摘要:
For reducing and homogenizing an end-to-end delay of data packet transmissions in a large-scale wireless mesh network, a device, a system and a method are provided for controlling data packet transmission in the wireless network, wherein transmission parameters of an intermediate node are adjusted based on a distance between the intermediate node and a sender node.
摘要:
A method for securing communications between a first node (N1) and a second node (N2) in a network (1) further comprising a management device (2) provided with root keying materials, the method comprising the following steps: the management device generating, based on root keying materials, a first node keying material shares comprising a number of sub-elements and the first node keying material shares being arranged for generating a first complete key, the management device selecting a subset of sub-elements of the first keying material shares, the number of sub-elements selected being less or equal than the total number of sub-elements of the first keying material shares, and the selected sub-elements forming a first node partial keying material shares or symmetric-key generation engine, the first node generating, based on the first node symmetric-key generation engine and on an identifier of the second node, a first key, used for securing communications with the second node.
摘要:
The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including a plurality of keying materials, wherein the first node further comprises a receiver for receiving from the second node a second node identifier, a controller being arranged for determining from the second node identifier the position in the first list of at least one keying material having a common root with one keying material of the second list, and for generating an encryption key by means of the keying material having a common root and the second node identifier.
摘要:
System using on- or in-body communication technologies such as body-sound communication (BSC) or body-coupled communication (BCC) to obtain information on the body composition of a patient (e.g. water content/hydration level on bone density/joint status). The system, in a preferred embodiment, comprises a transmitter, receiver and processor connected to the receiver. The transmitter is arranged to transmit a signal through a medium (the body of the patient), the signal comprising a plurality of different frequency components and transmission technologies. The receiver is arranged to receive the signal following propagation through the said medium. The processor is arranged to generate, at a first time, one or more transfer functions from the received signal, each transfer function defining values for a predetermined signal parameter at different frequencies. The processor then generates, at a second time, one or more further transfer functions from the received signal and compares a transfer function with the further transfer function for the same signal parameter. An output is generated if the difference between the transfer function and the further transfer function exceeds a preset threshold.
摘要:
For reducing and homogenizing an end-to-end delay of data packet transmissions in a large-scale wireless mesh network, a device, a system and a method are provided for controlling data packet transmission in the wireless network, wherein transmission parameters of an intermediate node are adjusted based on a distance between the intermediate node and a sender node.
摘要:
A method for securing communications between a first node (N1) and a second node (N2) in a network (1) further comprising a management device (2) provided with root keying materials, the method comprising the following steps: the management device generating, based on root keying materials, a first node keying material shares comprising a number of sub-elements and the first node keying material shares being arranged for generating a first complete key, the management device selecting a subset of sub-elements of the first keying material shares, the number of sub-elements selected being less or equal than the total number of sub-elements of the first keying material shares, and the selected sub-elements forming a first node partial keying material shares or symmetric-key generation engine, the first node generating, based on the first node symmetric-key generation engine and on an identifier of the second node, a first key, used for securing communications with the second node.
摘要:
The invention relates to the control of networked lighting systems, particularly large scale networked lighting systems, and more specifically to an efficient transmission of messages to control luminaries of a networked lighting system. A basic idea of the invention is to provide an efficient and flexible multicast, particularly group cast message that addresses several or a group of luminaires, and that can control the addressed luminaries in an efficient way by compressing the distributed light settings using a function in order to reduce the communicational overhead. An embodiment of the invention relates to a method for controlling a networked lighting system comprising the steps of—selecting several controllable luminaries of the networked lighting system (S10), —combining control information for each one of the selected luminaries to a set of information control information (S12), —selecting at least one predetermined function for compressing the set of control information by associating an input related to a selected controllable luminary to the control information for the selected controllable luminary from the set of control information (S14), —creating a multicast message addressed to the selected luminaries and comprising information regarding the selected predetermined function (S16), and—transmitting the created multicast message (S18).
摘要:
For improving application data traffic in a communications network, data traffic of at least one application of the communications network is divided into two types in view of the current situation of the network—a first type comprising data, which can be transmitted by delaying the transmission, and a second type comprising data, which should not be delayed but should be transmitted at the current time. When an analysis of the current (average) load of the network shows that transmitting both types of data could lead to a heavy data traffic, a temporal transmission suppression session can be performed with regard to at least one entity of the communications network. In the temporal transmission suppression session, transmitting of data of the first type is interrupted during transmitting data of the second type. After completion of transmitting data of the second type, transmitting data of the first type is resumed.
摘要:
The invention relates to a method for securely broadcasting sensitive data in a wireless sensor networks comprising a central device, called trust center, and a plurality of sensor nodes, the trust center being initialized with a cryptographic hash chain and each node being initialized with a node key and the anchor of the trust center hash chain, the method comprising the following steps: the trust center broadcasting a first secure message to the nodes, each node, after reception of the first message, creating a first acknowledgment message, and transmitting it back to the trust center, the trust center checking whether all the nodes have transmitted respective first acknowledgment message, and in case all messages have been received, the trust center securely broadcasting sensitive data in a third message, the nodes checking, based on elements included in the first message, whether sensitive data actually originates from the trust center.
摘要:
The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network (1), comprising a node (D1) and a system management device (3), the system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of, and the node being provided with a node keying material share of degree of complexity α derived from the root keying material. The method comprises the following steps, upon receipt at the system management device of a request for an external user (4) to gain access to the node (D1): the system management device generates an external user keying material share of degree of complexity α from the root keying material and an access identifier, the system management device generates an access keying material of degree of complexity less than α, from the external user keying material share and an identifier of the node, the system management device provides the external user with the access keying material share and the access identifier, the external user derives a key from the access keying material share, and transmitting this key and the access certificate to the node, the node computes a key from the access identifier and the node keying material share, and the node compares the key transmitted by the external user and the key computed by the node, so as to authenticate the external user.