Authentication scheme for ad hoc and sensor wireless networks

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C713S155000, C713S161000, C705S067000

Reexamination Certificate

active

07096359

ABSTRACT:
Strong authentication of packets sent between nodes of different clusters in a two-tier ad hoc network is provided by the cluster heads. Each cluster head authenticates nodes that enter the cluster. Thereafter, when a sending node requests a session from its cluster head with a receiving node in another cluster, the cluster head negotiates a session secret key (SSK) with the corresponding cluster head of the receiving node. Further, the cluster head provides authentication tags for the sending node to use with each packet. Each authentication tag is time-stamped, digitally signed by the cluster head, encrypted with the SSK, and includes indicators of message integrity, including a sequence number and TCP header field of checksum. The sending node further calculates a check result from a number of the authentication tags, encrypted with the SSK, so that the receiving node can authenticate the number of packets.

REFERENCES:
patent: 5757913 (1998-05-01), Bellare et al.
patent: 5987136 (1999-11-01), Schipper et al.
patent: 6915426 (2005-07-01), Carman et al.
patent: 6976168 (2005-12-01), Branstad et al.
patent: 1033657 (2000-09-01), None
Menezes et al., Handbook of Applied Cryptography, 1997, CRC Press, p. 361.
Microsoft Computer Dictionary, 4thed., 1999, Microsoft Press, definition of “packet header”.
Mario Gerla and Jack Tsu-Chieh Tsai, “Multicluster, mobile, multimedia radio network”, 1995, Kluwer Academic Publishers, Wirel. Netw. 3, vol. 1, pp. 255-265.
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography., 1997, CRC Press, pp. 362,363, 399-401, 570, 571.
Abdul-Rahman et al,Security Issues in Mobile Systems, University College London, Nov., 1995.
Zhou, Haas,Securing Ad Hoc Networks*, Cornell University, Ithaca, NY 1999.
James Binkley,Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems, Technical Report 96-3, Portland State University, Portland, Oregon 1996.
Corson et al,Manet Authentication Architecture, ietf.org, Aug. 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication scheme for ad hoc and sensor wireless networks does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication scheme for ad hoc and sensor wireless networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication scheme for ad hoc and sensor wireless networks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3624024

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.