摘要:
A communication device receives secure communication frames on which a security transform has been performed to permit authentication. The communication device maintains an authentication history and a local time varying parameter. In multi-hop communication, the communication device provisionally verifies the freshness of a received secure communication frame by verifying that identifying information extracted from the frame is not already present in the authentication history and that a received time varying parameter extracted from the frame is not older than the local time varying parameter by more than a certain margin. If these freshness tests both pass, the frame is authenticated. If authentication succeeds, the frame is transmitted on the next hop without performance of a new security transform.
摘要:
A communication terminal generates a temporary network key based on a managed master network key and on key identification used for security processing on a communication frame. The security processing is performed on the communication frame using the temporary network key. A secure communication frame is produced in which the identification of the key is indicated.
摘要:
A communication device receives secure communication frames on which a security transform has been performed to permit authentication. The communication device maintains an authentication history and a local time varying parameter. In multi-hop communication, the communication device provisionally verifies the freshness of a received secure communication frame by verifying that identifying information extracted from the frame is not already present in the authentication history and that a received time varying parameter extracted from the frame is not older than the local time varying parameter by more than a certain margin. If these freshness tests both pass, the frame is authenticated. If authentication succeeds, the frame is transmitted on the next hop without performance of a new security transform.
摘要:
A communication terminal generates a temporary network key based on a managed master network key and on key identification used for security processing on a communication frame. The security processing is performed on the communication frame using the temporary network key. A secure communication frame is produced in which the identification of the key is indicated.
摘要:
A transmission terminal includes an information generation unit, a transmission unit, a delivery management unit, and a reception unit. The information generation unit generates information that is to be transmitted to a destination reception terminal. The transmission unit transmits information that the information generation unit has generated. The delivery management unit manages transmission of information. The reception unit receives information that the destination reception terminal transmits. Furthermore, the information generation unit generates or receives transmission information that is to be transmitted to the destination reception terminal and generates redundant information for the destination reception terminal to restore the transmission information. The delivery management unit causes the information generation unit to generate, and causes the transmission unit to retransmit, the redundant information when the reception unit has not received a successful reception reply from the destination reception terminal.
摘要:
A transmission terminal includes an information generation unit, a transmission unit, a delivery management unit, and a reception unit. The information generation unit generates information that is to be transmitted to a destination reception terminal. The transmission unit transmits information that the information generation unit has generated. The delivery management unit manages transmission of information. The reception unit receives information that the destination reception terminal transmits. Furthermore, the information generation unit generates or receives transmission information that is to be transmitted to the destination reception terminal and generates redundant information for the destination reception terminal to restore the transmission information. The delivery management unit causes the information generation unit to generate, and causes the transmission unit to retransmit, the redundant information when the reception unit has not received a successful reception reply from the destination reception terminal.
摘要:
A receiving device sends challenge information to a transmitting device. The transmitting device initializes a time varying parameter and transmits communication data together with data derived from the challenge information to the receiving device. Subsequent communication data, if any, are then transmitted together with data derived from the time varying parameter. The receiving device uses the challenge information to verify the freshness of the communication data transmitted first, and uses the time varying parameter to verify the freshness of the subsequent communication data. Freshness can be verified without having to maintain any type of verification data during sleep periods, and without having to send a separate challenge for each data transmission.
摘要:
A receiving device sends challenge information to a transmitting device. The transmitting device initializes a time varying parameter and transmits communication data together with data derived from the challenge information to the receiving device. Subsequent communication data, if any, are then transmitted together with data derived from the time varying parameter. The receiving device uses the challenge information to verify the freshness of the communication data transmitted first, and uses the time varying parameter to verify the freshness of the subsequent communication data. Freshness can be verified without having to maintain any type of verification data during sleep periods, and without having to send a separate challenge for each data transmission.
摘要:
In a message authentication system in which a message is transmitted from a message transmission apparatus 100 to individual message reception apparatuses 120 through wireless communication connecting the message transmission apparatus 100 with the message reception apparatuses 120 via intermediary message reception apparatuses and the message is authenticated at each message reception apparatus, the message transmission apparatus first transmits an electronic signature to each message reception apparatus as a message transmission notification and then transmits the message and an authentication key to the message reception apparatus after allowing a predetermined time lag. Thus, the message reception apparatus does not need to hold the message before the authentication key is published (FIG. 7).
摘要:
Each node in a communication system receives state variable signals from other nodes indicating the internal operating states or internal timing of the other nodes, and transmits a state variable signal indicating its own internal operating state or timing. Each node also determines whether each received state variable signal is valid. Transitions in the internal operating state or timing of a node take place at a basic transition rate but at times adjusted according to the valid state variable signals received from other nodes. A group of neighboring nodes transmitting data signals can thereby autonomously reach a steady state in which their data signals do not collide, without having their timing control disrupted by reflected state variable signals or other invalid state variable signals.