Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-08-22
2006-08-22
Moise, Emmanuel L. (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S153000, C713S155000, C713S161000, C705S067000
Reexamination Certificate
active
07096359
ABSTRACT:
Strong authentication of packets sent between nodes of different clusters in a two-tier ad hoc network is provided by the cluster heads. Each cluster head authenticates nodes that enter the cluster. Thereafter, when a sending node requests a session from its cluster head with a receiving node in another cluster, the cluster head negotiates a session secret key (SSK) with the corresponding cluster head of the receiving node. Further, the cluster head provides authentication tags for the sending node to use with each packet. Each authentication tag is time-stamped, digitally signed by the cluster head, encrypted with the SSK, and includes indicators of message integrity, including a sequence number and TCP header field of checksum. The sending node further calculates a check result from a number of the authentication tags, encrypted with the SSK, so that the receiving node can authenticate the number of packets.
REFERENCES:
patent: 5757913 (1998-05-01), Bellare et al.
patent: 5987136 (1999-11-01), Schipper et al.
patent: 6915426 (2005-07-01), Carman et al.
patent: 6976168 (2005-12-01), Branstad et al.
patent: 1033657 (2000-09-01), None
Menezes et al., Handbook of Applied Cryptography, 1997, CRC Press, p. 361.
Microsoft Computer Dictionary, 4thed., 1999, Microsoft Press, definition of “packet header”.
Mario Gerla and Jack Tsu-Chieh Tsai, “Multicluster, mobile, multimedia radio network”, 1995, Kluwer Academic Publishers, Wirel. Netw. 3, vol. 1, pp. 255-265.
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography., 1997, CRC Press, pp. 362,363, 399-401, 570, 571.
Abdul-Rahman et al,Security Issues in Mobile Systems, University College London, Nov., 1995.
Zhou, Haas,Securing Ad Hoc Networks*, Cornell University, Ithaca, NY 1999.
James Binkley,Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems, Technical Report 96-3, Portland State University, Portland, Oregon 1996.
Corson et al,Manet Authentication Architecture, ietf.org, Aug. 1998.
Agrawal Dharma P.
Venkataraman Lakshmi
Moise Emmanuel L.
University of Cincinnati
Williams, Jr. Jeffery
Wood Herron & Evans L.L.P.
LandOfFree
Authentication scheme for ad hoc and sensor wireless networks does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authentication scheme for ad hoc and sensor wireless networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication scheme for ad hoc and sensor wireless networks will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3624024