai and the network NW1.
  • Nodes Ni-1 to Ni-mi are wireless communication devices that perform multi-hop communication with other nodes within a predetermined communication range.
  • the gateway Gi it is not necessary for all the nodes Ni-1 to Ni-mi to directly communicate with the gateway Gi, and it is sufficient that some nodes can communicate with the gateway Gi.
  • the network system 100 can be applied to, for example, a system that collects the amount of power and gas used in each household. Specifically, for example, by incorporating each node Ni-1 to Ni-mi into a power meter or gas meter in each home, the amount of power or gas used in each home is transmitted and received between nodes in the ad hoc network Ai. Note that the power consumption and gas consumption of each household may be measured by each node Ni-1 to Ni-mi, or each node Ni-1 to Ni-mi may be obtained from a power meter or gas meter. Good.
  • the gateway Gi uses the power and gas usage of each home received from the nodes Ni-1 to Ni-mi in the ad hoc network Ai to the server of the power company or gas company (for example, the management server 101) via the network NW1. Send to. As a result, the amount of power and gas used can be collected without the need for workers to visit the site.
  • the packet is encrypted using the encryption key unique to the gateway Gi for each ad hoc network Ai. This ensures secure communication (data confidentiality, tampering prevention, etc.) of the ad hoc network Ai. Moreover, the risk at the time of key leakage is reduced by changing an encryption key for every ad hoc network Ai.
  • a single gateway Gi is provided in the ad hoc network Ai.
  • a plurality of gateways Gi may be provided in the same ad hoc network Ai.
  • an encryption key for encrypting a packet transmitted / received in the ad hoc network Ai is common to a plurality of gateways Gi.
  • the encrypted packet encrypted with the encryption key unique to the gateway Gi is transferred according to the routing table broadcast from the gateway Gi in advance. Since the transfer source address and the transfer destination address are defined in the routing table, the encrypted packet from the transfer source node is transferred to the transfer destination node.
  • the downstream type is a process for setting a key by broadcasting a packet from an upstream side (gateway) to a new node.
  • the upstream type is a process for setting a key by uploading a packet from a new node to the upstream side (gateway).
  • the downstream type will be described with reference to FIGS.
  • the upstream type will be described with reference to FIGS. 9 and 10.
  • a plurality of encryption keys are set for the boundary node.
  • an example in which one encryption key is set will be described first, and then an additional setting example of keys will be described. explain.
  • FIG. 6 is an explanatory diagram showing an example of introducing a new node by the downstream type into the network system 100 according to the present embodiment.
  • a new node Ni-x is introduced into the ad hoc network Ai of the network system 100.
  • nodes Ni-1 to Ni-3 are shown as representatives.
  • the worker OP When the new node Ni-x is introduced, the worker OP does not know which ad hoc network Ai the new node Ni-x belongs to. Therefore, the new node Ni-x intercepts from the neighborhood and transmits the encrypted packet from the gateway Gi to the management server 101 by using the mobile terminal MT used by the worker OP, whereby the new node Ni-x
  • the management server 101 is inquired about the encryption key Ki to be set to. As a result, an appropriate encryption key Ki is acquired from the management server 101 and automatically set to the new node Ni-x.
  • the mobile terminal MT is a mobile communication device used by the worker OP, and is, for example, a mobile phone, a PHS (Personal Handy-phone System) phone, a smartphone, a notebook personal computer, or the like.
  • the mobile terminal MT relays communication between the new node Ni-x that cannot communicate directly and the management server 101.
  • FIG. 7 and 8 are sequence diagrams showing an operation example of the network system 100 when the downstream type new node Ni-x according to the embodiment is introduced.
  • the sequence in FIG. 7 is an operation example performed until the worker OP goes to the site (place where the new node Ni-x is installed), for example.
  • the sequence in FIG. 8 is an example of an operation performed after the worker OP goes to the site, for example.
  • the gateway Gi transmits the encryption key Ki unique to the gateway Gi to the management server 101.
  • the management server 101 associates and registers the encryption key Ki unique to the gateway Gi and the address of the gateway Gi in the encryption key DB 110.
  • the gateway Gi broadcasts (simultaneously reports) a packet (hereinafter referred to as “encrypted packet SPi”) encrypted using the encryption key Ki unique to the gateway Gi to the ad hoc network Ai.
  • Encrypted packet SPi a packet encrypted using the encryption key Ki unique to the gateway Gi to the ad hoc network Ai.
  • the address of the gateway Gi is included in the encrypted packet SPi.
  • the node Ni-1 transmits the encrypted packet SPi from the gateway Gi to the node Ni-3 in the communication area.
  • the node Ni-3 intercepts the encrypted packet SPi transmitted by the node Ni-1.
  • the new node Ni-x records the encrypted packet SPi from the node Ni-3. However, at this time, the new node Ni-x cannot decrypt the encrypted packet SPi because the encryption key Ki is not set.
  • the mobile terminal MT is connected to the management server 101 via a network NW2 such as a mobile phone network or the Internet.
  • NW2 such as a mobile phone network or the Internet.
  • the mobile terminal MT performs existing secure communication with the management server 101 using, for example, SSL (Secure Socket Layer).
  • the mobile terminal MT is connected to the new node Ni-x via the wired or wireless network NW3.
  • NW3 Universal Serial Bus
  • the new node Ni-x transmits the encrypted packet SPi recorded in (6) shown in FIG. 7 to the mobile terminal MT via the network NW3.
  • the mobile terminal MT transmits the encrypted packet SPi from the new node Ni-x to the management server 101 via the network NW2.
  • the management server 101 extracts the encryption key Ki for decrypting the encrypted packet SPi from the mobile terminal MT from the encryption key DB 110. Specifically, for example, the management server 101 extracts the encryption key Ki stored in association with the address of the gateway Gi included in the encrypted packet SPi from the encryption key DB 110.
  • the management server 101 transmits the extracted encryption key Ki to the mobile terminal MT via the network NW2. (13) The mobile terminal MT transmits the encryption key Ki from the management server 101 to the new node Ni-x via the network NW3. (14) The new node Ni-x sets the encryption key Ki from the mobile terminal MT as a key for encrypting the packet.
  • the new node Ni-x makes a key request to the management server 101 via the portable terminal MT, using the encrypted packet SPi from the gateway Gi that can be received even if the encryption key Ki for secure communication is not set. By doing so, the encryption key Ki to be set can be acquired.
  • FIG. 9 is an explanatory diagram showing an example of introducing an upstream type new node to the network system 100 according to the present embodiment.
  • a new node Ni-x is introduced in the ad hoc network Ai of the network system 100.
  • nodes Ni-1 to Ni-3 are shown as representatives.
  • the worker OP When the new node Ni-x is introduced, the worker OP does not know which ad hoc network Ai the new node Ni-x belongs to. Therefore, in the present embodiment, using the mobile terminal MT used by the worker OP, an acquisition request for the encryption key Ki to be set in the new node Ni-x is uploaded to the ad hoc network Ai. At this time, the gateway Gi uploads the encryption key Ki unique to the gateway Gi to the management server 101. Then, the new node Ni-x acquires the encryption key Ki uploaded to the management server 101 from the management server 101 via the mobile terminal MT, and automatically sets it to the new node Ni-x.
  • the gateway Gi uploads the encryption key Ki unique to the gateway Gi to the management server 101.
  • the new node Ni-x acquires the encryption key Ki uploaded to the management server 101 from the management server 101 via the mobile terminal MT, and automatically sets it to the new node Ni-x.
  • an operation example of the network system 100 when the new node Ni-x is introduced will be
  • FIG. 10 is a sequence diagram showing an operation example of the network system 100 when a new node is introduced.
  • (1) the mobile terminal MT is connected to the management server 101 via the network NW2.
  • the mobile terminal MT performs existing secure communication with the management server 101 using, for example, SSL.
  • the mobile terminal MT is connected to the new node Ni-x via the wired or wireless network NW3.
  • the worker OP connects the mobile terminal MT and the new node Ni-x using a USB cable, so that the network NW3 is connected between the mobile terminal MT and the new node Ni-x.
  • the network NW3 is connected between the mobile terminal MT and the new node Ni-x.
  • the new node Ni-x detects the connection with the mobile terminal MT, the new node Ni-x broadcasts to the ad hoc network Ai a key acquisition request for encrypting a packet transmitted / received by multihop communication in the ad hoc network Ai. .
  • the key acquisition request is transmitted to the node Ni-3 existing in the communication area of the new node Ni-x.
  • the node Ni-3 transmits a key acquisition request from the new node Ni-x to the node Ni-1 in the communication area.
  • the node Ni-1 transmits a key acquisition request from the node Ni-3 to the gateway Gi in the communication area.
  • the key acquisition request from the new node N is transferred to the gateway Gi in the ad hoc network Ai.
  • the gateway Gi Upon receiving the key acquisition request from the new node Ni-x, the gateway Gi transmits the encryption key Ki unique to the gateway Gi to the management server 101. (7) The management server 101 transmits the encryption key Ki unique to the gateway Gi from the gateway Gi to the mobile terminal MT via the network NW2.
  • the mobile terminal MT transmits the encryption key Ki unique to the gateway Gi from the management server 101 to the new node Ni-x via the network NW3.
  • the new node Ni-x sets the encryption key Ki from the mobile terminal MT as a key for encrypting the packet.
  • the connection between the mobile terminal MT and the new node Ni-x is maintained until the setting of the encryption key Ki for the new node Ni-x is completed. Further, when the setting of the encryption key Ki is completed and the connection between the mobile terminal MT and the new node Ni-x is disconnected, the encryption key Ki may be automatically deleted from the mobile terminal MT. Thereby, the risk when the mobile terminal MT is lost can be reduced.
  • the new node Ni-x when the new node Ni-x is introduced, a temporary communication path between the new node Ni-x and the management server 101 can be established via the portable terminal MT of the worker OP. Further, as a result of the key acquisition request broadcast from the new node Ni-x being transferred to the gateway Gi, the encryption key Ki transmitted from the gateway Gi to the management server 101 is newly received from the management server 101 via the portable terminal MT. Node Ni-x can be provided. As a result, the encryption key Ki to be set for the new node Ni-x can be easily acquired, and the efficiency of setting the encryption key Ki used by the new node Ni-x can be improved.
  • FIG. 11 is an explanatory diagram (part 1) illustrating an example of adding an encryption key to a boundary node in the network system.
  • the management server 101 and the gateway G1 can communicate via the network NW1.
  • the ad hoc network A1 includes a gateway G1 and nodes N1-1 to N1-4 and Nx.
  • the gateway G1 and the nodes N1-1 to N1-4 and Nx hold the encryption key K1 unique to the gateway G1 by the downstream type or the upstream type described above.
  • the encrypted packet SP1 encrypted by the transmission source (any one of the gateway G1 and the nodes N1-1 to N1-4 and Nx) with the encryption key K1 is subjected to multihop communication.
  • the nodes N1-1 to N1-4 and Nx that have received the encrypted packet SP1 transfer the encrypted packet SP1 to the neighboring nodes when the encrypted packet SP1 can be decrypted with the encryption key K1, thereby enabling the encrypted packet SP1 multi-hop communication is realized.
  • FIG. 12 is an explanatory diagram (part 2) showing an example of adding an encryption key to a boundary node in the network system.
  • FIG. 12 shows a state (B) next to the state (A) in FIG.
  • the state (B) in FIG. 12 shows a state in which the ad hoc network A2 is installed after the state (A) in FIG.
  • the ad hoc network A2 includes a gateway G2 and nodes N2-1 to N2-3.
  • the gateway G2 and the nodes N2-1 to N2-3 hold the encryption key K2 unique to the gateway G2 by the downstream type or the upstream type described above.
  • the encrypted packet SP2 encrypted by the transmission source (any one of the gateway G2 and the nodes N2-1 to N2-3) with the encryption key K2 is subjected to multihop communication.
  • the nodes N2-1 to N2-3 that have received the encrypted packet SP2 transfer the encrypted packet SP2 to the neighboring nodes when the encrypted packet SP2 can be decrypted with the encryption key K2, so that the encrypted packet SP2 Realize multi-hop communication.
  • the node Nx is a node in the ad hoc network A1, but is within the communication range of the node N2-2 in the ad hoc network A2.
  • FIG. 13 is an explanatory diagram (part 3) illustrating an example of adding an encryption key to a boundary node in the network system.
  • FIG. 13 shows a state (C) next to the state (B) of FIG.
  • the encrypted packet SP2 from the node N2-2 is intercepted. Since the header of the intercepted encrypted packet SP2 is not encrypted, the node Nx specifies the address of the gateway G2 from the header of the encrypted packet SP2. The encrypted packet SP2 generated by the nodes N2-1 to N2-3 is described with the address of the gateway G2 as the destination.
  • the address of the gateway G2 is described as the transmission source, and the broadcast address is described at the destination. Therefore, the address of the gateway G2 can be detected from the transmission source address when the destination of the encrypted packet SP2 is a broadcast address, and from the destination address when the destination of the encrypted packet SP2 is not a broadcast address.
  • the node Nx counts the number of failures to decrypt the encrypted packet SP2 (number of intercepts) and the number of successes (number of normal receptions) for each detected gateway.
  • the number of failures and successes is counted at regular intervals. In this case, after a certain period of time, the number of failures and the number of successes are reset. Further, the count of the number of failures and the number of successes may be accumulated indefinitely without being separated at a fixed period.
  • FIG. 14 is an explanatory diagram (part 4) of an example of adding an encryption key to a boundary node in the network system.
  • FIG. 14 shows a state (D) next to the state (C) of FIG.
  • the boundary node Nx transmits the encrypted packet SP1x to the gateway G1 according to the number of failures and the number of successes (at least the number of failures) in the state (C). For example, when the number of failures exceeds a preset threshold value, the boundary node Nx transmits the encrypted packet SP1x to the gateway G1.
  • the encrypted packet SP1x data including the address of the gateway G2 specified in (2) of FIG. 13 and the acquisition request information of the encryption key K2 unique to the gateway G2 is encrypted with the encryption key K1 at the node Nx. It is an encrypted packet. Since the encrypted packet SP1x is subjected to multihop communication within the ad hoc network A1, the encrypted packet SP1x reaches the gateway G1.
  • the management server 101 When receiving the encrypted packet SP1x from the gateway G1, the management server 101 decrypts the encrypted packet SP1x with the encryption key K1 in the encryption key DB 110. Thereby, the acquisition request information of the address of the gateway G2 and the encryption key K2 unique to the gateway G2 is obtained. When confirming the acquisition request information, the management server 101 extracts the encryption key K2 unique to the gateway G2 from the encryption key DB 110 using the address of the gateway G2 as a clue.
  • FIG. 15 is an explanatory diagram (part 5) showing an example of adding an encryption key to a boundary node in the network system.
  • FIG. 15 shows a state (E) next to the state (D) of FIG.
  • the management server 101 encrypts the encryption key K2 in the node Nx with the encryption key K1.
  • the encrypted packet SP1 (K2) is transmitted.
  • the encrypted packet SP1 (K2) finally reaches the node Nx via the network NW1 and the gateway G1.
  • the gateway G1 and nodes N1-1 and N1-3 on the way can also decrypt the encrypted packet SP1 (K2), so that the encryption key K2 can be obtained.
  • K2 Only the encrypted packet SP1 (K2) is transferred, and the decrypted encryption key K2 is discarded.
  • the destination of the encrypted packet SP1 (K2) in this case, the address of the node Nx
  • FIG. 16 is an explanatory diagram (part 6) of an example of adding an encryption key to a boundary node in the network system.
  • FIG. 16 shows a state (F) next to the state (E) in FIG.
  • the node Nx decrypts the encrypted packet SP1 (K2) with the encryption key K1, thereby obtaining the encryption key K2. Take out. Then, the node Nx sets the decrypted encryption key K2 together with the encryption key K1 as an active key that performs encryption and decryption.
  • the node Nx can decrypt the encrypted packet SP1 from the node N1-3 with the encryption key K1, and can decrypt the encrypted packet SP2 from the node N2-2 with the encryption key K2.
  • the node Nx can also encrypt the transmitted data with the encryption keys K1 and K2, and transmit the encrypted packets SP1 and SP2.
  • the node Nx since the distance between the node Nx and the node N2-2 is shorter than the distance between the node Nx and the node N1-3, the node Nx preferably communicates via the ad hoc network A2.
  • the node Nx may use only the newly added encryption key K2 as an active key and the existing encryption key K1 as an inactive key. Further, in this case, this enables the node Nx to communicate with the ad hoc network A2, thereby improving communication efficiency.
  • the encryption key K1 set to inactive may be decrypted only for the encrypted packet SP1 that could not be decrypted with the encryption key K2.
  • the decrypted data is encrypted with the encryption key K2, which is an active key at the node Nx, and distributed as an encrypted packet SP2 in the ad hoc network A2.
  • the new node when a new node is set under the boundary node Nx by setting an active key and an inactive key, the new node may include the above-described downstream type (FIGS. 6 to 8) or up-link. Only one encryption key K2, which is an active key, is set instead of both encryption keys K1 and K2 by either one of the stream types (FIGS. 9 and 10). Therefore, since a single key is set for a node installed under the boundary node Nx, the efficiency of data processing and communication processing can be improved.
  • FIGS. 6 to 8 Only one encryption key K2, which is an active key, is set instead of both encryption keys K1 and K2 by either one of the stream types (FIGS. 9 and 10). Therefore, since a single key is set for a node installed under the boundary node Nx, the efficiency of data processing and communication processing can be improved.
  • the inactive encryption key K1 may be deleted at the node Nx. Thereby, the memory saving of the node Nx can be achieved. Furthermore, even if the node Nx is analyzed, only the encryption key K2 is leaked and the encryption key K1 is not leaked, so that security can be improved.
  • node N refers to a node that transmits and receives packets by multi-hop communication within any one of the ad hoc networks A1 to An of the network system 100. Further, “nodes and the like” indicate the gateways G1 to Gn and the node N of the network system 100.
  • FIG. 17 is a block diagram illustrating a hardware configuration example of the management server 101.
  • the management server 101 includes a CPU (Central Processing Unit) 1701, a ROM (Read Only Memory) 1702, a RAM (Random Access Memory) 1703, a magnetic disk drive 1704, a magnetic disk 1705, and an optical disk drive 1706.
  • the CPU 1701 to the mouse 1711 are connected by a bus 1700, respectively.
  • the CPU 1701 governs overall control of the management server 101.
  • the ROM 1702 stores a program such as a boot program.
  • the RAM 1703 is used as a work area for the CPU 1701.
  • the magnetic disk drive 1704 controls the reading / writing of the data with respect to the magnetic disk 1705 according to control of CPU1701.
  • the magnetic disk 1705 stores data written under the control of the magnetic disk drive 1704.
  • the optical disc drive 1706 controls reading / writing of data with respect to the optical disc 1707 according to the control of the CPU 1701.
  • the optical disk 1707 stores data written under the control of the optical disk drive 1706, and causes the computer to read data stored on the optical disk 1707.
  • the I / F 1708 is connected to the networks NW1 and NW2 through communication lines, and is connected to other devices (for example, the gateway Gi and the mobile terminal MT) via the networks NW1 and NW2.
  • the I / F 1708 controls an internal interface with the networks NW1 and NW2, and controls input / output of data from an external device.
  • a modem or a LAN adapter may be employed as the I / F 1708.
  • Display 1709 displays data such as a document, an image, and function information as well as a cursor, an icon, or a tool box.
  • a CRT a CRT
  • TFT liquid crystal display a plasma display, or the like can be adopted.
  • the keyboard 1710 includes keys for inputting characters, numbers, various instructions, etc., and inputs data. Moreover, a touch panel type input pad or a numeric keypad may be used.
  • the mouse 1711 moves the cursor, selects a range, moves the window, changes the size, and the like. A trackball or a joystick may be used as long as they have the same function as a pointing device. Note that the mobile terminal MT can also be realized by the same hardware configuration as that of the management server 101 shown in FIG.
  • FIG. 18 is a block diagram illustrating a hardware configuration example such as a node.
  • the node or the like includes a CPU 1801, a RAM 1802, a flash memory 1803, an I / F 1804, and an encryption circuit 1805.
  • the CPU 1801 to the encryption circuit 1805 are connected by a bus 1800, respectively.
  • the CPU 1801 controls the entire node and the like.
  • the RAM 1802 is used as a work area for the CPU 1801.
  • the flash memory 1803 stores key information such as programs and encryption keys.
  • the I / F 1804 transmits and receives packets by multi-hop communication. Further, the I / F 1804 of the gateway Gi is connected to the network NW1 through a communication line, and is connected to the management server 101 via the network NW1.
  • the encryption circuit 1805 is a circuit that encrypts data with an encryption key when encrypting the data. When encryption is executed by software, the encryption circuit 1805 is not necessary by storing a program corresponding to the encryption circuit 1805 in the flash memory 1803.
  • FIG. 19 is an explanatory diagram showing an example of the contents stored in the encryption key DB 110.
  • the encryption key DB 110 has fields of ID, GW address, and encryption key, and by setting information in each field, key information 1900-1 to 1900-n for each of the gateways G1 to Gn is used as a record. I remember it.
  • the ID is an identifier of each gateway Gi used for explanation in this specification.
  • the GW address is the address of the gateway Gi.
  • a MAC (Media Access Control) address or an IP (Internet Protocol) address of the gateway Gi can be used.
  • the encryption key is an encryption key Ki unique to each gateway Gi, and is specifically binary data of about 128 to 256 bits, for example. Taking the key information 1900-1 as an example, the gateway G1's GW address is “xx: xx: xx: xx: 12: 34”, and the encryption key is “encryption key K1”.
  • the key information 1900-i has position information Pi and history information Hi.
  • the position information Pi is information indicating the installation position of the gateway Gi. For example, the latitude and longitude, the address of the installation destination of the gateway Gi, etc. are mentioned.
  • the history information Hi is the number of times the setting is canceled after the encryption key Ki unique to the gateway Gi is set to the node N in another ad hoc network Aj (j ⁇ i).
  • the setting cancellation includes, for example, a case where it is set to inactive or a case where it is deleted.
  • the encryption key DB 110 is realized by a storage device such as the ROM 1702, the RAM 1703, the magnetic disk 1705, and the optical disk 1707 of the management server 101 shown in FIG.
  • the storage contents of the encryption key DB 110 may be updated when the management server 101 receives the encryption key Ki unique to the gateway Gi from the gateway Gi. Further, the stored contents of the encryption key DB 110 may be updated by a user operation input using the keyboard 1710 and the mouse 1711 shown in FIG.
  • FIG. 20 is a block diagram illustrating a functional configuration example of the node N.
  • the node N includes a receiving unit 2001, a detecting unit 2002, a decoding unit 2003, a counting unit 2004, a determining unit 2005, a transmitting unit 2006, and a setting unit 2007.
  • each function unit for example, causes the CPU 1801 to execute a program stored in a storage device such as the RAM 1802 and the flash memory 1803 illustrated in FIG.
  • the function is realized by the I / F 1804.
  • the processing results of the respective function units (reception unit 2001 to setting unit 2007) are stored in a storage device such as the RAM 1802 and the flash memory 1803 unless otherwise specified.
  • the receiving unit 2001 receives an encrypted packet. Specifically, the node N receives the encrypted packet regardless of whether or not the node N can be decrypted with the encryption key Ki of the node N. When a packet that cannot be decrypted with the encryption key Ki is received, the encrypted packet is intercepted.
  • the detection unit 2002 detects the destination of the encrypted packet received by the reception unit 2001 or the gateway serving as the transmission source for each encrypted packet.
  • the encrypted packet is encrypted with one of the encryption keys Ki, but the header portion is not encrypted.
  • the data structure of the encrypted packet will be described.
  • FIG. 21 and 22 are explanatory diagrams showing an example of the data structure of the encrypted packet Ki encrypted with the encryption key Ki.
  • FIG. 21 shows an example of the data structure of the encrypted packet SP1 broadcast from the gateway G1 as an example.
  • FIG. 22 shows an example of the data structure of an encrypted packet SP1 from a certain node N to the gateway G1 as an example.
  • the encrypted packet SPi has a header part 2110 and a payload part 2120.
  • the payload portion 2120 describes the encrypted data body (hatched portion in FIG. 20).
  • the destination address is a destination address.
  • the sending address is a sender address. Note that although the MAC address is used as an example of the destination address, the sending address, and the GW address here, an IP address or the like may be used.
  • the number of hops is a remaining transfer count indicating how many times the encrypted packet SPi is transferred.
  • the maximum number of hops of the encrypted packet SPi broadcast from the gateway Gi is set in advance. The hop number is decremented when the encrypted packet SPi is transferred, and the encrypted packet SPi having the hop number of “0” is discarded.
  • the hop number “10” of the encrypted packet SP1 is described.
  • the encrypted packet SPi is a broadcast packet from the gateway Gi as the destination address
  • the broadcast MAC address “00: 00: 00: 00: 00: 00” is described in the destination address.
  • the MAC address “xx: xx: xx: xx: 12: 34” of the gateway G1 that is the broadcast source is described as the source address.
  • the MAC address “xx: xx: xx: 12: 34” of the gateway G1 is described as the destination address for sending to the gateway G1. Further, the MAC address “AA: BB: CC: DD: CC: DD” of the transmission source node is described as the source address.
  • the detection unit 2002 detects the address described in the source address as the address of the gateway Gi because the source address is the address of the gateway Gi. To do.
  • the destination address of the encrypted packet SPi is a broadcast address
  • the destination address is detected as the address of the gateway Gi because it is the encrypted packet SPi from the node N to the gateway Gi. Therefore, the MAC address “xx: xx: xx: xx: 12: 34” of the gateway G1 can be detected in any of the encrypted packets SPi in FIG. 21 and FIG.
  • the decryption unit 2003 decrypts the encrypted packet received by the reception unit 2001 with the stored encryption key Ki.
  • the decryption unit 2003 may decrypt the brute force, or may terminate the decryption when the brute force is being decrypted or decrypted.
  • the decryption unit 2003 may decrypt only the active encryption key Ki. Note that if any encryption key Ki cannot be decrypted, the encrypted packet SPi is intercepted.
  • the counting unit 2004 counts the number of failures in which the encrypted packet SPj (j ⁇ i) could not be decrypted with the encryption key Ki for each gateway Gi detected by the detecting unit 2002. For example, in the node N to which the encryption key Ki is set, an attempt to decrypt the encrypted packet SPj in which the address of the gateway Gj is described with the encryption key Ki will fail. As a result, the number of failures for the gateway Gj is counted as one. The counting result is recorded in a table described later. In addition, it is good also as counting by accumulating the encryption packet SPi which failed in decoding.
  • the counting unit 2004 counts the number of successes that the encrypted packet SPi can be decrypted with the encryption key Ki for each gateway Gi detected by the detecting unit 2002. For example, in the node N in which the encryption key Ki is set, the encryption packet SPi in which the address of the gateway Gi is described is successfully decrypted with the encryption key Ki. As a result, the number of successes for the gateway Gi is counted by one. Also in this case, the counting result is recorded in a table to be described later. It is also possible to count by accumulating encrypted packets SPi that have been successfully decrypted. Note that the counting by the counting unit 2004 may be performed at regular intervals, or may be performed until the threshold value is reached.
  • the determination unit 2005 should acquire the encryption key Kj unique to the gateway Gj (j ⁇ i) other than the affiliated gateway Gi having the node as a subordinate node based on the counting result counted by the counting unit 2004. Judging.
  • the determination unit 2005 determines for each gateway whether or not the number of failures is greater than or equal to a threshold value related to key acquisition.
  • the threshold related to key acquisition is, for example, the upper limit of the number of decryption failures for each gateway Gi within a certain period. As an example, assume 1000 times.
  • the determination unit 2005 determines that the encryption key Kj unique to the gateway Gj should be acquired. As described above, the determination unit 2005 can determine whether or not a key should be acquired by using an absolute index called a threshold related to key acquisition.
  • the determination unit 2005 may determine for each gateway Gi whether or not a difference obtained by subtracting the number of successes from the number of failures counted by the counting unit 2004 is equal to or greater than a threshold value related to key acquisition. Specifically, for example, the determination unit 2005 determines the encrypted packet SPi in which the address of the gateway Gi is described based on the number of failure of decryption with the encryption key Ki of the encrypted packet SPj in which the address of the gateway Gj is described. The difference obtained by subtracting the number of successful decryptions with the encryption key Ki is obtained.
  • the determination unit 2005 determines that the encryption key Kj unique to the gateway Gj should be acquired based on whether or not the difference is equal to or greater than a threshold value related to key acquisition (for example, 500 times). As described above, the determination unit 2005 can determine whether or not a key should be acquired by using a relative index called a difference obtained by subtracting the number of successes from the number of failures.
  • the transmission unit 2006 sends the acquisition request for the second key specific to the gateway, which is determined to be equal to or greater than the threshold by the determination unit 2005, to any one of the ad hoc networks in the server storing the key specific to each gateway of the plurality of ad hoc networks. Send via. Specifically, for example, when the determining unit 2005 determines that the threshold value for key acquisition is equal to or greater than the threshold value, the transmitting unit 2006 sends an acquisition request for the encryption key Kj unique to the gateway Gj to the management server 101 via the gateway Gi. Send.
  • the acquisition request will be described.
  • FIG. 23 is an explanatory diagram showing an example of the data structure of the acquisition request packet.
  • the address of the gateway Gi under its node N is described in the destination address of the header part 2310 of the acquisition request packet Pix.
  • the MAC address “xx: xx: xx: xx: 12: 34” of the gateway G1 under the node N is described.
  • the MAC address “AA: BB: CC: DD: CC: DD” of the source node N is described in the source address.
  • the key acquisition request flag and the gateway address detected by the detection portion 2002 that is, the address of the gateway Gj described in the encrypted packet SPj that could not be decrypted with the encryption key Ki of the node N are stored. is described.
  • the MAC address “xx: xx: xx: xx: 56: 78” of the gateway G2 is described.
  • the acquisition request packet Pix becomes an encrypted acquisition request packet SPix by encrypting the payload portion 2320 with the encryption key Ki.
  • the acquisition request packet P1x is encrypted into an encrypted acquisition request packet SP1x.
  • the receiving unit 2001 receives an encryption response packet for the encryption acquisition request packet SPix from the management server 101 via the gateway Gi.
  • the encryption response packet includes the encryption key Kj encrypted with the encryption key Ki.
  • the received encryption response packet is decrypted with the encryption key Ki by the decryption unit 2003, whereby the encryption key Kj is extracted.
  • the setting unit 2007 sets the encryption key Kj as a key for performing encryption and decryption. Specifically, for example, an active key is set in the same manner as the encryption key Ki. As a result, when the node N subsequently becomes the boundary node Nx, encryption and decryption can be performed using both the encryption keys Ki and Kj. Therefore, communication processing can be performed using both gateways Gi and Gj of the ad hoc networks Ai and Aj. Thereby, even if a communication failure occurs with one of the ad hoc networks, communication can be performed via the other ad hoc network.
  • the setting unit 2007 may set the existing encryption key Ki as a key that is not subjected to encryption and decryption. Specifically, for example, when a new encryption key Kj is added, the setting of the existing encryption key Ki may be canceled, that is, deactivated. As a result, at the boundary node Nx, encryption and decryption are performed using the encryption key Kj, which is assumed to have a greater number of decryptions than the encryption key Ki, as an active key.
  • the encryption key Ki since the encryption key Ki is set inactive, it is not used for encryption and decryption. Thereby, useless data processing and communication processing can be reduced. Further, the encryption key Ki set to inactive may be deleted. Thereby, the memory saving of the boundary node Nx can be achieved.
  • the newly added encryption key Kj may be used as the main key, and the existing encryption key Ki may be used as the sub key.
  • the primary key is the above-described active key
  • the secondary key is a key that becomes active only under a certain restriction. For example, it is a key that can be decrypted when the primary key cannot be decrypted.
  • the encrypted packet SPi is received, it cannot be decrypted with the encryption key Kj that is the primary key, and is decrypted with the encryption key Ki that is the secondary key.
  • the decrypted data is encrypted with the encryption key Kj and transferred as an encrypted packet SPj.
  • the new node when a new node is newly set up under the boundary node Nx by setting the main and sub keys, the new node may include the downstream type (FIGS. 6 to 8) or the upstream described above. Regardless of the setting method of the type (FIGS. 9 and 10), only the encryption key Kj as the main key is set. Therefore, it is possible to prevent an increase in overhead of data processing and communication in the new subordinate node.
  • the management table realizes its function by the RAM 1802 or the flash memory 1803 of FIG.
  • the management table manages key information and decryption success / failure information. This will be described below with reference to FIGS.
  • FIGS. 24 to 26 are explanatory diagrams showing examples of stored contents of the management table in the node N.
  • the management table T has key information and decryption success / failure information.
  • the key information includes a gateway address item, an encryption key item, and a valid / invalid flag item.
  • the gateway address item the address of the gateway detected by the detection unit 2002 is stored. 24 to 26, for convenience, the gateway code is described instead of the gateway address.
  • an encryption key (or a pointer to the encryption key) is stored. Accordingly, the encryption key not set by the setting unit 2007 is not stored.
  • a flag indicating whether the encryption key is active (valid) or inactive (invalid) is stored. For example, if the flag is “2”, it is active, and if it is “0”, it is inactive. Further, “1” indicates that it is active (subkey) only under certain restrictions.
  • (A) shows the storage contents of the management table T in the state shown in FIG.
  • the gateway address is the address of the gateway G1
  • the encryption key is the encryption key K1 unique to the gateway G1
  • the valid / invalid flag is “2”.
  • the encrypted packet SP1 has been successfully received and decrypted 500 times. Further, since the encrypted packet other than the encrypted packet SP1 is not intercepted, the number of failures at the gateway G1 is zero.
  • (B) shows the storage contents of the management table T in the period after (A). Due to the newly established ad hoc network A2, the node Nx intercepts the encrypted packet SP2 from the node N2-2. As a result, when the address of the gateway G2 is detected by the detection unit 2002, the address of the gateway G2 is written in the gateway address item. However, since the encryption key K2 has not yet been acquired at this time, the encryption key item stores the encryption key K1 used for decryption, and the valid / invalid flag item stores “2”.
  • the node Nx indicates that the decryption using the encryption key K1 of the encrypted packet SP1 in which the address of the gateway G1 is stored has been successful 481 times. Further, it is indicated that the decryption using the encryption key K1 of the encrypted packet SP2 in which the address of the gateway G2 is stored has failed 1584 times.
  • (C) shows the state of FIG. 16 after (B).
  • the node Nx since the newly added encryption key K2 has already been acquired, the node Nx updates the encryption key item of the record of the gateway G2 from the encryption key K1 to the encryption key K2 by the setting unit 2007. In FIG. 24, since both the valid / invalid flag items are set to “2”, the node Nx activates both encryption keys K1 and K2 by the setting unit 2007.
  • FIG. 27 is a flowchart showing a packet transfer processing procedure of the node N (boundary node Nx).
  • the node N waits for the reception of the encrypted packet by the receiving unit 2001 (step S2701: No).
  • the node N is received by the detecting unit 2002.
  • the gateway address is detected from the header part 2110 of the encrypted packet (step S2702).
  • step S2703 the node N executes a decoding process by the decoding unit 2003 (step S2703). Details of the decoding process (step S2703) will be described with reference to FIG. After the decryption process (step S2703), the node N determines whether or not the received encrypted packet can be decrypted with any encryption key (step S2704).
  • step S2704 the node N discards the received encrypted packet (step S2705), and ends the node N key setting processing procedure. Instead of discarding, the encrypted packet that failed to be decrypted may be stored in the RAM 1802 or the flash memory 1803 for counting.
  • step S2704 when decryption is possible with any encryption key (step S2704: Yes), the node N determines whether the destination of the received encrypted packet is the address (or broadcast address) of the own node. Judgment is made (step S2706). When the destination of the received encrypted packet is the address (or broadcast address) of the own node (step S2706: Yes), the node N executes data processing according to the decrypted data (step S2707) and encrypts it. The packet is transferred (step S2708).
  • step S2706 when the destination of the received encrypted packet is not the address (or broadcast address) of the own node (step S2706: No), the node N transfers the encrypted packet without executing the data processing (step S2707). (Step S2708). Thereby, the packet transfer processing procedure of the node N is completed.
  • FIG. 28 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG.
  • This decryption process (step S2703) is a process executed whenever an encrypted packet is received. Also, in FIG. 28, a process of confirming the success / failure of the decryption using all the active encryption keys currently held by the node N is shown.
  • the node N determines whether or not there is an unselected encryption key (step S2801). When there is an unselected encryption key (step S2801: Yes), the node N selects one unselected encryption key (step S2802), and the decryption unit 2003 performs decryption with the selected encryption key (step S2803). ).
  • step S2804: No If decryption fails (step S2804: No), the node N adds 1 to the number of decryption failures with the selection key for the gateway detected in step S2702 in the management table T by the counting unit 2004. (Step S2805), the process returns to Step S2801. On the other hand, when the decryption is successful (step S2804: Yes), the node N adds 1 to the number of successful decryptions with the selection key for the gateway detected in step S2702 in the management table T by the counting unit 2004. (Step S2806), it returns to step S2801.
  • step S2801 if there is no unselected encryption key (step S2801: No), the process proceeds to step S2704. Thereby, the decoding process (step S2703) is terminated. According to the decryption process (step S2703) shown in FIG. 28, it is possible to attempt decryption using all the active encryption keys held by the brute force. Therefore, the counting unit 2004 can obtain an accurate counting result.
  • FIG. 29 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG.
  • This decryption process (step S2703) is a process executed whenever an encrypted packet is received.
  • the success or failure of the decryption is confirmed using all the active encryption keys currently held by the node N, but the process ends when the decryption is successful. Note that the same processing as that in FIG. 28 is denoted by the same step number, and description thereof is omitted.
  • step S2806 when the node N adds 1 to the number of successful decryptions with the selection key for the gateway detected in step S2702 by the counting unit 2004 (step S2806), the process proceeds to step S2704. It is a point to shift. That is, when the decoding is successful, the decoding process (step S2703) ends. As a result, it is not necessary to continue the decoding process (step S2703) even after the decoding is successful, so that the decoding process of the node N (step S2703) can be speeded up.
  • FIG. 30 shows an encryption key addition process procedure in absolute evaluation based on the number of failures and a threshold value related to key acquisition.
  • FIG. 31 shows an encryption key addition processing procedure in relative evaluation based on a difference obtained by subtracting the number of successes from the number of failures.
  • FIG. 30 is a flowchart (part 1) illustrating the encryption key addition processing procedure of the node N.
  • the node N waits for a predetermined period to elapse (step S3001: No). If the predetermined period elapses (step S3001: Yes), the node N refers to the management table T,
  • the determination unit 2005 determines whether there is a gateway (hereinafter, “specific gateway”) in which the number of failures is greater than or equal to a threshold value related to key acquisition (step S3002).
  • specific gateway a gateway in which the number of failures is greater than or equal to a threshold value related to key acquisition
  • step S3002 If there is no specific gateway whose number of failures is equal to or greater than the threshold for key acquisition (step S3002: No), the process proceeds to step S3009. On the other hand, when there is a specific gateway in which the number of failures is equal to or greater than the threshold for key acquisition (step S3002: Yes), the node N sends a request for acquiring an encryption key unique to the specific gateway to the management server 101 by the transmission unit 2006 Transmit (step S3003).
  • step S3004 an encrypted packet is awaited from the management server 101 (step S3004). If the key has not been received (step S3004: NO), the node N determines whether or not a timeout has occurred (step S3005). When it is not time-out (step S3005: No), it returns to step S3004. In the case of timeout (step S3005: Yes), the process proceeds to step S3009.
  • step S3004 when the encrypted packet is received in step S3004 (step S3004: Yes), the node N is decrypted by the decryption unit 2003 with the held encryption key (step S3006). Then, the node N determines whether or not there is a provision permission flag in the decrypted data (step S3007). When there is a provision permission flag (step S3007: Yes), since the decrypted data includes the encryption key, the node N sets the encryption key obtained by the decryption as an active key by the setting unit 2007. (Step S3008).
  • step S3007 when it is a notification that provision is not possible (step S3007: No), the process proceeds to step S3009.
  • step S3009 the node N resets the decryption success / failure information in the management table T (step S3009). Thereby, the encryption key adding process of the node N is finished.
  • FIG. 31 is a flowchart (part 2) illustrating the encryption key addition processing procedure of the node N.
  • step S3002 of FIG. 30 is changed to S3102.
  • the determination unit 2005 determines whether or not there is a gateway Gi whose difference obtained by subtracting the number of successes from the number of failures counted by the counting unit 2004 is equal to or greater than a threshold value related to key acquisition. Become. In this way, in FIG. 31, since it can be relatively determined which ad hoc network is more likely to succeed in decoding, there is an advantage that communication efficiency is easily superior or inferior.
  • a functional configuration example of the management server 101 will be described.
  • FIG. 32 is a block diagram illustrating a functional configuration example of the management server 101.
  • the management server 101 includes a receiving unit 3201, a decrypting unit 3202, a determining unit 3203, an extracting unit 3204, an encryption processing unit 3205, and a transmitting unit 3206.
  • each functional unit stores a program stored in a storage device such as the ROM 1702, the RAM 1703, the magnetic disk 1705, or the optical disk 1707 of the management server 101 shown in FIG.
  • the function is realized by causing the CPU 1701 to execute or by the I / F 1708.
  • the processing results of the functional units are storage devices such as the ROM 1702, the RAM 1703, the magnetic disk 1705, and the optical disk 1707 of the management server 101 shown in FIG. Is remembered.
  • the receiving unit 3201 receives the encrypted packet SPi from each gateway Gi. Specifically, for example, the reception unit 3201 receives the encrypted packet SPi that has been subjected to multi-hop communication from the node N, from the gateway Gi that controls the node N.
  • the decryption unit 3202 decrypts the encrypted packet SPi received by the reception unit 3201. Specifically, for example, the encryption key Ki of the encryption key DB 110 is attempted to be brute-forced. Alternatively, the encryption key Ki (the encryption key K1 in the case of FIG. 33) may be extracted from the encryption DB 110 and decrypted using the source address of the encrypted packet SPi as a clue. If the decryption is successful and the payload part 2320 has an acquisition request flag, the encrypted packet SPi is determined to be the encrypted acquisition request packet SPix.
  • FIG. 33 is an explanatory diagram showing an example of decryption of the encrypted acquisition request packet SPix.
  • the address “xx: xx: xx: xx: xx: xx” of the management server 101 is described in the destination address of the header part 2310 of the encrypted acquisition request packet SPix.
  • the address of the gateway Gi (G1 in FIG. 33) serving as a transmission source is described in the source address.
  • the address of the acquisition request source node N is added to the header portion 2310 by the gateway Gi.
  • the MAC address “AA: BB: CC: DD: CC: DD” of the node N is described.
  • the management server 101 extracts the encryption key Ki (in the case of FIG. 33, the encryption key K1) from the encryption DB 110 using the source address as a clue. As a result, the encrypted acquisition request packet SPix can be decrypted. In FIG. 33, since the decryption was successful with the encryption key K1, the acquisition request flag can be extracted from the payload portion 2320 of the acquisition request packet Pix.
  • the determination unit 3203 determines whether the received packet is an acquisition request packet Pix. Specifically, the determination unit 3203 determines that it is an acquisition request packet Pix when the decryption unit 3202 can confirm the acquisition request flag.
  • the determination unit 3203 determines whether or not the encryption key Kj requested for acquisition should be transmitted to the node N that is the acquisition request source based on a predetermined determination criterion. Specifically, for example, the distance between the position information Pi of the gateway Gi that uses the encryption key Ki stored in the encryption key DB 110 and the position information Pj of the gateway Gj that uses the requested encryption key Kj is acceptable. The determination unit 3203 determines whether or not it is within the range. When it is within the allowable range, the determination unit 3203 determines that transmission should be performed to the node N that is the acquisition request source.
  • the determination unit 3203 determines whether or not to transmit to the node N that is the acquisition request source, based on the history information Hj of the gateway Gj that uses the encryption key Kj that is the acquisition request target. Specifically, for example, the determination unit 3203 refers to the history information Hj of the address of the gateway Gj described in the payload portion 2320 of the acquisition request packet Pix decoded by the reception unit 3201.
  • FIG. 34 is an explanatory diagram showing a specific example of the history information Hj.
  • the history information Hj stores the number of times the setting of the encryption key Kj is canceled when the encryption key Kj is set together with another encryption key Ki.
  • the number of setting cancellations is the number of times set to inactive. Moreover, the number of times of deletion or the number of times of becoming a sub key may be used. It is assumed that the history information Hj is updated by transmitting the presence / absence of setting cancellation from the node N each time.
  • the number of setting cancellation times of the encryption key Kj when set together with the encryption key Ki is “7”.
  • the determination unit 3203 determines that the encryption key Kj should be transmitted because the threshold value is lower than the threshold value related to the cancellation of setting.
  • the threshold value related to the setting cancellation is “5”, for example, it becomes larger than the threshold value related to the setting cancellation, so the determination unit 3203 determines that the encryption key Kj should not be transmitted.
  • the encryption key Kj should be transmitted because the encryption key Kj setting release count for the encryption key Ki is zero. Determined.
  • the extraction unit 3204 extracts the encryption key Kj to be acquired from the encryption key DB 110. Specifically, for example, the extraction unit 3204 extracts the encryption key Kj associated with the address of the gateway Gj described in the header part 2310 of the acquisition request packet Pix from the encryption key DB 110.
  • the encryption processing unit 3205 encrypts the encryption key Kj extracted from the encryption DB 110 with the encryption key Ki that has successfully decrypted the encryption acquisition request packet SPix, and transmits an encryption response packet.
  • FIG. 35 is an explanatory diagram showing an example of the data structure of the response packet.
  • the destination address of the header part 3510 of the response packet Rix describes the source address of the encrypted acquisition request packet SPix.
  • the address of the gateway G1 is described.
  • the address of the management server 101 is described in the sender address.
  • a provision permission / non-permission flag for the encryption key Kj is described. Specifically, the provision permission flag is set when the determination unit 3203 determines that transmission should be performed, and the provision non-permission flag is set when it is determined that transmission should not be performed. If the provision permission flag is set, the encryption key Kj extracted by the extraction unit 3204 is described. In FIG. 35, the encryption key K2 is described.
  • the address of the acquisition request source is described.
  • the MAC address “AA: BB: CC: DD: CC: DD” of the node N (Nx) as the acquisition request source is described.
  • the response packet Rix is encrypted by the encryption processing unit 3205 with the encryption key Ki that has successfully decrypted the encryption acquisition request packet SPix.
  • encryption is performed using the encryption key K1. Thereby, the encryption response packet SRix is generated.
  • the transmission unit 3206 transmits the encryption response packet SRix.
  • the encrypted response packet SRix is transmitted to the destination gateway Gi.
  • the gateway Gi replaces the source address of the encrypted response packet SRix with the address of the gateway Gi, and replaces the destination address with the broadcast address. Thereby, the encryption response packet SRix is transmitted to the ad hoc network Ai.
  • the encryption response packet SRix is decrypted with the encryption key Ki, and if there is a provision permission flag (step S3007: Yes), the encryption key Kj described in the payload portion 3520 is set to be active. become. On the other hand, if it is a provision non-permission flag (step S3007: No), since the encryption key Kj is not described, the encryption key Kj is not set.
  • FIG. 36 is a flowchart (part 1) illustrating the key provision processing procedure of the management server 101.
  • FIG. 36 shows a processing procedure that does not use the position information Pi and the history information Hj.
  • the management server 101 waits for reception of an encrypted packet (step S3601: No).
  • the management server 101 executes decryption processing by the decryption unit 3202. (Step S3602). Details of the decoding process (step S3602) will be described with reference to FIG.
  • the management server 101 determines whether or not the decrypted packet has an acquisition request flag by the determination unit 3203 (step S3603).
  • the management server 101 executes data processing according to the payload portion 2120 (step S3604). As a result, the key providing process ends.
  • step S3603 if it is an acquisition request flag (step S3603: Yes), it is determined that the packet is an acquisition request packet Pix. Therefore, the management server 101 uses the extraction unit 3204 to extract the encryption key Kj that is the acquisition request target (step S3605). Then, the management server 101 generates an encrypted response packet SRix by encrypting the extracted encryption key Kj with the encryption key Ki decrypted in the decryption process (step S3602) by the encryption processing unit 3205. (Step S3606). Thereafter, the management server 101 transmits the encryption response packet SRix including the encryption key Kj by the transmission unit 3206 (step S3607). As a result, the key providing process ends.
  • FIG. 37 is a flowchart showing a detailed processing procedure of the decoding process (step S3602) shown in FIG.
  • the encrypted packet SPi received in step S3601 is decrypted using the encryption key Ki unique to the gateway Gi in the encryption key DB 110 (step S3702).
  • step S3703 it is determined whether or not the encrypted packet SPi has been successfully decrypted. If the decryption of the encrypted packet SPi is successful (step S3703: YES), the process proceeds to step S3603 shown in FIG.
  • step S3703 when the decryption of the encrypted packet SPi fails (step S3703: No), “i” of the gateway Gi is incremented (step S3704), and it is determined whether “i” is larger than “n” (step S3704). Step S3705).
  • step S3705 when “i” is equal to or less than “n” (step S3705: No), the process returns to step S3702. On the other hand, if “i” is greater than “n” (step S3705: YES), error processing is executed (step S3706), and a series of processing of the management server 101 is terminated. As a result, the encrypted packet SPi can be decrypted.
  • FIG. 38 is a flowchart (part 2) illustrating the key provision processing procedure of the management server 101.
  • FIG. 36 shows a processing procedure using the position information Pi and / or history information Hj. Note that the same steps as those in FIG. 36 are denoted by the same step numbers and description thereof is omitted.
  • the difference from FIG. 36 is that a validity determination process (step S3800) is added between step S3603: YES and step S3605. Details of the validity determination process (step S3800) will be described below with reference to FIGS.
  • FIG. 39 is a flowchart (part 1) showing a detailed processing procedure of the validity determination processing (step S3800).
  • FIG. 39 shows a processing procedure using the position information Pi.
  • the management server 101 uses the extraction unit 3204 to transmit the location information Pi of the gateway Gi that transmitted the encrypted acquisition request packet SPix, and the location information Pj of the gateway Gj whose address is described in the payload portion 2320 of the acquisition request packet Pix. Is extracted (step S3901).
  • the management server 101 determines whether the distance between the position information Pi and Pj is within an allowable range by the determination unit 3203 (step S3902). If it is within the allowable range (step S3902: YES), the process proceeds to step S3605 in FIG.
  • step S3902 when it is outside the allowable range (step S3902: No), the management server 101 transmits the encryption response packet SRix including the provision non-permission flag by the encryption processing unit 3205 and the transmission unit 3206 (step S3903).
  • the encryption key Kj can be provided only when the distance between the gateways Gi and Gj is guaranteed to be a short distance.
  • FIG. 40 is a flowchart (part 2) showing a detailed processing procedure of the validity determination processing (step S3800).
  • FIG. 40 shows a processing procedure using the history information Hj.
  • the management server 101 extracts the history information Hj of the gateway Gj whose address is described in the payload portion 2320 of the acquisition request packet Pix by the extraction unit 3204 (step S4001).
  • the management server 101 uses the determination unit 3203 to determine whether or not the number of setting cancellations in the history information Hj is within an allowable range (step S4002). If it is within the allowable range (less than the threshold value related to the setting cancellation) (step S4002: Yes), the process proceeds to step S3605 in FIG.
  • step S4002 if it is out of the allowable range (more than the threshold for setting cancellation) (step S4002: No), the management server 101 uses the encryption processing unit 3205 and the transmission unit 3206 to encrypt the response packet including the provision non-permission flag SRix is transmitted (step S4003). Thereby, even if the encryption key Kj is provided, it is not necessary to provide the encryption key Kj to the node N that may be reset again, so that unnecessary key addition setting processing can be prevented. .
  • FIG. 41 is a flowchart (part 3) showing a detailed processing procedure of the validity determination processing (step S3800).
  • FIG. 41 shows a processing procedure using the position information Pi and the history information Hj.
  • the management server 101 extracts the location information Pi of the gateway Gi that transmitted the acquisition request packet Pix and the location information Pj of the gateway Gj whose address is described in the payload portion 2320 of the acquisition request packet Pix by the extraction unit 3204. (Step S4101).
  • the management server 101 determines whether the distance between the position information Pi and Pj is within an allowable range by the determination unit 3203 (step S4102). When it is within the allowable range (step S4102: Yes), the management server 101 extracts the history information Hj of the gateway Gj whose address is described in the payload part 2320 of the acquisition request packet Pix by the extraction unit 3204 (step S4103). ).
  • the management server 101 uses the determination unit 3203 to determine whether or not the number of setting cancellations in the history information Hj is within an allowable range (step S4104). If it is within the allowable range (less than the threshold value related to the setting cancellation) (step S4104: YES), the process proceeds to step S3605 in FIG.
  • step S4102 if it is outside the allowable range (step S4102: No), the management server 101 transmits the encryption response packet SRix including the provision non-permission flag by the encryption processing unit 3205 and the transmission unit 3206 (Ste S4105).
  • the encryption key Kj can be provided only when the distance between the gateways Gi and Gj is guaranteed to be a short distance.
  • step S4104 if it is out of the allowable range (more than the threshold for setting cancellation) (step S4104: No), the management server 101 includes the provision non-permission flag by the encryption processing unit 3205 and the transmission unit 3206.
  • the encrypted response packet SRix is transmitted (step S4105).
  • FIG. 42 and 43 are explanatory diagrams showing examples of updating the management table T of the node N.
  • FIG. 42 and 43 show states after the state (C) in FIG.
  • the number of successes of the encryption key K1 is 509 times and the number of failures is 1083 times.
  • the encryption key K2 is reversed.
  • the threshold value regarding the setting cancellation of the number of failures is 1000 times, since the encryption key K1 has failed more than the threshold value regarding the setting cancellation, the valid / invalid flag is updated to “0”.
  • the encryption key K1 becomes inactive, and thereafter encryption and decryption are performed using only the encryption key K2.
  • the valid / invalid flag is updated to “1”.
  • the encryption key K1 becomes active only under certain restrictions, and the encryption key K1 is used for decryption only when it cannot be decrypted with the encryption key K2.
  • FIG. 44 is a flowchart (part 1) showing the key setting release processing procedure of the node N.
  • the node N waits for a predetermined period to elapse (step S4401: No), and if the predetermined period elapses (step S4401: Yes), the node N determines that the success number is a threshold value for canceling the setting by the determination unit 2005. It is determined whether or not there is an encryption key (hereinafter, “specific key”) (step S4402). When there is no specific key (step S4402: No), it transfers to step S4407.
  • specific key hereinafter, “specific key”.
  • step S4402 when it is a specific key (step S4402: Yes), the node N determines whether or not both are equal to or less than a threshold value related to setting cancellation (step S4403). If none of them is equal to or less than the threshold value related to the setting cancellation (step S4403: No), the node N sets the specific key as an inactive key by the setting unit 2007 (step S4404).
  • step S4403 YES
  • the node N sets the specific key with the smallest number of successes as an inactive key by the setting unit 2007 (step S4405).
  • step S4404 and S4405 the node N transmits a setting cancellation result to the management server 101 (step S4406). Thereafter, the node N resets the decryption success / failure information of the management table T (step S4407). Thereby, the key setting cancellation processing procedure of the node N is completed. Thereby, when it is below the threshold value regarding the cancellation
  • the ad hoc network encryption key can be set inactive.
  • the encryption key may be deleted or a sub key may be used.
  • a certain period of success number 0 continues several times, there is a high possibility that it has been removed. In such a case, even if an inactive key is held, it is useless and is deleted. Thereby, the memory saving of the node N can be achieved.
  • FIG. 45 is a flowchart (part 2) showing the key setting release processing procedure of the node N.
  • the node N waits for a predetermined period to elapse (step S4501: No), and when the predetermined period elapses (step S4501: Yes), the node N sets the specific key with the smallest number of successes by the setting unit 2007.
  • An active key is set (step S4502).
  • the node N transmits the setting cancellation result to the management server 101 (step S4503). Thereafter, the node N resets the decryption success / failure information in the management table T (step S4504). Thereby, the key setting cancellation processing procedure of the node N is completed. Thereby, an inactive key can be set by relative evaluation of the number of successes.
  • the encryption key of the ad hoc network with the lower communication efficiency is set inactive as viewed from the border node Nx. Can do.
  • the encryption key may be deleted or used as a sub key.
  • the encryption key may be deleted or used as a sub key.
  • a certain period of success number 0 continues several times, there is a high possibility that it has been removed. In such a case, even if an inactive key is held, it is useless and is deleted. Thereby, the memory saving of the node N can be achieved.
  • the boundary node Nx can autonomously set the encryption key Kj even if the worker OP does not go to the site for setting work of the encryption key Kj in another ad hoc network. Therefore, the efficiency of new addition work can be improved.
  • the encryption key Kj is newly added to the boundary node Nx in which the encryption key Ki is set, if communication efficiency with the node N of the other ad hoc network Aj is better, the communication in the other ad hoc network Aj A gateway Gj can be selected. Therefore, the ad hoc networks Ai and Aj can be autonomously selected, and robustness can be improved.
  • the existing encryption key Ki can be set as an inactive key.
  • multihop communication can be performed using only the encryption key Kj having the higher communication efficiency, and wasteful packet communication can be reduced.
  • inactive keys may be deleted at the node Nx. Thereby, the memory saving of the node Nx can be achieved.
  • one of the plurality of ad hoc networks Ai, Aj to which the boundary node Nx belongs may be removed. Even in such a case, by counting the number of decryption failures, it becomes clear that the removed encryption key Kj is unnecessary, so by setting it to an inactive key, wasteful data processing and communication An increase in the amount can be prevented. When the number of successes for a certain period (or continuous period) is 0, the encryption key set as inactive may be deleted as having been removed. Thereby, the memory saving of the node Nx can be achieved.

Abstract

Provided are a key setting method, a node, a server, and a network system, whereby: an ad hoc network (Ab) is installed after an ad hoc network (Aa) is installed; nodes (Nc, Nb) are within a communications area; once the node (Nb) is installed, the node (Nb) may sometimes be closer than a node (Na) to the node (Nc); and data from the node (Nc) is more efficiently uploaded to a management server (101) via the node (Nb) and a gateway (Gb). Accordingly, an ad hoc network (Ab) gateway (Gb) specific encryption key (Kb) is assigned after the fact to the node (Nc) that holds only an encryption key (Ka). As a result, the node (Nc) can autonomously select a gateway (Ga, Gb) and upload data for the node (Nc) to the management server (101).

Description

鍵設定方法、ノード、サーバ、およびネットワークシステムKey setting method, node, server, and network system
 本発明は、データを暗号化するための鍵を設定する鍵設定方法、ノード、サーバ、およびネットワークシステムに関する。 The present invention relates to a key setting method for setting a key for encrypting data, a node, a server, and a network system.
 アドホックネットワークは、無線通信でリンクする自己構成型のネットワークの一種である。アドホックネットワークは複数のノードにより構成される。また、アドホックネットワーク内の各ノードは、マルチホップ通信によりパケットの送受信を行う。マルチホップ通信は、互いの通信圏内に存在しないノード同士が、各ノードの通信圏内に存在する別のノードを介して通信を行う技術である。 An ad hoc network is a type of self-configuring network that is linked by wireless communication. An ad hoc network is composed of a plurality of nodes. Each node in the ad hoc network transmits and receives packets by multi-hop communication. Multi-hop communication is a technique in which nodes that do not exist within each other's communication area communicate with each other via another node that exists within the communication area of each node.
 また、アドホックネットワークとインターネット、LAN(Local Area Network)、WAN(Wide Area Network)などの他のネットワークとを接続する場合、ゲートウェイと呼ばれる中継機器を用いて、ネットワーク間の通信の転送が行われる。 In addition, when connecting an ad hoc network and another network such as the Internet, LAN (Local Area Network), WAN (Wide Area Network), etc., communication between networks is transferred using a relay device called a gateway.
 また、アドホックネットワークに属するノード数がある程度以上大きくなると、一つのゲートウェイでは処理が困難になる。そのような場合、ゲートウェイを複数個設けることにより、その処理を分散することが行われる。 Also, if the number of nodes belonging to the ad hoc network becomes larger than a certain level, processing with one gateway becomes difficult. In such a case, the processing is distributed by providing a plurality of gateways.
 上述の通り、アドホックネットワークにおけるマルチホップ通信は、中継するノードが選択した経路を通して、ノード同士の通信が自律的に行われるため、各ノードの状態や通信環境によって、時々刻々と経路が変化する。複数のゲートウェイが存在するアドホックネットワークでも同様で、あるノードが他のネットワークと通信する場合、どのゲートウェイにより中継されるかは、ネットワークの状態により変化するのが一般的である。アドホックネットワークは、このような自由な経路選択による、自律性とロバスト性を持つという特徴を有している。 As described above, in multi-hop communication in an ad hoc network, communication between nodes is performed autonomously through a route selected by a relaying node, and therefore the route changes every moment depending on the state of each node and the communication environment. The same applies to an ad hoc network having a plurality of gateways. When a node communicates with another network, which gateway is relayed generally varies depending on the state of the network. The ad hoc network has a feature that it has autonomy and robustness by such free route selection.
 一方、アドホックネットワークを利用した技術として、各家庭の電力メータに無線通信可能なノードを組み込んで、作業員が現地に出向くことなく、アドホックネットワーク経由でメータ確認などの業務を行うシステムがある。各家庭の電力の使用量などの個人情報を扱うアドホックネットワークでは、秘匿性や改ざん防止の観点からセキュアな通信を行うことが要求される。 On the other hand, as a technology using an ad hoc network, there is a system in which a node capable of wireless communication is incorporated into a power meter in each home, and a worker performs work such as meter confirmation via an ad hoc network without going to the site. In an ad hoc network that handles personal information such as the amount of power used in each home, it is required to perform secure communication from the viewpoint of confidentiality and tampering prevention.
 そこで、従来では、アドホックネットワーク内のノード間で送受信されるパケットを暗号化することで、セキュアな通信を確保することが行われている。この際、システム内で使用する暗号化用の鍵を1個として、各ノードやゲートウェイがこの鍵を保持することで、セキュアな通信を行うことが一般的に行われている。 Therefore, conventionally, secure communication is ensured by encrypting packets transmitted and received between nodes in the ad hoc network. At this time, it is generally performed that secure communication is performed by using one encryption key used in the system and each node or gateway holding this key.
 しかし、システム内の全ノードで共通の暗号鍵を用いた場合、万一、1個のノードが解析されて鍵が漏洩した場合、システム全体の通信の内容が漏洩する危険性がある。そのため、システム内で使用する鍵を複数にすることで、鍵漏洩時のリスクを低減することが求められている。 However, if a common encryption key is used by all nodes in the system, there is a risk that the contents of communication in the entire system will be leaked if one key is analyzed and the key is leaked. Therefore, it is required to reduce the risk at the time of key leakage by using a plurality of keys used in the system.
 また、システムへの新規ノードの初期導入時などにおいて、新規ノードは、暗号鍵が設定されるまでの間、アドホックネットワーク内の他のノードとセキュアな通信を行うことができない。このため、アドホックネットワーク経由で新規ノードに暗号鍵を自動設定することが難しく、作業員が現地に出向いて暗号鍵の設定作業を行うことがある。 Also, when the new node is initially introduced into the system, the new node cannot communicate securely with other nodes in the ad hoc network until the encryption key is set. For this reason, it is difficult to automatically set an encryption key to a new node via an ad hoc network, and an operator may go to the site to set the encryption key.
 また、セキュア通信に関する先行技術として、たとえば、ブロードキャストにより通信を行うネットワークの暗号鍵を管理する技術がある(たとえば、下記特許文献1参照。)。また、アドホックネットワークにおいて通信開始時の鍵交換を安定して行うための技術がある(たとえば、下記特許文献2参照。)。また、アドホックネットワーク内の各ノードが適応ゲートウェイを選択するための技術がある(たとえば、下記特許文献3参照。)。 Also, as a prior art related to secure communication, for example, there is a technique for managing an encryption key of a network that performs communication by broadcast (see, for example, Patent Document 1 below). There is also a technique for stably performing key exchange at the start of communication in an ad hoc network (see, for example, Patent Document 2 below). There is also a technique for each node in an ad hoc network to select an adaptive gateway (see, for example, Patent Document 3 below).
 また、セキュア通信に関する先行技術として、たとえば、端末が通信制御を行うのに必要な各種の通信制御情報を端末とは異なる他の通信装置を利用して認証サーバから取得する技術がある(たとえば、下記特許文献4参照。)。また、各通信端末が最寄りの通信端末と公開鍵を用いて相互認証を行うアドホックネットワークに関する技術がある(たとえば、下記特許文献5参照。)。 Further, as a prior art related to secure communication, for example, there is a technique for acquiring various types of communication control information necessary for a terminal to perform communication control from an authentication server using another communication device different from the terminal (for example, (See Patent Document 4 below.) In addition, there is a technique related to an ad hoc network in which each communication terminal performs mutual authentication with the nearest communication terminal using a public key (see, for example, Patent Document 5 below).
特開2003-348072号公報JP 2003-348072 A 特開2007-88799号公報JP 2007-88799 A 特開2009-81854号公報JP 2009-81854 A 特開2006-135874号公報JP 2006-135874 A 特開2007-13386号公報JP 2007-13386 A
 しかしながら、上述した従来技術では、アドホックネットワーク内の各ノードに設定する暗号鍵をゲートウェイごとに変える場合、新規ノードの初期導入時などにおいて、新規ノードが属するゲートウェイを特定することが難しいという問題があった。たとえば、新規ノードの設置場所の住所から候補となるゲートウェイを絞り込むことはできても、天候や近傍の建物との位置関係などの要因により通信状況が変化する。このため、実際にどのゲートウェイと通信可能であるかを作業員が現地に出向いて確認する必要があり、作業員の暗号鍵の設定作業にかかる作業時間および作業負荷の増大を招くという問題がある。 However, the above-described prior art has a problem that when the encryption key set for each node in the ad hoc network is changed for each gateway, it is difficult to specify the gateway to which the new node belongs at the initial introduction of the new node. It was. For example, even if the candidate gateways can be narrowed down from the address of the installation location of the new node, the communication status changes depending on factors such as the weather and the positional relationship with a nearby building. For this reason, it is necessary for the worker to go to the site to check which gateway is actually communicable, and there is a problem in that the work time and work load required for the work of setting the encryption key of the worker are increased. .
 また、事後的に他のアドホックネットワークのノードが通信圏内に設置された場合、他のアドホックネットワークのノードとは、使用しているゲートウェイが異なるため、暗号鍵も異なる。したがって、作業員が現地に出向いて確認する必要があり、作業員の暗号鍵の設定作業にかかる作業時間および作業負荷の増大を招くという問題がある。 In addition, when a node of another ad hoc network is installed in the communication range afterwards, the encryption key is different from the other ad hoc network node because the gateway used is different. Therefore, it is necessary for the worker to go to the site for confirmation, and there is a problem that the work time and work load required for the work of setting the encryption key of the worker are increased.
 また、他のアドホックネットワークの暗号鍵が追加設定できない場合、他のアドホックネットワークのノードとは通信可能であるにもかかわらず、他のアドホックネットワーク経由で通信できないこととなる。したがって、アドホックネットワークの特徴の一つである自律的なゲートウェイの選択ができず、ロバスト性が低減することにより、通信効率の低減を招く可能性があるという問題がある。 In addition, when an encryption key of another ad hoc network cannot be additionally set, communication cannot be performed via another ad hoc network even though communication with a node of the other ad hoc network is possible. Therefore, there is a problem that the autonomous gateway that is one of the features of the ad hoc network cannot be selected, and the robustness is reduced, which may lead to a reduction in communication efficiency.
 また、他のアドホックネットワークが撤去された場合、その暗号鍵は不要であるが、他のアドホックネットワークとの境界に位置していたノードは、いつまでも不要な暗号鍵を保持していると、そもそも不要な復号処理を行ってしまい、データ処理による負荷が増大するという問題がある。 In addition, when another ad hoc network is removed, the encryption key is unnecessary, but if the node located at the boundary with the other ad hoc network keeps the unnecessary encryption key, it is unnecessary in the first place. There is a problem that a heavy decryption process is performed and a load due to data processing increases.
 本発明は、1つの側面では、アドホックネットワーク内のノードが用いる暗号鍵の設定作業の効率化を図ることを目的とする。また、他の側面では、他のアドホックネットワークの新設や撤去に応じて動的に暗号鍵を追加することで、アドホックネットワークの自律性やロバスト性を維持して通信の効率化を図ることを目的とする。 An object of one aspect of the present invention is to improve the efficiency of setting work of encryption keys used by nodes in an ad hoc network. In another aspect, the purpose is to increase the efficiency of communication by maintaining the autonomy and robustness of ad hoc networks by dynamically adding encryption keys in response to the establishment or removal of other ad hoc networks. And
 本発明の一態様として、複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出し、前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、検出されたゲートウェイごとに計数し、計数された失敗数が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断し、前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記複数のアドホックネットワークの各ゲートウェイ固有の鍵を記憶するサーバに、前記いずれかのアドホックネットワーク経由で送信し、前記取得要求が送信された結果、前記サーバに記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信し、受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する鍵設定方法、ノード、およびネットワークシステムが提案される。 As one aspect of the present invention, a node in any one of the ad hoc networks that performs encryption and decryption with a gateway-specific first key in any one of a plurality of ad hoc networks is received by the encrypted packet A gateway that is a destination or a transmission source is detected for each encrypted packet, and the number of failures in which the encrypted packet could not be decrypted with the first key is counted for each detected gateway. It is determined for each gateway whether the number is greater than or equal to a threshold value related to key acquisition, and a second key acquisition request specific to the gateway determined to be equal to or greater than the threshold value Send it to the server that stores the key unique to each gateway via one of the above ad hoc networks. As a result of the acquisition request being transmitted, the second key stored in the server is received from the server via any one of the ad hoc networks, and the received second key is encrypted and A key setting method, a node, and a network system for setting a key for decryption are proposed.
 また、本発明の一態様として、複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出し、前記暗号化パケットを前記第1の鍵で復号できた成功数を、検出されたゲートウェイごとに計数するとともに、前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、前記ゲートウェイごとに計数し、計数された前記失敗数から前記成功数を引いた差分が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断し、前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記複数のアドホックネットワークの各ゲートウェイ固有の鍵を記憶するサーバに、前記いずれかのアドホックネットワーク経由で送信し、前記取得要求が送信された結果、前記サーバに記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信し、受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する鍵設定方法、ノード、およびネットワークシステムが提案される。 Also, as one aspect of the present invention, a node in any one of the ad hoc networks that performs encryption and decryption with a first key unique to a gateway in any one of a plurality of ad hoc networks is received encryption. A destination address or source gateway of the encrypted packet is detected for each encrypted packet, and the number of successful decryptions of the encrypted packet with the first key is counted for each detected gateway. The number of failures that could not decrypt the encrypted packet with the first key is counted for each gateway, and the difference obtained by subtracting the number of successes from the number of failures counted is greater than or equal to a threshold for key acquisition. For each gateway, and it is necessary to acquire a second key specific to the gateway that is determined to be equal to or greater than the threshold. Is transmitted to the server storing the key specific to each gateway of the plurality of ad hoc networks via any one of the ad hoc networks, and the second request stored in the server as a result of the acquisition request being transmitted. A key setting method, a node, and a network system are proposed in which a key is received from the server via any one of the ad hoc networks, and the received second key is set as a key for encryption and decryption. .
 また、本発明の一態様として、複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵および他のアドホックネットワーク内の他のゲートウェイ固有の第2の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、受信された暗号化パケットごとに、前記第1の鍵で復号できた成功数を計数するとともに、前記第2の鍵で復号できた成功数を計数し、計数された各成功数が設定解除に関するしきい値以下であるか否かを判断し、前記第1の鍵および前記第2の鍵のうち前記設定解除に関するしきい値以下と判断された鍵を、前記暗号化および復号をおこなわない鍵に設定する鍵設定方法、ノード、およびネットワークシステムが提案される。 Also, as one aspect of the present invention, encryption and decryption are performed using a first key specific to a gateway in an ad hoc network of any one of a plurality of ad hoc networks and a second key specific to another gateway in another ad hoc network. The node in any one of the ad hoc networks to perform counts the number of successes that can be decrypted with the first key and counts the number of successes that can be decrypted with the second key for each received encrypted packet Then, it is determined whether each counted number of successes is less than or equal to a threshold value related to canceling the setting. A key setting method, a node, and a network system for setting a key to a key that does not perform encryption and decryption are proposed.
 また、本発明の一態様として、複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵および他のアドホックネットワーク内の他のゲートウェイ固有の第2の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、受信された暗号化パケットごとに、前記第1の鍵で復号できた成功数を計数するとともに、前記第2の鍵で復号できた成功数を計数し、前記第1の鍵および前記第2の鍵のうち前記成功数が少ない方の鍵を、前記暗号化および復号をおこなわない鍵に設定する鍵設定方法、ノード、およびネットワークシステムが提案される。 Also, as one aspect of the present invention, encryption and decryption are performed using a first key specific to a gateway in an ad hoc network of any one of a plurality of ad hoc networks and a second key specific to another gateway in another ad hoc network. The node in any one of the ad hoc networks to perform counts the number of successes that can be decrypted with the first key and counts the number of successes that can be decrypted with the second key for each received encrypted packet Then, a key setting method, a node, and a network system are proposed in which the key with the smaller number of successes out of the first key and the second key is set as a key that does not perform the encryption and decryption. .
 また、本発明の一態様として、複数のアドホックネットワーク各々のゲートウェイと通信可能なサーバが、前記ゲートウェイの識別情報と前記ゲートウェイ固有の鍵とを、ゲートウェイごとに記憶しており、前記複数のアドホックネットワーク内のいずれかのアドホックネットワーク内のノードから、前記いずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵とは異なるゲートウェイ固有の第2の鍵の取得要求を、前記いずれかのアドホックネットワーク経由で受信し、受信された前記第2の鍵の取得要求に含まれている前記第2の鍵を使用するゲートウェイの識別情報に基づいて、前記第2の鍵を抽出し、抽出された前記第2の鍵を、前記いずれかのアドホックネットワーク経由で前記ノードに送信する鍵設定方法、サーバ、およびネットワークシステムが提案される。 Further, as one aspect of the present invention, a server capable of communicating with each gateway of a plurality of ad hoc networks stores the gateway identification information and the gateway-specific key for each gateway, and the plurality of ad hoc networks A request for obtaining a second key specific to the gateway, which is different from the first key specific to the gateway in any one of the ad hoc networks, from a node in any one of the ad hoc networks via the one of the ad hoc networks The second key is extracted based on the identification information of the gateway using the second key included in the received second key acquisition request received, and the extracted second Key setting method for transmitting the key of the server to the node via any one of the ad hoc networks, , And the network system is proposed.
 本鍵設定方法、ノード、サーバ、およびネットワークシステムによれば、アドホックネットワーク内のノードが用いる暗号鍵の設定作業の効率化を図ることができるという効果を奏する。また、他のアドホックネットワークの新設や撤去に応じて動的に暗号鍵を追加することで、アドホックネットワークの自律性やロバスト性を維持して通信の効率化を図ることができるという効果を奏する。 According to this key setting method, node, server, and network system, it is possible to improve the efficiency of setting the encryption key used by the nodes in the ad hoc network. Further, by dynamically adding an encryption key in accordance with the establishment or removal of another ad hoc network, there is an effect that it is possible to maintain the autonomy and robustness of the ad hoc network and improve the efficiency of communication.
図1は、ネットワークシステムの第1の例を示す説明図である。FIG. 1 is an explanatory diagram illustrating a first example of a network system. 図2は、ネットワークシステムの第2の例を示す説明図である。FIG. 2 is an explanatory diagram illustrating a second example of the network system. 図3は、ネットワークシステムの第3の例を示す説明図である。FIG. 3 is an explanatory diagram showing a third example of the network system. 図4は、ネットワークシステムの第4の例を示す説明図である。FIG. 4 is an explanatory diagram illustrating a fourth example of the network system. 図5は、ネットワークシステムの一実施例を示す説明図である。FIG. 5 is an explanatory diagram showing an embodiment of the network system. 図6は、本実施の形態にかかるネットワークシステムへのダウンストリーム型による新規ノードの導入例を示す説明図である。FIG. 6 is an explanatory diagram showing an example of introducing a new node of the downstream type into the network system according to the present embodiment. 図7は、実施の形態にかかるダウンストリーム型による新規ノードの導入時におけるネットワークシステムの動作例を示すシーケンス図(その1)である。FIG. 7 is a sequence diagram (part 1) illustrating an operation example of the network system at the time of introducing a new node of the downstream type according to the embodiment. 図8は、実施の形態にかかるダウンストリーム型による新規ノードの導入時におけるネットワークシステムの動作例を示すシーケンス図(その2)である。FIG. 8 is a sequence diagram (part 2) illustrating an operation example of the network system at the time of introducing a new node of the downstream type according to the embodiment. 図9は、本実施の形態にかかるネットワークシステムへのアップストリーム型による新規ノードの導入例を示す説明図である。FIG. 9 is an explanatory diagram showing an example of introducing an upstream type new node into the network system according to the present embodiment. 図10は、新規ノードの導入時におけるネットワークシステムの動作例を示すシーケンス図である。FIG. 10 is a sequence diagram illustrating an operation example of the network system when a new node is introduced. 図11は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その1)である。FIG. 11 is an explanatory diagram (part 1) of an example of adding an encryption key to a boundary node in the network system. 図12は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その2)である。FIG. 12 is an explanatory diagram (part 2) of an example of adding an encryption key to a boundary node in the network system. 図13は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その3)である。FIG. 13 is an explanatory diagram (part 3) illustrating an example of adding the encryption key to the boundary node in the network system. 図14は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その4)である。FIG. 14 is an explanatory diagram (part 4) illustrating an example of adding the encryption key to the boundary node in the network system. 図15は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その5)である。FIG. 15 is an explanatory diagram (part 5) of an example of adding the encryption key to the boundary node in the network system. 図16は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その6)である。FIG. 16 is an explanatory diagram (part 6) of an example of adding the encryption key to the boundary node in the network system. 図17は、管理サーバのハードウェア構成例を示すブロック図である。FIG. 17 is a block diagram illustrating a hardware configuration example of the management server. 図18は、ノード等のハードウェア構成例を示すブロック図である。FIG. 18 is a block diagram illustrating a hardware configuration example such as a node. 図19は、暗号鍵DBの記憶内容の一例を示す説明図である。FIG. 19 is an explanatory diagram showing an example of the contents stored in the encryption key DB. 図20は、ノードの機能的構成例を示すブロック図である。FIG. 20 is a block diagram illustrating a functional configuration example of a node. 図21は、暗号鍵で暗号化された暗号化パケットのデータ構造例を示す説明図(その1)である。FIG. 21 is an explanatory diagram (part 1) of a data structure example of an encrypted packet encrypted with an encryption key. 図22は、暗号鍵で暗号化された暗号化パケットのデータ構造例を示す説明図(その2)である。FIG. 22 is an explanatory diagram (part 2) of a data structure example of an encrypted packet encrypted with an encryption key. 図23は、取得要求パケットのデータ構造例を示す説明図である。FIG. 23 is an explanatory diagram of an exemplary data structure of an acquisition request packet. 図24は、ノード内の管理テーブルの記憶内容例を示す説明図(その1)である。FIG. 24 is an explanatory diagram (part 1) illustrating an example of storage contents of a management table in a node. 図25は、ノード内の管理テーブルの記憶内容例を示す説明図(その2)である。FIG. 25 is an explanatory diagram (part 2) of an example of stored contents of the management table in the node. 図26は、ノード内の管理テーブルの記憶内容例を示す説明図(その3)である。FIG. 26 is an explanatory diagram (part 3) of an example of stored contents of the management table in the node. 図27は、ノード(境界ノード)のパケット転送処理手順を示すフローチャートである。FIG. 27 is a flowchart showing a packet transfer processing procedure of a node (boundary node). 図28は、図27に示した復号処理(ステップS2703)の詳細な処理手順を示すフローチャートである。FIG. 28 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG. 図29は、図27に示した復号処理(ステップS2703)の詳細な処理手順を示すフローチャートである。FIG. 29 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG. 図30は、ノードの暗号鍵追加処理手順を示すフローチャート(その1)である。FIG. 30 is a flowchart (part 1) illustrating the encryption key addition processing procedure of the node. 図31は、ノードの暗号鍵追加処理手順を示すフローチャート(その2)である。FIG. 31 is a flowchart (part 2) illustrating the encryption key addition processing procedure of the node. 図32は、管理サーバの機能的構成例を示すブロック図である。FIG. 32 is a block diagram illustrating a functional configuration example of the management server. 図33は、暗号化取得要求パケットの復号例を示す説明図である。FIG. 33 is an explanatory diagram of an example of decryption of the encryption acquisition request packet. 図34は、履歴情報の具体例を示す説明図である。FIG. 34 is an explanatory diagram of a specific example of history information. 図35は、応答パケットのデータ構造例を示す説明図である。FIG. 35 is an explanatory diagram of a data structure example of a response packet. 図36は、管理サーバの鍵提供処理手順を示すフローチャート(その1)である。FIG. 36 is a flowchart (No. 1) showing the key provision processing procedure of the management server. 図37は、図36に示した復号処理(ステップS3602)の詳細な処理手順を示すフローチャートである。FIG. 37 is a flowchart of a detailed process procedure of the decryption process (step S3602) depicted in FIG. 図38は、管理サーバの鍵提供処理手順を示すフローチャート(その2)である。FIG. 38 is a flowchart (part 2) illustrating the key provision processing procedure of the management server. 図39は、妥当性判定処理(ステップS3800)の詳細な処理手順を示すフローチャート(その1)である。FIG. 39 is a flowchart (part 1) illustrating a detailed processing procedure of the validity determination processing (step S3800). 図40は、妥当性判定処理(ステップS3800)の詳細な処理手順を示すフローチャート(その2)である。FIG. 40 is a flowchart (part 2) illustrating the detailed processing procedure of the validity determination processing (step S3800). 図41は、妥当性判定処理(ステップS3800)の詳細な処理手順を示すフローチャート(その3)である。FIG. 41 is a flowchart (part 3) illustrating a detailed processing procedure of the validity determination processing (step S3800). 図42は、ノードの管理テーブルTの更新例を示す説明図(その1)である。FIG. 42 is an explanatory diagram (part 1) of an example of updating the node management table T. 図43は、ノードの管理テーブルTの更新例を示す説明図(その2)である。FIG. 43 is an explanatory diagram (part 2) of an example of updating the node management table T. 図44は、ノードの鍵設定解除処理手順を示すフローチャート(その1)である。FIG. 44 is a flowchart (No. 1) showing the node key setting release processing procedure. 図45は、ノードの鍵設定解除処理手順を示すフローチャート(その2)である。FIG. 45 is a flowchart (part 2) of the node key setting release processing procedure.
 以下に添付図面を参照して、本発明にかかる鍵設定方法、ノード、サーバおよびネットワークシステムの実施の形態を詳細に説明する。アドホックネットワークとは、無線LANのようなアクセスポイントを必要としない、無線で接続できるノード群で構成された自立分散型無線ネットワークである。なお、本明細書では、ゲートウェイ(いわゆるシンクノード)もアドホックネットワークに含まれるものとする。 Hereinafter, embodiments of a key setting method, a node, a server, and a network system according to the present invention will be described in detail with reference to the accompanying drawings. An ad hoc network is an autonomous distributed wireless network configured by a group of nodes that can be connected wirelessly without requiring an access point such as a wireless LAN. In this specification, a gateway (so-called sink node) is also included in the ad hoc network.
 アドホックネットワークでは、当該アドホックネットワーク内の各ノードに設定する暗号鍵を、セキュリティ等のため、ゲートウェイごとに変える場合がある。このようにゲートウェイごとに暗号鍵を変える場合、セキュリティを考慮しない(つまり暗号鍵を使用しない)アドホックネットワークや、1個の暗号鍵を全ノードが共有するアドホックネットワークでは可能であった、自律的なゲートウェイの選択が行えないという状況が発生する。そのため、アドホックネットワークの特徴の一つであるロバスト性が低減することにより、通信効率の低減を招く可能性がある。 In an ad hoc network, the encryption key set in each node in the ad hoc network may be changed for each gateway for security or the like. In this way, when changing the encryption key for each gateway, autonomous, which is possible in an ad hoc network that does not consider security (that is, the encryption key is not used) or an ad hoc network in which all nodes share one encryption key. A situation occurs where the gateway cannot be selected. Therefore, there is a possibility that the communication efficiency may be reduced by reducing the robustness that is one of the features of the ad hoc network.
 本実施の形態では、アドホックネットワークの自律性やロバスト性を担保するため、複数のアドホックネットワークの境界に位置するノードに、各アドホックネットワーク内のゲートウェイ固有の暗号鍵をそれぞれ付与する。その際、一方の暗号鍵がすでに付与されており、他方の暗号鍵がまだ付与されていない場合に、境界に位置するノードが、他方の暗号鍵をセキュアかつ自動的に取得する。 In this embodiment, in order to secure the autonomy and robustness of the ad hoc network, a gateway-specific encryption key in each ad hoc network is assigned to each node located at the boundary of the plurality of ad hoc networks. At this time, when one encryption key has already been assigned and the other encryption key has not been assigned yet, the node located at the boundary acquires the other encryption key securely and automatically.
 また、必要に応じて、他方の暗号鍵の付与が妥当か否かも判断し、妥当であれば、境界に位置するノードの他方の暗号鍵をセキュアかつ自動的に取得する。これにより、境界に位置するノードは、自律的にゲートウェイが選択可能となり、アドホックネットワークの通信効率の向上を図ることができる。以下、図面を用いて説明する。 Also, if necessary, it is also determined whether or not the other encryption key is appropriate, and if it is appropriate, the other encryption key of the node located at the boundary is acquired securely and automatically. As a result, the gateway located at the boundary can autonomously select the gateway, and the communication efficiency of the ad hoc network can be improved. Hereinafter, it demonstrates using drawing.
 図1は、ネットワークシステムの第1の例を示す説明図である。図1では、管理サーバ101とゲートウェイGaがネットワークNW1を介して通信可能とする。図1では、説明を単純化するため、ゲートウェイ数を1個、ノード数を2個とする。アドホックネットワークAaを構成するゲートウェイGaおよびノードNa,Ncは、ゲートウェイGa固有の暗号鍵Kaを保持する。 FIG. 1 is an explanatory diagram showing a first example of a network system. In FIG. 1, the management server 101 and the gateway Ga can communicate with each other via the network NW1. In FIG. 1, to simplify the description, the number of gateways is one and the number of nodes is two. The gateway Ga and the nodes Na and Nc constituting the ad hoc network Aa hold an encryption key Ka unique to the gateway Ga.
 図1のネットワークシステムでは、ゲートウェイGaが暗号鍵Kaで暗号化した暗号化パケットSPaをブロードキャストすることで、ノードNaは暗号化パケットSPaを受信する。ノードNaは、受信した暗号化パケットSPaを暗号鍵Kaで復号できるため、暗号化パケットSPaをノードNcに転送することで、マルチホップ通信を実現する。また、ノードNcも暗号化パケットSPaを暗号鍵Kaで復号する。これにより、暗号化パケットSPaに埋め込まれたデータが、ノードNa,Ncに行き渡ることになる。 In the network system of FIG. 1, the gateway Na broadcasts the encrypted packet SPa encrypted with the encryption key Ka, so that the node Na receives the encrypted packet SPa. Since the node Na can decrypt the received encrypted packet SPa with the encryption key Ka, multi-hop communication is realized by transferring the encrypted packet SPa to the node Nc. The node Nc also decrypts the encrypted packet SPa with the encryption key Ka. As a result, the data embedded in the encrypted packet SPa is distributed to the nodes Na and Nc.
 また、ノードNa,NcからデータをゲートウェイGaにアップロードする場合は、暗号化パケットSPaをゲートウェイGaあてに送信することで、マルチホップ通信によりゲートウェイGaに到達する。 In addition, when uploading data from the nodes Na and Nc to the gateway Ga, the encrypted packet SPa is transmitted to the gateway Ga to reach the gateway Ga by multi-hop communication.
 図2は、ネットワークシステムの第2の例を示す説明図である。図2に示す第2の例は、図1に示したアドホックネットワークAaの設置後に、さらに、アドホックネットワークAbが設置された例である。説明を単純化するため、アドホックネットワークAbは、1個のゲートウェイGbと1個のノードNbで構成されているものとする。ゲートウェイGbおよびノードNbは、ゲートウェイGb固有の暗号鍵Kbを保持する。図1の場合と同様、アドホックネットワークAb内でも、暗号鍵Kbで暗号化された暗号化パケットSPbが流通する。 FIG. 2 is an explanatory diagram showing a second example of the network system. The second example shown in FIG. 2 is an example in which an ad hoc network Ab is further installed after the ad hoc network Aa shown in FIG. 1 is installed. In order to simplify the description, it is assumed that the ad hoc network Ab is composed of one gateway Gb and one node Nb. The gateway Gb and the node Nb hold an encryption key Kb unique to the gateway Gb. As in the case of FIG. 1, the encrypted packet SPb encrypted with the encryption key Kb also circulates within the ad hoc network Ab.
 ここで、ノードNcとノードNbとは互いに通信圏内にあるものとする。ノードNcのように、複数のアドホックネットワークのノード(図2ではノードNa,Nb)の通信圏内にあるノードを、「境界ノード」と称す。 Here, it is assumed that the node Nc and the node Nb are within communication range. A node within the communication range of a plurality of ad hoc network nodes (nodes Na and Nb in FIG. 2), such as the node Nc, is referred to as a “boundary node”.
 図1では、ノードNcの近隣ノード(通信圏内にあるノード)はノードNaのみであるため、ノードNcはノードNaと通信をおこなっていたが、図2のように、アドホックネットワークAb内のノードNbが設置されると、ノードNaよりもノードNbの方がノードNcに近い場合がある。このような場合は、ノードNcのデータは、ノードNb、ゲートウェイGbを経由して、管理サーバ101にアップロードする方が効率的であるが、ノードNcは暗号鍵Kbを保持していない。このため、ノードNbの方が近距離に位置しているにもかかわらず、ノードNcは、セキュリティ上、ノードNa、ゲートウェイGaを経由して管理サーバ101にデータをアップロードしなければならない。 In FIG. 1, since the node Nc is the only neighboring node (the node within the communication range) of the node Nc, the node Nc communicates with the node Na. However, as shown in FIG. 2, the node Nb in the ad hoc network Ab Is installed, the node Nb may be closer to the node Nc than the node Na. In such a case, it is more efficient to upload the data of the node Nc to the management server 101 via the node Nb and the gateway Gb, but the node Nc does not hold the encryption key Kb. For this reason, the node Nc has to upload data to the management server 101 via the node Na and the gateway Ga for security, although the node Nb is located closer.
 図3は、ネットワークシステムの第3の例を示す説明図である。図3に示す第3の例は、図2の第2の例におけるノードNcに、暗号鍵Kbを付与した例を示している。本実施の形態では、第3の例のように、暗号鍵Kaのみ保持するノードNcに、アドホックネットワークAbのゲートウェイGb固有の暗号鍵Kbを事後的に付与しておくことで、ノードNcは、自律的にゲートウェイGa,Gbを選択して、ノードNcのデータを管理サーバ101にアップロードすることができる。 FIG. 3 is an explanatory diagram showing a third example of the network system. The third example shown in FIG. 3 shows an example in which the encryption key Kb is assigned to the node Nc in the second example of FIG. In the present embodiment, as in the third example, by adding the encryption key Kb unique to the gateway Gb of the ad hoc network Ab to the node Nc that holds only the encryption key Ka, the node Nc The gateways Ga and Gb can be selected autonomously and the data of the node Nc can be uploaded to the management server 101.
 図4は、ネットワークシステムの第4の例を示す説明図である。図4に示す第4の例は、図3の第3の例において、アドホックネットワークAaが撤去された例を示している。アドホックネットワークAaが撤去された場合でも、ノードNcにおいて暗号鍵Kaを残しておくと、ノードNcは、暗号鍵Kaで暗号化や復号を試みてしまう。暗号鍵Kaで暗号化された暗号化パケットSPaを送信しても、ノードNbでは結局破棄されてしまうため、暗号鍵Kaでの暗号化処理や暗号化パケットSPaの送信自体が無駄である。 FIG. 4 is an explanatory diagram showing a fourth example of the network system. The fourth example shown in FIG. 4 shows an example in which the ad hoc network Aa is removed in the third example of FIG. Even when the ad hoc network Aa is removed, if the encryption key Ka is left in the node Nc, the node Nc tries to encrypt or decrypt with the encryption key Ka. Even if the encrypted packet SPa encrypted with the encryption key Ka is transmitted, it is eventually discarded at the node Nb. Therefore, the encryption process with the encryption key Ka and the transmission of the encrypted packet SPa are useless.
 したがって、本実施の形態では、第4の例のように、アドホックネットワークAaが撤去された場合、ノードNcにおいて、撤去されたアドホックネットワークAaの暗号鍵Kaを削除する。これにより、無駄な暗号化処理や通信処理をなくし、残されたアドホックネットワークAb内の通信の効率化を図ることができる。 Therefore, in this embodiment, when the ad hoc network Aa is removed as in the fourth example, the encryption key Ka of the removed ad hoc network Aa is deleted at the node Nc. Thereby, useless encryption processing and communication processing can be eliminated, and the efficiency of communication within the remaining ad hoc network Ab can be improved.
(ネットワークシステムの一実施例)
 図5は、ネットワークシステムの一実施例を示す説明図である。図5において、ネットワークシステム100は、管理サーバ101と、ゲートウェイG1~Gnと、ノードN1-1~N1-m1,…,Ni-1~Ni-mi,…,Nn-1~Nn-mnと、を含む構成である。
(One embodiment of network system)
FIG. 5 is an explanatory diagram showing an embodiment of the network system. In FIG. 5, the network system 100 includes a management server 101, gateways G1 to Gn, nodes N1-1 to N1-m1,..., Ni-1 to Ni-mi, ..., Nn-1 to Nn-mn, It is the structure containing.
 ネットワークシステム100において、管理サーバ101とゲートウェイG1~Gnは、インターネット、LAN、WANなどのネットワークNW1を介して相互に通信可能に接続されている。また、ゲートウェイGiとノードNi-1~Ni-miは、アドホックネットワークAiを介して接続されている(i=1,2,…,n)。 In the network system 100, the management server 101 and the gateways G1 to Gn are connected to each other via a network NW1 such as the Internet, LAN, or WAN. The gateway Gi and the nodes Ni-1 to Ni-mi are connected via the ad hoc network Ai (i = 1, 2,..., N).
 ここで、管理サーバ101は、暗号鍵DB(データベース)110を備え、各ゲートウェイG1~Gn固有の暗号鍵を管理するコンピュータである。ゲートウェイGi固有の暗号鍵(以下、「暗号鍵Ki」という)は、ゲートウェイGiが属するアドホックネットワークAi内のノード間で送受信されるパケットを暗号化するための鍵情報である。なお、暗号鍵DB110についての詳細な説明は、図19を用いて後述する。 Here, the management server 101 is a computer that includes an encryption key DB (database) 110 and manages encryption keys unique to the gateways G1 to Gn. The encryption key unique to the gateway Gi (hereinafter referred to as “encryption key Ki”) is key information for encrypting packets transmitted and received between nodes in the ad hoc network Ai to which the gateway Gi belongs. A detailed description of the encryption key DB 110 will be described later with reference to FIG.
 ゲートウェイGiは、アドホックネットワークAiとネットワークNW1とを接続する中継機器である。ゲートウェイGiは、アドホックネットワークAiのプロトコルとネットワークNW1のプロトコルの両方を理解し、アドホックネットワークAiとネットワークNW1との間の通信の転送を行う。 The gateway Gi is a relay device that connects the ad hoc network Ai and the network NW1. The gateway Gi understands both the protocol of the ad hoc network Ai and the protocol of the network NW1, and transfers communication between the ad hoc network Ai and the network NW1.
 ノードNi-1~Ni-miは、所定の通信圏内の他ノードとマルチホップ通信を行う無線通信装置である。アドホックネットワークAiでは、すべてのノードNi-1~Ni-miがゲートウェイGiと直接通信できる必要はなく、一部のノードがゲートウェイGiと通信可能であればよい。 Nodes Ni-1 to Ni-mi are wireless communication devices that perform multi-hop communication with other nodes within a predetermined communication range. In the ad hoc network Ai, it is not necessary for all the nodes Ni-1 to Ni-mi to directly communicate with the gateway Gi, and it is sufficient that some nodes can communicate with the gateway Gi.
 ネットワークシステム100は、たとえば、各家庭の電力やガスの使用量を収集するシステムに適用することができる。具体的には、たとえば、各家庭の電力メータやガスメータに各ノードNi-1~Ni-miを組み込むことで、アドホックネットワークAi内のノード間で各家庭の電力やガスの使用量を送受信する。なお、各家庭の電力やガスの使用量は、各ノードNi-1~Ni-miが計測してもよく、また、各ノードNi-1~Ni-miが電力メータやガスメータから取得してもよい。 The network system 100 can be applied to, for example, a system that collects the amount of power and gas used in each household. Specifically, for example, by incorporating each node Ni-1 to Ni-mi into a power meter or gas meter in each home, the amount of power or gas used in each home is transmitted and received between nodes in the ad hoc network Ai. Note that the power consumption and gas consumption of each household may be measured by each node Ni-1 to Ni-mi, or each node Ni-1 to Ni-mi may be obtained from a power meter or gas meter. Good.
 ゲートウェイGiは、アドホックネットワークAi内のノードNi-1~Ni-miから受信した各家庭の電力やガスの使用量を、ネットワークNW1を介して電力会社やガス会社のサーバ(たとえば、管理サーバ101)に送信する。これにより、作業員が現地に出向くことなく電力やガスの使用量を収集することができる。 The gateway Gi uses the power and gas usage of each home received from the nodes Ni-1 to Ni-mi in the ad hoc network Ai to the server of the power company or gas company (for example, the management server 101) via the network NW1. Send to. As a result, the amount of power and gas used can be collected without the need for workers to visit the site.
 また、ネットワークシステム100では、アドホックネットワークAiごとにゲートウェイGi固有の暗号鍵を用いてパケットを暗号化する。これにより、アドホックネットワークAiのセキュア通信(データ秘匿性、改ざん防止など)を確保する。また、アドホックネットワークAiごとに暗号鍵を変えることで、鍵漏洩時のリスクを低減させる。 In the network system 100, the packet is encrypted using the encryption key unique to the gateway Gi for each ad hoc network Ai. This ensures secure communication (data confidentiality, tampering prevention, etc.) of the ad hoc network Ai. Moreover, the risk at the time of key leakage is reduced by changing an encryption key for every ad hoc network Ai.
 なお、図5の例では、アドホックネットワークAi内に1台のゲートウェイGiを設ける構成としたが、同一のアドホックネットワークAi内に複数台のゲートウェイGiを設ける構成としてもよい。この場合、アドホックネットワークAi内で送受信されるパケットを暗号化するための暗号鍵は、複数台のゲートウェイGiで共通である。 In the example of FIG. 5, a single gateway Gi is provided in the ad hoc network Ai. However, a plurality of gateways Gi may be provided in the same ad hoc network Ai. In this case, an encryption key for encrypting a packet transmitted / received in the ad hoc network Ai is common to a plurality of gateways Gi.
 なお、アドホックネットワークAi内の各ノードNi-1~Ni-miにおいて、ゲートウェイGi固有の暗号鍵で暗号化された暗号化パケットは、あらかじめゲートウェイGiからブロードキャストされたルーティングテーブルに従って転送する。ルーティングテーブルには、転送元アドレスと転送先アドレスが規定されているため、転送元ノードからの暗号化パケットは転送先ノードに転送される。 Note that, in each of the nodes Ni-1 to Ni-mi in the ad hoc network Ai, the encrypted packet encrypted with the encryption key unique to the gateway Gi is transferred according to the routing table broadcast from the gateway Gi in advance. Since the transfer source address and the transfer destination address are defined in the routing table, the encrypted packet from the transfer source node is transferred to the transfer destination node.
 また、ルーティングテーブルがない場合は、通信圏内の近隣ノードに送信される。アドホックネットワークAiの各ノードNi-1~Ni-miでは、保持しているゲートウェイGi固有の暗号鍵で復号できなかったパケットは破棄されるため、パケット内に転送回数の上限を規定しておくことで、あて先にマルチホップ通信することができる。また、復号できなかった暗号化パケットは破棄されるが、このように復号できない暗号化パケットを受信することを、「傍受」と称す。 Also, when there is no routing table, it is transmitted to neighboring nodes in the communication area. In each of the nodes Ni-1 to Ni-mi of the ad hoc network Ai, packets that could not be decrypted with the encryption key unique to the gateway Gi held are discarded. Therefore, an upper limit of the number of transfer times should be specified in the packet. Thus, multi-hop communication can be performed at the destination. In addition, an encrypted packet that could not be decrypted is discarded, but receiving an encrypted packet that cannot be decrypted in this way is referred to as “interception”.
(新規ノードの導入時における暗号鍵の設定例)
 つぎに、図5に示したネットワークシステム100への新規ノードの導入時における暗号鍵の設定例について図6~図8を用いて説明する。鍵設定処理には、ダウンストリーム型とアップストリーム型の2種類がある。ダウンストリーム型とは、新規ノードに対し上流側(ゲートウェイ)からパケットをブロードキャストすることで、鍵設定をおこなう処理である。アップストリーム型とは、新規ノードから上流側(ゲートウェイ)に対しパケットをアップロードすることで、鍵設定を行う処理である。
(Setting example of encryption key when introducing a new node)
Next, an example of setting an encryption key when a new node is introduced into the network system 100 shown in FIG. 5 will be described with reference to FIGS. There are two types of key setting processes, a downstream type and an upstream type. The downstream type is a process for setting a key by broadcasting a packet from an upstream side (gateway) to a new node. The upstream type is a process for setting a key by uploading a packet from a new node to the upstream side (gateway).
 ダウンストリーム型については、図6~図8を用いて説明する。また、アップストリーム型については、図9および図10を用いて説明する。なお、本実施の形態では、境界ノードに対し、複数の暗号鍵を設定するが、ここでは、まず、1個の暗号鍵を設定する例について説明し、そのあとで、鍵の追加設定例について説明する。 The downstream type will be described with reference to FIGS. The upstream type will be described with reference to FIGS. 9 and 10. In this embodiment, a plurality of encryption keys are set for the boundary node. Here, an example in which one encryption key is set will be described first, and then an additional setting example of keys will be described. explain.
 図6は、本実施の形態にかかるネットワークシステム100へのダウンストリーム型による新規ノードの導入例を示す説明図である。図6において、ネットワークシステム100のアドホックネットワークAi内に新規ノードNi-xが導入されている。なお、図6では、アドホックネットワークAi内のノードNi-1~Ni-miのうち、代表としてノードNi-1~Ni-3を示している。 FIG. 6 is an explanatory diagram showing an example of introducing a new node by the downstream type into the network system 100 according to the present embodiment. In FIG. 6, a new node Ni-x is introduced into the ad hoc network Ai of the network system 100. In FIG. 6, among the nodes Ni-1 to Ni-mi in the ad hoc network Ai, nodes Ni-1 to Ni-3 are shown as representatives.
 新規ノードNi-xの導入時は、作業員OPは新規ノードNi-xがどのアドホックネットワークAiに属しているのかわからない。そこで、新規ノードNi-xが近隣から傍受した、ゲートウェイGiからの暗号化パケットを、作業員OPが使用する携帯端末MTを利用して、管理サーバ101に送信することで、新規ノードNi-xに設定すべき暗号鍵Kiを管理サーバ101に問い合わせる。これにより、適切な暗号鍵Kiを管理サーバ101から取得して新規ノードNi-xに自動設定される。 When the new node Ni-x is introduced, the worker OP does not know which ad hoc network Ai the new node Ni-x belongs to. Therefore, the new node Ni-x intercepts from the neighborhood and transmits the encrypted packet from the gateway Gi to the management server 101 by using the mobile terminal MT used by the worker OP, whereby the new node Ni-x The management server 101 is inquired about the encryption key Ki to be set to. As a result, an appropriate encryption key Ki is acquired from the management server 101 and automatically set to the new node Ni-x.
 ここで、携帯端末MTは、作業員OPが使用する携帯型の通信装置であり、たとえば、携帯電話機、PHS(Personal Handy-phone System)電話機、スマートフォン、ノート型のパーソナル・コンピュータなどである。携帯端末MTは、直接通信できない新規ノードNi-xと管理サーバ101との間の通信を中継する。 Here, the mobile terminal MT is a mobile communication device used by the worker OP, and is, for example, a mobile phone, a PHS (Personal Handy-phone System) phone, a smartphone, a notebook personal computer, or the like. The mobile terminal MT relays communication between the new node Ni-x that cannot communicate directly and the management server 101.
 図7および図8は、実施の形態にかかるダウンストリーム型による新規ノードNi-xの導入時におけるネットワークシステム100の動作例を示すシーケンス図である。図7のシーケンスは、たとえば、作業員OPが現地(新規ノードNi-xの設置場所)に出向くまでに行われる動作例である。図8のシーケンスは、たとえば、作業員OPが現地に出向いたあとに行われる動作例である。 7 and 8 are sequence diagrams showing an operation example of the network system 100 when the downstream type new node Ni-x according to the embodiment is introduced. The sequence in FIG. 7 is an operation example performed until the worker OP goes to the site (place where the new node Ni-x is installed), for example. The sequence in FIG. 8 is an example of an operation performed after the worker OP goes to the site, for example.
 図7のシーケンスにおいて、(1)ゲートウェイGiは、ゲートウェイGi固有の暗号鍵Kiを管理サーバ101に送信する。(2)管理サーバ101は、ゲートウェイGi固有の暗号鍵KiとゲートウェイGiのアドレスとを関連付けて暗号鍵DB110に登録する。 7, (1) the gateway Gi transmits the encryption key Ki unique to the gateway Gi to the management server 101. (2) The management server 101 associates and registers the encryption key Ki unique to the gateway Gi and the address of the gateway Gi in the encryption key DB 110.
 (3)ゲートウェイGiは、ゲートウェイGi固有の暗号鍵Kiを用いて暗号化されたパケット(以下、「暗号化パケットSPi」という)をアドホックネットワークAiにブロードキャスト(同時通報)する。暗号化パケットSPiには、たとえば、ゲートウェイGiのアドレスが含まれている。 (3) The gateway Gi broadcasts (simultaneously reports) a packet (hereinafter referred to as “encrypted packet SPi”) encrypted using the encryption key Ki unique to the gateway Gi to the ad hoc network Ai. For example, the address of the gateway Gi is included in the encrypted packet SPi.
 (4)ノードNi-1は、ゲートウェイGiからの暗号化パケットSPiを通信圏内のノードNi-3に送信する。(5)ノードNi-3は、ノードNi-1が送信した暗号化パケットSPiを傍受する。(6)新規ノードNi-xは、ノードNi-3からの暗号化パケットSPiを記録する。ただし、この時点では、新規ノードNi-xは、暗号鍵Kiが未設定のため、暗号化パケットSPiを復号することはできない。 (4) The node Ni-1 transmits the encrypted packet SPi from the gateway Gi to the node Ni-3 in the communication area. (5) The node Ni-3 intercepts the encrypted packet SPi transmitted by the node Ni-1. (6) The new node Ni-x records the encrypted packet SPi from the node Ni-3. However, at this time, the new node Ni-x cannot decrypt the encrypted packet SPi because the encryption key Ki is not set.
 図8のシーケンスにおいて、(7)携帯端末MTは、携帯電話網やインターネットなどのネットワークNW2を介して管理サーバ101に接続する。この際、携帯端末MTは、たとえば、SSL(Secure Socket Layer)を用いて、管理サーバ101と既存のセキュアな通信を行う。 8, (7) the mobile terminal MT is connected to the management server 101 via a network NW2 such as a mobile phone network or the Internet. At this time, the mobile terminal MT performs existing secure communication with the management server 101 using, for example, SSL (Secure Socket Layer).
 (8)携帯端末MTは、有線または無線のネットワークNW3を介して新規ノードNi-xに接続する。具体的には、たとえば、作業員OPが、USB(Universal Serial Bus)ケーブルを用いて、携帯端末MTと新規ノードNi-xとを接続することで、携帯端末MTと新規ノードNi-xとの間にネットワークNW3が確立される。 (8) The mobile terminal MT is connected to the new node Ni-x via the wired or wireless network NW3. Specifically, for example, when the worker OP connects the mobile terminal MT and the new node Ni-x using a USB (Universal Serial Bus) cable, the mobile terminal MT and the new node Ni-x are connected. In the meantime, the network NW3 is established.
 (9)新規ノードNi-xは、ネットワークNW3を介して、図7に示した(6)において記録した暗号化パケットSPiを携帯端末MTに送信する。(10)携帯端末MTは、ネットワークNW2を介して、新規ノードNi-xからの暗号化パケットSPiを管理サーバ101に送信する。 (9) The new node Ni-x transmits the encrypted packet SPi recorded in (6) shown in FIG. 7 to the mobile terminal MT via the network NW3. (10) The mobile terminal MT transmits the encrypted packet SPi from the new node Ni-x to the management server 101 via the network NW2.
 (11)管理サーバ101は、携帯端末MTからの暗号化パケットSPiを復号するための暗号鍵Kiを暗号鍵DB110の中から抽出する。具体的には、たとえば、管理サーバ101は、暗号鍵DB110の中から、暗号化パケットSPiに含まれるゲートウェイGiのアドレスと関連付けて記憶されている暗号鍵Kiを抽出する。 (11) The management server 101 extracts the encryption key Ki for decrypting the encrypted packet SPi from the mobile terminal MT from the encryption key DB 110. Specifically, for example, the management server 101 extracts the encryption key Ki stored in association with the address of the gateway Gi included in the encrypted packet SPi from the encryption key DB 110.
 (12)管理サーバ101は、ネットワークNW2を介して、抽出された暗号鍵Kiを携帯端末MTに送信する。(13)携帯端末MTは、ネットワークNW3を介して、管理サーバ101からの暗号鍵Kiを新規ノードNi-xに送信する。(14)新規ノードNi-xは、携帯端末MTからの暗号鍵Kiを、パケットを暗号化するための鍵に設定する。 (12) The management server 101 transmits the extracted encryption key Ki to the mobile terminal MT via the network NW2. (13) The mobile terminal MT transmits the encryption key Ki from the management server 101 to the new node Ni-x via the network NW3. (14) The new node Ni-x sets the encryption key Ki from the mobile terminal MT as a key for encrypting the packet.
 このように、新規ノードNi-xが、セキュア通信のための暗号鍵Kiが未設定でも受信できるゲートウェイGiからの暗号化パケットSPiを手掛かりに、携帯端末MTを介して、管理サーバ101に鍵要求することで、設定すべき暗号鍵Kiを取得することができる。 In this way, the new node Ni-x makes a key request to the management server 101 via the portable terminal MT, using the encrypted packet SPi from the gateway Gi that can be received even if the encryption key Ki for secure communication is not set. By doing so, the encryption key Ki to be set can be acquired.
 図9は、本実施の形態にかかるネットワークシステム100へのアップストリーム型による新規ノードの導入例を示す説明図である。図9において、ネットワークシステム100のアドホックネットワークAi内に新規ノードNi-xが導入されている。なお、図9では、アドホックネットワークAi内のノードNi-1~Ni-miのうち、代表としてノードNi-1~Ni-3を示している。 FIG. 9 is an explanatory diagram showing an example of introducing an upstream type new node to the network system 100 according to the present embodiment. In FIG. 9, a new node Ni-x is introduced in the ad hoc network Ai of the network system 100. In FIG. 9, among the nodes Ni-1 to Ni-mi in the ad hoc network Ai, nodes Ni-1 to Ni-3 are shown as representatives.
 新規ノードNi-xの導入時は、作業員OPは新規ノードNi-xがどのアドホックネットワークAiに属しているのかわからない。そこで、本実施の形態では、作業員OPが使用する携帯端末MTを利用して、新規ノードNi-xに設定すべき暗号鍵Kiの取得要求を、アドホックネットワークAiにアップロードする。このとき、ゲートウェイGiは、ゲートウェイGi固有の暗号鍵Kiを管理サーバ101にアップロードする。そして、新規ノードNi-xは、管理サーバ101にアップロードされた暗号鍵Kiを、携帯端末MTを介して管理サーバ101から取得して、新規ノードNi-xに自動設定する。以下、新規ノードNi-xの導入時におけるネットワークシステム100の動作例について説明する。 When the new node Ni-x is introduced, the worker OP does not know which ad hoc network Ai the new node Ni-x belongs to. Therefore, in the present embodiment, using the mobile terminal MT used by the worker OP, an acquisition request for the encryption key Ki to be set in the new node Ni-x is uploaded to the ad hoc network Ai. At this time, the gateway Gi uploads the encryption key Ki unique to the gateway Gi to the management server 101. Then, the new node Ni-x acquires the encryption key Ki uploaded to the management server 101 from the management server 101 via the mobile terminal MT, and automatically sets it to the new node Ni-x. Hereinafter, an operation example of the network system 100 when the new node Ni-x is introduced will be described.
 図10は、新規ノードの導入時におけるネットワークシステム100の動作例を示すシーケンス図である。図10のシーケンスにおいて、(1)携帯端末MTは、ネットワークNW2を介して管理サーバ101に接続する。この際、携帯端末MTは、たとえば、SSLを用いて、管理サーバ101と既存のセキュアな通信を行う。 FIG. 10 is a sequence diagram showing an operation example of the network system 100 when a new node is introduced. In the sequence of FIG. 10, (1) the mobile terminal MT is connected to the management server 101 via the network NW2. At this time, the mobile terminal MT performs existing secure communication with the management server 101 using, for example, SSL.
 (2)携帯端末MTは、有線または無線のネットワークNW3を介して新規ノードNi-xに接続する。具体的には、たとえば、作業員OPが、USBケーブルを用いて、携帯端末MTと新規ノードNi-xとを接続することで、携帯端末MTと新規ノードNi-xとの間にネットワークNW3が確立される。 (2) The mobile terminal MT is connected to the new node Ni-x via the wired or wireless network NW3. Specifically, for example, the worker OP connects the mobile terminal MT and the new node Ni-x using a USB cable, so that the network NW3 is connected between the mobile terminal MT and the new node Ni-x. Established.
 (3)新規ノードNi-xは、携帯端末MTとの接続を検知すると、アドホックネットワークAi内でマルチホップ通信により送受信されるパケットを暗号化するための鍵の取得要求をアドホックネットワークAiにブロードキャストする。ここでは、鍵の取得要求が、新規ノードNi-xの通信圏内に存在するノードNi-3に送信される。 (3) When the new node Ni-x detects the connection with the mobile terminal MT, the new node Ni-x broadcasts to the ad hoc network Ai a key acquisition request for encrypting a packet transmitted / received by multihop communication in the ad hoc network Ai. . Here, the key acquisition request is transmitted to the node Ni-3 existing in the communication area of the new node Ni-x.
 (4)ノードNi-3は、新規ノードNi-xからの鍵の取得要求を通信圏内のノードNi-1に送信する。(5)ノードNi-1は、ノードNi-3からの鍵の取得要求を通信圏内のゲートウェイGiに送信する。この結果、新規ノードNからの鍵の取得要求がアドホックネットワークAi内のゲートウェイGiに転送される。 (4) The node Ni-3 transmits a key acquisition request from the new node Ni-x to the node Ni-1 in the communication area. (5) The node Ni-1 transmits a key acquisition request from the node Ni-3 to the gateway Gi in the communication area. As a result, the key acquisition request from the new node N is transferred to the gateway Gi in the ad hoc network Ai.
 (6)ゲートウェイGiは、新規ノードNi-xからの鍵の取得要求を受信すると、ゲートウェイGi固有の暗号鍵Kiを管理サーバ101に送信する。(7)管理サーバ101は、ネットワークNW2を介して、ゲートウェイGiからのゲートウェイGi固有の暗号鍵Kiを携帯端末MTに送信する。 (6) Upon receiving the key acquisition request from the new node Ni-x, the gateway Gi transmits the encryption key Ki unique to the gateway Gi to the management server 101. (7) The management server 101 transmits the encryption key Ki unique to the gateway Gi from the gateway Gi to the mobile terminal MT via the network NW2.
 (8)携帯端末MTは、ネットワークNW3を介して、管理サーバ101からのゲートウェイGi固有の暗号鍵Kiを新規ノードNi-xに送信する。(9)新規ノードNi-xは、携帯端末MTからの暗号鍵Kiを、パケットを暗号化するための鍵に設定する。 (8) The mobile terminal MT transmits the encryption key Ki unique to the gateway Gi from the management server 101 to the new node Ni-x via the network NW3. (9) The new node Ni-x sets the encryption key Ki from the mobile terminal MT as a key for encrypting the packet.
 なお、携帯端末MTと新規ノードNi-xとの接続は、新規ノードNi-xに対する暗号鍵Kiの設定が終了するまで維持する。また、暗号鍵Kiの設定が終了して携帯端末MTと新規ノードNi-xとの接続を切断すると、携帯端末MTの中から暗号鍵Kiが自動で削除されるようにしてもよい。これにより、携帯端末MTの紛失時などにおけるリスクを低減させることができる。 The connection between the mobile terminal MT and the new node Ni-x is maintained until the setting of the encryption key Ki for the new node Ni-x is completed. Further, when the setting of the encryption key Ki is completed and the connection between the mobile terminal MT and the new node Ni-x is disconnected, the encryption key Ki may be automatically deleted from the mobile terminal MT. Thereby, the risk when the mobile terminal MT is lost can be reduced.
 このように、新規ノードNi-xの導入時では、作業員OPの携帯端末MTを介して、新規ノードNi-xと管理サーバ101との一時的な通信路を確立することができる。また、新規ノードNi-xからブロードキャストされた鍵の取得要求がゲートウェイGiに転送された結果、ゲートウェイGiから管理サーバ101に送信された暗号鍵Kiを、携帯端末MTを介して管理サーバ101から新規ノードNi-xに提供することができる。これにより、新規ノードNi-xに設定すべき暗号鍵Kiを容易に取得することができ、新規ノードNi-xが用いる暗号鍵Kiの設定作業の効率化を図ることができる。 Thus, when the new node Ni-x is introduced, a temporary communication path between the new node Ni-x and the management server 101 can be established via the portable terminal MT of the worker OP. Further, as a result of the key acquisition request broadcast from the new node Ni-x being transferred to the gateway Gi, the encryption key Ki transmitted from the gateway Gi to the management server 101 is newly received from the management server 101 via the portable terminal MT. Node Ni-x can be provided. As a result, the encryption key Ki to be set for the new node Ni-x can be easily acquired, and the efficiency of setting the encryption key Ki used by the new node Ni-x can be improved.
(ネットワークシステム内の境界ノードへの暗号鍵追加例)
 つぎに、ネットワークシステムの詳細な構成を例に挙げて、暗号鍵の追加例について、図11~図16を用いて具体的に説明する。
(Example of adding an encryption key to a border node in a network system)
Next, taking a detailed configuration of the network system as an example, an example of adding an encryption key will be specifically described with reference to FIGS.
 図11は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その1)である。図11の状態(A)において、管理サーバ101とゲートウェイG1は、ネットワークNW1を介して通信可能である。図11では、アドホックネットワークA1は、ゲートウェイG1およびノードN1-1~ノードN1-4,Nxで構成されている。ゲートウェイG1およびノードN1-1~ノードN1-4,Nxは、上述したダウンストリーム型またはアップストリーム型により、ゲートウェイG1固有の暗号鍵K1を保持する。 FIG. 11 is an explanatory diagram (part 1) illustrating an example of adding an encryption key to a boundary node in the network system. In the state (A) of FIG. 11, the management server 101 and the gateway G1 can communicate via the network NW1. In FIG. 11, the ad hoc network A1 includes a gateway G1 and nodes N1-1 to N1-4 and Nx. The gateway G1 and the nodes N1-1 to N1-4 and Nx hold the encryption key K1 unique to the gateway G1 by the downstream type or the upstream type described above.
 アドホックネットワークA1では、送信元(ゲートウェイG1およびノードN1-1~ノードN1-4,Nxのいずれか)が暗号鍵K1で暗号化した暗号化パケットSP1は、マルチホップ通信される。暗号化パケットSP1を受け取ったノードN1-1~ノードN1-4,Nxは、暗号化パケットSP1が暗号鍵K1で復号できた場合に暗号化パケットSP1を近隣ノードに転送することで、暗号化パケットSP1のマルチホップ通信を実現する。 In the ad hoc network A1, the encrypted packet SP1 encrypted by the transmission source (any one of the gateway G1 and the nodes N1-1 to N1-4 and Nx) with the encryption key K1 is subjected to multihop communication. The nodes N1-1 to N1-4 and Nx that have received the encrypted packet SP1 transfer the encrypted packet SP1 to the neighboring nodes when the encrypted packet SP1 can be decrypted with the encryption key K1, thereby enabling the encrypted packet SP1 multi-hop communication is realized.
 図12は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その2)である。図12は、図11の状態(A)の次状態(B)を示している。具体的には、図12の状態(B)は、図11の状態(A)のあと、アドホックネットワークA2が設置された状態を示している。アドホックネットワークA2は、ゲートウェイG2およびノードN2-1~ノードN2-3で構成されている。ゲートウェイG2およびノードN2-1~ノードN2-3は、上述したダウンストリーム型またはアップストリーム型により、ゲートウェイG2固有の暗号鍵K2を保持する。 FIG. 12 is an explanatory diagram (part 2) showing an example of adding an encryption key to a boundary node in the network system. FIG. 12 shows a state (B) next to the state (A) in FIG. Specifically, the state (B) in FIG. 12 shows a state in which the ad hoc network A2 is installed after the state (A) in FIG. The ad hoc network A2 includes a gateway G2 and nodes N2-1 to N2-3. The gateway G2 and the nodes N2-1 to N2-3 hold the encryption key K2 unique to the gateway G2 by the downstream type or the upstream type described above.
 アドホックネットワークA2では、送信元(ゲートウェイG2およびノードN2-1~ノードN2-3のいずれか)が暗号鍵K2で暗号化した暗号化パケットSP2は、マルチホップ通信される。暗号化パケットSP2を受け取ったノードN2-1~ノードN2-3は、暗号化パケットSP2が暗号鍵K2で復号できた場合に暗号化パケットSP2を近隣ノードに転送することで、暗号化パケットSP2のマルチホップ通信を実現する。なお、ノードNxは、アドホックネットワークA1内のノードであるが、アドホックネットワークA2内のノードN2-2の通信圏内にあるものとする。 In the ad hoc network A2, the encrypted packet SP2 encrypted by the transmission source (any one of the gateway G2 and the nodes N2-1 to N2-3) with the encryption key K2 is subjected to multihop communication. The nodes N2-1 to N2-3 that have received the encrypted packet SP2 transfer the encrypted packet SP2 to the neighboring nodes when the encrypted packet SP2 can be decrypted with the encryption key K2, so that the encrypted packet SP2 Realize multi-hop communication. Note that the node Nx is a node in the ad hoc network A1, but is within the communication range of the node N2-2 in the ad hoc network A2.
 図13は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その3)である。図13は、図12の状態(B)の次状態(C)を示している。 FIG. 13 is an explanatory diagram (part 3) illustrating an example of adding an encryption key to a boundary node in the network system. FIG. 13 shows a state (C) next to the state (B) of FIG.
 (1)ノードNxは、アドホックネットワークA2内のノードN2-2の通信圏内にあるため、ノードN2-2からの暗号化パケットSP2を傍受することになる。傍受した暗号化パケットSP2のヘッダは、暗号化されていないため、ノードNxは、暗号化パケットSP2のヘッダからゲートウェイG2のアドレスを特定する。ノードN2-1~N2-3が生成した暗号化パケットSP2は、ゲートウェイG2のアドレスがあて先として記述されている。 (1) Since the node Nx is within the communication range of the node N2-2 in the ad hoc network A2, the encrypted packet SP2 from the node N2-2 is intercepted. Since the header of the intercepted encrypted packet SP2 is not encrypted, the node Nx specifies the address of the gateway G2 from the header of the encrypted packet SP2. The encrypted packet SP2 generated by the nodes N2-1 to N2-3 is described with the address of the gateway G2 as the destination.
 また、ゲートウェイG2が生成した暗号化パケットSP2は、ゲートウェイG2のアドレスが送信元として記述されており、あて先にはブロードキャストアドレスが記述されている。したがって、暗号化パケットSP2のあて先がブロードキャストアドレスの場合は送信元アドレス、暗号化パケットSP2のあて先がブロードキャストアドレスでない場合はあて先アドレスから、ゲートウェイG2のアドレスを検出することができる。 In the encrypted packet SP2 generated by the gateway G2, the address of the gateway G2 is described as the transmission source, and the broadcast address is described at the destination. Therefore, the address of the gateway G2 can be detected from the transmission source address when the destination of the encrypted packet SP2 is a broadcast address, and from the destination address when the destination of the encrypted packet SP2 is not a broadcast address.
 (2)そして、ノードNxは、暗号化パケットSP2の復号の失敗数(傍受回数)と成功数(正常受信回数)を、検出されたゲートウェイごとに計数する。失敗数と成功数の計数は、一定期間ごとにおこなう。この場合、一定期間経過後、失敗数と成功数はリセットされる。また、失敗数と成功数の計数は、一定期間で区切らず、無制限に累積することとしてもよい。 (2) Then, the node Nx counts the number of failures to decrypt the encrypted packet SP2 (number of intercepts) and the number of successes (number of normal receptions) for each detected gateway. The number of failures and successes is counted at regular intervals. In this case, after a certain period of time, the number of failures and the number of successes are reset. Further, the count of the number of failures and the number of successes may be accumulated indefinitely without being separated at a fixed period.
 図14は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その4)である。図14は、図13の状態(C)の次状態(D)を示している。状態(D)では、境界ノードNxは、状態(C)での失敗数と成功数(少なくとも失敗数)にしたがって、暗号化パケットSP1xをゲートウェイG1あてに送信する。たとえば、失敗数があらかじめ設定しておいたしきい値以上となった場合に、境界ノードNxは、暗号化パケットSP1xをゲートウェイG1あてに送信する。 FIG. 14 is an explanatory diagram (part 4) of an example of adding an encryption key to a boundary node in the network system. FIG. 14 shows a state (D) next to the state (C) of FIG. In the state (D), the boundary node Nx transmits the encrypted packet SP1x to the gateway G1 according to the number of failures and the number of successes (at least the number of failures) in the state (C). For example, when the number of failures exceeds a preset threshold value, the boundary node Nx transmits the encrypted packet SP1x to the gateway G1.
 暗号化パケットSP1xは、図13の(2)で特定されたゲートウェイG2のアドレスと、ゲートウェイG2固有の暗号鍵K2の取得要求情報と、を含むデータを、ノードNxにおいて暗号鍵K1で暗号化した暗号化パケットである。暗号化パケットSP1xは、アドホックネットワークA1内でマルチホップ通信されるため、ゲートウェイG1に到達する。 In the encrypted packet SP1x, data including the address of the gateway G2 specified in (2) of FIG. 13 and the acquisition request information of the encryption key K2 unique to the gateway G2 is encrypted with the encryption key K1 at the node Nx. It is an encrypted packet. Since the encrypted packet SP1x is subjected to multihop communication within the ad hoc network A1, the encrypted packet SP1x reaches the gateway G1.
 管理サーバ101は、ゲートウェイG1から暗号化パケットSP1xを受信すると、暗号鍵DB110内の暗号鍵K1で暗号化パケットSP1xを復号する。これにより、ゲートウェイG2のアドレスと、ゲートウェイG2固有の暗号鍵K2の取得要求情報が得られる。管理サーバ101は、取得要求情報を確認すると、ゲートウェイG2のアドレスを手がかりにして暗号鍵DB110からゲートウェイG2固有の暗号鍵K2を抽出する。 When receiving the encrypted packet SP1x from the gateway G1, the management server 101 decrypts the encrypted packet SP1x with the encryption key K1 in the encryption key DB 110. Thereby, the acquisition request information of the address of the gateway G2 and the encryption key K2 unique to the gateway G2 is obtained. When confirming the acquisition request information, the management server 101 extracts the encryption key K2 unique to the gateway G2 from the encryption key DB 110 using the address of the gateway G2 as a clue.
 図15は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その5)である。図15は、図14の状態(D)の次状態(E)を示している。状態(E)では、図14の状態(D)においてノードNxが取得要求している暗号鍵K2が抽出されたため、管理サーバ101は、ノードNxに、暗号鍵K2を暗号鍵K1で暗号化した暗号化パケットSP1(K2)を送信する。暗号化パケットSP1(K2)は、ネットワークNW1、ゲートウェイG1を経由して、最終的にノードNxに到達する。 FIG. 15 is an explanatory diagram (part 5) showing an example of adding an encryption key to a boundary node in the network system. FIG. 15 shows a state (E) next to the state (D) of FIG. In the state (E), since the encryption key K2 requested by the node Nx in the state (D) in FIG. 14 is extracted, the management server 101 encrypts the encryption key K2 in the node Nx with the encryption key K1. The encrypted packet SP1 (K2) is transmitted. The encrypted packet SP1 (K2) finally reaches the node Nx via the network NW1 and the gateway G1.
 なお、途中経路のゲートウェイG1,ノードN1-1,N1-3でも、暗号化パケットSP1(K2)を復号できるため、暗号鍵K2を取得できるが、データ処理および通信処理のオーバーヘッドを防止するため、暗号化パケットSP1(K2)の転送だけおこない、復号された暗号鍵K2は破棄される。具体的には、暗号化パケットSP1(K2)のあて先(この場合はノードNxのアドレス)が自ノードのアドレスでない場合は、転送後に破棄するように設定しておけばよい。 The gateway G1 and nodes N1-1 and N1-3 on the way can also decrypt the encrypted packet SP1 (K2), so that the encryption key K2 can be obtained. However, in order to prevent the overhead of data processing and communication processing, Only the encrypted packet SP1 (K2) is transferred, and the decrypted encryption key K2 is discarded. Specifically, if the destination of the encrypted packet SP1 (K2) (in this case, the address of the node Nx) is not the address of the own node, it may be set to be discarded after the transfer.
 図16は、ネットワークシステム内の境界ノードへの暗号鍵追加例を示す説明図(その6)である。図16は、図15の状態(E)の次状態(F)を示している。状態(F)では、状態(E)でノードNxは暗号化パケットSP1(K2)を受信できたため、ノードNxは、暗号鍵K1で暗号化パケットSP1(K2)を復号することで、暗号鍵K2を取り出す。そして、ノードNxは、復号された暗号鍵K2を、暗号鍵K1とともに、暗号化および復号をおこなうアクティブな鍵に設定する。これにより、ノードNxは、ノードN1-3からの暗号化パケットSP1は、暗号鍵K1で復号でき、ノードN2-2からの暗号化パケットSP2は、暗号鍵K2で復号することができる。また、ノードNxは、送信したデータを暗号鍵K1,K2でそれぞれ暗号化し、暗号化パケットSP1,SP2を送信することもできる。 FIG. 16 is an explanatory diagram (part 6) of an example of adding an encryption key to a boundary node in the network system. FIG. 16 shows a state (F) next to the state (E) in FIG. In the state (F), since the node Nx has received the encrypted packet SP1 (K2) in the state (E), the node Nx decrypts the encrypted packet SP1 (K2) with the encryption key K1, thereby obtaining the encryption key K2. Take out. Then, the node Nx sets the decrypted encryption key K2 together with the encryption key K1 as an active key that performs encryption and decryption. Thereby, the node Nx can decrypt the encrypted packet SP1 from the node N1-3 with the encryption key K1, and can decrypt the encrypted packet SP2 from the node N2-2 with the encryption key K2. The node Nx can also encrypt the transmitted data with the encryption keys K1 and K2, and transmit the encrypted packets SP1 and SP2.
 また、本例では、ノードNxとノードN1-3との距離よりも、ノードNxとノードN2-2との距離のほうが短いため、ノードNxは、アドホックネットワークA2経由で通信するのが好ましい。このような場合、ノードNxでは、新規追加された暗号鍵K2のみをアクティブな鍵とし、既存の暗号鍵K1を非アクティブな鍵としてもよい。また、この場合、これにより、ノードNxは、アドホックネットワークA2により通信可能となるため、通信の効率化を図ることができる。 In this example, since the distance between the node Nx and the node N2-2 is shorter than the distance between the node Nx and the node N1-3, the node Nx preferably communicates via the ad hoc network A2. In such a case, the node Nx may use only the newly added encryption key K2 as an active key and the existing encryption key K1 as an inactive key. Further, in this case, this enables the node Nx to communicate with the ad hoc network A2, thereby improving communication efficiency.
 また、非アクティブに設定された暗号鍵K1は、暗号鍵K2で復号できなかった暗号化パケットSP1についてのみ復号することとしてもよい。この場合、復号されたデータは、ノードNxにおいてアクティブな鍵である暗号鍵K2で暗号化されて、暗号化パケットSP2としてアドホックネットワークA2内に流通することとなる。 Also, the encryption key K1 set to inactive may be decrypted only for the encrypted packet SP1 that could not be decrypted with the encryption key K2. In this case, the decrypted data is encrypted with the encryption key K2, which is an active key at the node Nx, and distributed as an encrypted packet SP2 in the ad hoc network A2.
 このように、アクティブな鍵と非アクティブな鍵を設定することで、境界ノードNxの配下に新規ノードを設置する場合、新規ノードには、上述したダウンストリーム型(図6~図8)またはアップストリーム型(図9、図10)のいずれか一方の方式により、両方の暗号鍵K1,K2ではなく、アクティブな鍵である暗号鍵K2のみが設定される。したがって、境界ノードNxの配下に設置されたノードには、単一の鍵が設定されるため、データ処理や通信処理の効率化を図ることができる。 As described above, when a new node is set under the boundary node Nx by setting an active key and an inactive key, the new node may include the above-described downstream type (FIGS. 6 to 8) or up-link. Only one encryption key K2, which is an active key, is set instead of both encryption keys K1 and K2 by either one of the stream types (FIGS. 9 and 10). Therefore, since a single key is set for a node installed under the boundary node Nx, the efficiency of data processing and communication processing can be improved.
 また、非アクティブとなった暗号鍵K1は、ノードNxにおいて削除することとしてもよい。これにより、ノードNxの省メモリ化を図ることができる。さらに、ノードNxが解析されたとしても、暗号鍵K2のみが漏洩し、暗号鍵K1は漏洩しないため、セキュリティの向上を図ることができる。 Also, the inactive encryption key K1 may be deleted at the node Nx. Thereby, the memory saving of the node Nx can be achieved. Furthermore, even if the node Nx is analyzed, only the encryption key K2 is leaked and the encryption key K1 is not leaked, so that security can be improved.
 なお、以下の説明において、「ノードN」とは、ネットワークシステム100のアドホックネットワークA1~AnのいずれかのアドホックネットワークAi内でマルチホップ通信によりパケットを送受信するノードを示す。また、「ノード等」とは、ネットワークシステム100のゲートウェイG1~GnおよびノードNを示す。 In the following description, “node N” refers to a node that transmits and receives packets by multi-hop communication within any one of the ad hoc networks A1 to An of the network system 100. Further, “nodes and the like” indicate the gateways G1 to Gn and the node N of the network system 100.
(管理サーバ101のハードウェア構成例)
 図17は、管理サーバ101のハードウェア構成例を示すブロック図である。図17において、管理サーバ101は、CPU(Central Processing Unit)1701と、ROM(Read Only Memory)1702と、RAM(Random Access Memory)1703と、磁気ディスクドライブ1704と、磁気ディスク1705と、光ディスクドライブ1706と、光ディスク1707と、I/F(Interface)1708と、ディスプレイ1709と、キーボード1710と、マウス1711と、を備えている。また、CPU1701~マウス1711はバス1700によってそれぞれ接続されている。
(Example of hardware configuration of the management server 101)
FIG. 17 is a block diagram illustrating a hardware configuration example of the management server 101. 17, the management server 101 includes a CPU (Central Processing Unit) 1701, a ROM (Read Only Memory) 1702, a RAM (Random Access Memory) 1703, a magnetic disk drive 1704, a magnetic disk 1705, and an optical disk drive 1706. An optical disk 1707, an I / F (Interface) 1708, a display 1709, a keyboard 1710, and a mouse 1711. Further, the CPU 1701 to the mouse 1711 are connected by a bus 1700, respectively.
 ここで、CPU1701は、管理サーバ101の全体の制御を司る。ROM1702は、ブートプログラムなどのプログラムを記憶している。RAM1703は、CPU1701のワークエリアとして使用される。磁気ディスクドライブ1704は、CPU1701の制御に従って磁気ディスク1705に対するデータのリード/ライトを制御する。磁気ディスク1705は、磁気ディスクドライブ1704の制御で書き込まれたデータを記憶する。 Here, the CPU 1701 governs overall control of the management server 101. The ROM 1702 stores a program such as a boot program. The RAM 1703 is used as a work area for the CPU 1701. The magnetic disk drive 1704 controls the reading / writing of the data with respect to the magnetic disk 1705 according to control of CPU1701. The magnetic disk 1705 stores data written under the control of the magnetic disk drive 1704.
 光ディスクドライブ1706は、CPU1701の制御に従って光ディスク1707に対するデータのリード/ライトを制御する。光ディスク1707は、光ディスクドライブ1706の制御で書き込まれたデータを記憶したり、光ディスク1707に記憶されたデータをコンピュータに読み取らせたりする。 The optical disc drive 1706 controls reading / writing of data with respect to the optical disc 1707 according to the control of the CPU 1701. The optical disk 1707 stores data written under the control of the optical disk drive 1706, and causes the computer to read data stored on the optical disk 1707.
 I/F1708は、通信回線を通じてネットワークNW1,NW2に接続され、このネットワークNW1,NW2を介して他の装置(たとえば、ゲートウェイGi、携帯端末MT)に接続される。I/F1708は、ネットワークNW1,NW2と内部のインターフェースを司り、外部装置からのデータの入出力を制御する。I/F1708には、たとえば、モデムやLANアダプタなどを採用することができる。 The I / F 1708 is connected to the networks NW1 and NW2 through communication lines, and is connected to other devices (for example, the gateway Gi and the mobile terminal MT) via the networks NW1 and NW2. The I / F 1708 controls an internal interface with the networks NW1 and NW2, and controls input / output of data from an external device. For example, a modem or a LAN adapter may be employed as the I / F 1708.
 ディスプレイ1709は、カーソル、アイコンあるいはツールボックスをはじめ、文書、画像、機能情報などのデータを表示する。このディスプレイ1709は、たとえば、CRT、TFT液晶ディスプレイ、プラズマディスプレイなどを採用することができる。 Display 1709 displays data such as a document, an image, and function information as well as a cursor, an icon, or a tool box. As the display 1709, for example, a CRT, a TFT liquid crystal display, a plasma display, or the like can be adopted.
 キーボード1710は、文字、数字、各種指示などの入力のためのキーを備え、データの入力を行う。また、タッチパネル式の入力パッドやテンキーなどであってもよい。マウス1711は、カーソルの移動や範囲選択、あるいはウィンドウの移動やサイズの変更などを行う。ポインティングデバイスとして同様に機能を備えるものであれば、トラックボールやジョイスティックなどであってもよい。なお、携帯端末MTについても、図17に示した管理サーバ101と同様のハードウェア構成により実現できる。 The keyboard 1710 includes keys for inputting characters, numbers, various instructions, etc., and inputs data. Moreover, a touch panel type input pad or a numeric keypad may be used. The mouse 1711 moves the cursor, selects a range, moves the window, changes the size, and the like. A trackball or a joystick may be used as long as they have the same function as a pointing device. Note that the mobile terminal MT can also be realized by the same hardware configuration as that of the management server 101 shown in FIG.
(ノード等のハードウェア構成例)
 図18は、ノード等のハードウェア構成例を示すブロック図である。図18において、ノード等は、CPU1801と、RAM1802と、フラッシュメモリ1803と、I/F1804と、暗号化回路1805と、を備えている。CPU1801~暗号化回路1805は、バス1800によってそれぞれ接続されている。
(Example of hardware configuration such as nodes)
FIG. 18 is a block diagram illustrating a hardware configuration example such as a node. In FIG. 18, the node or the like includes a CPU 1801, a RAM 1802, a flash memory 1803, an I / F 1804, and an encryption circuit 1805. The CPU 1801 to the encryption circuit 1805 are connected by a bus 1800, respectively.
 ここで、CPU1801は、ノード等の全体の制御を司る。RAM1802は、CPU1801のワークエリアとして使用される。フラッシュメモリ1803は、プログラムや暗号鍵などの鍵情報を記憶している。I/F1804は、マルチホップ通信によりパケットを送受信する。また、ゲートウェイGiのI/F1804は、通信回線を通じてネットワークNW1に接続され、このネットワークNW1を介して管理サーバ101に接続される。 Here, the CPU 1801 controls the entire node and the like. The RAM 1802 is used as a work area for the CPU 1801. The flash memory 1803 stores key information such as programs and encryption keys. The I / F 1804 transmits and receives packets by multi-hop communication. Further, the I / F 1804 of the gateway Gi is connected to the network NW1 through a communication line, and is connected to the management server 101 via the network NW1.
 暗号化回路1805は、データを暗号化する場合に暗号鍵によりデータを暗号化する回路である。暗号化をソフトウェア的に実行する場合は、暗号化回路1805に相当するプログラムをフラッシュメモリ1803に記憶させておくことで、暗号化回路1805は不要となる。 The encryption circuit 1805 is a circuit that encrypts data with an encryption key when encrypting the data. When encryption is executed by software, the encryption circuit 1805 is not necessary by storing a program corresponding to the encryption circuit 1805 in the flash memory 1803.
(暗号鍵DB110の記憶内容)
 図19は、暗号鍵DB110の記憶内容の一例を示す説明図である。図19において、暗号鍵DB110は、ID、GWアドレスおよび暗号鍵のフィールドを有し、各フィールドに情報を設定することで、ゲートウェイG1~Gnごとの鍵情報1900-1~1900-nをレコードとして記憶している。
(Storage contents of the encryption key DB 110)
FIG. 19 is an explanatory diagram showing an example of the contents stored in the encryption key DB 110. In FIG. 19, the encryption key DB 110 has fields of ID, GW address, and encryption key, and by setting information in each field, key information 1900-1 to 1900-n for each of the gateways G1 to Gn is used as a record. I remember it.
 ここで、IDは、本明細書において説明上用いる各ゲートウェイGiの識別子である。GWアドレスは、ゲートウェイGiのアドレスである。GWアドレスとしては、たとえば、ゲートウェイGiのMAC(Media Access Control)アドレスやIP(Internet Protocol)アドレスを用いることができる。暗号鍵は、各ゲートウェイGi固有の暗号鍵Kiであり、具体的には、たとえば、128~256ビット程度のバイナリデータである。鍵情報1900-1を例に挙げると、ゲートウェイG1のGWアドレスは『xx:xx:xx:xx:12:34』、暗号鍵は『暗号鍵K1』である。 Here, the ID is an identifier of each gateway Gi used for explanation in this specification. The GW address is the address of the gateway Gi. As the GW address, for example, a MAC (Media Access Control) address or an IP (Internet Protocol) address of the gateway Gi can be used. The encryption key is an encryption key Ki unique to each gateway Gi, and is specifically binary data of about 128 to 256 bits, for example. Taking the key information 1900-1 as an example, the gateway G1's GW address is “xx: xx: xx: xx: 12: 34”, and the encryption key is “encryption key K1”.
 また、鍵情報1900-iは、位置情報Piと履歴情報Hiを有する。位置情報Piは、ゲートウェイGiの設置位置を示す情報である。たとえば、緯度経度や、ゲートウェイGiの設置先の住所などが挙げられる。また、履歴情報Hiは、ゲートウェイGi固有の暗号鍵Kiが他のアドホックネットワークAj(j≠i)内のノードNへの設定後に設定解除された回数である。設定解除とは、たとえば、非アクティブに設定された場合や、削除された場合が挙げられる。 In addition, the key information 1900-i has position information Pi and history information Hi. The position information Pi is information indicating the installation position of the gateway Gi. For example, the latitude and longitude, the address of the installation destination of the gateway Gi, etc. are mentioned. The history information Hi is the number of times the setting is canceled after the encryption key Ki unique to the gateway Gi is set to the node N in another ad hoc network Aj (j ≠ i). The setting cancellation includes, for example, a case where it is set to inactive or a case where it is deleted.
 なお、暗号鍵DB110は、たとえば、図17に示した管理サーバ101のROM1702、RAM1703、磁気ディスク1705、光ディスク1707などの記憶装置により実現される。暗号鍵DB110の記憶内容は、管理サーバ101がゲートウェイGi固有の暗号鍵KiをゲートウェイGiから受信することで更新してもよい。また、図17に示したキーボード1710やマウス1711を用いたユーザの操作入力により、暗号鍵DB110の記憶内容を更新することにしてもよい。 Note that the encryption key DB 110 is realized by a storage device such as the ROM 1702, the RAM 1703, the magnetic disk 1705, and the optical disk 1707 of the management server 101 shown in FIG. The storage contents of the encryption key DB 110 may be updated when the management server 101 receives the encryption key Ki unique to the gateway Gi from the gateway Gi. Further, the stored contents of the encryption key DB 110 may be updated by a user operation input using the keyboard 1710 and the mouse 1711 shown in FIG.
(ノードNの機能的構成例)
 図20は、ノードNの機能的構成例を示すブロック図である。ノードNは、受信部2001と、検出部2002と、復号部2003と、計数部2004と、判断部2005と、送信部2006と、設定部2007と、を備えている。各機能部(受信部2001~設定部2007)は、具体的には、たとえば、図18に示したRAM1802、フラッシュメモリ1803などの記憶装置に記憶されたプログラムをCPU1801に実行させることにより、または、I/F1804により、その機能を実現する。また、各機能部(受信部2001~設定部2007)の処理結果は、特に指定する場合を除いて、RAM1802、フラッシュメモリ1803などの記憶装置に記憶される。
(Example of functional configuration of node N)
FIG. 20 is a block diagram illustrating a functional configuration example of the node N. The node N includes a receiving unit 2001, a detecting unit 2002, a decoding unit 2003, a counting unit 2004, a determining unit 2005, a transmitting unit 2006, and a setting unit 2007. Specifically, each function unit (reception unit 2001 to setting unit 2007), for example, causes the CPU 1801 to execute a program stored in a storage device such as the RAM 1802 and the flash memory 1803 illustrated in FIG. The function is realized by the I / F 1804. Further, the processing results of the respective function units (reception unit 2001 to setting unit 2007) are stored in a storage device such as the RAM 1802 and the flash memory 1803 unless otherwise specified.
 受信部2001は、暗号化パケットを受信する。具体的には、ノードNは、自ノードNの暗号鍵Kiで復号できるか否かにかかわらず、暗号化パケットを受信する。暗号鍵Kiで復号できないパケットを受信した場合は、当該暗号化パケットを傍受したこととなる。 The receiving unit 2001 receives an encrypted packet. Specifically, the node N receives the encrypted packet regardless of whether or not the node N can be decrypted with the encryption key Ki of the node N. When a packet that cannot be decrypted with the encryption key Ki is received, the encrypted packet is intercepted.
 検出部2002は、受信部2001によって受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出する。暗号化パケットは、いずれかの暗号鍵Kiで暗号化されているが、ヘッダ部については、暗号化されていない。ここで、暗号化パケットのデータ構造について説明する。 The detection unit 2002 detects the destination of the encrypted packet received by the reception unit 2001 or the gateway serving as the transmission source for each encrypted packet. The encrypted packet is encrypted with one of the encryption keys Ki, but the header portion is not encrypted. Here, the data structure of the encrypted packet will be described.
 図21および図22は、暗号鍵Kiで暗号化された暗号化パケットKiのデータ構造例を示す説明図である。図21では、一例として、ゲートウェイG1からブロードキャストされた暗号化パケットSP1のデータ構造例を示している。また、図22では、一例として、あるノードNからゲートウェイG1への暗号化パケットSP1のデータ構造例を示している。 21 and 22 are explanatory diagrams showing an example of the data structure of the encrypted packet Ki encrypted with the encryption key Ki. FIG. 21 shows an example of the data structure of the encrypted packet SP1 broadcast from the gateway G1 as an example. FIG. 22 shows an example of the data structure of an encrypted packet SP1 from a certain node N to the gateway G1 as an example.
 図21および図22において、暗号化パケットSPiは、ヘッダ部2110とペイロード部2120を有する。ヘッダ部2110には、宛先アドレス、差出アドレス、およびホップ数が記述されている。ペイロード部2120には、暗号化されたデータ本体が記述されている(図20中ハッチ部分)。ここで、宛先アドレスは、送信先のアドレスである。差出アドレスは、送信元のアドレスである。なお、ここでは宛先アドレス、差出アドレスおよびGWアドレスの一例として、MACアドレスを用いて説明したが、IPアドレスなどのアドレスを用いることにしてもよい。 21 and 22, the encrypted packet SPi has a header part 2110 and a payload part 2120. In the header part 2110, a destination address, a source address, and the number of hops are described. The payload portion 2120 describes the encrypted data body (hatched portion in FIG. 20). Here, the destination address is a destination address. The sending address is a sender address. Note that although the MAC address is used as an example of the destination address, the sending address, and the GW address here, an IP address or the like may be used.
 ホップ数は、暗号化パケットSPiを残り何回転送するのかを示す残余の転送回数である。ゲートウェイGiからブロードキャストされる暗号化パケットSPiのホップ数の最大値は予め設定されている。このホップ数は暗号化パケットSPiの転送時にデクリメントされ、ホップ数が『0』となった暗号化パケットSPiは棄却される。ここでは、暗号化パケットSP1のホップ数『10』が記述されている。 The number of hops is a remaining transfer count indicating how many times the encrypted packet SPi is transferred. The maximum number of hops of the encrypted packet SPi broadcast from the gateway Gi is set in advance. The hop number is decremented when the encrypted packet SPi is transferred, and the encrypted packet SPi having the hop number of “0” is discarded. Here, the hop number “10” of the encrypted packet SP1 is described.
 図21では、宛先アドレスとして暗号化パケットSPiがゲートウェイGiからのブロードキャストパケットであるため宛先アドレスには、ブロードキャスト用のMACアドレス『00:00:00:00:00:00』が記述される。また、差出アドレスとして、ブロードキャスト元であるゲートウェイG1のMACアドレス『xx:xx:xx:xx:12:34』が記述されている。 In FIG. 21, since the encrypted packet SPi is a broadcast packet from the gateway Gi as the destination address, the broadcast MAC address “00: 00: 00: 00: 00” is described in the destination address. In addition, the MAC address “xx: xx: xx: xx: 12: 34” of the gateway G1 that is the broadcast source is described as the source address.
 また、図22では、ゲートウェイG1に送るため、宛先アドレスとして、ゲートウェイG1のMACアドレス『xx:xx:xx:xx:12:34』が記述されている。また、差出アドレスとして、送信元ノードのMACアドレス『AA:BB:CC:DD:CC:DD』が記述されている。 In FIG. 22, the MAC address “xx: xx: xx: xx: 12: 34” of the gateway G1 is described as the destination address for sending to the gateway G1. Further, the MAC address “AA: BB: CC: DD: CC: DD” of the transmission source node is described as the source address.
 図20に戻り、検出部2002は、暗号化パケットSPiの宛先アドレスがブロードキャストアドレスの場合は、差出アドレスがゲートウェイGiのアドレスであるため、差出アドレスに記述されているアドレスをゲートウェイGiのアドレスとして検出する。また、暗号化パケットSPiの宛先アドレスがブロードキャストアドレスの場合は、ノードNからゲートウェイGiへの暗号化パケットSPiであるため、宛先アドレスをゲートウェイGiのアドレスとして検出する。したがって、図21および図22の暗号化パケットSPiのいずれにおいても、ゲートウェイG1のMACアドレス『xx:xx:xx:xx:12:34』を検出することができる。 Returning to FIG. 20, when the destination address of the encrypted packet SPi is a broadcast address, the detection unit 2002 detects the address described in the source address as the address of the gateway Gi because the source address is the address of the gateway Gi. To do. When the destination address of the encrypted packet SPi is a broadcast address, the destination address is detected as the address of the gateway Gi because it is the encrypted packet SPi from the node N to the gateway Gi. Therefore, the MAC address “xx: xx: xx: xx: 12: 34” of the gateway G1 can be detected in any of the encrypted packets SPi in FIG. 21 and FIG.
 復号部2003は、受信部2001によって受信された暗号化パケットを、保持している暗号鍵Kiで復号する。暗号鍵Kiが複数ある場合は、復号部2003は、総当たりで復号してもよく、総当たりで復号中、復号できた時点で復号を終了してもよい。また、復号部2003は、アクティブな暗号鍵Kiのみ復号することとしてもよい。なお、いずれの暗号鍵Kiでも復号できなかった場合は、暗号化パケットSPiを傍受したこととなる。 The decryption unit 2003 decrypts the encrypted packet received by the reception unit 2001 with the stored encryption key Ki. When there are a plurality of encryption keys Ki, the decryption unit 2003 may decrypt the brute force, or may terminate the decryption when the brute force is being decrypted or decrypted. In addition, the decryption unit 2003 may decrypt only the active encryption key Ki. Note that if any encryption key Ki cannot be decrypted, the encrypted packet SPi is intercepted.
 計数部2004は、暗号化パケットSPj(j≠i)を暗号鍵Kiで復号できなかった失敗数を、検出部2002によって検出されたゲートウェイGiごとに計数する。たとえば、暗号鍵Kiが設定されたノードNにおいては、ゲートウェイGjのアドレスが記述されている暗号化パケットSPjを暗号鍵Kiで復号しようとすると失敗する。これにより、ゲートウェイGjについての失敗数が1計数される。計数結果は、後述するテーブルに記録される。なお、復号に失敗した暗号化パケットSPiを蓄積することで計数することとしてもよい。 The counting unit 2004 counts the number of failures in which the encrypted packet SPj (j ≠ i) could not be decrypted with the encryption key Ki for each gateway Gi detected by the detecting unit 2002. For example, in the node N to which the encryption key Ki is set, an attempt to decrypt the encrypted packet SPj in which the address of the gateway Gj is described with the encryption key Ki will fail. As a result, the number of failures for the gateway Gj is counted as one. The counting result is recorded in a table described later. In addition, it is good also as counting by accumulating the encryption packet SPi which failed in decoding.
 また、計数部2004は、暗号化パケットSPiを暗号鍵Kiで復号できた成功数を、検出部2002によって検出されたゲートウェイGiごとに計数する。たとえば、暗号鍵Kiが設定されたノードNにおいては、ゲートウェイGiのアドレスが記述されている暗号化パケットSPiを暗号鍵Kiで復号すると成功する。これにより、ゲートウェイGiについての成功数が1計数される。この場合も、計数結果は、後述するテーブルに記録される。なお、復号に成功した暗号化パケットSPiを蓄積することで計数することとしてもよい。なお、計数部2004での計数は、一定期間ごとにおこなわれてもよく、しきい値に到達するまでおこなわれることとしてもよい。 In addition, the counting unit 2004 counts the number of successes that the encrypted packet SPi can be decrypted with the encryption key Ki for each gateway Gi detected by the detecting unit 2002. For example, in the node N in which the encryption key Ki is set, the encryption packet SPi in which the address of the gateway Gi is described is successfully decrypted with the encryption key Ki. As a result, the number of successes for the gateway Gi is counted by one. Also in this case, the counting result is recorded in a table to be described later. It is also possible to count by accumulating encrypted packets SPi that have been successfully decrypted. Note that the counting by the counting unit 2004 may be performed at regular intervals, or may be performed until the threshold value is reached.
 判断部2005は、計数部2004によって計数された計数結果に基づいて、自ノードを配下ノードとする所属ゲートウェイGi以外の他のゲートウェイGj(j≠i)固有の暗号鍵Kjを取得すべきか否かを判断する。 Whether or not the determination unit 2005 should acquire the encryption key Kj unique to the gateway Gj (j ≠ i) other than the affiliated gateway Gi having the node as a subordinate node based on the counting result counted by the counting unit 2004. Judging.
 具体的には、たとえば、判断部2005は、失敗数が鍵取得に関するしきい値以上であるか否かを、ゲートウェイごとに判断する。鍵取得に関するしきい値とは、たとえば、一定期間内でのゲートウェイGiごとの復号の失敗数の上限である。例として1000回とする。 Specifically, for example, the determination unit 2005 determines for each gateway whether or not the number of failures is greater than or equal to a threshold value related to key acquisition. The threshold related to key acquisition is, for example, the upper limit of the number of decryption failures for each gateway Gi within a certain period. As an example, assume 1000 times.
 たとえば、ゲートウェイGi固有の暗号鍵Kiが設定されているノードNにおいて、ゲートウェイGjのアドレスが記述されている暗号化パケットSPjの暗号鍵Kiでの復号の失敗数が一定期間内で1584回だったとする。この場合、ゲートウェイGi固有の暗号鍵Kiでは、暗号化パケットSPjを傍受するだけで、復号処理が無駄になる。したがって、判断部2005は、ゲートウェイGj固有の暗号鍵Kjを取得すべきと判断する。このように、判断部2005では、鍵を取得すべきか否かを、鍵取得に関するしきい値という絶対的な指標で判断することができる。 For example, in the node N in which the encryption key Ki unique to the gateway Gi is set, the number of decryption failures with the encryption key Ki of the encrypted packet SPj in which the address of the gateway Gj is described is 1584 times within a certain period. To do. In this case, with the encryption key Ki unique to the gateway Gi, the decryption process is wasted only by intercepting the encrypted packet SPj. Therefore, the determination unit 2005 determines that the encryption key Kj unique to the gateway Gj should be acquired. As described above, the determination unit 2005 can determine whether or not a key should be acquired by using an absolute index called a threshold related to key acquisition.
 また、判断部2005は、計数部2004によって計数された失敗数から成功数を引いた差分が鍵取得に関するしきい値以上であるか否かを、ゲートウェイGiごとに判断することとしてもよい。具体的には、たとえば、判断部2005は、ゲートウェイGjのアドレスが記述されている暗号化パケットSPjの暗号鍵Kiでの復号の失敗数から、ゲートウェイGiのアドレスが記述されている暗号化パケットSPiの暗号鍵Kiでの復号の成功数を引いた差分を求める。 Further, the determination unit 2005 may determine for each gateway Gi whether or not a difference obtained by subtracting the number of successes from the number of failures counted by the counting unit 2004 is equal to or greater than a threshold value related to key acquisition. Specifically, for example, the determination unit 2005 determines the encrypted packet SPi in which the address of the gateway Gi is described based on the number of failure of decryption with the encryption key Ki of the encrypted packet SPj in which the address of the gateway Gj is described. The difference obtained by subtracting the number of successful decryptions with the encryption key Ki is obtained.
 判断部2005は、この差分が、鍵取得に関するしきい値(たとえば、500回)以上であるか否かにより、ゲートウェイGj固有の暗号鍵Kjを取得すべきと判断する。このように、判断部2005では、鍵を取得すべきか否かを、失敗数から成功数を引いた差分という相対的な指標で判断することができる。 The determination unit 2005 determines that the encryption key Kj unique to the gateway Gj should be acquired based on whether or not the difference is equal to or greater than a threshold value related to key acquisition (for example, 500 times). As described above, the determination unit 2005 can determine whether or not a key should be acquired by using a relative index called a difference obtained by subtracting the number of successes from the number of failures.
 送信部2006は、判断部2005によってしきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、複数のアドホックネットワークの各ゲートウェイ固有の鍵を記憶するサーバに、いずれかのアドホックネットワーク経由で送信する。具体的には、たとえば、送信部2006は、判断部2005によって鍵取得に関するしきい値以上と判断された場合、ゲートウェイGj固有の暗号鍵Kjの取得要求を、ゲートウェイGi経由で、管理サーバ101に送信する。ここで、取得要求について説明する。 The transmission unit 2006 sends the acquisition request for the second key specific to the gateway, which is determined to be equal to or greater than the threshold by the determination unit 2005, to any one of the ad hoc networks in the server storing the key specific to each gateway of the plurality of ad hoc networks. Send via. Specifically, for example, when the determining unit 2005 determines that the threshold value for key acquisition is equal to or greater than the threshold value, the transmitting unit 2006 sends an acquisition request for the encryption key Kj unique to the gateway Gj to the management server 101 via the gateway Gi. Send. Here, the acquisition request will be described.
 図23は、取得要求パケットのデータ構造例を示す説明図である。図23において、取得要求パケットPixのヘッダ部2310の宛先アドレスには、自ノードNを配下とするゲートウェイGiのアドレスが記述されている。図23では、ノードNを配下とするゲートウェイG1のMACアドレス『xx:xx:xx:xx:12:34』が記述されている。また、差出アドレスには、送信元ノードNのMACアドレス『AA:BB:CC:DD:CC:DD』が記述されている。 FIG. 23 is an explanatory diagram showing an example of the data structure of the acquisition request packet. In FIG. 23, the address of the gateway Gi under its node N is described in the destination address of the header part 2310 of the acquisition request packet Pix. In FIG. 23, the MAC address “xx: xx: xx: xx: 12: 34” of the gateway G1 under the node N is described. In addition, the MAC address “AA: BB: CC: DD: CC: DD” of the source node N is described in the source address.
 ペイロード部2320には、鍵取得要求フラグと、検出部2002によって検出されたゲートウェイのアドレス、すなわち、ノードNの暗号鍵Kiで復号できなかった暗号化パケットSPjに記述されていたゲートウェイGjのアドレスが記述されている。図23では、ゲートウェイG2のMACアドレス『xx:xx:xx:xx:56:78』が記述されている。取得要求パケットPixは、暗号鍵Kiでペイロード部2320が暗号化されることで、暗号化取得要求パケットSPixとなる。図23では、取得要求パケットP1xが暗号化されて暗号化取得要求パケットSP1xとなる。 In the payload portion 2320, the key acquisition request flag and the gateway address detected by the detection portion 2002, that is, the address of the gateway Gj described in the encrypted packet SPj that could not be decrypted with the encryption key Ki of the node N are stored. is described. In FIG. 23, the MAC address “xx: xx: xx: xx: 56: 78” of the gateway G2 is described. The acquisition request packet Pix becomes an encrypted acquisition request packet SPix by encrypting the payload portion 2320 with the encryption key Ki. In FIG. 23, the acquisition request packet P1x is encrypted into an encrypted acquisition request packet SP1x.
 図20に戻り、このあと、受信部2001は、暗号化取得要求パケットSPixに対する暗号化応答パケットを、管理サーバ101からゲートウェイGi経由で受信することになる。暗号化応答パケットには、暗号鍵Kiで暗号化された暗号鍵Kjが含まれている。受信された暗号化応答パケットは、復号部2003により暗号鍵Kiで復号されることで、暗号鍵Kjが取り出される。 Referring back to FIG. 20, thereafter, the receiving unit 2001 receives an encryption response packet for the encryption acquisition request packet SPix from the management server 101 via the gateway Gi. The encryption response packet includes the encryption key Kj encrypted with the encryption key Ki. The received encryption response packet is decrypted with the encryption key Ki by the decryption unit 2003, whereby the encryption key Kj is extracted.
 設定部2007は、暗号鍵Kjを、暗号化および復号をおこなう鍵に設定する。具体的には、たとえば、暗号鍵Kiと同様、アクティブな鍵に設定する。これにより、ノードNが事後的に境界ノードNxになった場合、暗号鍵Ki,Kjの両方の鍵を用いて暗号化と復号をおこなうことができる。したがって、アドホックネットワークAi,Ajの両ゲートウェイGi,Gjを利用して通信処理をおこなうことができる。これにより、いずれか一方のアドホックネットワークと通信障害が発生しても、他方のアドホックネットワーク経由で通信することができる。 The setting unit 2007 sets the encryption key Kj as a key for performing encryption and decryption. Specifically, for example, an active key is set in the same manner as the encryption key Ki. As a result, when the node N subsequently becomes the boundary node Nx, encryption and decryption can be performed using both the encryption keys Ki and Kj. Therefore, communication processing can be performed using both gateways Gi and Gj of the ad hoc networks Ai and Aj. Thereby, even if a communication failure occurs with one of the ad hoc networks, communication can be performed via the other ad hoc network.
 また、設定部2007は、新規追加した暗号鍵Kjを暗号化および復号をおこなう鍵に設定した場合、既存の暗号鍵Kiを暗号化および復号をおこなわない鍵に設定することとしてもよい。具体的には、たとえば、暗号鍵Kjが新規追加されると、既存の暗号鍵Kiの設定を解除、すなわち、非アクティブにすることとしてもよい。これにより、境界ノードNxでは、暗号鍵Kiよりも復号回数が多くなると想定される暗号鍵Kjがアクティブな鍵となって暗号化および復号がおこなわれる。 In addition, when the newly added encryption key Kj is set as a key for performing encryption and decryption, the setting unit 2007 may set the existing encryption key Ki as a key that is not subjected to encryption and decryption. Specifically, for example, when a new encryption key Kj is added, the setting of the existing encryption key Ki may be canceled, that is, deactivated. As a result, at the boundary node Nx, encryption and decryption are performed using the encryption key Kj, which is assumed to have a greater number of decryptions than the encryption key Ki, as an active key.
 一方、暗号鍵Kiは非アクティブに設定されたため、暗号化および復号には使用されない。これにより、無駄なデータ処理や通信処理の低減化を図ることができる。また、非アクティブに設定された暗号鍵Kiは削除することとしてもよい。これにより、境界ノードNxの省メモリ化を図ることができる。 On the other hand, since the encryption key Ki is set inactive, it is not used for encryption and decryption. Thereby, useless data processing and communication processing can be reduced. Further, the encryption key Ki set to inactive may be deleted. Thereby, the memory saving of the boundary node Nx can be achieved.
 また、新規追加した暗号鍵Kjを主鍵とし、既存の暗号鍵Kiを副鍵としてもよい。ここで、主鍵とは、上述したアクティブな鍵であり、副鍵とは、一定の制限下でのみアクティブになる鍵である。たとえば、主鍵で復号できなかった場合に、復号をおこなうことができる鍵である。これにより、暗号化パケットSPiを受信した場合、主鍵である暗号鍵Kjでは復号できないため、副鍵である暗号鍵Kiで復号される。そして、復号されたデータは、暗号鍵Kjで暗号化されて暗号化パケットSPjとして転送される。 Also, the newly added encryption key Kj may be used as the main key, and the existing encryption key Ki may be used as the sub key. Here, the primary key is the above-described active key, and the secondary key is a key that becomes active only under a certain restriction. For example, it is a key that can be decrypted when the primary key cannot be decrypted. As a result, when the encrypted packet SPi is received, it cannot be decrypted with the encryption key Kj that is the primary key, and is decrypted with the encryption key Ki that is the secondary key. The decrypted data is encrypted with the encryption key Kj and transferred as an encrypted packet SPj.
 このように、鍵の主副を設定しておくことで、境界ノードNxの配下に新規ノードを新設する場合、当該新規ノードには、上述したダウンストリーム型(図6~図8)またはアップストリーム型(図9および図10)のいずれの設定方式であっても、主鍵である暗号鍵Kjのみが設定される。したがって、配下の新規ノードでのデータ処理および通信のオーバーヘッドの増加防止を図ることができる。 As described above, when a new node is newly set up under the boundary node Nx by setting the main and sub keys, the new node may include the downstream type (FIGS. 6 to 8) or the upstream described above. Regardless of the setting method of the type (FIGS. 9 and 10), only the encryption key Kj as the main key is set. Therefore, it is possible to prevent an increase in overhead of data processing and communication in the new subordinate node.
(ノードN内の管理テーブルの記憶内容)
 つぎに、ノードNの管理テーブルの記憶内容について説明する。管理テーブルは、図18のRAM1802またはフラッシュメモリ1803によりその機能を実現する。管理テーブルは、鍵情報と復号成否情報を管理する。以下、図24~図26を用いて説明する。
(Storage contents of management table in node N)
Next, the contents stored in the management table of node N will be described. The management table realizes its function by the RAM 1802 or the flash memory 1803 of FIG. The management table manages key information and decryption success / failure information. This will be described below with reference to FIGS.
 図24~図26は、ノードN内の管理テーブルの記憶内容例を示す説明図である。図24~図26において、管理テーブルTは、鍵情報と復号成否情報を有する。鍵情報は、ゲートウェイアドレス項目と、暗号鍵項目と、有効/無効フラグ項目と、を有する。ゲートウェイアドレス項目には、検出部2002で検出されたゲートウェイのアドレスが記憶される。図24~図26では、便宜上、ゲートウェイのアドレスのかわりにゲートウェイの符号を記述している。 FIGS. 24 to 26 are explanatory diagrams showing examples of stored contents of the management table in the node N. FIG. 24 to 26, the management table T has key information and decryption success / failure information. The key information includes a gateway address item, an encryption key item, and a valid / invalid flag item. In the gateway address item, the address of the gateway detected by the detection unit 2002 is stored. 24 to 26, for convenience, the gateway code is described instead of the gateway address.
 暗号鍵項目には、暗号鍵(または暗号鍵へのポインタ)が記憶されている。したがって、設定部2007によって未設定の暗号鍵については記憶されていない。有効/無効フラグ項目には、暗号鍵がアクティブ(有効)であるか非アクティブ(無効)であるかを示すフラグが記憶される。たとえば、フラグが「2」であればアクティブ、「0」であれば非アクティブである。また、「1」は、一定の制限下でのみアクティブ(副鍵)であることを示している。 In the encryption key item, an encryption key (or a pointer to the encryption key) is stored. Accordingly, the encryption key not set by the setting unit 2007 is not stored. In the valid / invalid flag item, a flag indicating whether the encryption key is active (valid) or inactive (invalid) is stored. For example, if the flag is “2”, it is active, and if it is “0”, it is inactive. Further, “1” indicates that it is active (subkey) only under certain restrictions.
 ここで、図24~図26において、(A)は、図11に示した状態での管理テーブルTの記憶内容を示している。具体的には、ゲートウェイアドレスはゲートウェイG1のアドレス、暗号鍵はゲートウェイG1固有の暗号鍵K1、有効/無効フラグは「2」である。なお、(A)の期間では、暗号化パケットSP1が500回正常に受信、復号できている。また、暗号化パケットSP1以外の他の暗号化パケットは傍受していないため、ゲートウェイG1での失敗数は0回である。 Here, in FIGS. 24 to 26, (A) shows the storage contents of the management table T in the state shown in FIG. Specifically, the gateway address is the address of the gateway G1, the encryption key is the encryption key K1 unique to the gateway G1, and the valid / invalid flag is “2”. During the period (A), the encrypted packet SP1 has been successfully received and decrypted 500 times. Further, since the encrypted packet other than the encrypted packet SP1 is not intercepted, the number of failures at the gateway G1 is zero.
 図24~図26において、(B)は、(A)以降の期間での管理テーブルTの記憶内容を示している。アドホックネットワークA2が新設された影響で、ノードNxは、ノードN2-2からの暗号化パケットSP2を傍受してしまう。これにより、検出部2002によりゲートウェイG2のアドレスが検出されることで、ゲートウェイアドレス項目に、ゲートウェイG2のアドレスが書き込まれる。ただし、この時点では、まだ暗号鍵K2は取得できていないため、暗号鍵項目は復号に使用した暗号鍵K1が記憶され、有効/無効フラグ項目には「2」が記憶される。 24 to 26, (B) shows the storage contents of the management table T in the period after (A). Due to the newly established ad hoc network A2, the node Nx intercepts the encrypted packet SP2 from the node N2-2. As a result, when the address of the gateway G2 is detected by the detection unit 2002, the address of the gateway G2 is written in the gateway address item. However, since the encryption key K2 has not yet been acquired at this time, the encryption key item stores the encryption key K1 used for decryption, and the valid / invalid flag item stores “2”.
 この状態で図13に示したように通信がおこなわれると、復号成否情報で示した復号の成功数と失敗数が記憶される。具体的には、たとえば、ノードNxは、ゲートウェイG1のアドレスが記憶されている暗号化パケットSP1の暗号鍵K1を用いた復号は、481回成功したことを示している。また、ゲートウェイG2のアドレスが記憶されている暗号化パケットSP2の暗号鍵K1を用いた復号は、1584回失敗していることを示している。 In this state, when communication is performed as shown in FIG. 13, the number of successful decryptions and the number of failures indicated by the decryption success / failure information are stored. Specifically, for example, the node Nx indicates that the decryption using the encryption key K1 of the encrypted packet SP1 in which the address of the gateway G1 is stored has been successful 481 times. Further, it is indicated that the decryption using the encryption key K1 of the encrypted packet SP2 in which the address of the gateway G2 is stored has failed 1584 times.
 (C)は、(B)以降となる図16の状態を示している。図24~図26では、すでに新規追加の暗号鍵K2が取得されたため、ノードNxは、設定部2007により、ゲートウェイG2のレコードの暗号鍵項目を、暗号鍵K1から暗号鍵K2に更新する。また、図24では、ノードNxは、有効/無効フラグ項目を両方とも「2」に設定したため、設定部2007により、両暗号鍵K1,K2をアクティブにする。 (C) shows the state of FIG. 16 after (B). 24 to 26, since the newly added encryption key K2 has already been acquired, the node Nx updates the encryption key item of the record of the gateway G2 from the encryption key K1 to the encryption key K2 by the setting unit 2007. In FIG. 24, since both the valid / invalid flag items are set to “2”, the node Nx activates both encryption keys K1 and K2 by the setting unit 2007.
 また、図25では、ノードNxは、設定部2007により、暗号鍵K1の有効/無効フラグ項目を「0」に設定したため、暗号鍵K1は使用されない。また、図26では、ノードNxは、設定部2007により、暗号鍵K1の有効/無効フラグ項目を「1」に設定したため、暗号鍵K1は副鍵として使用される。 In FIG. 25, since the node Nx sets the valid / invalid flag item of the encryption key K1 to “0” by the setting unit 2007, the encryption key K1 is not used. In FIG. 26, since the node Nx sets the valid / invalid flag item of the encryption key K1 to “1” by the setting unit 2007, the encryption key K1 is used as a sub key.
(ノードNの鍵設定処理手順)
 つぎに、ノードNの鍵設定処理について説明する。ここでは、ノードNは、アドホックネットワークAi内のノードとして、すでに暗号鍵Kiが設定済みであるものとする。そして、そのあとで、アドホックネットワークAjが設置された場合において、境界ノードNxとなったノードNの鍵設定処理手順について説明する。
(Key setting processing procedure of node N)
Next, the key setting process of the node N will be described. Here, it is assumed that the encryption key Ki has already been set as the node N in the ad hoc network Ai. After that, when the ad hoc network Aj is installed, the key setting processing procedure of the node N that has become the boundary node Nx will be described.
 図27は、ノードN(境界ノードNx)のパケット転送処理手順を示すフローチャートである。まず、ノードNは、受信部2001により、暗号化パケットの受信を待ち受け(ステップS2701:No)、暗号化パケットを受信した場合(ステップS2701:Yes)、ノードNは、検出部2002により、受信した暗号化パケットのヘッダ部2110からゲートウェイのアドレスを検出する(ステップS2702)。 FIG. 27 is a flowchart showing a packet transfer processing procedure of the node N (boundary node Nx). First, the node N waits for the reception of the encrypted packet by the receiving unit 2001 (step S2701: No). When the encrypted packet is received (step S2701: Yes), the node N is received by the detecting unit 2002. The gateway address is detected from the header part 2110 of the encrypted packet (step S2702).
 そして、ノードNは、復号部2003により復号処理を実行する(ステップS2703)。復号処理(ステップS2703)の詳細については、図28で説明する。ノードNは、復号処理(ステップS2703)のあと、受信した暗号化パケットがいずれかの暗号鍵で復号できたか否かを判断する(ステップS2704)。 Then, the node N executes a decoding process by the decoding unit 2003 (step S2703). Details of the decoding process (step S2703) will be described with reference to FIG. After the decryption process (step S2703), the node N determines whether or not the received encrypted packet can be decrypted with any encryption key (step S2704).
 復号できなかった場合(ステップS2704:No)、ノードNは、受信した暗号化パケットを破棄して(ステップS2705)、ノードNの鍵設定処理手順を終了する。なお、破棄せずに、復号に失敗した暗号化パケットを、計数のためにRAM1802やフラッシュメモリ1803に蓄積しておくこととしてもよい。 If the decryption fails (step S2704: NO), the node N discards the received encrypted packet (step S2705), and ends the node N key setting processing procedure. Instead of discarding, the encrypted packet that failed to be decrypted may be stored in the RAM 1802 or the flash memory 1803 for counting.
 また、ステップS2704において、いずれかの暗号鍵で復号できた場合(ステップS2704:Yes)、ノードNは、受信した暗号化パケットの宛先が自ノードのアドレス(またはブロードキャストアドレス)であるか否かを判断する(ステップS2706)。受信した暗号化パケットの宛先が自ノードのアドレス(またはブロードキャストアドレス)である場合(ステップS2706:Yes)、ノードNは、復号したデータに応じたデータ処理を実行して(ステップS2707)、暗号化パケットを転送する(ステップS2708)。 In addition, in step S2704, when decryption is possible with any encryption key (step S2704: Yes), the node N determines whether the destination of the received encrypted packet is the address (or broadcast address) of the own node. Judgment is made (step S2706). When the destination of the received encrypted packet is the address (or broadcast address) of the own node (step S2706: Yes), the node N executes data processing according to the decrypted data (step S2707) and encrypts it. The packet is transferred (step S2708).
 一方、受信した暗号化パケットの宛先が自ノードのアドレス(またはブロードキャストアドレス)でない場合(ステップS2706:No)、ノードNは、データ処理(ステップS2707)を実行せずに、暗号化パケットを転送する(ステップS2708)。これにより、ノードNのパケット転送処理手順を終了する。 On the other hand, when the destination of the received encrypted packet is not the address (or broadcast address) of the own node (step S2706: No), the node N transfers the encrypted packet without executing the data processing (step S2707). (Step S2708). Thereby, the packet transfer processing procedure of the node N is completed.
 図28は、図27に示した復号処理(ステップS2703)の詳細な処理手順を示すフローチャートである。この復号処理(ステップS2703)は、暗号化パケットが受信される都度、実行される処理である。また、図28では、現在ノードNが保持しているアクティブな暗号鍵をすべて用いて復号の成否確認をおこなう処理である。 FIG. 28 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG. This decryption process (step S2703) is a process executed whenever an encrypted packet is received. Also, in FIG. 28, a process of confirming the success / failure of the decryption using all the active encryption keys currently held by the node N is shown.
 図28において、まず、ノードNは、未選択の暗号鍵があるか否かを判断する(ステップS2801)。未選択の暗号鍵がある場合(ステップS2801:Yes)、ノードNは、未選択の暗号鍵を1つ選択し(ステップS2802)、復号部2003により、選択した暗号鍵で復号をおこなう(ステップS2803)。 28, first, the node N determines whether or not there is an unselected encryption key (step S2801). When there is an unselected encryption key (step S2801: Yes), the node N selects one unselected encryption key (step S2802), and the decryption unit 2003 performs decryption with the selected encryption key (step S2803). ).
 そして、復号に失敗した場合(ステップS2804:No)、ノードNは、計数部2004により、管理テーブルTにおいて、ステップS2702で検出されたゲートウェイについての選択鍵での復号の失敗数を1加算して(ステップS2805)、ステップS2801に戻る。一方、復号に成功した場合(ステップS2804:Yes)、ノードNは、計数部2004により、管理テーブルTにおいて、ステップS2702で検出されたゲートウェイについての選択鍵での復号の成功数を1加算して(ステップS2806)、ステップS2801に戻る。 If decryption fails (step S2804: No), the node N adds 1 to the number of decryption failures with the selection key for the gateway detected in step S2702 in the management table T by the counting unit 2004. (Step S2805), the process returns to Step S2801. On the other hand, when the decryption is successful (step S2804: Yes), the node N adds 1 to the number of successful decryptions with the selection key for the gateway detected in step S2702 in the management table T by the counting unit 2004. (Step S2806), it returns to step S2801.
 一方、ステップS2801において、未選択の暗号鍵がない場合(ステップS2801:No)、ステップS2704に移行する。これにより、復号処理(ステップS2703)を終了する。図28に示した復号処理(ステップS2703)によれば、保持しているすべてのアクティブな暗号鍵を総当たりで用いて復号を試みることができる。したがって、計数部2004により精度のよい計数結果を得ることができる。 On the other hand, in step S2801, if there is no unselected encryption key (step S2801: No), the process proceeds to step S2704. Thereby, the decoding process (step S2703) is terminated. According to the decryption process (step S2703) shown in FIG. 28, it is possible to attempt decryption using all the active encryption keys held by the brute force. Therefore, the counting unit 2004 can obtain an accurate counting result.
 図29は、図27に示した復号処理(ステップS2703)の詳細な処理手順を示すフローチャートである。この復号処理(ステップS2703)は、暗号化パケットが受信される都度、実行される処理である。また、図29では、現在ノードNが保持しているアクティブな暗号鍵をすべて用いて復号の成否確認をおこなうが、復号に成功した段階で終了する処理である。なお、図28と同一処理については、同一ステップ番号を付し、その説明を省略する。 FIG. 29 is a flowchart showing a detailed processing procedure of the decoding process (step S2703) shown in FIG. This decryption process (step S2703) is a process executed whenever an encrypted packet is received. In FIG. 29, the success or failure of the decryption is confirmed using all the active encryption keys currently held by the node N, but the process ends when the decryption is successful. Note that the same processing as that in FIG. 28 is denoted by the same step number, and description thereof is omitted.
 図28と異なる点は、ステップS2806において、ノードNが、計数部2004により、ステップS2702で検出されたゲートウェイについての選択鍵での復号の成功数を1加算した場合(ステップS2806)、ステップS2704に移行する点である。すなわち、復号が成功した時点で、復号処理(ステップS2703)が終了する。これにより、復号が成功した後も、復号処理(ステップS2703)を継続しなくて済むため、ノードNの復号処理(ステップS2703)の高速化を図ることができる。 The difference from FIG. 28 is that, in step S2806, when the node N adds 1 to the number of successful decryptions with the selection key for the gateway detected in step S2702 by the counting unit 2004 (step S2806), the process proceeds to step S2704. It is a point to shift. That is, when the decoding is successful, the decoding process (step S2703) ends. As a result, it is not necessary to continue the decoding process (step S2703) even after the decoding is successful, so that the decoding process of the node N (step S2703) can be speeded up.
 つぎに、ノードNの暗号鍵追加処理について説明する。図30では、失敗数と鍵取得に関するしきい値とによる絶対評価での暗号鍵追加処理手順を示す。一方、図31では、失敗数から成功数を引いた差分による相対評価での暗号鍵追加処理手順を示す。 Next, the encryption key addition process of node N will be described. FIG. 30 shows an encryption key addition process procedure in absolute evaluation based on the number of failures and a threshold value related to key acquisition. On the other hand, FIG. 31 shows an encryption key addition processing procedure in relative evaluation based on a difference obtained by subtracting the number of successes from the number of failures.
 図30は、ノードNの暗号鍵追加処理手順を示すフローチャート(その1)である。図30において、まず、ノードNは、所定期間が経過するのを待ち受け(ステップS3001:No)、所定期間が経過した場合(ステップS3001:Yes)、ノードNは、管理テーブルTを参照して、判断部2005により、失敗数が鍵取得に関するしきい値以上となるゲートウェイ(以下、「特定ゲートウェイ」)があるか否かを判断する(ステップS3002)。 FIG. 30 is a flowchart (part 1) illustrating the encryption key addition processing procedure of the node N. In FIG. 30, first, the node N waits for a predetermined period to elapse (step S3001: No). If the predetermined period elapses (step S3001: Yes), the node N refers to the management table T, The determination unit 2005 determines whether there is a gateway (hereinafter, “specific gateway”) in which the number of failures is greater than or equal to a threshold value related to key acquisition (step S3002).
 失敗数が鍵取得に関するしきい値以上となる特定のゲートウェイがない場合(ステップS3002:No)、ステップS3009に移行する。一方、失敗数が鍵取得に関するしきい値以上となる特定のゲートウェイがある場合(ステップS3002:Yes)、ノードNは、送信部2006により、特定ゲートウェイ固有の暗号鍵の取得要求を管理サーバ101に送信する(ステップS3003)。 If there is no specific gateway whose number of failures is equal to or greater than the threshold for key acquisition (step S3002: No), the process proceeds to step S3009. On the other hand, when there is a specific gateway in which the number of failures is equal to or greater than the threshold for key acquisition (step S3002: Yes), the node N sends a request for acquiring an encryption key unique to the specific gateway to the management server 101 by the transmission unit 2006 Transmit (step S3003).
 このあと、管理サーバ101から、暗号化パケットを待ち受ける(ステップS3004)。鍵が受信されていない場合(ステップS3004:No)、ノードNは、タイムアウトか否かを判断する(ステップS3005)。タイムアウトでない場合(ステップS3005:No)、ステップS3004に戻る。タイムアウトの場合(ステップS3005:Yes)、ステップS3009に移行する。 Thereafter, an encrypted packet is awaited from the management server 101 (step S3004). If the key has not been received (step S3004: NO), the node N determines whether or not a timeout has occurred (step S3005). When it is not time-out (step S3005: No), it returns to step S3004. In the case of timeout (step S3005: Yes), the process proceeds to step S3009.
 一方、ステップS3004において、暗号化パケットを受信した場合(ステップS3004:Yes)、ノードNは、復号部2003により、保持している暗号鍵で復号する(ステップS3006)。そして、ノードNは、復号されたデータに、提供許可フラグがあるか否かを判断する(ステップS3007)。提供許可フラグがある場合(ステップS3007:Yes)、復号されたデータには暗号鍵が含まれているため、ノードNは、設定部2007により、復号で得られた暗号鍵をアクティブな鍵に設定する(ステップS3008)。 On the other hand, when the encrypted packet is received in step S3004 (step S3004: Yes), the node N is decrypted by the decryption unit 2003 with the held encryption key (step S3006). Then, the node N determines whether or not there is a provision permission flag in the decrypted data (step S3007). When there is a provision permission flag (step S3007: Yes), since the decrypted data includes the encryption key, the node N sets the encryption key obtained by the decryption as an active key by the setting unit 2007. (Step S3008).
 一方、提供不可通知である場合(ステップS3007:No)、ステップS3009に移行する。ステップS3009では、ノードNは、管理テーブルTの復号成否情報をリセットする(ステップS3009)。これにより、ノードNの暗号鍵追加処理を終了する。 On the other hand, when it is a notification that provision is not possible (step S3007: No), the process proceeds to step S3009. In step S3009, the node N resets the decryption success / failure information in the management table T (step S3009). Thereby, the encryption key adding process of the node N is finished.
 図31は、ノードNの暗号鍵追加処理手順を示すフローチャート(その2)である。図31では、図30と同一処理については、同一ステップ番号を付し、その説明を省略する。図30との相違は、図30のステップS3002が、S3102に変わった点である。図31では、相対評価をおこなうため、判断部2005により、計数部2004によって計数された失敗数から成功数を引いた差分が鍵取得に関するしきい値以上であるゲートウェイGiの有無を判断することとなる。このように、図31では、いずれのアドホックネットワークの方が復号が成功しやすいかを、相対的に判断することができるため、通信効率の優劣がつけやすいという利点がある。つぎに、管理サーバ101の機能的構成例について説明する。 FIG. 31 is a flowchart (part 2) illustrating the encryption key addition processing procedure of the node N. In FIG. 31, the same processes as those in FIG. 30 are denoted by the same step numbers, and description thereof is omitted. The difference from FIG. 30 is that step S3002 of FIG. 30 is changed to S3102. In FIG. 31, in order to perform relative evaluation, the determination unit 2005 determines whether or not there is a gateway Gi whose difference obtained by subtracting the number of successes from the number of failures counted by the counting unit 2004 is equal to or greater than a threshold value related to key acquisition. Become. In this way, in FIG. 31, since it can be relatively determined which ad hoc network is more likely to succeed in decoding, there is an advantage that communication efficiency is easily superior or inferior. Next, a functional configuration example of the management server 101 will be described.
 図32は、管理サーバ101の機能的構成例を示すブロック図である。図32において、管理サーバ101は、受信部3201と復号部3202と判定部3203と抽出部3204と暗号化処理部3205と送信部3206とを含む構成である。各機能部(受信部3201~送信部3206)は、具体的には、たとえば、図17に示した管理サーバ101のROM1702、RAM1703、磁気ディスク1705、光ディスク1707などの記憶装置に記憶されたプログラムをCPU1701に実行させることにより、または、I/F1708により、その機能を実現する。 FIG. 32 is a block diagram illustrating a functional configuration example of the management server 101. 32, the management server 101 includes a receiving unit 3201, a decrypting unit 3202, a determining unit 3203, an extracting unit 3204, an encryption processing unit 3205, and a transmitting unit 3206. Specifically, each functional unit (reception unit 3201 to transmission unit 3206) stores a program stored in a storage device such as the ROM 1702, the RAM 1703, the magnetic disk 1705, or the optical disk 1707 of the management server 101 shown in FIG. The function is realized by causing the CPU 1701 to execute or by the I / F 1708.
 また、各機能部(受信部3201~送信部3206)の処理結果は、特に指定する場合を除いて、図17に示した管理サーバ101のROM1702、RAM1703、磁気ディスク1705、光ディスク1707などの記憶装置に記憶される。 Further, unless otherwise specified, the processing results of the functional units (reception unit 3201 to transmission unit 3206) are storage devices such as the ROM 1702, the RAM 1703, the magnetic disk 1705, and the optical disk 1707 of the management server 101 shown in FIG. Is remembered.
 受信部3201は、各ゲートウェイGiから暗号化パケットSPiを受信する。具体的には、たとえば、受信部3201は、ノードNからマルチホップ通信されてきた暗号化パケットSPiを、ノードNを配下とするゲートウェイGiから受信する。 The receiving unit 3201 receives the encrypted packet SPi from each gateway Gi. Specifically, for example, the reception unit 3201 receives the encrypted packet SPi that has been subjected to multi-hop communication from the node N, from the gateway Gi that controls the node N.
 復号部3202は、受信部3201によって受信された暗号化パケットSPiを復号する。具体的には、たとえば、暗号鍵DB110の暗号鍵Kiを総当たりで復号を試みる。または、暗号化パケットSPiの差出アドレスを手がかりとして、暗号化DB110から暗号鍵Ki(図33の場合は、暗号鍵K1)を抽出し、復号することとしてもよい。そして、復号に成功した場合、ペイロード部2320に取得要求フラグがあれば、暗号化パケットSPiは暗号化取得要求パケットSPixであると判明する。 The decryption unit 3202 decrypts the encrypted packet SPi received by the reception unit 3201. Specifically, for example, the encryption key Ki of the encryption key DB 110 is attempted to be brute-forced. Alternatively, the encryption key Ki (the encryption key K1 in the case of FIG. 33) may be extracted from the encryption DB 110 and decrypted using the source address of the encrypted packet SPi as a clue. If the decryption is successful and the payload part 2320 has an acquisition request flag, the encrypted packet SPi is determined to be the encrypted acquisition request packet SPix.
 図33は、暗号化取得要求パケットSPixの復号例を示す説明図である。暗号化取得要求パケットSPixのヘッダ部2310の宛先アドレスには、管理サーバ101のアドレス『xx:xx:xx:xx:xx:xx』が記述される。また、差出アドレスには、送信元となるゲートウェイGi(図33ではG1)のアドレスが記述される。また、ヘッダ部2310には、取得要求元のノードNのアドレスが、ゲートウェイGiにより追加されている。図33では、ノードNのMACアドレス『AA:BB:CC:DD:CC:DD』が記述されている。 FIG. 33 is an explanatory diagram showing an example of decryption of the encrypted acquisition request packet SPix. The address “xx: xx: xx: xx: xx: xx” of the management server 101 is described in the destination address of the header part 2310 of the encrypted acquisition request packet SPix. In addition, the address of the gateway Gi (G1 in FIG. 33) serving as a transmission source is described in the source address. In addition, the address of the acquisition request source node N is added to the header portion 2310 by the gateway Gi. In FIG. 33, the MAC address “AA: BB: CC: DD: CC: DD” of the node N is described.
 管理サーバ101は、差出アドレスを手がかりとして、暗号化DB110から暗号鍵Ki(図33の場合は、暗号鍵K1)を抽出する。これにより、暗号化取得要求パケットSPixの復号が可能となる。図33では、暗号鍵K1で復号が成功したため、取得要求パケットPixのペイロード部2320から取得要求フラグを取り出すことができる。 The management server 101 extracts the encryption key Ki (in the case of FIG. 33, the encryption key K1) from the encryption DB 110 using the source address as a clue. As a result, the encrypted acquisition request packet SPix can be decrypted. In FIG. 33, since the decryption was successful with the encryption key K1, the acquisition request flag can be extracted from the payload portion 2320 of the acquisition request packet Pix.
 また、図32に戻り、判定部3203は、受信されたパケットが取得要求パケットPixであるか否かを判定する。具体的には、判定部3203は、復号部3202で取得要求フラグが確認できた場合、取得要求パケットPixであると判定する。 32, the determination unit 3203 determines whether the received packet is an acquisition request packet Pix. Specifically, the determination unit 3203 determines that it is an acquisition request packet Pix when the decryption unit 3202 can confirm the acquisition request flag.
 また、判定部3203は、所定の判定基準により、取得要求してきた暗号鍵Kjを、取得要求元のノードNに送信すべきか否かを判定する。具体的には、たとえば、暗号鍵DB110に記憶されている暗号鍵Kiを使用するゲートウェイGiの位置情報Piと、取得要求した暗号鍵Kjを使用するゲートウェイGjの位置情報Pjとの距離が、許容範囲内であるか否かを、判定部3203は判断する。判定部3203は、許容範囲内にある場合、取得要求元のノードNに送信すべきと判定する。 Further, the determination unit 3203 determines whether or not the encryption key Kj requested for acquisition should be transmitted to the node N that is the acquisition request source based on a predetermined determination criterion. Specifically, for example, the distance between the position information Pi of the gateway Gi that uses the encryption key Ki stored in the encryption key DB 110 and the position information Pj of the gateway Gj that uses the requested encryption key Kj is acceptable. The determination unit 3203 determines whether or not it is within the range. When it is within the allowable range, the determination unit 3203 determines that transmission should be performed to the node N that is the acquisition request source.
 また、判定部3203は、取得要求対象となる暗号鍵Kjを使用するゲートウェイGjの履歴情報Hjに基づいて、取得要求元のノードNに送信すべきか否かを判定する。具体的には、たとえば、判定部3203は、受信部3201で復号された取得要求パケットPixのペイロード部2320に記述されているゲートウェイGjのアドレスの履歴情報Hjを参照する。 Also, the determination unit 3203 determines whether or not to transmit to the node N that is the acquisition request source, based on the history information Hj of the gateway Gj that uses the encryption key Kj that is the acquisition request target. Specifically, for example, the determination unit 3203 refers to the history information Hj of the address of the gateway Gj described in the payload portion 2320 of the acquisition request packet Pix decoded by the reception unit 3201.
 図34は、履歴情報Hjの具体例を示す説明図である。履歴情報Hjには、暗号鍵Kjが他の暗号鍵Kiとともに設定された場合の暗号鍵Kjの設定解除回数が記憶されている。設定解除回数とは、非アクティブに設定された回数である。また、削除された回数や副鍵となった回数でもよい。なお、設定解除の有無は、その都度、ノードNから送信されることにより、履歴情報Hjが更新されるものとする。 FIG. 34 is an explanatory diagram showing a specific example of the history information Hj. The history information Hj stores the number of times the setting of the encryption key Kj is canceled when the encryption key Kj is set together with another encryption key Ki. The number of setting cancellations is the number of times set to inactive. Moreover, the number of times of deletion or the number of times of becoming a sub key may be used. It is assumed that the history information Hj is updated by transmitting the presence / absence of setting cancellation from the node N each time.
 ここで、図34では、暗号鍵Kiとともに設定されたときの暗号鍵Kjの設定解除回数が「7」となっている。設定解除に関するしきい値が、たとえば、「10」である場合、設定解除に関するしきい値以下となるため、判定部3203は、暗号鍵Kjを送信すべきと判定する。一方、設定解除に関するしきい値が、たとえば、「5」である場合、設定解除に関するしきい値よりも大きくなるため、判定部3203は、暗号鍵Kjを送信すべきでないと判定する。なお、アドホックネットワークAi内のノードNから暗号鍵Kjの取得要求がはじめてある場合は、暗号鍵Kiについての暗号鍵Kjの設定解除回数は0回であるため、かならず暗号鍵Kjは送信すべきと判定される。 Here, in FIG. 34, the number of setting cancellation times of the encryption key Kj when set together with the encryption key Ki is “7”. For example, when the threshold value related to the cancellation of setting is “10”, the determination unit 3203 determines that the encryption key Kj should be transmitted because the threshold value is lower than the threshold value related to the cancellation of setting. On the other hand, when the threshold value related to the setting cancellation is “5”, for example, it becomes larger than the threshold value related to the setting cancellation, so the determination unit 3203 determines that the encryption key Kj should not be transmitted. In addition, when the acquisition request of the encryption key Kj from the node N in the ad hoc network Ai is made for the first time, the encryption key Kj should be transmitted because the encryption key Kj setting release count for the encryption key Ki is zero. Determined.
 抽出部3204は、取得要求対象となる暗号鍵Kjを暗号鍵DB110から抽出する。具体的には、たとえば、抽出部3204は、取得要求パケットPixのヘッダ部2310に記述されているゲートウェイGjのアドレスに関連づけられている暗号鍵Kjを暗号鍵DB110から抽出する。 The extraction unit 3204 extracts the encryption key Kj to be acquired from the encryption key DB 110. Specifically, for example, the extraction unit 3204 extracts the encryption key Kj associated with the address of the gateway Gj described in the header part 2310 of the acquisition request packet Pix from the encryption key DB 110.
 暗号化処理部3205は、暗号化DB110から抽出された暗号鍵Kjを、暗号化取得要求パケットSPixの復号に成功した暗号鍵Kiで暗号化して、暗号化応答パケットを送信する。 The encryption processing unit 3205 encrypts the encryption key Kj extracted from the encryption DB 110 with the encryption key Ki that has successfully decrypted the encryption acquisition request packet SPix, and transmits an encryption response packet.
 図35は、応答パケットのデータ構造例を示す説明図である。応答パケットRixのヘッダ部3510の宛先アドレスは、暗号化取得要求パケットSPixの差出アドレスが記述される。図35では、ゲートウェイG1のアドレスが記述されている。差出アドレスには、管理サーバ101のアドレスが記述される。 FIG. 35 is an explanatory diagram showing an example of the data structure of the response packet. The destination address of the header part 3510 of the response packet Rix describes the source address of the encrypted acquisition request packet SPix. In FIG. 35, the address of the gateway G1 is described. The address of the management server 101 is described in the sender address.
 ペイロード部3520には、暗号鍵Kjの提供許可/不許可フラグが記述される。具体的には、判定部3203により送信すべきと判定された場合は、提供許可フラグが設定され、送信すべきでないと判定された場合は、提供不許可フラグが設定される。また、提供許可フラグが設定された場合は、抽出部3204によって抽出された暗号鍵Kjが記述される。図35では、暗号鍵K2が記述されている。 In the payload portion 3520, a provision permission / non-permission flag for the encryption key Kj is described. Specifically, the provision permission flag is set when the determination unit 3203 determines that transmission should be performed, and the provision non-permission flag is set when it is determined that transmission should not be performed. If the provision permission flag is set, the encryption key Kj extracted by the extraction unit 3204 is described. In FIG. 35, the encryption key K2 is described.
 また、ペイロード部3520には、取得要求元のアドレスが記述される。図35では、取得要求元のノードN(Nx)のMACアドレス『AA:BB:CC:DD:CC:DD』が記述されている。応答パケットRixは、暗号化処理部3205において、暗号化取得要求パケットSPixの復号に成功した暗号鍵Kiで暗号化される。図35では、暗号鍵K1で暗号化される。これにより、暗号化応答パケットSRixが生成される。 In the payload portion 3520, the address of the acquisition request source is described. In FIG. 35, the MAC address “AA: BB: CC: DD: CC: DD” of the node N (Nx) as the acquisition request source is described. The response packet Rix is encrypted by the encryption processing unit 3205 with the encryption key Ki that has successfully decrypted the encryption acquisition request packet SPix. In FIG. 35, encryption is performed using the encryption key K1. Thereby, the encryption response packet SRix is generated.
 送信部3206は、暗号化応答パケットSRixを送信する。暗号化応答パケットSRixは宛先となるゲートウェイGiに送信される。ゲートウェイGiは、暗号化応答パケットSRixの差出アドレスをゲートウェイGiのアドレスに付け替え、宛先アドレスをブロードキャストアドレスに付け替える。これにより、暗号化応答パケットSRixは、アドホックネットワークAiに送信される。 The transmission unit 3206 transmits the encryption response packet SRix. The encrypted response packet SRix is transmitted to the destination gateway Gi. The gateway Gi replaces the source address of the encrypted response packet SRix with the address of the gateway Gi, and replaces the destination address with the broadcast address. Thereby, the encryption response packet SRix is transmitted to the ad hoc network Ai.
 なお、ノードNでは、暗号化応答パケットSRixを暗号鍵Kiで復号し、提供許可フラグがあれば(ステップS3007:Yes)、ペイロード部3520に記述されている暗号鍵Kjがアクティブに設定されることになる。一方、提供不許可フラグであれば(ステップS3007:No)、暗号鍵Kjが記述されていないため、暗号鍵Kjは設定されないことになる。 In the node N, the encryption response packet SRix is decrypted with the encryption key Ki, and if there is a provision permission flag (step S3007: Yes), the encryption key Kj described in the payload portion 3520 is set to be active. become. On the other hand, if it is a provision non-permission flag (step S3007: No), since the encryption key Kj is not described, the encryption key Kj is not set.
(管理サーバ101の鍵提供処理手順)
 図36は、管理サーバ101の鍵提供処理手順を示すフローチャート(その1)である。図36では、位置情報Piおよび履歴情報Hjを用いない処理手順を示している。まず、管理サーバ101は、暗号化パケットの受信を待ち受け(ステップS3601:No)、暗号化パケットが受信された場合(ステップS3601:Yes)、管理サーバ101は、復号部3202により、復号処理を実行する(ステップS3602)。復号処理(ステップS3602)の詳細については図37で説明する。
(Key providing procedure of management server 101)
FIG. 36 is a flowchart (part 1) illustrating the key provision processing procedure of the management server 101. FIG. 36 shows a processing procedure that does not use the position information Pi and the history information Hj. First, the management server 101 waits for reception of an encrypted packet (step S3601: No). When an encrypted packet is received (step S3601: Yes), the management server 101 executes decryption processing by the decryption unit 3202. (Step S3602). Details of the decoding process (step S3602) will be described with reference to FIG.
 このあと、復号に成功した場合は、管理サーバ101は、判定部3203により、復号されたパケットに取得要求フラグがあるか否かを判定する(ステップS3603)。取得要求フラグがない場合(ステップS3603:No)、管理サーバ101は、ペイロード部2120に応じたデータ処理を実行する(ステップS3604)。これにより、鍵提供処理を終了する。 Thereafter, when the decryption is successful, the management server 101 determines whether or not the decrypted packet has an acquisition request flag by the determination unit 3203 (step S3603). When there is no acquisition request flag (step S3603: No), the management server 101 executes data processing according to the payload portion 2120 (step S3604). As a result, the key providing process ends.
 一方、取得要求フラグである場合(ステップS3603:Yes)、そのパケットは、取得要求パケットPixであることが判明する。したがって、管理サーバ101は、抽出部3204により、取得要求対象となる暗号鍵Kjを抽出する(ステップS3605)。そして、管理サーバ101は、暗号化処理部3205により、抽出された暗号鍵Kjを、復号処理(ステップS3602)で復号できた暗号鍵Kiで暗号化することで、暗号化応答パケットSRixを生成する(ステップS3606)。このあと、管理サーバ101は、送信部3206により、暗号鍵Kjを含む暗号化応答パケットSRixを送信する(ステップS3607)。これにより、鍵提供処理を終了する。 On the other hand, if it is an acquisition request flag (step S3603: Yes), it is determined that the packet is an acquisition request packet Pix. Therefore, the management server 101 uses the extraction unit 3204 to extract the encryption key Kj that is the acquisition request target (step S3605). Then, the management server 101 generates an encrypted response packet SRix by encrypting the extracted encryption key Kj with the encryption key Ki decrypted in the decryption process (step S3602) by the encryption processing unit 3205. (Step S3606). Thereafter, the management server 101 transmits the encryption response packet SRix including the encryption key Kj by the transmission unit 3206 (step S3607). As a result, the key providing process ends.
 図37は、図36に示した復号処理(ステップS3602)の詳細な処理手順を示すフローチャートである。まず、ゲートウェイGiの「i」を「i=1」で初期化する(ステップS3701)。そして、暗号鍵DB110の中のゲートウェイGi固有の暗号鍵Kiを用いて、ステップS3601において受信された暗号化パケットSPiを復号する(ステップS3702)。 FIG. 37 is a flowchart showing a detailed processing procedure of the decoding process (step S3602) shown in FIG. First, “i” of the gateway Gi is initialized with “i = 1” (step S3701). Then, the encrypted packet SPi received in step S3601 is decrypted using the encryption key Ki unique to the gateway Gi in the encryption key DB 110 (step S3702).
 このあと、暗号化パケットSPiの復号に成功したか否かを判断する(ステップS3703)。ここで、暗号化パケットSPiの復号に成功した場合(ステップS3703:Yes)、図36に示したステップS3603に移行する。 Thereafter, it is determined whether or not the encrypted packet SPi has been successfully decrypted (step S3703). If the decryption of the encrypted packet SPi is successful (step S3703: YES), the process proceeds to step S3603 shown in FIG.
 一方、暗号化パケットSPiの復号に失敗した場合(ステップS3703:No)、ゲートウェイGiの「i」をインクリメントして(ステップS3704)、「i」が「n」より大きいか否かを判断する(ステップS3705)。 On the other hand, when the decryption of the encrypted packet SPi fails (step S3703: No), “i” of the gateway Gi is incremented (step S3704), and it is determined whether “i” is larger than “n” (step S3704). Step S3705).
 ここで、「i」が「n」以下の場合(ステップS3705:No)、ステップS3702に戻る。一方、「i」が「n」より大きい場合(ステップS3705:Yes)、エラー処理を実行して(ステップS3706)、管理サーバ101の一連の処理を終了する。これにより、暗号化パケットSPiを復号することができる。 Here, when “i” is equal to or less than “n” (step S3705: No), the process returns to step S3702. On the other hand, if “i” is greater than “n” (step S3705: YES), error processing is executed (step S3706), and a series of processing of the management server 101 is terminated. As a result, the encrypted packet SPi can be decrypted.
 図38は、管理サーバ101の鍵提供処理手順を示すフローチャート(その2)である。図36では、位置情報Piまたは/および履歴情報Hjを用いた処理手順を示している。なお、図36と同一処理については同一ステップ番号を付し、その説明を省略する。図36との相違は、ステップS3603:YesとステップS3605との間に、妥当性判定処理(ステップS3800)を追加した点である。以下、妥当性判定処理(ステップS3800)の詳細について、図39~図41を用いて説明する。 FIG. 38 is a flowchart (part 2) illustrating the key provision processing procedure of the management server 101. FIG. 36 shows a processing procedure using the position information Pi and / or history information Hj. Note that the same steps as those in FIG. 36 are denoted by the same step numbers and description thereof is omitted. The difference from FIG. 36 is that a validity determination process (step S3800) is added between step S3603: YES and step S3605. Details of the validity determination process (step S3800) will be described below with reference to FIGS.
 図39は、妥当性判定処理(ステップS3800)の詳細な処理手順を示すフローチャート(その1)である。図39では、位置情報Piを用いた処理手順を示している。まず、管理サーバ101は、抽出部3204により、暗号化取得要求パケットSPixを送信したゲートウェイGiの位置情報Piと、取得要求パケットPixのペイロード部2320にアドレスが記述されているゲートウェイGjの位置情報Pjを抽出する(ステップS3901)。 FIG. 39 is a flowchart (part 1) showing a detailed processing procedure of the validity determination processing (step S3800). FIG. 39 shows a processing procedure using the position information Pi. First, the management server 101 uses the extraction unit 3204 to transmit the location information Pi of the gateway Gi that transmitted the encrypted acquisition request packet SPix, and the location information Pj of the gateway Gj whose address is described in the payload portion 2320 of the acquisition request packet Pix. Is extracted (step S3901).
 つぎに、管理サーバ101は、判定部3203により、位置情報Pi,Pj間の距離が許容範囲であるか否かを判定する(ステップS3902)。許容範囲内である場合(ステップS3902:Yes)、図36のステップS3605に移行する。 Next, the management server 101 determines whether the distance between the position information Pi and Pj is within an allowable range by the determination unit 3203 (step S3902). If it is within the allowable range (step S3902: YES), the process proceeds to step S3605 in FIG.
 一方、許容範囲外である場合(ステップS3902:No)、管理サーバ101は、暗号化処理部3205および送信部3206により、提供不許可フラグを含む暗号化応答パケットSRixを送信する(ステップS3903)。これにより、ゲートウェイGi,Gj間の距離が近距離であると保証された場合に限り、暗号鍵Kjを提供することができる。 On the other hand, when it is outside the allowable range (step S3902: No), the management server 101 transmits the encryption response packet SRix including the provision non-permission flag by the encryption processing unit 3205 and the transmission unit 3206 (step S3903). Thus, the encryption key Kj can be provided only when the distance between the gateways Gi and Gj is guaranteed to be a short distance.
 図40は、妥当性判定処理(ステップS3800)の詳細な処理手順を示すフローチャート(その2)である。図40では、履歴情報Hjを用いた処理手順を示している。まず、管理サーバ101は、抽出部3204により、取得要求パケットPixのペイロード部2320にアドレスが記述されているゲートウェイGjの履歴情報Hjを抽出する(ステップS4001)。 FIG. 40 is a flowchart (part 2) showing a detailed processing procedure of the validity determination processing (step S3800). FIG. 40 shows a processing procedure using the history information Hj. First, the management server 101 extracts the history information Hj of the gateway Gj whose address is described in the payload portion 2320 of the acquisition request packet Pix by the extraction unit 3204 (step S4001).
 つぎに、管理サーバ101は、判定部3203により、履歴情報Hj内の設定解除回数が許容範囲であるか否かを判定する(ステップS4002)。許容範囲内(設定解除に関するしきい値未満)である場合(ステップS4002:Yes)、図36のステップS3605に移行する。 Next, the management server 101 uses the determination unit 3203 to determine whether or not the number of setting cancellations in the history information Hj is within an allowable range (step S4002). If it is within the allowable range (less than the threshold value related to the setting cancellation) (step S4002: Yes), the process proceeds to step S3605 in FIG.
 一方、許容範囲外(設定解除に関するしきい値以上)である場合(ステップS4002:No)、管理サーバ101は、暗号化処理部3205および送信部3206により、提供不許可フラグを含む暗号化応答パケットSRixを送信する(ステップS4003)。これにより、暗号鍵Kjを提供しても再度設定解除となる可能性があるノードNに対しては、暗号鍵Kjを提供しなくて済むため、無駄な鍵追加設定処理を防止することができる。 On the other hand, if it is out of the allowable range (more than the threshold for setting cancellation) (step S4002: No), the management server 101 uses the encryption processing unit 3205 and the transmission unit 3206 to encrypt the response packet including the provision non-permission flag SRix is transmitted (step S4003). Thereby, even if the encryption key Kj is provided, it is not necessary to provide the encryption key Kj to the node N that may be reset again, so that unnecessary key addition setting processing can be prevented. .
 図41は、妥当性判定処理(ステップS3800)の詳細な処理手順を示すフローチャート(その3)である。図41では、位置情報Piおよび履歴情報Hjを用いた処理手順を示している。まず、管理サーバ101は、抽出部3204により、取得要求パケットPixを送信したゲートウェイGiの位置情報Piと、取得要求パケットPixのペイロード部2320にアドレスが記述されているゲートウェイGjの位置情報Pjを抽出する(ステップS4101)。 FIG. 41 is a flowchart (part 3) showing a detailed processing procedure of the validity determination processing (step S3800). FIG. 41 shows a processing procedure using the position information Pi and the history information Hj. First, the management server 101 extracts the location information Pi of the gateway Gi that transmitted the acquisition request packet Pix and the location information Pj of the gateway Gj whose address is described in the payload portion 2320 of the acquisition request packet Pix by the extraction unit 3204. (Step S4101).
 つぎに、管理サーバ101は、判定部3203により、位置情報Pi,Pj間の距離が許容範囲であるか否かを判定する(ステップS4102)。許容範囲内である場合(ステップS4102:Yes)、管理サーバ101は、抽出部3204により、取得要求パケットPixのペイロード部2320にアドレスが記述されているゲートウェイGjの履歴情報Hjを抽出する(ステップS4103)。 Next, the management server 101 determines whether the distance between the position information Pi and Pj is within an allowable range by the determination unit 3203 (step S4102). When it is within the allowable range (step S4102: Yes), the management server 101 extracts the history information Hj of the gateway Gj whose address is described in the payload part 2320 of the acquisition request packet Pix by the extraction unit 3204 (step S4103). ).
 つぎに、管理サーバ101は、判定部3203により、履歴情報Hj内の設定解除回数が許容範囲であるか否かを判定する(ステップS4104)。許容範囲内(設定解除に関するしきい値未満)である場合(ステップS4104:Yes)、図36のステップS3605に移行する。 Next, the management server 101 uses the determination unit 3203 to determine whether or not the number of setting cancellations in the history information Hj is within an allowable range (step S4104). If it is within the allowable range (less than the threshold value related to the setting cancellation) (step S4104: YES), the process proceeds to step S3605 in FIG.
 また、ステップS4102において、許容範囲外である場合(ステップS4102:No)、管理サーバ101は、暗号化処理部3205および送信部3206により、提供不許可フラグを含む暗号化応答パケットSRixを送信する(ステップS4105)。これにより、ゲートウェイGi,Gj間の距離が近距離であると保証された場合に限り、暗号鍵Kjを提供することができる。 In step S4102, if it is outside the allowable range (step S4102: No), the management server 101 transmits the encryption response packet SRix including the provision non-permission flag by the encryption processing unit 3205 and the transmission unit 3206 ( Step S4105). Thereby, the encryption key Kj can be provided only when the distance between the gateways Gi and Gj is guaranteed to be a short distance.
 また、ステップS4104において、許容範囲外(設定解除に関するしきい値以上)である場合(ステップS4104:No)、管理サーバ101は、暗号化処理部3205および送信部3206により、提供不許可フラグを含む暗号化応答パケットSRixを送信する(ステップS4105)。これにより、暗号鍵Kjを提供しても再度設定解除となる可能性があるノードNに対しては、暗号鍵Kjを提供しなくて済むため、無駄な鍵追加設定処理を防止することができる。 In step S4104, if it is out of the allowable range (more than the threshold for setting cancellation) (step S4104: No), the management server 101 includes the provision non-permission flag by the encryption processing unit 3205 and the transmission unit 3206. The encrypted response packet SRix is transmitted (step S4105). Thereby, even if the encryption key Kj is provided, it is not necessary to provide the encryption key Kj to the node N that may be reset again, so that useless key addition setting processing can be prevented. .
(暗号鍵設定解除例)
 つぎに、暗号鍵の設定解除例について説明する。上述した例では、境界ノードNxにおいて、複数の暗号鍵がアクティブな鍵に設定される場合がある。このような場合、その後の状況に応じて、設定を解除することができる。
(Example of canceling encryption key setting)
Next, an example of canceling the encryption key setting will be described. In the example described above, a plurality of encryption keys may be set as active keys at the boundary node Nx. In such a case, the setting can be canceled according to the subsequent situation.
 図42および図43は、ノードNの管理テーブルTの更新例を示す説明図である。図42および図43は、図24の状態(C)以降の状態を示している。図42では、暗号鍵K1の成功数が509回、失敗数が1083回である.暗号鍵K2はその逆となる。失敗数の設定解除に関するしきい値を1000回とした場合、暗号鍵K1は、設定解除に関するしきい値以上失敗しているため、有効/無効フラグが「0」に更新される。これにより、暗号鍵K1は非アクティブとなり、その後は、暗号鍵K2だけで暗号化および復号がおこなわれる。 42 and 43 are explanatory diagrams showing examples of updating the management table T of the node N. FIG. 42 and 43 show states after the state (C) in FIG. In FIG. 42, the number of successes of the encryption key K1 is 509 times and the number of failures is 1083 times. The encryption key K2 is reversed. When the threshold value regarding the setting cancellation of the number of failures is 1000 times, since the encryption key K1 has failed more than the threshold value regarding the setting cancellation, the valid / invalid flag is updated to “0”. As a result, the encryption key K1 becomes inactive, and thereafter encryption and decryption are performed using only the encryption key K2.
 また、図43では、有効/無効フラグが「1」に更新される。これにより、暗号鍵K1は一定の制限下でのみアクティブとなり、暗号鍵K2で復号できなかった場合に限り、暗号鍵K1が復号に用いられることとなる。 In FIG. 43, the valid / invalid flag is updated to “1”. As a result, the encryption key K1 becomes active only under certain restrictions, and the encryption key K1 is used for decryption only when it cannot be decrypted with the encryption key K2.
 図44は、ノードNの鍵設定解除処理手順を示すフローチャート(その1)である。まずノードNは、所定期間経過するのを待ち受け(ステップS4401:No)、所定期間が経過した場合(ステップS4401:Yes)、ノードNは、判断部2005により、成功数が設定解除に関するしきい値以下となる暗号鍵(以下、「特定鍵」)があるか否かを判断する(ステップS4402)。特定鍵がない場合(ステップS4402:No)、ステップS4407に移行する。 FIG. 44 is a flowchart (part 1) showing the key setting release processing procedure of the node N. First, the node N waits for a predetermined period to elapse (step S4401: No), and if the predetermined period elapses (step S4401: Yes), the node N determines that the success number is a threshold value for canceling the setting by the determination unit 2005. It is determined whether or not there is an encryption key (hereinafter, “specific key”) (step S4402). When there is no specific key (step S4402: No), it transfers to step S4407.
 一方、特定鍵である場合(ステップS4402:Yes)、ノードNは、判断部2005により、いずれも設定解除に関するしきい値以下であるか否かを判断する(ステップS4403)。いずれも設定解除に関するしきい値以下でない場合(ステップS4403:No)、ノードNは、設定部2007により、特定鍵を非アクティブな鍵に設定する(ステップS4404)。 On the other hand, when it is a specific key (step S4402: Yes), the node N determines whether or not both are equal to or less than a threshold value related to setting cancellation (step S4403). If none of them is equal to or less than the threshold value related to the setting cancellation (step S4403: No), the node N sets the specific key as an inactive key by the setting unit 2007 (step S4404).
 一方、いずれも設定解除に関するしきい値以下である場合(ステップS4403:Yes)、ノードNは、設定部2007により、成功数が最小の特定鍵を非アクティブな鍵に設定する(ステップS4405)。 On the other hand, if both are less than or equal to the threshold for canceling the setting (step S4403: YES), the node N sets the specific key with the smallest number of successes as an inactive key by the setting unit 2007 (step S4405).
 そして、ノードNは、ステップS4404、S4405のあと、設定解除結果を管理サーバ101に送信する(ステップS4406)。このあと、ノードNは、管理テーブルTの復号成否情報をリセットする(ステップS4407)。これにより、ノードNの鍵設定解除処理手順を終了する。これにより、通信に支障を来す設定解除に関するしきい値以下である場合に、非アクティブに設定することができる。 Then, after step S4404 and S4405, the node N transmits a setting cancellation result to the management server 101 (step S4406). Thereafter, the node N resets the decryption success / failure information of the management table T (step S4407). Thereby, the key setting cancellation processing procedure of the node N is completed. Thereby, when it is below the threshold value regarding the cancellation | release which causes trouble in communication, it can set to inactive.
 また、いずれも設定解除に関するしきい値以下である場合、相対的に成功数が最小な特定鍵のみを非アクティブな鍵に設定しているため、境界ノードNxから見て、通信効率の悪い方のアドホックネットワークの暗号鍵を非アクティブに設定することができる。 If both are below the threshold for canceling the setting, only the specific key with the relatively smallest number of successes is set as an inactive key. The ad hoc network encryption key can be set inactive.
 なお、非アクティブな設定をした場合、その暗号鍵を削除してもよく、副鍵としてもよい。特に、成功数0の一定期間が複数回連続した場合、撤去された可能性が高い。このような場合、非アクティブな鍵を保持していても無駄であるため、削除するものとする。これにより、ノードNの省メモリ化を図ることができる。 Note that if an inactive setting is made, the encryption key may be deleted or a sub key may be used. In particular, if a certain period of success number 0 continues several times, there is a high possibility that it has been removed. In such a case, even if an inactive key is held, it is useless and is deleted. Thereby, the memory saving of the node N can be achieved.
 図45は、ノードNの鍵設定解除処理手順を示すフローチャート(その2)である。まずノードNは、所定期間経過するのを待ち受け(ステップS4501:No)、所定期間が経過した場合(ステップS4501:Yes)、ノードNは、設定部2007により、成功数が最小の特定鍵を非アクティブな鍵に設定する(ステップS4502)。 FIG. 45 is a flowchart (part 2) showing the key setting release processing procedure of the node N. First, the node N waits for a predetermined period to elapse (step S4501: No), and when the predetermined period elapses (step S4501: Yes), the node N sets the specific key with the smallest number of successes by the setting unit 2007. An active key is set (step S4502).
 そして、ノードNは、設定解除結果を管理サーバ101に送信する(ステップS4503)。このあと、ノードNは、管理テーブルTの復号成否情報をリセットする(ステップS4504)。これにより、ノードNの鍵設定解除処理手順を終了する。これにより、成功数の相対的な評価により、非アクティブな鍵を設定することができる。 Then, the node N transmits the setting cancellation result to the management server 101 (step S4503). Thereafter, the node N resets the decryption success / failure information in the management table T (step S4504). Thereby, the key setting cancellation processing procedure of the node N is completed. Thereby, an inactive key can be set by relative evaluation of the number of successes.
 すなわち、相対的に成功数が最小な特定鍵のみを非アクティブな鍵に設定しているため、境界ノードNxから見て、通信効率の悪い方のアドホックネットワークの暗号鍵を非アクティブに設定することができる。 In other words, since only the specific key with the relatively smallest number of successes is set as an inactive key, the encryption key of the ad hoc network with the lower communication efficiency is set inactive as viewed from the border node Nx. Can do.
 また、非アクティブな設定をした場合、その暗号鍵を削除してもよく、副鍵としてもよい。特に、成功数0の一定期間が複数回連続した場合、撤去された可能性が高い。このような場合、非アクティブな鍵を保持していても無駄であるため、削除するものとする。これにより、ノードNの省メモリ化を図ることができる。 Also, when inactive settings are made, the encryption key may be deleted or used as a sub key. In particular, if a certain period of success number 0 continues several times, there is a high possibility that it has been removed. In such a case, even if an inactive key is held, it is useless and is deleted. Thereby, the memory saving of the node N can be achieved.
 以上説明したように、本実施の形態によれば、アドホックネットワークAi内のノードNの通信圏内に、事後的に他のアドホックネットワークAjのノードNが設置された場合、アドホックネットワークAi内のノードNは、境界ノードNxとなる。この場合、作業員OPが他のアドホックネットワークでの暗号鍵Kjの設定作業のために現場にいかなくても、境界ノードNxが自律的に暗号鍵Kjを設定することができる。したがって、新規追加作業の効率化を図ることができる。 As described above, according to the present embodiment, when a node N of another ad hoc network Aj is installed in the communication area of the node N in the ad hoc network Ai, the node N in the ad hoc network Ai is subsequently installed. Becomes the boundary node Nx. In this case, the boundary node Nx can autonomously set the encryption key Kj even if the worker OP does not go to the site for setting work of the encryption key Kj in another ad hoc network. Therefore, the efficiency of new addition work can be improved.
 また、暗号鍵Kiが設定されている境界ノードNxに暗号鍵Kjが新規追加されると、他のアドホックネットワークAjのノードNとの方が通信効率がよい場合は、他のアドホックネットワークAj内のゲートウェイGjを選択することができる。したがって、アドホックネットワークAi,Ajの自律的な選択が可能となり、ロバスト性の向上を図ることができる。 In addition, when the encryption key Kj is newly added to the boundary node Nx in which the encryption key Ki is set, if communication efficiency with the node N of the other ad hoc network Aj is better, the communication in the other ad hoc network Aj A gateway Gj can be selected. Therefore, the ad hoc networks Ai and Aj can be autonomously selected, and robustness can be improved.
 また、暗号鍵Kjが新規追加された時点で、既存の暗号鍵Kiを非アクティブな鍵に設定することもできる。これにより、通信効率のよい方の暗号鍵Kjのみでマルチホップ通信をおこなうことができ、無駄なパケット通信の低減化を図ることができる。 Also, when the encryption key Kj is newly added, the existing encryption key Ki can be set as an inactive key. As a result, multihop communication can be performed using only the encryption key Kj having the higher communication efficiency, and wasteful packet communication can be reduced.
 また、非アクティブな鍵については、ノードNxにおいて削除することとしてもよい。これにより、ノードNxの省メモリ化を図ることができる。 Further, inactive keys may be deleted at the node Nx. Thereby, the memory saving of the node Nx can be achieved.
 また、アクティブな鍵を1つだけにすることで、境界ノードNxの配下に設置される新規ノードについては、上述したダウンストリーム型またはアップストリーム型で鍵設定作業を行う場合、アクティブな鍵のみ設定することができる。これにより、配下の新規ノードに複数個鍵が設定されなくなるため、複数の暗号鍵を用いた場合のデータ処理および通信量の増加を防止することができる。 In addition, by setting only one active key, for the new node installed under the boundary node Nx, when performing the key setting work in the downstream type or the upstream type described above, only the active key is set. can do. As a result, a plurality of keys are not set in the new subordinate node, and therefore it is possible to prevent an increase in data processing and communication volume when a plurality of encryption keys are used.
 また、事後的に、境界ノードNxが属することとなった複数のアドホックネットワークAi,Ajのうちいずれかが撤去される場合がある。このような場合でも、復号の失敗数を計数することで、撤去された方の暗号鍵Kjが不要であることが判明するため、非アクティブな鍵に設定することで、無駄なデータ処理および通信量の増加を防止することができる。なお、一定期間(または連続期間)成功数が0である場合、撤去されたものとして、非アクティブに設定された暗号鍵を削除することとしてもよい。これにより、ノードNxの省メモリ化を図ることができる。 In addition, after the fact, one of the plurality of ad hoc networks Ai, Aj to which the boundary node Nx belongs may be removed. Even in such a case, by counting the number of decryption failures, it becomes clear that the removed encryption key Kj is unnecessary, so by setting it to an inactive key, wasteful data processing and communication An increase in the amount can be prevented. When the number of successes for a certain period (or continuous period) is 0, the encryption key set as inactive may be deleted as having been removed. Thereby, the memory saving of the node Nx can be achieved.
2001 受信部
2002 検出部
2003 復号部
2004 計数部
2005 判断部
2006 送信部
3201 受信部
3202 復号部
3203 判定部
3204 抽出部
3205 暗号化処理部
3206 送信部
110 暗号鍵DB
T 管理テーブル
2001 receiving unit 2002 detecting unit 2003 decrypting unit 2004 counting unit 2005 determining unit 2006 transmitting unit 3201 receiving unit 3202 decrypting unit 3203 determining unit 3204 extracting unit 3205 encryption processing unit 3206 transmitting unit 110 encryption key DB
T management table

Claims (53)

  1.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、
     受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出する検出工程と、
     前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、前記検出工程によって検出されたゲートウェイごとに計数する計数工程と、
     前記計数工程によって計数された失敗数が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断する判断工程と、
     前記判断工程によって前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記複数のアドホックネットワークの各ゲートウェイ固有の鍵を記憶するサーバに、前記いずれかのアドホックネットワーク経由で送信する送信工程と、
     前記送信工程によって前記取得要求が送信された結果、前記サーバに記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信する受信工程と、
     前記受信工程によって受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する設定工程と、
     を実行することを特徴とする鍵設定方法。
    A node in any one of the plurality of ad hoc networks that performs encryption and decryption with a gateway-specific first key in any one of the ad hoc networks;
    A detection step of detecting, for each encrypted packet, a gateway that is a destination or source of the received encrypted packet;
    A counting step of counting, for each gateway detected by the detection step, the number of failures in which the encrypted packet could not be decrypted with the first key;
    A determination step of determining, for each gateway, whether or not the number of failures counted by the counting step is equal to or greater than a threshold value related to key acquisition;
    The acquisition request for the second key specific to the gateway determined to be equal to or greater than the threshold value in the determination step is sent to the server storing the key specific to each gateway of the plurality of ad hoc networks via any one of the ad hoc networks. A transmission process to transmit;
    A reception step of receiving the second key stored in the server as a result of the acquisition request being transmitted by the transmission step from the server via any one of the ad hoc networks;
    A setting step of setting the second key received by the receiving step as a key for performing encryption and decryption;
    The key setting method characterized by performing.
  2.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、
     受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出する検出工程と、
     前記暗号化パケットを前記第1の鍵で復号できた成功数を、前記検出工程によって検出されたゲートウェイごとに計数するとともに、前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、前記ゲートウェイごとに計数する計数工程と、
     前記計数工程によって計数された前記失敗数から前記成功数を引いた差分が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断する判断工程と、
     前記判断工程によって前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記複数のアドホックネットワークの各ゲートウェイ固有の鍵を記憶するサーバに、前記いずれかのアドホックネットワーク経由で送信する送信工程と、
     前記送信工程によって前記取得要求が送信された結果、前記サーバに記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信する受信工程と、
     前記受信工程によって受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する設定工程と、
     を実行することを特徴とする鍵設定方法。
    A node in any one of the plurality of ad hoc networks that performs encryption and decryption with a gateway-specific first key in any one of the ad hoc networks;
    A detection step of detecting, for each encrypted packet, a gateway that is a destination or source of the received encrypted packet;
    The number of successes in which the encrypted packet could be decrypted with the first key is counted for each gateway detected by the detection step, and the number of failures in which the encrypted packet could not be decrypted with the first key. Counting step for each gateway;
    A determination step of determining, for each gateway, whether or not a difference obtained by subtracting the number of successes from the number of failures counted by the counting step is greater than or equal to a threshold value related to key acquisition;
    The acquisition request for the second key specific to the gateway determined to be equal to or greater than the threshold value in the determination step is sent to the server storing the key specific to each gateway of the plurality of ad hoc networks via any one of the ad hoc networks. A transmission process to transmit;
    A reception step of receiving the second key stored in the server as a result of the acquisition request being transmitted by the transmission step from the server via any one of the ad hoc networks;
    A setting step of setting the second key received by the receiving step as a key for performing encryption and decryption;
    The key setting method characterized by performing.
  3.  前記送信工程によって前記取得要求が送信された結果、前記サーバ内の前記第2の鍵を前記第1の鍵で暗号化した暗号化パケットを前記第1の鍵で復号する復号工程を実行し、
     前記設定工程は、
     前記復号工程によって復号された前記第2の鍵を、前記暗号化および復号をおこなう鍵に設定することを特徴とする請求項1または2に記載の鍵設定方法。
    As a result of the acquisition request being transmitted by the transmission step, executing a decryption step of decrypting the encrypted packet obtained by encrypting the second key in the server with the first key with the first key;
    The setting step includes
    3. The key setting method according to claim 1, wherein the second key decrypted in the decrypting step is set as a key for performing the encryption and decryption.
  4.  前記設定工程は、
     前記第2の鍵を暗号化および復号をおこなう鍵に設定した場合、前記第1の鍵を暗号化および復号をおこなわない鍵に設定することを特徴とする請求項1または2に記載の鍵設定方法。
    The setting step includes
    3. The key setting according to claim 1, wherein when the second key is set as a key that performs encryption and decryption, the first key is set as a key that does not perform encryption and decryption. 4. Method.
  5.  前記設定工程は、
     前記第2の鍵を暗号化および復号をおこなう鍵に設定した場合、前記第1の鍵を削除することを特徴とする請求項1または2に記載の鍵設定方法。
    The setting step includes
    3. The key setting method according to claim 1, wherein when the second key is set as a key for performing encryption and decryption, the first key is deleted.
  6.  前記設定工程は、
     前記第2の鍵を暗号化および復号をおこなう鍵に設定した場合、前記第2の鍵で復号できなかった場合に限り、前記第1の鍵を暗号化および復号をおこなう鍵に設定することを特徴とする請求項1または2に記載の鍵設定方法。
    The setting step includes
    When the second key is set as a key for encryption and decryption, the first key is set as a key for encryption and decryption only when the second key cannot be decrypted. The key setting method according to claim 1 or 2, characterized in that:
  7.  前記計数工程は、
     前記設定工程によって前記第2の鍵が設定された後に受信された暗号化パケットを復号できた前記第2の鍵の設定後の成功数を、前記第1の鍵と前記第2の鍵の各々について計数し、
     前記判断工程は、
     前記計数工程によって計数された前記第2の鍵の設定後の成功数が設定解除に関するしきい値以下であるか否かを、前記第1の鍵と前記第2の鍵の各々について判断し、
     前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記判断工程によって前記設定解除に関するしきい値以下と判断された鍵を、前記暗号化および復号をおこなわない鍵に設定することを特徴とする請求項1または2に記載の鍵設定方法。
    The counting step includes
    The number of successes after setting the second key that was able to decrypt the encrypted packet received after the second key was set by the setting step is determined for each of the first key and the second key. Counting about
    The determination step includes
    It is determined for each of the first key and the second key whether the number of successes after setting the second key counted by the counting step is equal to or less than a threshold value related to setting cancellation,
    The setting step includes
    The key determined to be not more than the threshold value related to the cancellation of the setting by the determining step among the first key and the second key is set as a key that is not subjected to the encryption and decryption. Item 3. A key setting method according to item 1 or 2.
  8.  前記設定工程は、
     前記判断工程によって前記設定解除に関するしきい値以下と判断された鍵を削除することを特徴とする請求項7に記載の鍵設定方法。
    The setting step includes
    The key setting method according to claim 7, wherein the key determined by the determining step to be equal to or less than a threshold value related to the setting cancellation is deleted.
  9.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記判断工程によって前記設定解除に関するしきい値以下と判断された一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項7に記載の鍵設定方法。
    The setting step includes
    Of the first key and the second key, one key determined by the determining step to be equal to or less than the threshold value related to the setting cancellation is the other key determined to be larger than the threshold value related to the setting cancellation. 8. The key setting method according to claim 7, wherein the key is set to a key that only performs decryption only when the key cannot be decrypted.
  10.  前記設定工程は、
     前記第1の鍵および前記第2の鍵がともに前記設定解除に関するしきい値以下と判断された場合、前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を、前記暗号化および復号をおこなわない鍵に設定することを特徴とする請求項1または2に記載の鍵設定方法。
    The setting step includes
    Success in setting the second key of the first key and the second key when both the first key and the second key are determined to be equal to or less than the threshold value related to the cancellation of the setting 3. The key setting method according to claim 1, wherein a key having a smaller number is set as a key that does not perform the encryption and decryption.
  11.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を削除することを特徴とする請求項10に記載の鍵設定方法。
    The setting step includes
    The key setting method according to claim 10, wherein a key having a smaller number of successes after the setting of the second key is deleted from the first key and the second key.
  12.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項10に記載の鍵設定方法。
    The setting step includes
    Decrypting one of the first key and the second key that has a smaller number of successes after setting the second key with the other key determined to be larger than the threshold value related to the cancellation of the setting 11. The key setting method according to claim 10, wherein the key is set to a key for performing only decryption only when it cannot be performed.
  13.  前記計数工程は、
     前記設定工程によって前記第2の鍵が設定された後に受信された暗号化パケットを復号できた前記第2の鍵の設定後の成功数を、前記第1の鍵と前記第2の鍵の各々について計数し、
     前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を、暗号化および復号をおこなわない鍵に設定することを特徴とする請求項1または2に記載の鍵設定方法。
    The counting step includes
    The number of successes after setting the second key that was able to decrypt the encrypted packet received after the second key was set by the setting step is determined for each of the first key and the second key. Counting about
    The setting step includes
    2. The key having a smaller number of successes after setting the second key out of the first key and the second key is set as a key that is not encrypted and decrypted. Or the key setting method of 2.
  14.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を削除することを特徴とする請求項13に記載の鍵設定方法。
    The setting step includes
    14. The key setting method according to claim 13, wherein a key having a smaller number of successes after setting the second key is deleted from the first key and the second key.
  15.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない一方の鍵を、他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項13に記載の鍵設定方法。
    The setting step includes
    Of the first key and the second key, one key having a small number of successes after the setting of the second key is set as a key that only performs decryption when the other key cannot be decrypted. The key setting method according to claim 13.
  16.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵および他のアドホックネットワーク内の他のゲートウェイ固有の第2の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、
     受信された暗号化パケットごとに、前記第1の鍵で復号できた成功数を計数するとともに、前記第2の鍵で復号できた成功数を計数する計数工程と、
     前記計数工程によって計数された各成功数が設定解除に関するしきい値以下であるか否かを判断する判断工程と、
     前記第1の鍵および前記第2の鍵のうち前記判断工程によって前記設定解除に関するしきい値以下と判断された鍵を、前記暗号化および復号をおこなわない鍵に設定する設定工程と、
     を実行することを特徴とする鍵設定方法。
    In any one of the plurality of ad hoc networks, encryption and decryption is performed using a gateway-specific first key in one of the ad hoc networks and a second key specific to another gateway in the other ad hoc network. Node
    For each received encrypted packet, a counting step of counting the number of successes that can be decrypted with the first key and counting the number of successes that can be decrypted with the second key;
    A determination step of determining whether or not each success number counted by the counting step is equal to or less than a threshold value related to setting cancellation;
    A setting step of setting a key that is determined to be equal to or less than a threshold value related to the cancellation of the setting by the determination step among the first key and the second key as a key that is not to be encrypted and decrypted;
    The key setting method characterized by performing.
  17.  前記設定工程は、
     前記判断工程によって前記設定解除に関するしきい値以下と判断された鍵を削除することを特徴とする請求項16に記載の鍵設定方法。
    The setting step includes
    The key setting method according to claim 16, wherein the key determined to be equal to or less than a threshold value related to the cancellation of the setting by the determining step is deleted.
  18.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記判断工程によって前記設定解除に関するしきい値以下と判断された一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項16に記載の鍵設定方法。
    The setting step includes
    Of the first key and the second key, one key determined by the determining step to be equal to or less than the threshold value related to the setting cancellation is the other key determined to be larger than the threshold value related to the setting cancellation. The key setting method according to claim 16, wherein the key is set to a key that only performs decryption only when the key cannot be decrypted.
  19.  前記設定工程は、
     前記第1の鍵および前記第2の鍵がともに前記設定解除に関するしきい値以下と判断された場合、前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を、前記暗号化および復号をおこなわない鍵に設定することを特徴とする請求項16に記載の鍵設定方法。
    The setting step includes
    Success in setting the second key of the first key and the second key when both the first key and the second key are determined to be equal to or less than the threshold value related to the cancellation of the setting The key setting method according to claim 16, wherein a key having a smaller number is set as a key that does not perform the encryption and decryption.
  20.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を削除することを特徴とする請求項19に記載の鍵設定方法。
    The setting step includes
    20. The key setting method according to claim 19, wherein a key having a smaller number of successes after setting the second key is deleted from the first key and the second key.
  21.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない一方の鍵を、他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項19に記載の鍵設定方法。
    The setting step includes
    Of the first key and the second key, one key having a small number of successes after the setting of the second key is set as a key that only performs decryption when the other key cannot be decrypted. The key setting method according to claim 19.
  22.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵および他のアドホックネットワーク内の他のゲートウェイ固有の第2の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードが、
     受信された暗号化パケットごとに、前記第1の鍵で復号できた成功数を計数するとともに、前記第2の鍵で復号できた成功数を計数する計数工程と、
     前記第1の鍵および前記第2の鍵のうち前記成功数が少ない方の鍵を、前記暗号化および復号をおこなわない鍵に設定する設定工程と、
     を実行することを特徴とする鍵設定方法。
    In any one of the plurality of ad hoc networks, encryption and decryption is performed using a gateway-specific first key in one of the ad hoc networks and a second key specific to another gateway in the other ad hoc network. Node
    For each received encrypted packet, a counting step of counting the number of successes that can be decrypted with the first key and counting the number of successes that can be decrypted with the second key;
    A setting step of setting the key having the smaller number of successes among the first key and the second key as a key that does not perform the encryption and decryption;
    The key setting method characterized by performing.
  23.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記成功数が少ない方の鍵を削除することを特徴とする請求項22に記載の鍵設定方法。
    The setting step includes
    23. The key setting method according to claim 22, wherein the key having the smaller number of successes out of the first key and the second key is deleted.
  24.  前記設定工程は、
     前記第1の鍵および前記第2の鍵のうち前記成功数が少ない一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り、前記暗号化および復号をおこなう鍵に設定することを特徴とする請求項22に記載の鍵設定方法。
    The setting step includes
    Only when the one of the first key and the second key having the smaller number of successes cannot be decrypted by the other key determined to be larger than the threshold value related to the cancellation of the setting. 23. The key setting method according to claim 22, wherein the key is set to a key for performing encryption and decryption.
  25.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードであって、
     受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出する検出手段と、
     前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、前記検出手段によって検出されたゲートウェイごとに計数する計数手段と、
     前記計数手段によって計数された失敗数が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断する判断手段と、
     前記判断手段によって前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記複数のアドホックネットワークの各ゲートウェイ固有の鍵を記憶するサーバに、前記いずれかのアドホックネットワーク経由で送信する送信手段と、
     前記送信手段によって前記取得要求が送信された結果、前記サーバに記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信する受信手段と、
     前記受信手段によって受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する設定手段と、
     を備えることを特徴とするノード。
    A node in any one of the plurality of ad hoc networks that performs encryption and decryption with a gateway-specific first key in the ad hoc network;
    Detection means for detecting the destination or source gateway of the received encrypted packet for each encrypted packet;
    Counting means for counting the number of failures that could not decrypt the encrypted packet with the first key for each gateway detected by the detecting means;
    Determining means for determining, for each gateway, whether or not the number of failures counted by the counting means is greater than or equal to a threshold value related to key acquisition;
    The acquisition request for the second key specific to the gateway determined by the determination means to be equal to or greater than the threshold value is sent to the server storing the key specific to each gateway of the plurality of ad hoc networks via any one of the ad hoc networks. A transmission means for transmitting;
    Receiving means for receiving the second key stored in the server as a result of the acquisition request being transmitted by the transmitting means from the server via any one of the ad hoc networks;
    Setting means for setting the second key received by the receiving means as a key for encryption and decryption;
    A node characterized by comprising:
  26.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードであって、
     受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出する検出手段と、
     前記暗号化パケットを前記第1の鍵で復号できた成功数を、前記検出手段によって検出されたゲートウェイごとに計数するとともに、前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、前記ゲートウェイごとに計数する計数手段と、
     前記計数手段によって計数された前記失敗数から前記成功数を引いた差分が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断する判断手段と、
     前記判断手段によって前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記複数のアドホックネットワークの各ゲートウェイ固有の鍵を記憶するサーバに、前記いずれかのアドホックネットワーク経由で送信する送信手段と、
     前記送信手段によって前記取得要求が送信された結果、前記サーバに記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信する受信手段と、
     前記受信手段によって受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する設定手段と、
     を備えることを特徴とするノード。
    A node in any one of the plurality of ad hoc networks that performs encryption and decryption with a gateway-specific first key in the ad hoc network;
    Detection means for detecting the destination or source gateway of the received encrypted packet for each encrypted packet;
    The number of successes in which the encrypted packet could be decrypted with the first key is counted for each gateway detected by the detection means, and the number of failures in which the encrypted packet could not be decrypted with the first key Counting means for counting each gateway;
    Determining means for determining for each gateway whether or not a difference obtained by subtracting the number of successes from the number of failures counted by the counting means is greater than or equal to a threshold for key acquisition;
    The acquisition request for the second key specific to the gateway determined by the determination means to be equal to or greater than the threshold value is sent to the server storing the key specific to each gateway of the plurality of ad hoc networks via any one of the ad hoc networks. A transmission means for transmitting;
    Receiving means for receiving the second key stored in the server as a result of the acquisition request being transmitted by the transmitting means from the server via any one of the ad hoc networks;
    Setting means for setting the second key received by the receiving means as a key for encryption and decryption;
    A node characterized by comprising:
  27.  前記送信手段によって前記取得要求が送信された結果、前記サーバ内の前記第2の鍵を前記第1の鍵で暗号化した暗号化パケットを前記第1の鍵で復号する復号手段を備え、
     前記設定手段は、
     前記復号手段によって復号された前記第2の鍵を、前記暗号化および復号をおこなう鍵に設定することを特徴とする請求項25または26に記載のノード。
    As a result of the acquisition request being transmitted by the transmission means, the decryption means for decrypting the encrypted packet obtained by encrypting the second key in the server with the first key with the first key;
    The setting means includes
    27. The node according to claim 25 or 26, wherein the second key decrypted by the decrypting means is set as a key for performing the encryption and decryption.
  28.  前記設定手段は、
     前記第2の鍵を暗号化および復号をおこなう鍵に設定した場合、前記第1の鍵を暗号化および復号をおこなわない鍵に設定することを特徴とする請求項25または26に記載のノード。
    The setting means includes
    27. The node according to claim 25 or 26, wherein when the second key is set as a key that performs encryption and decryption, the first key is set as a key that does not perform encryption and decryption.
  29.  前記設定手段は、
     前記第2の鍵を暗号化および復号をおこなう鍵に設定した場合、前記第1の鍵を削除することを特徴とする請求項25または26に記載のノード。
    The setting means includes
    27. The node according to claim 25 or 26, wherein when the second key is set as a key for performing encryption and decryption, the first key is deleted.
  30.  前記設定手段は、
     前記第2の鍵を暗号化および復号をおこなう鍵に設定した場合、前記第2の鍵で復号できなかった場合に限り、前記第1の鍵を暗号化および復号をおこなう鍵に設定することを特徴とする請求項25または26に記載のノード。
    The setting means includes
    When the second key is set as a key for encryption and decryption, the first key is set as a key for encryption and decryption only when the second key cannot be decrypted. 27. A node according to claim 25 or 26, characterized in that:
  31.  前記計数手段は、
     前記設定手段によって前記第2の鍵が設定された後に受信された暗号化パケットを復号できた前記第2の鍵の設定後の成功数を、前記第1の鍵と前記第2の鍵の各々について計数し、
     前記判断手段は、
     前記計数手段によって計数された前記第2の鍵の設定後の成功数が設定解除に関するしきい値以下であるか否かを、前記第1の鍵と前記第2の鍵の各々について判断し、
     前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記判断手段によって前記設定解除に関するしきい値以下と判断された鍵を、前記暗号化および復号をおこなわない鍵に設定することを特徴とする請求項25または26に記載のノード。
    The counting means includes
    The number of successes after the setting of the second key that was able to decrypt the encrypted packet received after the setting of the second key by the setting means is set as the first key and the second key, respectively. Counting about
    The determination means includes
    It is determined for each of the first key and the second key whether the number of successes after setting of the second key counted by the counting means is equal to or less than a threshold value related to setting cancellation,
    The setting means includes
    The key that is determined by the determining means to be equal to or less than the threshold value related to the cancellation of the setting among the first key and the second key is set as a key that is not subjected to the encryption and decryption. Item 27. The node according to item 25 or 26.
  32.  前記設定手段は、
     前記判断手段によって前記設定解除に関するしきい値以下と判断された鍵を削除することを特徴とする請求項31に記載のノード。
    The setting means includes
    32. The node according to claim 31, wherein a key determined by the determining means to be equal to or less than a threshold value related to the cancellation of the setting is deleted.
  33.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記判断手段によって前記設定解除に関するしきい値以下と判断された一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項31に記載のノード。
    The setting means includes
    Of the first key and the second key, one key determined by the determining means to be equal to or lower than the threshold value related to the cancellation of setting is the other key determined to be larger than the threshold value related to the setting cancellation. 32. The node according to claim 31, wherein the node is set to a key that only performs decryption when the key cannot be decrypted.
  34.  前記設定手段は、
     前記第1の鍵および前記第2の鍵がともに前記設定解除に関するしきい値以下と判断された場合、前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を、前記暗号化および復号をおこなわない鍵に設定することを特徴とする請求項25または26に記載のノード。
    The setting means includes
    Success in setting the second key of the first key and the second key when both the first key and the second key are determined to be equal to or less than the threshold value related to the cancellation of the setting 27. The node according to claim 25 or 26, wherein a key having a smaller number is set to a key that does not perform the encryption and decryption.
  35.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を削除することを特徴とする請求項34に記載のノード。
    The setting means includes
    35. The node according to claim 34, wherein a key having a smaller number of successes after setting the second key is deleted from the first key and the second key.
  36.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項34に記載のノード。
    The setting means includes
    Decrypting one of the first key and the second key that has a smaller number of successes after setting the second key with the other key determined to be larger than the threshold value related to the cancellation of the setting 35. The node according to claim 34, wherein the node is set to a key for performing only decryption only when it cannot be performed.
  37.  前記計数手段は、
     前記設定手段によって前記第2の鍵が設定された後に受信された暗号化パケットを復号できた前記第2の鍵の設定後の成功数を、前記第1の鍵と前記第2の鍵の各々について計数し、
     前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を、暗号化および復号をおこなわない鍵に設定することを特徴とする請求項25または26に記載のノード。
    The counting means includes
    The number of successes after the setting of the second key that was able to decrypt the encrypted packet received after the setting of the second key by the setting means is set as the first key and the second key, respectively. Counting about
    The setting means includes
    26. The key having the smaller number of successes after setting the second key out of the first key and the second key is set as a key that is not encrypted and decrypted. Or the node according to 26.
  38.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を削除することを特徴とする請求項37に記載のノード。
    The setting means includes
    38. The node according to claim 37, wherein a key having a smaller number of successes after setting the second key is deleted from the first key and the second key.
  39.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない一方の鍵を、他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項37に記載のノード。
    The setting means includes
    Of the first key and the second key, one key having a small number of successes after the setting of the second key is set as a key that only performs decryption when the other key cannot be decrypted. 38. The node of claim 37.
  40.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵および他のアドホックネットワーク内の他のゲートウェイ固有の第2の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードであって、
     受信された暗号化パケットごとに、前記第1の鍵で復号できた成功数を計数するとともに、前記第2の鍵で復号できた成功数を計数する計数手段と、
     前記計数手段によって計数された各成功数が設定解除に関するしきい値以下であるか否かを判断する判断手段と、
     前記第1の鍵および前記第2の鍵のうち前記判断手段によって前記設定解除に関するしきい値以下と判断された鍵を、前記暗号化および復号をおこなわない鍵に設定する設定手段と、
     を備えることを特徴とするノード。
    In any one of the plurality of ad hoc networks, encryption and decryption is performed using a gateway-specific first key in one of the ad hoc networks and a second key specific to another gateway in the other ad hoc network. A node,
    Counting means for counting the number of successes that can be decrypted with the first key for each received encrypted packet, and for counting the number of successes that can be decrypted with the second key;
    Determining means for determining whether each success number counted by the counting means is equal to or less than a threshold value related to setting cancellation;
    A setting unit that sets a key that is determined to be equal to or less than a threshold value related to the cancellation of setting by the determination unit among the first key and the second key, as a key that does not perform the encryption and decryption;
    A node characterized by comprising:
  41.  前記設定手段は、
     前記判断手段によって前記設定解除に関するしきい値以下と判断された鍵を削除することを特徴とする請求項40に記載のノード。
    The setting means includes
    41. The node according to claim 40, wherein the key determined by the determining means to be equal to or less than a threshold value related to the setting cancellation is deleted.
  42.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記判断手段によって前記設定解除に関するしきい値以下と判断された一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項41に記載のノード。
    The setting means includes
    Of the first key and the second key, one key determined by the determining means to be equal to or lower than the threshold value related to the cancellation of setting is the other key determined to be larger than the threshold value related to the setting cancellation. 42. The node according to claim 41, wherein the node is set to a key that only performs decryption when the key cannot be decrypted.
  43.  前記設定手段は、
     前記第1の鍵および前記第2の鍵がともに前記設定解除に関するしきい値以下と判断された場合、前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を、前記暗号化および復号をおこなわない鍵に設定することを特徴とする請求項41に記載のノード。
    The setting means includes
    Success in setting the second key of the first key and the second key when both the first key and the second key are determined to be equal to or less than the threshold value related to the cancellation of the setting 42. The node according to claim 41, wherein a key having a smaller number is set as a key that does not perform the encryption and decryption.
  44.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない方の鍵を削除することを特徴とする請求項43に記載のノード。
    The setting means includes
    44. The node according to claim 43, wherein a key having a smaller number of successes after setting the second key is deleted from the first key and the second key.
  45.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記第2の鍵の設定後の成功数が少ない一方の鍵を、他方の鍵で復号できなかった場合に限り復号のみをおこなう鍵に設定することを特徴とする請求項43に記載のノード。
    The setting means includes
    Of the first key and the second key, one key having a small number of successes after the setting of the second key is set as a key that only performs decryption when the other key cannot be decrypted. 44. The node of claim 43.
  46.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵および他のアドホックネットワーク内の他のゲートウェイ固有の第2の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードであって、
     受信された暗号化パケットごとに、前記第1の鍵で復号できた成功数を計数するとともに、前記第2の鍵で復号できた成功数を計数する計数手段と、
     前記第1の鍵および前記第2の鍵のうち前記成功数が少ない方の鍵を、前記暗号化および復号をおこなわない鍵に設定する設定手段と、
     を備えることを特徴とするノード。
    In any one of the plurality of ad hoc networks, encryption and decryption is performed using a gateway-specific first key in one of the ad hoc networks and a second key specific to another gateway in the other ad hoc network. A node,
    Counting means for counting the number of successes that can be decrypted with the first key for each received encrypted packet, and for counting the number of successes that can be decrypted with the second key;
    Setting means for setting a key having the smaller number of successes among the first key and the second key as a key that does not perform the encryption and decryption;
    A node characterized by comprising:
  47.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記成功数が少ない方の鍵を削除することを特徴とする請求項46に記載のノード。
    The setting means includes
    47. The node according to claim 46, wherein a key having the smaller number of successes out of the first key and the second key is deleted.
  48.  前記設定手段は、
     前記第1の鍵および前記第2の鍵のうち前記成功数が少ない一方の鍵を、前記設定解除に関するしきい値よりも大きいと判断された他方の鍵で復号できなかった場合に限り、前記暗号化および復号をおこなう鍵に設定することを特徴とする請求項46に記載のノード。
    The setting means includes
    Only when the one of the first key and the second key having the smaller number of successes cannot be decrypted by the other key determined to be larger than the threshold value related to the cancellation of the setting. The node according to claim 46, wherein the node is set to a key for performing encryption and decryption.
  49.  複数のアドホックネットワーク各々のゲートウェイと通信可能なサーバであって、
     前記ゲートウェイの識別情報と前記ゲートウェイ固有の鍵とを、ゲートウェイごとに記憶する記憶手段と、
     前記複数のアドホックネットワーク内のいずれかのアドホックネットワーク内のノードから、前記いずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵とは異なるゲートウェイ固有の第2の鍵の取得要求を、前記いずれかのアドホックネットワーク経由で受信する受信手段と、
     前記受信手段によって受信された前記第2の鍵の取得要求に含まれている前記第2の鍵を使用するゲートウェイの識別情報に基づいて、前記記憶手段から前記第2の鍵を抽出する抽出手段と、
     前記抽出手段によって抽出された前記第2の鍵を、前記いずれかのアドホックネットワーク経由で前記ノードに送信する送信手段と、
     を備えることを特徴とするサーバ。
    A server capable of communicating with each gateway of a plurality of ad hoc networks,
    Storage means for storing the gateway identification information and the gateway-specific key for each gateway;
    A request for acquiring a second key specific to a gateway different from a first key specific to a gateway in any one of the ad hoc networks from a node in any one of the plurality of ad hoc networks. Receiving means for receiving via an ad hoc network,
    Extraction means for extracting the second key from the storage means based on identification information of a gateway that uses the second key included in the second key acquisition request received by the reception means When,
    Transmitting means for transmitting the second key extracted by the extracting means to the node via any one of the ad hoc networks;
    A server comprising:
  50.  複数のアドホックネットワーク各々のゲートウェイと通信可能なサーバであって、
     前記ゲートウェイの識別情報と位置情報と前記ゲートウェイ固有の鍵とを、ゲートウェイごとに記憶する記憶手段と、
     前記複数のアドホックネットワーク内のいずれかのアドホックネットワーク内のノードから、前記いずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵とは異なるゲートウェイ固有の第2の鍵の取得要求を、前記いずれかのアドホックネットワーク経由で受信する受信手段と、
     前記受信手段によって受信された前記第2の鍵の取得要求に含まれている前記第2の鍵を使用するゲートウェイの識別情報に基づいて、前記記憶手段から前記第2の鍵を抽出する抽出手段と、
     前記第1の鍵を使用するゲートウェイの位置情報と前記第2の鍵を使用するゲートウェイの位置情報とに基づいて、前記第2の鍵を前記ノードに送信すべきか否かを判定する判定手段と、
     前記判定手段によって送信すべきと判定された場合、前記抽出手段によって抽出された前記第2の鍵を、前記いずれかのアドホックネットワーク経由で前記ノードに送信する送信手段と、
     を備えることを特徴とするサーバ。
    A server capable of communicating with each gateway of a plurality of ad hoc networks,
    Storage means for storing the gateway identification information, location information, and the gateway-specific key for each gateway;
    A request for acquiring a second key specific to a gateway different from a first key specific to a gateway in any one of the ad hoc networks from a node in any one of the plurality of ad hoc networks. Receiving means for receiving via an ad hoc network,
    Extraction means for extracting the second key from the storage means based on identification information of a gateway that uses the second key included in the second key acquisition request received by the reception means When,
    Determining means for determining whether or not to transmit the second key to the node based on position information of the gateway using the first key and position information of the gateway using the second key; ,
    A transmission means for transmitting the second key extracted by the extraction means to the node via any one of the ad hoc networks when it is determined by the determination means to be transmitted;
    A server comprising:
  51.  複数のアドホックネットワーク各々のゲートウェイと通信可能なサーバであって、
     前記ゲートウェイの識別情報と前記ゲートウェイ固有の鍵と他のゲートウェイ固有の鍵の使用頻度に関する履歴情報とを、ゲートウェイごとに記憶する記憶手段と、
     前記複数のアドホックネットワーク内のいずれかのアドホックネットワーク内のノードから、前記いずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵とは異なるゲートウェイ固有の第2の鍵の取得要求を、前記いずれかのアドホックネットワーク経由で受信する受信手段と、
     前記受信手段によって受信された前記第2の鍵の取得要求に含まれている前記第2の鍵を使用するゲートウェイの識別情報に基づいて、前記記憶手段から前記第2の鍵を抽出する抽出手段と、
     前記第1の鍵を使用するゲートウェイの履歴情報と前記第2の鍵を使用するゲートウェイの履歴情報とに基づいて、前記第2の鍵を前記ノードに送信すべきか否かを判定する判定手段と、
     前記判定手段によって送信すべきと判定された場合、前記抽出手段によって抽出された前記第2の鍵を、前記いずれかのアドホックネットワーク経由で前記ノードに送信する送信手段と、
     を備えることを特徴とするサーバ。
    A server capable of communicating with each gateway of a plurality of ad hoc networks,
    Storage means for storing, for each gateway, identification information of the gateway, history information regarding the use frequency of the gateway-specific key and another gateway-specific key,
    A request for acquiring a second key specific to a gateway different from a first key specific to a gateway in any one of the ad hoc networks from a node in any one of the plurality of ad hoc networks. Receiving means for receiving via an ad hoc network,
    Extraction means for extracting the second key from the storage means based on identification information of a gateway that uses the second key included in the second key acquisition request received by the reception means When,
    Determining means for determining whether or not to transmit the second key to the node based on history information of the gateway using the first key and history information of the gateway using the second key; ,
    A transmission means for transmitting the second key extracted by the extraction means to the node via any one of the ad hoc networks when it is determined by the determination means to be transmitted;
    A server comprising:
  52.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードと、前記複数のアドホックネットワーク各々のゲートウェイと通信可能であり、前記ゲートウェイの識別情報と前記ゲートウェイ固有の鍵とを、ゲートウェイごとに記憶する記憶手段を有するサーバと、を備えるネットワークシステムであって、
     前記ノードは、
     受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出する検出手段と、
     前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、前記検出手段によって検出されたゲートウェイごとに計数する計数手段と、
     前記計数手段によって計数された失敗数が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断する判断手段と、
     前記判断手段によって前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記サーバに、前記いずれかのアドホックネットワーク経由で送信する第1の送信手段と、
     前記第1の送信手段によって前記取得要求が送信された結果、前記サーバの前記記憶手段に記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信する第1の受信手段と、
     前記受信手段によって受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する設定手段と、を備え、
     前記サーバは、
     前記第1の送信手段によって送信された前記第2の鍵の取得要求を、前記いずれかのアドホックネットワーク経由で受信する第2の受信手段と、
     前記第2の受信手段によって受信された前記第2の鍵の取得要求に含まれている前記第2の鍵を使用するゲートウェイの識別情報に基づいて、前記記憶手段から前記第2の鍵を抽出する抽出手段と、
     前記抽出手段によって抽出された前記第2の鍵を、前記いずれかのアドホックネットワーク経由で前記ノードに送信する第2の送信手段と、
     を備えることを特徴とするネットワークシステム。
    It is possible to communicate with a node in any one of the ad hoc networks that performs encryption and decryption with a first key specific to the gateway in any one of the plurality of ad hoc networks, and a gateway of each of the plurality of ad hoc networks. A network system comprising: a server having storage means for storing the gateway identification information and the gateway-specific key for each gateway;
    The node is
    Detection means for detecting the destination or source gateway of the received encrypted packet for each encrypted packet;
    Counting means for counting the number of failures that could not decrypt the encrypted packet with the first key for each gateway detected by the detecting means;
    Determining means for determining, for each gateway, whether or not the number of failures counted by the counting means is greater than or equal to a threshold value related to key acquisition;
    First transmission means for transmitting the gateway-specific second key acquisition request determined by the determination means to be equal to or greater than the threshold value to the server via any one of the ad hoc networks;
    As a result of the acquisition request being transmitted by the first transmission means, the second key stored in the storage means of the server is received from the server via any one of the ad hoc networks. Receiving means;
    Setting means for setting the second key received by the receiving means as a key for performing encryption and decryption,
    The server
    Second receiving means for receiving the second key acquisition request transmitted by the first transmitting means via any one of the ad hoc networks;
    Extracting the second key from the storage unit based on identification information of the gateway using the second key included in the second key acquisition request received by the second receiving unit Extraction means to
    Second transmission means for transmitting the second key extracted by the extraction means to the node via any one of the ad hoc networks;
    A network system comprising:
  53.  複数のアドホックネットワークのいずれかのアドホックネットワーク内のゲートウェイ固有の第1の鍵で暗号化および復号をおこなう前記いずれかのアドホックネットワーク内のノードと、前記複数のアドホックネットワーク各々のゲートウェイと通信可能であり、前記ゲートウェイの識別情報と前記ゲートウェイ固有の鍵とを、ゲートウェイごとに記憶する記憶手段を有するサーバと、を備えるネットワークシステムであって、
     前記ノードは、
     受信された暗号化パケットのあて先または送信元となるゲートウェイを、暗号化パケットごとに検出する検出手段と、
     前記暗号化パケットを前記第1の鍵で復号できた成功数を、前記検出手段によって検出されたゲートウェイごとに計数するとともに、前記暗号化パケットを前記第1の鍵で復号できなかった失敗数を、前記ゲートウェイごとに計数する計数手段と、
     前記計数手段によって計数された前記失敗数から前記成功数を引いた差分が鍵取得に関するしきい値以上であるか否かを、前記ゲートウェイごとに判断する判断手段と、
     前記判断手段によって前記しきい値以上と判断されたゲートウェイ固有の第2の鍵の取得要求を、前記サーバに、前記いずれかのアドホックネットワーク経由で送信する第1の送信手段と、
     前記第1の送信手段によって前記取得要求が送信された結果、前記サーバに記憶されている前記第2の鍵を、前記サーバから前記いずれかのアドホックネットワーク経由で受信する第1の受信手段と、
     前記第1の受信手段によって受信された前記第2の鍵を、暗号化および復号をおこなう鍵に設定する設定手段と、を備え、
     前記サーバは、
     前記第1の送信手段によって送信された前記第2の鍵の取得要求を、前記いずれかのアドホックネットワーク経由で受信する第2の受信手段と、
     前記第2の受信手段によって受信された前記第2の鍵の取得要求に含まれている前記第2の鍵を使用するゲートウェイの識別情報に基づいて、前記記憶手段から前記第2の鍵を抽出する抽出手段と、
     前記抽出手段によって抽出された前記第2の鍵を、前記いずれかのアドホックネットワーク経由で前記ノードに送信する第2の送信手段と、
     を備えることを特徴とするネットワークシステム。
    It is possible to communicate with a node in any one of the ad hoc networks that performs encryption and decryption with a first key specific to the gateway in any one of the plurality of ad hoc networks, and a gateway of each of the plurality of ad hoc networks. A network system comprising: a server having storage means for storing the gateway identification information and the gateway-specific key for each gateway;
    The node is
    Detection means for detecting the destination or source gateway of the received encrypted packet for each encrypted packet;
    The number of successes in which the encrypted packet could be decrypted with the first key is counted for each gateway detected by the detection means, and the number of failures in which the encrypted packet could not be decrypted with the first key Counting means for counting each gateway;
    Determining means for determining for each gateway whether or not a difference obtained by subtracting the number of successes from the number of failures counted by the counting means is greater than or equal to a threshold for key acquisition;
    First transmission means for transmitting the gateway-specific second key acquisition request determined by the determination means to be equal to or greater than the threshold value to the server via any one of the ad hoc networks;
    First receiving means for receiving the second key stored in the server as a result of the acquisition request being transmitted by the first transmitting means from the server via any one of the ad hoc networks;
    Setting means for setting the second key received by the first receiving means as a key for performing encryption and decryption,
    The server
    Second receiving means for receiving the second key acquisition request transmitted by the first transmitting means via any one of the ad hoc networks;
    Extracting the second key from the storage unit based on identification information of the gateway using the second key included in the second key acquisition request received by the second receiving unit Extraction means to
    Second transmission means for transmitting the second key extracted by the extraction means to the node via any one of the ad hoc networks;
    A network system comprising:
PCT/JP2010/073814 2010-12-28 2010-12-28 Key setting method, node, server, and network system WO2012090332A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2010/073814 WO2012090332A1 (en) 2010-12-28 2010-12-28 Key setting method, node, server, and network system
JP2012550662A JP5494829B2 (en) 2010-12-28 2010-12-28 Key setting method, node, and network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2010/073814 WO2012090332A1 (en) 2010-12-28 2010-12-28 Key setting method, node, server, and network system

Publications (1)

Publication Number Publication Date
WO2012090332A1 true WO2012090332A1 (en) 2012-07-05

Family

ID=46382480

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2010/073814 WO2012090332A1 (en) 2010-12-28 2010-12-28 Key setting method, node, server, and network system

Country Status (2)

Country Link
JP (1) JP5494829B2 (en)
WO (1) WO2012090332A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10336745A (en) * 1997-05-30 1998-12-18 Nec Corp Moblie communication system
JP2010503330A (en) * 2006-09-07 2010-01-28 モトローラ・インコーポレイテッド Method and apparatus for establishing a security association between nodes of an ad hoc wireless network
JP2010503326A (en) * 2006-09-07 2010-01-28 モトローラ・インコーポレイテッド Security authentication and key management in infrastructure-based wireless multi-hop networks

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4158972B2 (en) * 2003-12-18 2008-10-01 Kddi株式会社 Multi-hop communication method
US8532304B2 (en) * 2005-04-04 2013-09-10 Nokia Corporation Administration of wireless local area networks
JP4526079B2 (en) * 2005-04-13 2010-08-18 Kddi株式会社 Multi-hop communication system, mobile terminal thereof, route control server, and route establishment method
JP4750515B2 (en) * 2005-09-07 2011-08-17 株式会社エヌ・ティ・ティ・ドコモ A system for building a secure ad hoc network
US7817986B2 (en) * 2006-04-28 2010-10-19 Motorola, Inc. Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10336745A (en) * 1997-05-30 1998-12-18 Nec Corp Moblie communication system
JP2010503330A (en) * 2006-09-07 2010-01-28 モトローラ・インコーポレイテッド Method and apparatus for establishing a security association between nodes of an ad hoc wireless network
JP2010503326A (en) * 2006-09-07 2010-01-28 モトローラ・インコーポレイテッド Security authentication and key management in infrastructure-based wireless multi-hop networks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YI LU ET AL.: "Secure Wireless Network with Movable Base Stations", IEICE TRANSACTIONS ON COMMUNICATIONS, vol. E86-B, no. 10, 1 October 2003 (2003-10-01), pages 2922 - 2930 *

Also Published As

Publication number Publication date
JPWO2012090332A1 (en) 2014-06-05
JP5494829B2 (en) 2014-05-21

Similar Documents

Publication Publication Date Title
JP5423907B2 (en) Key setting method, node, server, and network system
CN109995515B (en) Quantum key relay method
JP3595145B2 (en) Cryptographic communication system
US8719563B2 (en) Key setting method, node, and network system
US8732454B2 (en) Key setting method, node, and network system
WO2007052527A1 (en) Radio communication system, communication device, and relay device
GB2553754A (en) Encryption for a synchronous wireless link
KR101209248B1 (en) Method of data communication between PLC stations belonging to different PLC cells and apparatus therefor
JP5494829B2 (en) Key setting method, node, and network system
US20020116606A1 (en) Encryption and decryption system for multiple node network
JP4654950B2 (en) Information broadcasting system, information broadcasting method and program thereof
CN115277200B (en) Multi-node key auto-negotiation management method for link layer transparent encryption system
WO2012073340A1 (en) Key update method, node, gateway, server, and network system
JP5488715B2 (en) Key update method, node, server, and network system
JP3979390B2 (en) Mobile router device and home agent device
JP2005223838A (en) Communications system and relay device
JP5494828B2 (en) Key setting method, node, server, and network system
CN110650476B (en) Management frame encryption and decryption
JP5418700B2 (en) Key setting method, node, server, and network system
JP5621905B2 (en) Key setting method, node, server, and network system
JP5418699B2 (en) Key setting method, node, server, and network system
JP2006050228A (en) Radio network system
KR20130015384A (en) Data processing terminal, method of processing data therof, data processing system and method of processing data thereof
JP2006041641A (en) Radio communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10861402

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2012550662

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10861402

Country of ref document: EP

Kind code of ref document: A1