JP2006514789A - 安全な移動体アドホック・ネットワーク及び関連の方法 - Google Patents
安全な移動体アドホック・ネットワーク及び関連の方法 Download PDFInfo
- Publication number
- JP2006514789A JP2006514789A JP2004504448A JP2004504448A JP2006514789A JP 2006514789 A JP2006514789 A JP 2006514789A JP 2004504448 A JP2004504448 A JP 2004504448A JP 2004504448 A JP2004504448 A JP 2004504448A JP 2006514789 A JP2006514789 A JP 2006514789A
- Authority
- JP
- Japan
- Prior art keywords
- node
- seed
- key
- random
- key sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 17
- 238000004891 communication Methods 0.000 claims abstract description 29
- 230000005540 biological transmission Effects 0.000 claims abstract description 11
- 238000013459 approach Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000854291 Dianthus carthusianorum Species 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (10)
- 少なくとも1つの近隣ノードと無線通信リンクを確立する無線通信装置と、
プレーンテキスト源と、
シード(seed)を生成するために秘密鍵を使用して一方向アルゴリズムを実行するシード生成器と、
前記シードを受信し、それに基づいて鍵シーケンスを生成する鍵暗号化器と、
前記無線通信リンク上で前記鍵シーケンスとプレーンテキストに基づいて前記少なくとも1つの近隣ノードへの伝送用に暗号テキストを生成する論理回路と
を有する安全な移動体アドホック・ネットワークノード。 - 請求項1に記載のノードであって、
前記一方向アルゴリズムが、ハッシュアルゴリズムを有するノード。 - 請求項1に記載のノードであって、
前記シード生成器が、前記秘密鍵と変化する基準値を使用して前記一方向アルゴリズムを実行し、前記シードを生成するノード。 - 請求項1に記載のノードであって、
前記シード生成器が、前記秘密鍵と前記ノードのアドレスを使用して前記一方向アルゴリズムを実行するノード。 - 請求項1に記載のノードであって、
ランダム初期化ベクトル(IV:initialization vector)を生成するランダム初期化ベクトル(IV)生成器を更に有し、
前記シード生成器が、前記秘密鍵と前記ランダムIVを使用して前記一方向アルゴリズムを実行するノード。 - 請求項1に記載のノードであって、
前記プレーンテキストに基づいて完全性チェック値を生成する完全性チェッカを更に有し、
前記論理回路が、前記鍵シーケンスと前記プレーンテキストと前記完全性チェック値に基づいて、前記暗号テキストを生成するノード。 - 請求項1に記載のノードであって、
ランダムIVを生成するランダム初期化ベクトル(IV)と、
前記シードと前記ランダムIVを連結する連結器と
を更に有し、
前記鍵暗号化器が、前記シードと前記ランダムIVの連結に基づいて前記鍵シーケンスを生成するノード。 - 請求項1に記載の装置であって、
前記鍵シーケンスが複数のバイトを有し、
前記論理回路による前記暗号テキストの生成の前に、前記鍵暗号化器が前記鍵シーケンスから少なくとも1バイトを削除する装置。 - 複数のノードを有する移動体アドホック・ネットワーク用の通信方法であって、
秘密鍵を使用してソースノードで一方向アルゴリズムを実行してシードを生成し、
前記シードに基づいて前記ソースノードで鍵シーケンスを生成し、
前記鍵シーケンスとプレーンテキストに基づいて前記ソースノードで暗号テキストを生成し、
前記ソースノードから少なくとも1つの近隣ノードに前記暗号テキストを伝送することを有する通信方法。 - 請求項9に記載の方法であって、
ランダム初期化ベクトル(IV)を生成し、
前記ソースノードで前記シードと前記ランダムIVを連結することを更に有し、
前記鍵シーケンスを生成することが、前記シードと前記ランダムIVの連結に基づいて前記鍵シーケンスを生成することを有する方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/143,145 US7346167B2 (en) | 2002-05-10 | 2002-05-10 | Secure mobile ad-hoc network and related methods |
PCT/US2003/014322 WO2003096606A1 (en) | 2002-05-10 | 2003-05-07 | Secure mobile ad-hoc network and related methods |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2006514789A true JP2006514789A (ja) | 2006-05-11 |
Family
ID=29400041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2004504448A Pending JP2006514789A (ja) | 2002-05-10 | 2003-05-07 | 安全な移動体アドホック・ネットワーク及び関連の方法 |
Country Status (9)
Country | Link |
---|---|
US (1) | US7346167B2 (ja) |
EP (3) | EP1508220B1 (ja) |
JP (1) | JP2006514789A (ja) |
KR (1) | KR20040104725A (ja) |
CN (1) | CN1653742A (ja) |
AU (1) | AU2003230290A1 (ja) |
BR (1) | BR0309910A (ja) |
CA (1) | CA2483879A1 (ja) |
WO (1) | WO2003096606A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009130917A1 (ja) * | 2008-04-24 | 2009-10-29 | 富士通株式会社 | ノード装置及びプログラム |
JP2012502572A (ja) * | 2008-09-10 | 2012-01-26 | シーメンス アクチエンゲゼルシヤフト | ネットワークノード間のデータ伝送方法 |
Families Citing this family (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2812509B1 (fr) * | 2000-07-26 | 2002-12-27 | Gemplus Card Int | Procede de reconnaissance securisee entre deux appareils d'un reseau radiofrequence |
TW532025B (en) * | 2001-09-25 | 2003-05-11 | Admtek Inc | Data encryption and decryption method and apparatus therefor |
KR100888472B1 (ko) * | 2002-07-06 | 2009-03-12 | 삼성전자주식회사 | 이중키를 이용한 암호화방법 및 이를 위한 무선 랜 시스템 |
US6986161B2 (en) * | 2002-08-12 | 2006-01-10 | Harris Corporation | Mobile ad-hoc network with intrusion detection features and related methods |
JP2005286989A (ja) * | 2004-03-02 | 2005-10-13 | Ntt Docomo Inc | 通信端末及びアドホックネットワーク経路制御方法 |
US7308250B2 (en) * | 2004-03-16 | 2007-12-11 | Broadcom Corporation | Integration of secure identification logic into cell phone |
US8144595B1 (en) | 2004-03-25 | 2012-03-27 | Verizon Corporate Services Group Inc. | Variable translucency no-sight routing for AD-HOC networks |
US7768943B1 (en) * | 2004-03-25 | 2010-08-03 | Verizon Corporate Services Group Inc. | No-sight routing for ad-hoc networks |
US7571329B2 (en) * | 2004-07-14 | 2009-08-04 | Intel Corporation | Method of storing unique constant values |
DE112005001833B4 (de) * | 2004-07-30 | 2012-06-28 | Meshnetworks, Inc. | System und Verfahren zum Herbeiführen des sicheren Einsatzes von Netzwerken |
KR100636318B1 (ko) * | 2004-09-07 | 2006-10-18 | 삼성전자주식회사 | CoA 바인딩 프로토콜을 이용한 어드레스 오너쉽인증방법 및 그 시스템 |
US7757274B2 (en) * | 2005-04-05 | 2010-07-13 | Mcafee, Inc. | Methods and systems for exchanging security information via peer-to-peer wireless networks |
US7606370B2 (en) * | 2005-04-05 | 2009-10-20 | Mcafee, Inc. | System, method and computer program product for updating security criteria in wireless networks |
US7822972B2 (en) * | 2005-04-05 | 2010-10-26 | Mcafee, Inc. | Remotely configurable bridge system and method for use in secure wireless networks |
US7761710B2 (en) * | 2005-04-05 | 2010-07-20 | Mcafee, Inc. | Captive portal system and method for use in peer-to-peer networks |
CN101204037A (zh) * | 2005-05-09 | 2008-06-18 | 诺基亚公司 | 用于有效加密与解密drm权利对象的系统和方法 |
EP1753201B1 (en) * | 2005-08-12 | 2020-01-01 | Samsung Electronics Co., Ltd. | System and method for transmitting system messages insession initiation protocol |
KR101078915B1 (ko) * | 2005-12-01 | 2011-11-01 | 텔레폰악티에볼라겟엘엠에릭슨(펍) | 키 관리 |
US7900817B2 (en) * | 2006-01-26 | 2011-03-08 | Ricoh Company, Ltd. | Techniques for introducing devices to device families with paper receipt |
US8032746B2 (en) * | 2007-06-19 | 2011-10-04 | The University Of Texas At San Antonio | Tamper-resistant communication layer for attack mitigation and reliable intrusion detection |
US8085743B2 (en) * | 2007-07-20 | 2011-12-27 | Broadcom Corporation | Method and system for enabling rendering of electronic media content via a secure ad hoc network configuration utilizing a handheld wireless communication device |
US9398453B2 (en) | 2007-08-17 | 2016-07-19 | Qualcomm Incorporated | Ad hoc service provider's ability to provide service for a wireless network |
US20090049158A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Ad hoc service provider topology |
US20090046644A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Service set manager for ad hoc mobile service provider |
US20090046598A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | System and method for acquiring or distributing information related to one or more alternate ad hoc service providers |
US20090047930A1 (en) * | 2007-08-17 | 2009-02-19 | Qualcomm Incorporated | Method for a heterogeneous wireless ad hoc mobile service provider |
US20090073943A1 (en) * | 2007-08-17 | 2009-03-19 | Qualcomm Incorporated | Heterogeneous wireless ad hoc network |
US9392445B2 (en) * | 2007-08-17 | 2016-07-12 | Qualcomm Incorporated | Handoff at an ad-hoc mobile service provider |
US8566571B2 (en) * | 2008-12-12 | 2013-10-22 | Novell, Inc. | Pre-boot securing of operating system (OS) for endpoint evaluation |
US8281134B2 (en) * | 2009-01-29 | 2012-10-02 | Symbol Technologies, Inc. | Methods and apparatus for layer 2 and layer 3 security between wireless termination points |
US8838804B2 (en) * | 2009-03-12 | 2014-09-16 | Novell, Inc. | Securing a network connection by way of an endpoint computing device |
US8387131B2 (en) * | 2009-05-18 | 2013-02-26 | Novell, Inc. | Enforcing secure internet connections for a mobile endpoint computing device |
US9179367B2 (en) * | 2009-05-26 | 2015-11-03 | Qualcomm Incorporated | Maximizing service provider utility in a heterogeneous wireless ad-hoc network |
DE102010011022A1 (de) * | 2010-03-11 | 2012-02-16 | Siemens Aktiengesellschaft | Verfahren zur sicheren unidirektionalen Übertragung von Signalen |
BR112013001728A2 (pt) * | 2010-07-23 | 2016-05-31 | Emue Holdings Pty Ltd | métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador. |
US8539466B2 (en) | 2011-05-23 | 2013-09-17 | International Business Machines Corporation | Determining suitable insertion points for string sanitizers in a computer code |
CA2837516C (en) * | 2011-05-26 | 2016-11-01 | Certicom Corp. | Randomness for encryption operations |
US8862897B2 (en) | 2011-10-01 | 2014-10-14 | Oracle International Corporation | Increasing data security in enterprise applications by using formatting, checksums, and encryption to detect tampering of a data buffer |
CN103491536B (zh) * | 2012-06-13 | 2016-04-27 | 株式会社理光 | 移动节点状态控制方法及移动节点的密钥接收验证器 |
US9992021B1 (en) | 2013-03-14 | 2018-06-05 | GoTenna, Inc. | System and method for private and point-to-point communication between computing devices |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US9578543B2 (en) * | 2013-07-01 | 2017-02-21 | Qualcomm Incorporated | Reduced overhead for wireless communication |
US10015720B2 (en) | 2014-03-14 | 2018-07-03 | GoTenna, Inc. | System and method for digital communication between computing devices |
FR3019957B1 (fr) * | 2014-04-09 | 2016-05-27 | Actility | Procedes de codage et decodage de trames dans un reseau de telecommunication |
CN103957097A (zh) * | 2014-04-14 | 2014-07-30 | 河海大学 | 移动Ad Hoc网络路由和数据安全保障方法 |
US9787645B2 (en) | 2014-05-22 | 2017-10-10 | AVG Netherlands B.V. | User privacy protection method and system |
CN106664202B (zh) * | 2014-06-13 | 2020-04-03 | 百可德罗德公司 | 提供多个设备上的加密的方法、系统和计算机可读介质 |
US9703979B1 (en) | 2014-06-13 | 2017-07-11 | BicDroid Inc. | Methods and computer program products for encryption key generation and management |
US20170085371A1 (en) * | 2015-04-07 | 2017-03-23 | Secure Channels Sa | System and method for an enhanced xor cipher through extensions |
US10892889B2 (en) * | 2015-04-07 | 2021-01-12 | Coleridge Enterprises Llc | Systems and methods for an enhanced XOR cipher through extensions |
DE102016122333A1 (de) * | 2016-11-21 | 2018-05-24 | Jan Maybach | Verfahren und Vorrichtung zum Sichern einer elektronischen Datenübertragung |
US11190498B1 (en) | 2018-01-11 | 2021-11-30 | Secure Channels, Inc. | System and method for use of filters within a cryptographic process |
US10944669B1 (en) | 2018-02-09 | 2021-03-09 | GoTenna, Inc. | System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos |
US11082324B2 (en) | 2018-07-27 | 2021-08-03 | goTenna Inc. | Vine: zero-control routing using data packet inspection for wireless mesh networks |
WO2020185707A1 (en) | 2019-03-08 | 2020-09-17 | goTenna Inc. | Method for utilization-based traffic throttling in a wireless mesh network |
US11804955B1 (en) | 2019-09-13 | 2023-10-31 | Chol, Inc. | Method and system for modulated waveform encryption |
WO2023078588A1 (en) * | 2021-11-08 | 2023-05-11 | Telefonaktiebolaget Lm Ericsson (Publ) | First node and methods performed thereby for handling aggregation of messages |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4817146A (en) * | 1984-10-17 | 1989-03-28 | General Electric Company | Cryptographic digital signal transceiver method and apparatus |
US5239584A (en) | 1991-12-26 | 1993-08-24 | General Electric Corporation | Method and apparatus for encryption/authentication of data in energy metering applications |
IL102394A (en) | 1992-07-02 | 1996-08-04 | Lannet Data Communications Ltd | Method and apparatus for secure data transmission |
US5345508A (en) | 1993-08-23 | 1994-09-06 | Apple Computer, Inc. | Method and apparatus for variable-overhead cached encryption |
US5412654A (en) | 1994-01-10 | 1995-05-02 | International Business Machines Corporation | Highly dynamic destination-sequenced destination vector routing for mobile computers |
US5513245A (en) | 1994-08-29 | 1996-04-30 | Sony Corporation | Automatic generation of private authentication key for wireless communication systems |
US5541994A (en) * | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
US5778069A (en) | 1996-04-10 | 1998-07-07 | Microsoft Corporation | Non-biased pseudo random number generator |
US6167514A (en) * | 1996-07-05 | 2000-12-26 | Seiko Epson Corporation | Method, apparatus, system and information storage medium for wireless communication |
US5832228A (en) | 1996-07-30 | 1998-11-03 | Itt Industries, Inc. | System and method for providing multi-level security in computer devices utilized with non-secure networks |
US5872847A (en) | 1996-07-30 | 1999-02-16 | Itt Industries, Inc. | Using trusted associations to establish trust in a computer network |
US6028939A (en) | 1997-01-03 | 2000-02-22 | Redcreek Communications, Inc. | Data security system and method |
JP2001514834A (ja) * | 1997-03-10 | 2001-09-11 | ガイ・エル・フィールダー | 安全決定性暗号鍵発生システムおよび方法 |
US6438666B2 (en) | 1997-09-26 | 2002-08-20 | Hughes Electronics Corporation | Method and apparatus for controlling access to confidential data by analyzing property inherent in data |
US6148405A (en) * | 1997-11-10 | 2000-11-14 | Phone.Com, Inc. | Method and system for secure lightweight transactions in wireless data networks |
US6065120A (en) * | 1997-12-09 | 2000-05-16 | Phone.Com, Inc. | Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices |
US6055316A (en) | 1997-12-26 | 2000-04-25 | Sun Microsystems, Inc. | System and method for deriving an appropriate initialization vector for secure communications |
US6215876B1 (en) | 1997-12-31 | 2001-04-10 | Transcrypt International, Inc. | Apparatus for and method of detecting initialization vector errors and maintaining cryptographic synchronization without substantial increase in overhead |
US6263437B1 (en) | 1998-02-19 | 2001-07-17 | Openware Systems Inc | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks |
US6307938B1 (en) * | 1998-07-10 | 2001-10-23 | International Business Machines Corporation | Method, system and apparatus for generating self-validating prime numbers |
US6304556B1 (en) | 1998-08-24 | 2001-10-16 | Cornell Research Foundation, Inc. | Routing and mobility management protocols for ad-hoc networks |
AUPP752398A0 (en) | 1998-12-04 | 1999-01-07 | Collins, Lyal Sidney | Secure multi-point data transfer system |
US6823455B1 (en) * | 1999-04-08 | 2004-11-23 | Intel Corporation | Method for robust watermarking of content |
US6697490B1 (en) | 1999-10-19 | 2004-02-24 | Lucent Technologies Inc. | Automatic resynchronization of crypto-sync information |
US6668324B1 (en) * | 1999-12-13 | 2003-12-23 | Intel Corporation | System and method for safeguarding data within a device |
US7039190B1 (en) * | 2000-08-18 | 2006-05-02 | Nortel Networks Limited | Wireless LAN WEP initialization vector partitioning scheme |
US6987853B2 (en) * | 2000-11-29 | 2006-01-17 | Bodacion Technologies, Llc | Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess |
US6931128B2 (en) * | 2001-01-16 | 2005-08-16 | Microsoft Corporation | Methods and systems for generating encryption keys using random bit generators |
US6944688B1 (en) * | 2001-05-18 | 2005-09-13 | Cisco Technology, Inc. | Queuing system using dual receive FIFO |
US7194760B2 (en) * | 2001-05-21 | 2007-03-20 | Nokia Corporation | Method for protecting privacy when using a Bluetooth device |
TW532025B (en) | 2001-09-25 | 2003-05-11 | Admtek Inc | Data encryption and decryption method and apparatus therefor |
US6931132B2 (en) * | 2002-05-10 | 2005-08-16 | Harris Corporation | Secure wireless local or metropolitan area network and related methods |
US7277404B2 (en) * | 2002-05-20 | 2007-10-02 | Airdefense, Inc. | System and method for sensing wireless LAN activity |
US7277548B2 (en) * | 2002-10-23 | 2007-10-02 | Ndosa Technologies, Inc. | Cryptographic method and computer program product for use in wireless local area networks |
-
2002
- 2002-05-10 US US10/143,145 patent/US7346167B2/en not_active Expired - Lifetime
-
2003
- 2003-05-07 KR KR10-2004-7018050A patent/KR20040104725A/ko not_active Application Discontinuation
- 2003-05-07 EP EP03724496.9A patent/EP1508220B1/en not_active Expired - Lifetime
- 2003-05-07 WO PCT/US2003/014322 patent/WO2003096606A1/en active Application Filing
- 2003-05-07 EP EP16186725.4A patent/EP3125463A3/en not_active Withdrawn
- 2003-05-07 BR BRPI0309910-5A patent/BR0309910A/pt not_active IP Right Cessation
- 2003-05-07 CA CA002483879A patent/CA2483879A1/en not_active Abandoned
- 2003-05-07 AU AU2003230290A patent/AU2003230290A1/en not_active Abandoned
- 2003-05-07 JP JP2004504448A patent/JP2006514789A/ja active Pending
- 2003-05-07 CN CNA038102072A patent/CN1653742A/zh active Pending
- 2003-05-07 EP EP16186729.6A patent/EP3121990B1/en not_active Expired - Lifetime
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009130917A1 (ja) * | 2008-04-24 | 2009-10-29 | 富士通株式会社 | ノード装置及びプログラム |
JPWO2009130917A1 (ja) * | 2008-04-24 | 2011-08-11 | 富士通株式会社 | ノード装置及びプログラム |
JP4883219B2 (ja) * | 2008-04-24 | 2012-02-22 | 富士通株式会社 | ノード装置及びプログラム |
US8417936B2 (en) | 2008-04-24 | 2013-04-09 | Fujitsu Limited | Node apparatus, method and storage medium |
JP2012502572A (ja) * | 2008-09-10 | 2012-01-26 | シーメンス アクチエンゲゼルシヤフト | ネットワークノード間のデータ伝送方法 |
US9094818B2 (en) | 2008-09-10 | 2015-07-28 | Siemens Aktiengesellschaft | Method for cryptographically transmitting data between network nodes using a nonce value |
Also Published As
Publication number | Publication date |
---|---|
EP1508220B1 (en) | 2016-11-16 |
EP3121990A1 (en) | 2017-01-25 |
EP3125463A1 (en) | 2017-02-01 |
EP3121990A3 (en) | 2017-03-15 |
CA2483879A1 (en) | 2003-11-20 |
KR20040104725A (ko) | 2004-12-10 |
CN1653742A (zh) | 2005-08-10 |
US20030210787A1 (en) | 2003-11-13 |
EP1508220A1 (en) | 2005-02-23 |
AU2003230290A1 (en) | 2003-11-11 |
BR0309910A (pt) | 2007-04-10 |
EP3121990B1 (en) | 2020-01-15 |
EP1508220A4 (en) | 2005-05-25 |
US7346167B2 (en) | 2008-03-18 |
WO2003096606A1 (en) | 2003-11-20 |
EP3125463A3 (en) | 2017-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7346167B2 (en) | Secure mobile ad-hoc network and related methods | |
US8014526B2 (en) | Secure wireless local or metropolitan area network and related methods | |
CN101512537B (zh) | 在自组无线网络中安全处理认证密钥资料的方法和系统 | |
US7486651B2 (en) | Mobile node, an ad hoc network routing controlling method and an ad hoc network system | |
Hager et al. | An analysis of Bluetooth security vulnerabilities | |
US8959333B2 (en) | Method and system for providing a mesh key | |
US7039190B1 (en) | Wireless LAN WEP initialization vector partitioning scheme | |
Erritali et al. | A Contribution to Secure the Routing Protocol" Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash | |
Wang et al. | Security analysis for ieee802. 11 | |
Gahlin | Secure ad hoc networking | |
Nachammai et al. | Securing data transmission in MANET using an improved cooperative bait detection approach | |
Peter et al. | Security and dynamic encryption system in mobile AD-hoc network | |
Purandare et al. | Enhancing Message Privacy in WEP | |
WARIS | Analysis of Lightweight Security Protocol for Bluetooth Communication with ECC Approach | |
Chandramathi et al. | Modified WEP key management for enhancing WLAN security | |
Seys et al. | Security in Wireless PAN Mesh Networks | |
Haämaälaäinen et al. | 8 Security Enhancement Layer for Bluetooth | |
Akhtar et al. | Secure optimized link state routing in mobile social networks | |
Raman | Security in wireless networks | |
Singh et al. | Security issues of distance vector routing protocol and its advancement in security | |
Mogollon | Wireless Security | |
Kong et al. | An overview of network security in WLANs | |
Purandare | Enhancing Message Privacy In Wired Equivalent Privacy. | |
Islabudeen et al. | An Efficient Secure Communication in WLAN Using DH Method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20070306 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20070518 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20070525 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20070905 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20071002 |