摘要:
The present invention provides methods and devices for a security architecture for use in wireless multi-hop networks. A method for implementing pair-wise encryption key establishment, network node authentication and determining tunnel encryption keys is provided in a following manner. In a multi-hop wireless network including a plurality of network nodes, pair-wise security is established between pairs of neighboring network nodes of the plurality of network nodes. For example, pair-wise security is established in the form of temporal pair-wise encryption keys. Following establishment of pair-wise security between pairs of neighboring network nodes, for a pair of network nodes that are not neighbors, tunnel security is established between the pair of network nodes using tunnel encryption keys derived by the pair of network nodes on an ad hoc basis. The tunnel encryption keys are used to form the connection between non-neighboring network nodes so as to avoid the hop-by-hop encryption/decryption used in conventional multi-hop wireless systems.
摘要:
Described are a method and system for obtaining real-time media content over an Internet Protocol network. A proxy server receives a message from a client device requesting that communications be established with a media server for obtaining a stream of media content. The proxy server sends the client device a redirection message in reply to the client device if the requested media content is available from a local replication point. The redirection message instructs the client device to communicate with the local replication point to obtain the stream of media content.
摘要:
Multiple simultaneous associations with Wireless Access Points (WAPs) may be formed by a given wireless client to enable handoffs between the WAPs to be accelerated and, optionally, to enable both WAPs to provide simultaneous wireless services to the wireless client. Upon forming a primary association with one WAP the wireless client scans for beacon signals from other WAPs. Upon detecting another WAP, the wireless client transmits a Request To Send (RTS) message to the new WAP indicating the identity of the primary WAP. The wireless client may also identify the new WAP to the primary WAP using a RTS message. The primary and secondary WAPs exchange information so that, in the event of a handoff, the required information has already been shared with the new WAP. Optionally, the several WAPs may provide simultaneous service to the wireless client.
摘要:
A method of non-interactive zero-knowledge crowd verifiable digital contact tracing, system and devices that provides improved accuracy and/or privacy by improving the validity of digital contact tracing sources. Private information associated with a respective user intended for a receiver is uploaded to a data server. The receiver is notified that the private information has been uploaded to the data server. A proof of the private information is generated using a proof function of a non-interactive zero-knowledge cryptographic protocol and added to a contact tracing blockchain for the respective user. A second blockchain transaction is added in response to verification of the proof by a verifier network using a verification function of the non-interactive zero-knowledge cryptographic protocol and the receiver is be notified.
摘要:
A method, system and devices for digital contact tracing security and privacy with proximity-based ID exchange with distance-bounding. The method is performed by a first wireless communication device and provides for exchanging IDs with a second wireless communication device. A rolling proximity identifier A associated with the first wireless communication device is sent to the second wireless communication device. A rolling proximity identifier B associated with the second wireless communication device is received from the second wireless communication device. A cryptographic challenge response authentication with time-based distance-bounding is performed based on a hash value determined from the rolling proximity identifiers in accordance with a hash function. The rolling proximity identifier of the second wireless communication device is only stored in memory in response to a successful cryptographic challenge response authentication.
摘要:
System and method using distance bounding to provide security in fine timing measurement (FTM) communications including authenticating a prover device at a verifier device, including: transmitting from a verifier device, through the wireless interface, a sequence of challenge bits for a prover device, each challenge bit being transmitted in a respective FTM frame; receiving, at the verifier device, FTM acknowledgment frames; determining, for at least some of the received FTM acknowledgement frames, respective round trip time (RTT) measurements; determining, for at least some of the received FTM acknowledgement frames, whether the included response bit matches a predicted response bit; and authenticating the prover device based on the determined RTT measurements and the determined response bit matches.
摘要:
An access point (AP) hashes its SSID/BSSID according to a hashing function H and transmits wirelessly the hashed SSID/BSSID within a physical layer frame/packet to a user station (STA). The hashed SSID/BSSID uniquely identifies the AP. In one embodiment, the hashed SSID/BSSID is transmitted within a SIGNAL field of a preamble with the frame/packet. Upon receipt, the user station recovers the hashed SSID/BSSID and compares it to an expected hashed SSID/BSSID (calculated using the same hashing function H and a desired SSID/BSSID). In response to the comparison, the user station performs one or more actions.
摘要:
Various methods and communications devices to improve association and handoff performance of a wireless network are provided. By way of example, a modified state machine that permits reduced security requirements for authentication in order to achieve fast authentication is employed. The modified state machine providing fast authentication remains compatible with the classic state machine implementing the wireless fidelity (WiFi) standard.
摘要:
A relay station is provided for use in a wireless communication system. The wireless communication system includes a plurality of base stations communicatively coupled to a backhaul network and at least one mobile station. The relay station is shared by at least a first base station and a second base station. The relay station includes a transceiver, a controller and relay circuitry. The transceiver transmits signals to and receives signals both base stations and a mobile station. Signals transmitted to the base stations include a single preamble, MAP and FCH. The controller is electrically connected to the transceiver and is operable to measure a signal quality of the mobile station while connected to the first base station. The relay circuitry is electrically connected to the controller and is operable to conduct a phased handoff from the first base station to the second base station based on the signal quality.