WO2013055106A2 - Wlan(wireless local area network)-기반 p2p(peer to peer) 통신을 위한 방법 및 이를 위한 장치 - Google Patents
Wlan(wireless local area network)-기반 p2p(peer to peer) 통신을 위한 방법 및 이를 위한 장치 Download PDFInfo
- Publication number
- WO2013055106A2 WO2013055106A2 PCT/KR2012/008220 KR2012008220W WO2013055106A2 WO 2013055106 A2 WO2013055106 A2 WO 2013055106A2 KR 2012008220 W KR2012008220 W KR 2012008220W WO 2013055106 A2 WO2013055106 A2 WO 2013055106A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- data signal
- encrypted data
- information
- sta
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to a wireless communication system, and more particularly, to a method and apparatus for P2P communication based on a wireless local area network (WLAN). More specifically, the present invention relates to a method for neighbor discovery, data communication, and the like for P2P communication based on WLAN, and an apparatus therefor.
- WLAN refers to a local area network (LAN) based on wireless communication, such as a wireless fidelity (Wi-Fi), a ZigBee, a licensed band based on a small cell, and the like.
- Wireless communication systems are widely deployed to provide various kinds of communication services such as voice and data.
- a wireless communication system is a multiple access system capable of supporting communication with multiple users by sharing available system resources (bandwidth, transmission power, etc.).
- multiple access systems include code division multiple access (CDMA) systems, frequency division multiple access (FDMA) systems, time division multiple access (TDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, and single carrier frequency (SC-FDMA).
- CDMA code division multiple access
- FDMA frequency division multiple access
- TDMA time division multiple access
- OFDMA orthogonal frequency division multiple access
- SC-FDMA single carrier frequency Division Multiple Access
- IEEE 802.11a and b use an unlicensed band at 2.4. GHz or 5 GHz, IEEE 802.11b provides a transmission rate of 11 Mbps, and IEEE 802.11a provides a transmission rate of 54 Mbps.
- IEEE 802.11g applies Orthogonal Frequency Division Multiplexing (OFDM) at 2.4 GHz to provide a transmission rate of 54 Mbps.
- IEEE 802.11n provides a transmission rate of 300 Mbps by applying multiple input multiple output OFDM (MIMO-OFDM). IEEE 802.11n supports a channel bandwidth of up to 40 MHz, in which case it provides a transmission rate of 600 Mbps.
- OFDM Orthogonal Frequency Division Multiplexing
- IEEE 802.11p is a standard for supporting WAVE (Wireless Access in Vehicular Environments). For example, 802.11p provides the improvements needed to support Intelligent Transportation Systems (ITS).
- IEEE 802.11ai is a standard for supporting fast initial link setup of an IEEE 802.11 station (STA).
- Wi-Fi P2P technology is installed in portable devices such as TVs, laptops, printers, cameras, and mobile devices, so that users can use contents and services between devices through direct communication between devices without additional equipment such as an access point or router. Provide the foundation. Wi-Fi P2P technology is expected to replace Bluetooth technology in some areas by providing fast transfer speeds.
- the present invention provides a method and apparatus for efficiently performing P2P communication based on a WLAN. Another object of the present invention is to provide a method and apparatus for efficiently performing a process for authentication / encryption for P2P communication based on WLAN.
- a method for performing wireless local area network (WLAN) -based P2P communication in a first peer to peer (P2P) device connected to a cellular network receiving one or more key information from a cellular base station, Each key information comprising a key value corresponding to the service identification information; Receiving an encrypted data signal from a second P2P device; Providing, among the one or more key information, the first P2P device performing a process for attempting to decrypt the encrypted data signal using one or more keys corresponding to one or more services of interest. do.
- WLAN wireless local area network
- P2P peer to peer
- a first P2P device connected to a cellular network and configured to perform wireless local area network (WLAN) -based peer to peer (P2P) communication, comprising: a radio frequency (RF) unit; And a processor, wherein the processor receives one or more key information from a cellular base station, wherein each key information includes a key value corresponding to the service identification information, receives an encrypted data signal from a second P2P device, Among the one or more key information, the first P2P device is provided to perform a process for attempting to decrypt the encrypted data signal using one or more keys corresponding to one or more services of interest. do.
- WLAN wireless local area network
- P2P peer to peer
- RF radio frequency
- the encrypted data signal is received in a state in which there is no information about the second P2P device or information about a group to which the second P2P device belongs.
- the plurality of key values included in the one or more key information are set equally to the P2P device interested in all or the same P2P service in the cell where the cellular base station provides the service.
- the header of the encrypted data signal includes at least one of key identification information and service identification information.
- the encrypted data signal is discarded and the header of the encrypted data signal is the first P2P.
- a decryption process is performed on the encrypted data signal.
- the encrypted data signal is discarded in the PHY layer, and the decryption process for the encrypted data signal is performed in a medium access control (MAC) layer.
- MAC medium access control
- said one or more key information is updated when a predetermined timer expires.
- the method further comprises transmitting information requesting an update to said one or more key information to said cellular base station.
- WLAN-based P2P communication can be efficiently performed in a wireless communication system. Specifically, a process for authentication / encryption for WLAN-based P2P communication can be efficiently performed.
- FIG. 1A illustrates the structure of a Wireless Local Area Network (WLAN) (eg, IEEE 802.11) system to which the present invention may be applied.
- WLAN Wireless Local Area Network
- 1B is a block diagram illustrating exemplary operation of a communication system employing access devices and wireless user devices.
- WLAN-based P2P eg, Wi-Fi Direct (WFD)
- WLAN-based P2P eg, Wi-Fi Direct (WFD)
- 5 through 6 illustrate a WLAN authentication / encryption process.
- P2P Peer to Peer
- CDMA code division multiple access
- FDMA frequency division multiple access
- TDMA time division multiple access
- OFDMA orthogonal frequency division multiple access
- SC-FDMA single carrier frequency division multiple access
- CDMA may be implemented with a radio technology such as Universal Terrestrial Radio Access (UTRA) or CDMA2000.
- TDMA may be implemented with wireless technologies such as Global System for Mobile communications (GSM) / General Packet Radio Service (GPRS) / Enhanced Data Rates for GSM Evolution (EDGE).
- GSM Global System for Mobile communications
- GPRS General Packet Radio Service
- EDGE Enhanced Data Rates for GSM Evolution
- OFDMA may be implemented in a radio technology such as IEEE 802.16 (WiMAX), IEEE 802-20, Evolved UTRA (E-UTRA).
- OFDM may be implemented by a radio technology such as IEEE 802.11.
- IEEE 802.11 WLAN
- the inventive concept is not limited thereto.
- the following description may be supported by standard documents disclosed in at least one of wireless access systems IEEE 802 system, 3GPP system, 3GPP LTE and LTE-Advanced (LTE-A) system and 3GPP2 system. That is, steps or parts which are not described to clearly reveal the technical spirit of the present invention among the embodiments of the present invention may be supported by the above documents.
- all terms disclosed in the present document can be described by the above standard document.
- 1A is a diagram illustrating an exemplary structure of an IEEE 802.11 system to which the present invention can be applied.
- the IEEE 802.11 architecture may consist of a plurality of components, and by their interaction, a WLAN may be provided that supports transparent STA mobility for higher layers.
- the Basic Service Set (BSS) may correspond to a basic building block of an IEEE 802.11 LAN.
- FIG. 1A illustrates the case where two BSSs (BSS1 and BSS2) exist and each BSS includes two STAs (STA1 and STA2 are included in BSS1 and STA3 and STA4 are included in BSS2).
- the STA means a device that operates according to the Medium Access Control (MAC) / PHY (Physical) specification of IEEE 802.11.
- the STA includes an access point (AP) STA (simply an AP) and a non-AP (non-AP) STA.
- AP access point
- AP access point
- non-AP non-AP
- the AP corresponds to a device that provides a network (eg, WLAN) connection to a non-AP STA through an air interface.
- the AP may be configured in fixed or mobile form and includes portable wireless devices (eg, laptop computers, smartphones, etc.) that provide hot-spots.
- AP is a base station (BS), Node-B, Evolved Node-B (eNB), Base Transceiver System (BTS), femto base station in other wireless communication fields (Femto BS) and the like.
- Non-AP STAs generally correspond to devices that users directly handle, such as laptop computers, PDAs, wireless modems, and smartphones.
- the non-AP STA may include a terminal, a wireless transmit / receive unit (WTRU), a user equipment (UE), a mobile station (MS), a mobile terminal, a mobile subscriber station. (Mobile Subscriber Station, MSS) and the like.
- WTRU wireless transmit / receive unit
- UE user equipment
- MS mobile station
- MS mobile terminal
- MSS mobile subscriber Station
- an ellipse representing a BSS may be understood to represent a coverage area where STAs included in the BSS maintain communication. This area may be referred to as a basic service area (BSA).
- BSA basic service area
- the most basic type of BSS in an IEEE 802.11 LAN is an independent BSS (IBS).
- the IBSS may have a minimal form consisting of only two STAs.
- the BSS (BSS1 or BSS2) of FIG. 1A which is the simplest form and other components are omitted, may correspond to a representative example of the IBSS. This configuration is possible when STAs can communicate directly.
- this type of LAN may not be configured in advance, but may be configured when a LAN is required, which may be referred to as an ad-hoc network.
- the membership of the STA in the BSS may be dynamically changed by turning on or off the STA, entering or exiting the BSS region, or the like.
- the STA may join the BSS using a synchronization process.
- the STA may be associated with the BSS.
- FIG. 1B illustrates a communication system 100 employing access devices (eg AP STAs) 102A, 102B and 102C and wireless user devices (eg non-AP STAs).
- access devices eg AP STAs
- non-AP STAs wireless user devices
- access devices 102A-C are connected to a switch 104 that provides a connection to a Wide Area Network (WAN) 106, such as the Internet.
- WAN Wide Area Network
- Each of the access devices 102A-C provides a wireless connection to wireless devices within a coverage area (not shown) of the access device via a time division multiplexed network.
- access devices 102A-C jointly provide the entire WLAN coverage area of system 100.
- the wireless device 108 may be in the coverage area of the access devices 102A and 102B at the location indicated by the box marked with a solid line.
- wireless device 108 may receive beacons from each of access devices 102A and 102B, such as solid arrows 110A and 11OB.
- wireless device 108 When the wireless device 108 roams from the solid line box to the dashed box, the wireless device 108 enters the coverage area of the access device 102C and exits the coverage area of the access device 102A. Thus, wireless device 108 may receive beacons from access devices 102B and 102C, such as dashed arrows 112A and 112B.
- the wireless device 108 can determine which access device currently provides the best connection to the wireless device 108. .
- wireless device 108 may repeatedly scan beacons of adjacent access devices and measure signal strength (eg, power) associated with each of the beacons.
- the wireless device 108 can be associated with an access device that provides an optimal network connection based on the maximum beacon signal strength.
- the wireless device 108 may use other criteria related to optimal connection. For example, an optimal connection may be associated with more desirable services (eg, content, data rate, etc.).
- WLAN-based P2P eg Wi-Fi Direct, WFD
- WLAN-based P2P networks can perform Device-to-Device (D2D) (or Peer to Peer, P2P) communication with each other, even if Wi-Fi devices do not participate in home, office, and hotspot networks.
- D2D Device-to-Device
- P2P Peer to Peer
- WLAN-based P2P communication is referred to as WLAN P2P communication (simply P2P communication) or WLAN D2D communication (simply D2D communication).
- a WLAN P2P performing device is referred to as a WLAN P2P device, or simply a P2P device.
- the WLAN P2P network 200 may include at least one P2P device including a first P2P device 202 and a second P2P device 204.
- P2P devices include devices that support WLANs (eg, Wi-Fi, ZigBee, licensed band-based LANs) such as display devices, printers, digital cameras, projectors, and smartphones.
- the P2P device also includes a non-AP STA and an AP STA.
- the first P2P device 202 is a smartphone and the second P2P device 204 is a display device.
- P2P communication refers to a communication technology that is installed in a portable device and a mobile terminal to provide a basis for using contents and services between devices through direct communication between terminals without additional equipment such as an AP or a router. That is, P2P devices in the P2P network may be directly connected to each other.
- P2P communication is a case in which a signal transmission path between two P2P devices is directly established between corresponding P2P devices without passing through a third device (for example, an AP) or an existing network (for example, accessing a WLAN through an AP). Can mean.
- the signal transmission path directly set between the two P2P devices may be limited to the data transmission path.
- P2P communication may refer to a case where a plurality of non-STAs transmit data (eg, voice / video / text information) without passing through the AP.
- Signal transmission paths for control information e.g., resource allocation information for P2P configuration, wireless device identification information, etc.
- P2P devices e.g., non-AP STA-to-non-AP STA, non-AP STA-to- Directly set between APs, or between two P2P devices (eg, non-AP STA-to-non-AP STA) via the AP, or AP and corresponding P2P device (eg, AP-to-non-AP STA).
- # 1 AP-to-non-AP STA # 2.
- P2P is mainly used for semi-static communication such as remote printing, photo sharing and the like.
- WLAN devices due to the generalization of WLAN devices and location-based services, the utilization of P2P is getting wider.
- social chat e.g., wireless devices subscribed to Social Network Service (NSS) recognizes and sends information to nearby wireless devices based on location-based services
- location-based advertising e.g., location-based advertising
- location-based news P2P e.g., location-based news P2P is expected to be actively used for broadcasting and game linkage between wireless devices.
- P2P applications are referred to as novel P2P applications.
- FIG. 3 illustrates a P2P network aspect when a new P2P application (eg, social chat, location-based service provision, game linkage, etc.) is applied.
- a new P2P application eg, social chat, location-based service provision, game linkage, etc.
- a new P2P application eg, social chat, location-based service provision, game linkage, etc.
- a new P2P application eg, social chat, location-based service provision, game linkage, etc.
- the WLAN P2P network configuration process can be largely divided into two processes.
- the first process is the neighbor discovery process (Neighbor Discovery, ND, procedure), and the second process is the P2P link establishment and communication process.
- ND Network Discovery
- the second process is the P2P link establishment and communication process.
- a P2P device eg, 202 of FIG. 2 finds another neighboring P2P device (eg, 204 of FIG. 2) within its (wireless) coverage and associates with the corresponding P2P device, for example.
- information necessary for pre-association can be obtained.
- pre-connection may mean a second layer pre-connection in a wireless protocol.
- the information necessary for pre-connection may include, for example, identification information about the neighboring P2P device.
- FIG. 4 illustrates a neighbor discovery process. This example illustrates the operation between P2P device 202 and P2P device 204 in FIG.
- the neighbor discovery process may be initiated by an indication of a station management entity (SME) / application / user / vendor (S410), a scan phase (S412), and a find phase. It can be divided into (S414 ⁇ S416).
- the scan step S412 includes an operation of scanning for all available wireless channels according to the 802.11 scheme. This allows the P2P device to identify the best operating channel.
- the search steps S414 to S416 include a listen mode S414 and a search mode S416, and the P2P device alternately repeats the listen mode S414 and the search mode S416.
- the P2P devices 202 and 204 perform active searching using a probe request frame in the discovery mode (S416), and the discovery range is set to channels 1, 6, and 11 (2412, 2437, 2462 MHz) for quick discovery. It may be limited to a social channel of). In addition, the P2P devices 202 and 204 select only one channel among the three social channels in the listening mode S414 and maintain the received state. At this time, when a probe request frame transmitted from another P2P device (eg, 202) in the discovery mode is received, the P2P device (eg, 204) responds with a probe response frame.
- the listening mode (S414) time may be given randomly (eg, 100, 200, 300 Time Units (TU)).
- the P2P device may repeat the discovery mode and the reception mode repeatedly to reach each other's common channel. After discovering another P2P device, the P2P device may discover / exchange the device type, manufacturer or friendly device name using the probe request frame and the probe response frame to selectively bind to the corresponding P2P device. If the neighbor P2P device is found through the neighbor discovery process and necessary information is obtained, the P2P device (eg, 202) may inform the SME / application / user / vendor of the P2P device discovery (S418).
- an authentication / encryption process of the 802.11 WLAN will be described.
- a first communication structure / mode eg, FIG. 1
- an STA is associated with an AP, and communication is performed between the STA and the AP.
- 802.11 WLANs support both authentication and encryption algorithms.
- the authentication process refers to a process of determining whether to allow or block network access by distinguishing user information. If network access is allowed through the authentication process, data transmitted and received over the air interface is encrypted.
- authentication is performed between the authentication server (AS) and the STA, and the AS generates a key and transmits it to the AP.
- AS authentication server
- the AS refers to an 802.1x component that performs an authentication service to a terminal for network access, and may be implemented through a RADIUS (Remote Authentication Dial In User Service) server, an AAA (Authentication, authorization, and accounting) server, and the like.
- RADIUS Remote Authentication Dial In User Service
- AAA Authentication, authorization, and accounting
- IBSS independent BSS
- the AS may send a shared key to a peer instead of an AP.
- the key is used for encryption / decryption of all data transmitted over the air interface.
- STAs may perform communication with each other in a peer-to-peer manner. In this case, authentication and encryption can be performed similarly as in the first communication structure / mode.
- Wired Equivalent Privacy WEP performs authentication / encryption using the shared key.
- the shared key authentication process is largely divided into four steps S502 to S508.
- the STA transmits an authentication request message to the AP (S502).
- the authentication request message includes a STA identity.
- Second Step The AP transmits a challenge text to the STA (S504).
- Step 3 The STA encrypts the challenge text of the second step by using the 64-bit or 128-bit key set in the STA, and then transmits the encrypted challenge text to the AP (S506).
- Step 4 The AP decrypts the challenge text encrypted using the WEP key set for the corresponding STA.
- the AP compares the decrypted text with the original text. If the two texts are the same, it means that the AP and the STA share the same WEP key, so the AP notifies the STA of the authentication success (S508). Thereafter, the STA and the AP perform an association process (S510), and data transmitted / received through the air interface is encrypted using a shared key. On the other hand, if the two texts are different, it means that the AP and the STA do not share the same WEP key, so the AP notifies the STA of the authentication failure (S508). In this case, the STA may not perform an association process with the AP.
- RSN Robust Security Network
- TKIP Temporal Key Integrity Protocol
- CCMP Counter Mode with cipher block chaining message authentication code protocol
- Security capabilities discovery (S602): The AP advertises network security capabilities to the STA. Targets capable of communicating can be determined through security capability discovery.
- 802.1X authentication (S604): Centralize network admission policy decisions at the AS. Mutual authentication of STA and AS.
- the master key is generated as a result of authentication.
- the master key represents a positive connection decision.
- a pairwise master key (PMK) is generated as a connection authentication token. PMK indicates approval for 802.11 media.
- RADIUS-based key distribution (S606): The AS moves the PMK (without copying) to the STA's AP.
- 802.1X management (S608): Bind the PMK to the STA and the AP. Confirm that both the AP and the STA own the PMK. Creates a fresh Pairwise Transient Key (PTK), synchronizes PTK usage, and distributes GTK (Group Transient Key).
- PTK is a collection of Key Confirmation Key (KCK), Key Encryption Key (KEK), and Temporal Key (TK).
- KCK is used to bind PMKs to APs and STAs, and is used to prove PMK ownership.
- KEK is used for GTK distribution.
- TK is used for data encryption. This procedure is performed by a 4-way handshake using PMK.
- a high overhead occurs because a large number of packets are exchanged between the STA, AP and AS for authentication and key distribution.
- This overhead may be no problem with existing static network architectures (eg, FIG. 1).
- the existing high overhead may not be desirable because the terminals are constantly moving and the session between the terminals is maintained only for a very short time.
- P2P applications such as social chat, online games, location-based advertising, location-based news, and the like (FIG. 3)
- P2P communication between a large number of P2P devices in a dense network environment may occur dynamically / shortly. Can be done.
- there may be a high number of sessions and users within the radio range of the STA and the overhead problem due to authentication / encryption may be more important.
- the present invention proposes a method for managing / distributing a key for P2P communication using a cellular network.
- the P2P device requires an authentication process every time when joining or creating a network, and may also go through several steps of key distribution every time. This is because the authentication status of the corresponding P2P device is not known when the network is first joined / created.
- the corresponding P2P devices are connected to the cellular network (as long as they are connected to the cellular network). This means that the authentication is done within. Accordingly, when performing P2P communication (eg, social chat, etc.) between P2P devices distributed with a key from the cellular network, an additional authentication / key distribution process for P2P communication may be omitted.
- P2P communication e.g, social chat, etc.
- a P2P device that has received a P2P communication key from a cellular network e.g., a base station
- the authentication process is performed. By omitting, it is possible to perform P2P communication more efficiently.
- the P2P device includes both a cellular communication module and a WLAN communication module (eg, a Wi-Fi, ZigBee, and a licensed band communication module based on a small cell). Mixed with the terminal.
- a WLAN communication module eg, a Wi-Fi, ZigBee, and a licensed band communication module based on a small cell.
- the P2P device is connected to the cellular network.
- the group key may be assigned for each service category for P2P.
- the base station (cellular base station) of the cellular network transmits a ⁇ service category, key ⁇ list to the STA / terminal in the cell.
- the ⁇ Service Category, Key ⁇ list is shared with one or more STAs / terminals in the cell, and these keys are used for P2P service discovery and communication.
- the ⁇ service category, key ⁇ list may be transmitted in a STA / terminal-specific, STA / terminal group-specific, cell-specific manner (based on a service of interest to the STA / terminal).
- the STA / terminals within a cell are informed about one or more services of interest (eg, services). List) can be transmitted to the cellular base station in advance.
- services of interest eg, services
- P2P communication is performed based on the service category. That is, P2P communication is performed between a plurality of STAs / terminals using the same service category (ie, the same key), and STAs / terminals performing P2P do not need to know each other. Accordingly, the STA / terminal is P2P with one or more other STA / terminals in the proxy without knowing information about other STAs / terminals in the proxy or the group to which the other STA / terminal belongs. It is possible to carry out communication.
- the STA / terminal by transmitting the ⁇ service category, key ⁇ list from the base station to the STA / terminal in the cell, the STA / terminal not only obtains a key for P2P communication, but also belongs to the corresponding P2P service group even if the P2P service group does not go through the process. The operation of the case can be performed.
- FIG. 7 illustrates a group key distribution / management process according to the present example.
- a group key management / distribution process and P2P communication accordingly may be performed as follows.
- the STA / terminal may request a list of P2P group keys (eg, social P2P keys) from the base station.
- P2P group keys eg, social P2P keys
- service categories, IDs (S1, S2, ..., Sn) (n: integers greater than or equal to 1) for the corresponding categories and service categories may be given as shown in Table 1.
- Table 1 ID Service category Description 0
- STA / UE talk to each other (unicast or multicast) (similar to Kakao talk)
- One Socail advertisement STA / UE broadcasts advertisement information such as coupons, weekly ad, special deals, etc 2
- STA / UE exchange data for location-dependent information such as local restaurant review, theater movie list, etc 3
- On-line gaming STA / UE participate on-line multi-party gaming without accessing a centralized game server 4-255 Reserved
- Step 2 After receiving the request for the P2P group key list, the base station transmits a list of (service category identification information (eg, ID), key) to the STA / terminal for the service category supported in the cell ( ⁇ S1 , K1), (S2, K2), ..., (Sn, Kn) ⁇ ).
- service category identification information eg, ID
- key service category supported in the cell
- the STA / terminal may encrypt / decrypt a message belonging to a specific service category by using a group key.
- the STA / terminal may encrypt the message with a key Ki corresponding to the service category Si.
- the STA / terminal may attempt to decrypt the received message with the key Ki corresponding to the service category Si. That is, the STA / terminal may attempt to decrypt the received message using only the key corresponding to the service category of interest.
- the STA / terminal may attempt to decrypt the received message by using a plurality of corresponding keys.
- information about the group key (or service category, service category ID) may be included in the message header, whereby the counterpart STA / terminal is not desired.
- HY physical
- MAC medium access control
- one STA / terminal when using P2P communication sharing a key assigned to a service group, can provide information of the target STA / terminal (eg STA / terminal ID) or information about the group to which the target STA / terminal belongs. You can send / receive data without knowing it.
- information of the target STA / terminal eg STA / terminal ID
- information about the group to which the target STA / terminal belongs You can send / receive data without knowing it.
- the group key proposed in this example may be updated according to a predetermined condition.
- the base station may provide a group key to the STA / terminal and set a “KEY EXPIRATION” timer.
- the "KEY EXPIRATION” timer may expire after T time after sending the group key to the STA / terminal.
- the base station can regenerate the group key and send a list of (service category ID, updated key) to the STA / terminal.
- the STA / terminal requests the base station to update a group key (eg, a social P2P key), and the base station may update the group key in consideration of this.
- the STA / terminal can request the base station to update the group key when the timer set in the terminal expires. In this case, the timer operates when the group key is provided and may expire after T1 time.
- the group key mechanism of Option 1 is summarized as follows: (1) The group key can be encrypted so that any STA / terminal authenticated in the cellular network can encrypt / decrypt the messages of all services or groups supported in the cell. Providing, (2) data for an unwanted group (or service category) is filtered at the Physical (PHY) layer, and unfiltered data is decrypted at the Medium Access Control (MAC) layer, and (3) corresponding to the service category. Since P2P communication is performed based on the group key, data transmission line is possible without information on the partner STA / terminal.
- PHY Physical
- MAC Medium Access Control
- the present invention describes a method for providing a secure P2P connection using a cellular network.
- an STA / terminal in a cell knows existence and identification information (eg, STA / terminal ID) of another STA / terminal in a cell capable of P2P communication through an existing neighbor discovery process (eg, FIG. 4).
- the individual key may mean a key shared by P2P peers (ie, two STAs / terminals) or a key shared only by a limited number or a limited group of STAs / terminals.
- P2P peers ie, two STAs / terminals
- a key shared only by a limited number or a limited group of STAs / terminals ie, two STAs / terminals.
- an individual key management / distribution process and corresponding P2P communication may be performed as follows.
- the STA / terminal may request a key for a P2P session with UE3 from the base station.
- the key request message may include identification information (eg, STA / terminal ID) for the counterpart STA / terminal and information (eg, ID information of Table 1) about a desired service (eg, social chat).
- identification information eg, STA / terminal ID
- STA / terminal ID the opponent STA / terminal may be omitted or set to a predetermined value. Can be.
- Second step After receiving a P2P key request from UE1, the base station provides a public key of each peer to UE1 and UE3.
- a private key K_UE1 of UE1 is provided / disclosed to UE3
- a private key K_UE3 of UE3 is provided / disclosed to UE1.
- UE3 may be a STA / terminal requested by UE1 or a STA / terminal arbitrarily selected by a base station according to a service type.
- Step 3 The STA / terminal encrypts the data using the public key, and the counterpart STA / terminal decrypts the received data using its private key.
- UE1 encrypts the transmission data using the public key K_UE3, and UE3 decrypts the received data using the private key K_UE3.
- UE3 encrypts the transmitted data using the public key K_UE1, and UE1 decrypts the received data using the private key K_UE1.
- Providing the public key only when requested by the STA / terminal may be more efficient when the number of established P2P sessions is smaller than the number of STA / terminal peers.
- FIG 9 illustrates a WLAN P2P device that can be applied to the present invention.
- a WLAN-based P2P network includes a first P2P device 110 and a second P2P device 120.
- the first P2P device 110 includes a processor 112, a memory 114, and a radio frequency (RF) unit 116.
- the processor 112 may be configured to implement the procedures and / or methods proposed in the present invention.
- the memory 114 is connected to the processor 112 and stores various information related to the operation of the processor 112.
- the RF unit 116 is connected with the processor 112 and transmits and / or receives a radio signal.
- the RF unit 116 includes both a cellular communication module and a WLAN communication module (eg, a communication module for a licensed band based on Wi-Fi, ZigBee, small cell).
- the second P2P device 120 includes a processor 122, a memory 124, and an RF unit 126.
- the processor 122 may be configured to implement the procedures and / or methods proposed by the present invention.
- the memory 124 is connected with the processor 122 and stores various information related to the operation of the processor 122.
- the RF unit 126 is connected with the processor 122 and transmits and / or receives a radio signal.
- the RF unit 126 includes both a cellular communication module and a WLAN communication module (eg, a communication module for a licensed band based on Wi-Fi, ZigBee, small cell).
- the first P2P device 110 and / or the second P2P device 120 may have a single or multiple antennas.
- Embodiments according to the present invention may be implemented by various means, for example, hardware, firmware, software, or a combination thereof.
- an embodiment of the present invention may include one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), FPGAs ( field programmable gate arrays), processors, controllers, microcontrollers, microprocessors, and the like.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGAs field programmable gate arrays
- processors controllers, microcontrollers, microprocessors, and the like.
- an embodiment of the present invention may be implemented in the form of a module, procedure, function, etc. that performs the functions or operations described above.
- the software code may be stored in a memory unit and driven by a processor.
- the memory unit may be located inside or outside the processor, and may exchange data with the processor by various known means.
- the invention can be used in an apparatus for P2P communication, in particular WLAN-based P2P communication.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
ID | Service Category | Description |
0 | Social P2P chatting | STA/UE talk to each other (unicast or multicast) (similar to Kakao talk) |
1 | Socail Advertisement | STA/UE broadcasts advertisement information such as coupons, weekly ad, special deals, etc |
2 | Social map | STA/UE exchange data for location-dependent information such as local restaurant review, theater movie list, etc |
3 | On-line gaming | STA/UE participate on-line multi-party gaming without accessing a centralized game server |
4-255 | Reserved |
Claims (16)
- 셀룰러 네트워크에 연결된 제1 P2P(Peer to Peer) 장치에서 WLAN(Wireless Local Area Network)-기반 P2P 통신을 수행하는 방법에 있어서,셀룰러 기지국으로부터 하나 이상의 키 정보를 수신하되, 각각의 키 정보는 서비스 식별 정보와 대응하는 키 값을 포함하는 단계;제2 P2P 장치로부터 암호화된 데이터 신호를 수신하는 단계;상기 하나 이상의 키 정보 중, 상기 제1 P2P 장치가 관심 있는 하나 이상의 서비스에 대응하는 하나 이상의 키를 이용하여 상기 암호화된 데이터 신호의 해독화를 시도하는 위한 과정을 수행하는 단계를 포함하는 방법.
- 제1항에 있어서,상기 암호화된 데이터 신호의 수신은 상기 제2 P2P 장치에 대한 정보 또는 상기 제2 P2P 장치가 속하는 그룹에 대한 정보가 없는 상태에서 수신되는 방법.
- 제1항에 있어서,상기 하나 이상의 키 정보에 포함된 복수의 키 값은 상기 셀룰러 기지국이 서비스를 제공하는 셀 내의 모든 P2P 장치 또는 동일한 P2P 서비스에 관심이 있는 P2P 장치에 동일하게 설정되는 방법.
- 제1항에 있어서,상기 암호화된 데이터 신호의 헤더는 키 식별 정보, 서비스 식별 정보 중 적어도 하나를 포함하는 방법.
- 제4항에 있어서,상기 암호화된 데이터 신호의 헤더가 상기 제1 P2P가 관심 있는 키 또는 서비스에 관한 정보를 갖지 않는 경우, 상기 암호화된 데이터 신호는 버려지고,상기 암호화된 데이터 신호의 헤더가 상기 제1 P2P가 관심 있는 키 또는 서비스에 관한 정보를 갖는 경우, 상기 암호화된 데이터 신호에 대한 해독화 과정이 수행되는 방법.
- 제5항에 있어서,상기 암호화된 데이터 신호는 PHY(Physical) 계층에서 버려지고,상기 암호화된 데이터 신호에 대한 해독화 과정은 MAC(Medium Access Control) 계층에서 수행되는 방법.
- 제1항에 있어서,상기 하나 이상의 키 정보는 소정의 타이머가 만료되는 경우 갱신되는 방법.
- 제1항에 있어서,상기 하나 이상의 키 정보에 대해 갱신을 요청하는 정보를 상기 셀룰러 기지국에게 전송하는 단계를 더 포함하는 방법.
- 셀룰러 네트워크에 연결되고, WLAN(Wireless Local Area Network)-기반 P2P(Peer to Peer) 통신을 수행하도록 구성된 제1 P2P 장치에 있어서,무선 주파수(Radio Frequency, RF) 유닛; 및프로세서를 포함하고,상기 프로세서는 셀룰러 기지국으로부터 하나 이상의 키 정보를 수신하되, 각각의 키 정보는 서비스 식별 정보와 대응하는 키 값을 포함하고, 제2 P2P 장치로부터 암호화된 데이터 신호를 수신하며, 상기 하나 이상의 키 정보 중, 상기 제1 P2P 장치가 관심 있는 하나 이상의 서비스에 대응하는 하나 이상의 키를 이용하여 상기 암호화된 데이터 신호의 해독화를 시도하는 위한 과정을 수행하도록 구성된 제1 P2P 장치.
- 제9항에 있어서,상기 암호화된 데이터 신호의 수신은 상기 제2 P2P 장치에 대한 정보 또는 상기 제2 P2P 장치가 속하는 그룹에 대한 정보가 없는 상태에서 수신되는 제1 P2P 장치.
- 제9항에 있어서,상기 하나 이상의 키 정보에 포함된 복수의 키 값은 상기 셀룰러 기지국이 서비스를 제공하는 셀 내의 모든 P2P 장치 또는 동일한 P2P 서비스에 관심이 있는 P2P 장치에 동일하게 설정되는 제1 P2P 장치.
- 제9항에 있어서,상기 암호화된 데이터 신호의 헤더는 키 식별 정보, 서비스 식별 정보 중 적어도 하나를 포함하는 제1 P2P 장치.
- 제12항에 있어서,상기 암호화된 데이터 신호의 헤더가 관심 있는 키 또는 서비스에 관한 정보를 갖지 않는 경우, 상기 암호화된 데이터 신호는 버려지고,상기 암호화된 데이터 신호의 헤더가 관심 있는 키 또는 서비스에 관한 정보를 갖는 경우, 상기 암호화된 데이터 신호에 대한 해독화 과정이 수행되는 제1 P2P 장치.
- 제13항에 있어서,상기 암호화된 데이터 신호는 PHY(Physical) 계층에서 버려지고,상기 암호화된 데이터 신호에 대한 해독화 과정은 MAC(Medium Access Control) 계층에서 수행되는 제1 P2P 장치.
- 제9항에 있어서,상기 하나 이상의 키 정보는 소정의 타이머가 만료되는 경우 갱신되는 제1 P2P 장치.
- 제9항에 있어서,상기 프로세서는 또한 상기 하나 이상의 키 정보에 대해 갱신을 요청하는 정보를 상기 셀룰러 기지국에게 전송하도록 구성된 제1 P2P 장치.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020147012494A KR101958786B1 (ko) | 2011-10-10 | 2012-10-10 | Wlan(wireless local area network)-기반 p2p(peer to peer) 통신을 위한 방법 및 이를 위한 장치 |
US14/351,123 US9294278B2 (en) | 2011-10-10 | 2012-10-10 | Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161545205P | 2011-10-10 | 2011-10-10 | |
US61/545,205 | 2011-10-10 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2013055106A2 true WO2013055106A2 (ko) | 2013-04-18 |
WO2013055106A3 WO2013055106A3 (ko) | 2013-06-13 |
Family
ID=48082652
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2012/008220 WO2013055106A2 (ko) | 2011-10-10 | 2012-10-10 | Wlan(wireless local area network)-기반 p2p(peer to peer) 통신을 위한 방법 및 이를 위한 장치 |
Country Status (3)
Country | Link |
---|---|
US (1) | US9294278B2 (ko) |
KR (1) | KR101958786B1 (ko) |
WO (1) | WO2013055106A2 (ko) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015065063A1 (en) * | 2013-10-30 | 2015-05-07 | Samsung Electronics Co., Ltd. | Method and apparatus to identity verification using asymmetric keys in wireless direct communication network |
WO2015116413A1 (en) * | 2014-01-30 | 2015-08-06 | Intel IP Corporation | Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network |
EP3100572A1 (en) * | 2014-01-30 | 2016-12-07 | Telefonaktiebolaget LM Ericsson (publ) | Pre-configuration of devices supporting national security and public safety communications |
US10045261B2 (en) | 2014-12-10 | 2018-08-07 | Intel Corporation | Methods, systems, and devices for handover in multi-cell integrated networks |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101915314B1 (ko) * | 2011-10-25 | 2018-11-07 | 삼성전자주식회사 | 휴대단말기에서 WPS(Wi-Fi Protecte d Setup)을 이용한 와이파이 연결 방법 및 장치 |
TWI528766B (zh) * | 2012-02-05 | 2016-04-01 | 財團法人資訊工業策進會 | 直接通訊系統及其探索互動方法 |
KR20130109781A (ko) * | 2012-03-28 | 2013-10-08 | 한국전자통신연구원 | 셀룰러 이동통신 시스템에서의 단말간 직접 통신을 위한 자원 할당 방법 |
CN104023375B (zh) * | 2013-02-28 | 2017-06-23 | 株式会社理光 | 网络节点发现方法和装置 |
JP6838789B2 (ja) | 2013-06-28 | 2021-03-03 | 日本電気株式会社 | Ue及びその通信方法 |
KR102209289B1 (ko) * | 2013-10-11 | 2021-01-29 | 삼성전자 주식회사 | 이동 통신 시스템 환경에서 프록시미티 기반 서비스를 위한 보안 및 정보 지원 방법 및 시스템 |
US9876767B2 (en) * | 2014-05-09 | 2018-01-23 | Alcatel Lucent | Secure device-to-device (D2D) communication |
US10154532B2 (en) * | 2014-10-16 | 2018-12-11 | Kyocera Corporation | User terminal, relay apparatus, and processor |
US10897706B2 (en) | 2014-11-06 | 2021-01-19 | Samsung Electronics Co., Ltd. | Bootstrapping Wi-Fi direct communication by a trusted network entity |
US9872234B2 (en) | 2015-02-12 | 2018-01-16 | Intel IP Corporation | Apparatus, system and method of communicating in an awareness cluster |
US10075447B2 (en) | 2015-03-04 | 2018-09-11 | Neone, Inc. | Secure distributed device-to-device network |
US20170181205A1 (en) * | 2015-12-21 | 2017-06-22 | Intel Corporation | Direct connection network |
US11012227B2 (en) | 2016-07-01 | 2021-05-18 | Lg Electronics Inc. | Authentication method and system for device using Bluetooth technology |
US10574445B2 (en) * | 2016-12-21 | 2020-02-25 | Intel IP Corporation | Range constrained device configuration |
US11025596B1 (en) * | 2017-03-02 | 2021-06-01 | Apple Inc. | Cloud messaging system |
US10839060B1 (en) * | 2019-08-27 | 2020-11-17 | Capital One Services, Llc | Techniques for multi-voice speech recognition commands |
CN117979285A (zh) * | 2022-10-24 | 2024-05-03 | 华为技术有限公司 | 一种数据传输方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070110822A (ko) * | 2007-10-29 | 2007-11-20 | 한국정보통신주식회사 | 통신 프로토콜 스택의 스위칭 기능을 이용한 이종의 무선통신망에 대한 종단간 보안 통신을 위한 단말장치 |
US20080069348A1 (en) * | 2006-09-18 | 2008-03-20 | Jesse Walker | Techniques for key derivation for secure communication in wireless mesh networks |
US20100299517A1 (en) * | 2009-05-22 | 2010-11-25 | Nuvon, Inc. | Network System with a Plurality of Networked Devices with Various Connection Protocols |
KR20110042711A (ko) * | 2009-10-20 | 2011-04-27 | 삼성전자주식회사 | 개인 네트워크를 이용한 서비스 제공 방법 및 장치 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020174335A1 (en) * | 2001-03-30 | 2002-11-21 | Junbiao Zhang | IP-based AAA scheme for wireless LAN virtual operators |
WO2003047160A1 (en) * | 2001-11-30 | 2003-06-05 | Thumbaccess Biometrics Corporation Pty Ltd | An encryption system |
WO2006000239A1 (en) * | 2004-06-24 | 2006-01-05 | Telecom Italia S.P.A. | Method and system for controlling access to communication networks, related network and computer program therefor |
US8401535B2 (en) * | 2006-06-19 | 2013-03-19 | Samsung Electronics Co., Ltd. | System, a method, and an apparatus for sharing an updated content with peers |
US7801098B2 (en) * | 2007-01-23 | 2010-09-21 | Broadcom Corporation | Parallel MAC/PHY for enhanced transmission rate in a wireless network |
KR100955573B1 (ko) * | 2007-11-14 | 2010-04-30 | 에스케이 텔레콤주식회사 | 편의 서비스 인증 방법 및 시스템 |
US8196186B2 (en) * | 2008-05-20 | 2012-06-05 | Microsoft Corporation | Security architecture for peer-to-peer storage system |
KR101418570B1 (ko) * | 2009-10-12 | 2014-07-10 | 한국전자통신연구원 | P2p 제어 장치 및 전송 오버레이 제어 방법 |
US8855134B2 (en) * | 2012-07-25 | 2014-10-07 | Qualcomm Incorporated | Network-assisted peer discovery |
KR102064389B1 (ko) * | 2013-08-30 | 2020-01-13 | 삼성전자 주식회사 | 무선 통신 시스템에서 액세스 포인트 탐색 방법 및 장치 |
-
2012
- 2012-10-10 WO PCT/KR2012/008220 patent/WO2013055106A2/ko active Application Filing
- 2012-10-10 US US14/351,123 patent/US9294278B2/en not_active Expired - Fee Related
- 2012-10-10 KR KR1020147012494A patent/KR101958786B1/ko active IP Right Grant
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080069348A1 (en) * | 2006-09-18 | 2008-03-20 | Jesse Walker | Techniques for key derivation for secure communication in wireless mesh networks |
KR20070110822A (ko) * | 2007-10-29 | 2007-11-20 | 한국정보통신주식회사 | 통신 프로토콜 스택의 스위칭 기능을 이용한 이종의 무선통신망에 대한 종단간 보안 통신을 위한 단말장치 |
US20100299517A1 (en) * | 2009-05-22 | 2010-11-25 | Nuvon, Inc. | Network System with a Plurality of Networked Devices with Various Connection Protocols |
KR20110042711A (ko) * | 2009-10-20 | 2011-04-27 | 삼성전자주식회사 | 개인 네트워크를 이용한 서비스 제공 방법 및 장치 |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015065063A1 (en) * | 2013-10-30 | 2015-05-07 | Samsung Electronics Co., Ltd. | Method and apparatus to identity verification using asymmetric keys in wireless direct communication network |
KR20160078426A (ko) * | 2013-10-30 | 2016-07-04 | 삼성전자주식회사 | 무선 직접통신 네트워크에서 비대칭 키를 사용하여 아이덴티티를 검증하기 위한 방법 및 장치 |
US10631162B2 (en) | 2013-10-30 | 2020-04-21 | Samsung Electronics Co., Ltd. | Method and apparatus to perform device to device communication in wireless communication network |
KR102398221B1 (ko) * | 2013-10-30 | 2022-05-16 | 삼성전자주식회사 | 무선 직접통신 네트워크에서 비대칭 키를 사용하여 아이덴티티를 검증하기 위한 방법 및 장치 |
WO2015116413A1 (en) * | 2014-01-30 | 2015-08-06 | Intel IP Corporation | Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network |
CN105850169A (zh) * | 2014-01-30 | 2016-08-10 | 英特尔Ip公司 | 无线局域网中用户设备(ue)的安全通信的装置、系统和方法 |
US9426649B2 (en) | 2014-01-30 | 2016-08-23 | Intel IP Corporation | Apparatus, system and method of securing communications of a user equipment (UE) in a wireless local area network |
EP3100572A1 (en) * | 2014-01-30 | 2016-12-07 | Telefonaktiebolaget LM Ericsson (publ) | Pre-configuration of devices supporting national security and public safety communications |
KR101836021B1 (ko) | 2014-01-30 | 2018-04-19 | 인텔 아이피 코포레이션 | 무선 근거리 네트워크에서 사용자 장비(ue)의 통신을 보안하기 위한 장치, 시스템 및 방법 |
US10045261B2 (en) | 2014-12-10 | 2018-08-07 | Intel Corporation | Methods, systems, and devices for handover in multi-cell integrated networks |
Also Published As
Publication number | Publication date |
---|---|
KR101958786B1 (ko) | 2019-07-02 |
US9294278B2 (en) | 2016-03-22 |
US20140301552A1 (en) | 2014-10-09 |
WO2013055106A3 (ko) | 2013-06-13 |
KR20140085504A (ko) | 2014-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013055106A2 (ko) | Wlan(wireless local area network)-기반 p2p(peer to peer) 통신을 위한 방법 및 이를 위한 장치 | |
US10568152B2 (en) | Access network query protocol method and apparatus | |
US10064211B2 (en) | Accessing applications by devices in proximity in a communications network | |
US10362451B2 (en) | Methods, devices, and computer program products for facilitating device-to-device communication among wireless communication devices | |
JP2023062112A (ja) | Ieee802.11ネットワークにおける動的macアドレス配布のための方法および手順 | |
WO2014109513A1 (ko) | 무선 통신 시스템에서 디스커버리 방법 및 장치 | |
WO2014088378A1 (ko) | 무선 통신 시스템에서 세션 초기화 방법 및 장치 | |
WO2014123383A1 (ko) | 무선 통신 시스템에서 세션 수립 방법 및 장치 | |
WO2013035999A1 (ko) | WFD(Wireless Fidelity Direct) P2P(Peer to Peer) 통신을 위한 이웃 발견 방법 및 이를 위한 장치 | |
WO2014158006A1 (ko) | 장치 간 통신 방법 및 장치 | |
WO2015065165A1 (ko) | 이동 통신 시스템 환경에서 프락시미티 기반 서비스 단말 간 발견 및 통신을 지원하기 위한 보안 방안 및 시스템 | |
KR101670753B1 (ko) | 와이파이 다이렉트(Wi- Fi Direct) P2P(Peer to Peer) 통신을 위한 기기 발견 방법 및 이를 위한 장치 | |
JP2016522639A (ja) | 通信ネットワークにおけるデバイス−デバイス間通信に関するデバイス発見方法、ユーザ機器デバイスおよびコンピュータプログラム製品 | |
CN114846841A (zh) | 使用wtru到wtru中继的直接发现和通信的方法和设备 | |
WO2017039376A1 (ko) | 무선 통신 시스템에서 연결 능력 정보를 교환하는 방법 및 장치 | |
WO2017014579A1 (ko) | 무선 통신 시스템에서 디스커버리를 수행하는 방법 및 장치 | |
WO2015119329A1 (ko) | 무선 통신 시스템에서 디스커버리를 수행하는 방법 및 장치 | |
JP2022524704A (ja) | Pc5インターフェース上においてv2xユニキャスト通信を可能にする手順 | |
WO2015167269A1 (ko) | 무선 통신 시스템에서 서비스 디스커버리 방법 및 장치 | |
WO2016068632A1 (ko) | 무선 통신 시스템에서 와이파이 다이렉트를 지원하는 장치가 디스커버리를 수행하는 방법 및 장치 | |
WO2016126138A1 (ko) | 무선 통신 시스템에서 세션 수립 방법 및 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12839325 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14351123 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 20147012494 Country of ref document: KR Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12839325 Country of ref document: EP Kind code of ref document: A2 |