Abstract:
In a disclosed embodiment, a method for communication in a network includes receiving, at a first device registered to the network, a physical layer (PHY) frame that includes a PHY header and a MAC header. The PHY frame may further include a MAC payload. The PHY header includes a destination address field. The method further includes comparing a network address of the first device to the destination address field to determine whether the destination address field stores a value having the same number of bits as the network address. When the comparison indicates that the value stored by the destination address field does not have the same number of bits as the network address, the method skips decoding the MAC header and the MAC payload.
Abstract:
Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
Abstract:
A method of channel access for a radio device in an asynchronous channel hopping wireless network. A backoff time is set from an Interference Avoidance Delay plus a random backoff time for transmissions from the radio device. For initial frame transmissions, an initial value for a number of backoffs (nb) and initial number of preamble detection backoffs (npdb) is set. After waiting for expiring of the initial backoff time and provided a current npdb_value
Abstract:
A communication system and method includes receiving payload data of first and second media access control (MAC) frames. A MAC-level protocol is identified in response to the indication of the selected network for each of the first and second MAC frames. The payload data of the first and second MAC frames is transmitted and/or received across respective networks transmitted using, for example, power line communications signals over a common communications medium. The common communications medium is operable for carrying signals of a plurality of networks.
Abstract:
Power conservation is provided in a network of globally unsynchronized wireless communication devices that use asynchronous channel hopping. Each wireless communication device defines its own channel hopping schedule. The channel hopping schedules include channel hop intervals when the device's receiver is active for receiving transmissions, and sleep intervals when the receiver is in a low power sleep state. Parameters associated with the sleep intervals are defined by each wireless communication device independently of external constraint.
Abstract:
A wireless transmission having a header and a payload is sent by transmitting a preamble of the header with a first modulation, wherein the preamble carries a coded modulation indicator. The payload and a remainder of the header are transmitted with a modulation associated with the coded modulation indicator. When the transmission is received, the preamble is demodulated in accordance with the first modulation. The coded modulation indicator is then decoded, and the payload and the remainder of the header are demodulated in accordance with the modulation indicated by the decoded modulation indicator.
Abstract:
A physical layer (PHY) data frame for use in conjunction with processor in a node, processor coupled to a program memory for storing a sequence of operating instructions. The frame has a preamble, PHY header, a MAC header and a MAC payload. The PHY header includes a destination address field having a destination address therein. The destination address is used by the processor to determine match with the node address.
Abstract:
Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
Abstract:
This invention is an improvement of a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.
Abstract:
Systems and methods for relative phase detection and zero crossing detection for power line communications (PLC) are described. In some embodiments, both transmit and receive PLC devices detect a zero crossing on an AC mains phase. The devices start a phase detection counter (PDC) by generating a zero crossing pulse within 5% of the actual zero crossing time. When a frame is transmitted, the transmitting device includes a PDC value in the frame control header (FCH). The PDC value corresponds to the start time of the FCH. When the frame is received at the receive PLC device, the receive PLC device measures a local PDC value between the zero crossing and the start of the FCH. The receive device compares the local PDC value to the PDC value in the FCH of the received frame and determines if the devices are on the same phase.