摘要:
An approach is provided for using pseudonyms to protect privacy and anonymity of communication messages. A pseudonym is extracted from a received message for comparison against a precomputed set of pseudonyms associated respectively with a plurality of communities of wireless nodes. The pseudonyms are valid only for a particular time period.
摘要:
Systems and techniques for key management in mobile ad hoc networks are described. Pseudonyms are defined for group members of mobile ad hoc networks such that a pseudonym in a message can be deterministically identified with the sending device only by the sending device and the message recipient. Key management for a group is performed by a group manager (U.), and key management may include key renewal and revocation. Key renewal is performed by a group 'manager, with the group manager using a set of couple pseudonyms (q..), including a couple pseudonym between the manager and each group member. Key renewal employs^a renewal key used to encrypt the updated group key, and the group manager updates the group key by transmitting a message to each group member in proximity (402), with the message being identified using the couple pseudonym of the manager and the group member.
摘要:
A method including changing an access address of a network interface of a wireless network node, changing a frame sequence number of a network interface of the wireless network node in an unpredictable manner, and performing the changing of the access address and changing of the frame sequence number in a coordinated manner.
摘要:
A method for establishing an encrypted communication channel is described. Query IDs are generated at a first device. Each query ID identifies a keyword in a set of keywords. Query IDs are received, at a second device. A second set of keywords is determined by the second device based on the query IDs. Match IDs are determined based on the second set. Each match ID identifies a keyword in the second set. An encryption key is generated based on the second set. A response is sent which includes the match IDs and an encrypted message. At the first device, the second set is determined based on the match IDs. The second set includes keywords of the first set of keywords identified by the match IDs. The encryption key is generated at the first device and the encrypted message is decrypted. Apparatus and computer readable media are also described.
摘要:
One aspect of the invention discloses a method of authenticating an application. The method comprising performing, with a server application, bootstrapping procedures between the server application and a bootstrapping server function; deriving a shared key based on at least a key received from the bootstrapping server function server during the bootstrapping procedures and a network application function identifier; providing an application with a bootstrapping transaction identifier, the bootstrapping transaction identifier being received from the bootstrapping server function server during the bootstrapping procedures; receiving a response from the application; and authenticating the application by validating the response with the shared key.