摘要:
There is provided an unauthorized terminal inferring device (100) device that is connected to a plurality of communications terminal devices (IDi) by a multi-hop network. The device (100) includes a communications terminal information control portion (120) that controls identification information and key information for the communications terminal devices (IDi), a transmission portion (160) that transmits challenge information to the devices (IDi), a receiving portion (170) that receives from the devices (IDi) response information that corresponds to the challenge information, a response information verification portion (130) that verifies whether or not an authenticator that is contained in the response information is correct, and an unauthorized terminal device inferring processing portion (140) that, in a case where the verification result indicates that the response information is not legitimate, requests that each of the devices (IDi) retransmit received and generated information, then infers which communications terminal device performed the unauthorized behavior.
摘要:
In a message authentication system in which a message is transmitted from a message transmission apparatus 100 to individual message reception apparatuses 120 through wireless communication connecting the message transmission apparatus 100 with the message reception apparatuses 120 via intermediary message reception apparatuses and the message is authenticated at each message reception apparatus, the message transmission apparatus first transmits an electronic signature to each message reception apparatus as a message transmission notification and then transmits the message and an authentication key to the message reception apparatus after allowing a predetermined time lag. Thus, the message reception apparatus does not need to hold the message before the authentication key is published (FIG. 7).
摘要:
A communication method in which an operation, such as authentication, required when a new communication terminal participates in a mesh network is carried out in a more efficient manner. A second communication terminal that has already established an adjacent communication link with at least two first communication terminals, out of a plurality of communication terminals, distributes an adjacent terminal list including terminal identifiers of the first communication terminals along with a temporal key generated by the second communication terminal. One of the first communication terminals that received the adjacent terminal list and the temporal key distributes adjacent registration information, which is generated using a second temporal key. The other one of the first communication terminals that received both the adjacent terminal list and the adjacent registration information determines whether the terminal identifier of one of the first communication terminals is included in the adjacent terminal list, and whether the first temporal key distributed along with the adjacent terminal list matches with the second temporal key used for generating the adjacent registration information. If both determination results are affirmative, one of the first communication terminals is authenticated.
摘要:
Each node in a communication system receives state variable signals from other nodes indicating the internal operating states or internal timing of the other nodes, and transmits a state variable signal indicating its own internal operating state or timing. Each node also determines whether each received state variable signal is valid. Transitions in the internal operating state or timing of a node take place at a basic transition rate but at times adjusted according to the valid state variable signals received from other nodes. A group of neighboring nodes transmitting data signals can thereby autonomously reach a steady state in which their data signals do not collide, without having their timing control disrupted by reflected state variable signals or other invalid state variable signals.
摘要:
A message sending device sends a message. A message receiving device generates reception authentication information of the message when receiving the message, and further generates reception confirmation information of the message by using the reception authentication information of the message, to send the reception confirmation information of the message to a reception confirmation information verification device. The reception confirmation information verification device verifies the received reception confirmation information. The message sending device obtains a reception confirmation of the message for the message receiving device based on the verification result. This configuration reduces a processing load in each node as much as possible for confirming whether data to large numbers of nodes under a multihop environment have been received in each node.
摘要:
A wireless network system, information providing apparatus and wireless terminal that can prevent the leak of information such as an address of the wireless terminal. A wireless network system includes an information providing apparatus that provides service information over a wireless network, and multiple wireless terminals each of which receives the service information provided from the information providing apparatus. In this case, the information providing apparatus includes destination possibility data in the service information, and each of the wireless terminals determines the destination possibility that the destination of the provided service information is the wireless terminal based on the destination possibility data included in the provided service information accepts the provided service information only if it is determined that there is the destination possibility.
摘要:
A message sending device sends a message. A message receiving device generates reception authentication information of the message when receiving the message, and further generates reception confirmation information of the message by using the reception authentication information of the message, to send the reception confirmation information of the message to a reception confirmation information verification device. The reception confirmation information verification device verifies the received reception confirmation information. The message sending device obtains a reception confirmation of the message for the message receiving device based on the verification result. This configuration reduces a processing load in each node as much as possible for confirming whether data to large numbers of nodes under a multihop environment have been received in each node.
摘要:
The invention provides a key update system for a multihop network system including an authentication management device that manages keys using a hierarchical structure. That device constructs key information having a hierarchical structure in accordance with the structure of the multihop network. In addition, that device determines respective encryption keys for encrypting the keys based on the key information, and the communication terminals obtain the respective keys. In this system, that device includes a key tree management portion that constructs and manages the key information; an encryption portion that encrypts the keys using the keys included in the key information; and a transmission portion that transmits the encrypted keys. Each communication terminal includes a receiving portion that receives the encrypted keys; a key management portion that manages the keys that need to be held and stored by the given communication terminal; and a decryption portion that decrypts the encrypted keys.
摘要:
In a sensor network system, a transmitter device uses a message authentication key generated by a message generator to transmit a message with authenticator to plural receiver devices, which in reply produce a certification by a certification generator from a message with authenticator held by a message holder to transmit the certification to the transmitter device. An information generator of the transmitter device uses an identification from a reception checker and the message authentication key thus generated to generate an authentication key notification, which will be transmitted to receiver devices having transmitted the certification. In the receiver devices, the message holder holds the authentication key notification, from which an authentication key acquirer acquires the message authentication key, which a message authenticator uses to compare the message with authenticator generated with the message with authenticator held in the message holder to confirm the received message.
摘要:
The invention provides a key update system for a multihop network system including an authentication management device that manages keys using a hierarchical structure. That device constructs key information having a hierarchical structure in accordance with the structure of the multihop network. In addition, that device determines respective encryption keys for encrypting the keys based on the key information, and the communication terminals obtain the respective keys. In this system, that device includes a key tree management portion that constructs and manages the key information; an encryption portion that encrypts the keys using the keys included in the key information; and a transmission portion that transmits the encrypted keys. Each communication terminal includes a receiving portion that receives the encrypted keys; a key management portion that manages the keys that need to be held and stored by the given communication terminal; and a decryption portion that decrypts the encrypted keys.