Abstract:
This disclosure describes techniques for device to device authentication. For instance, a first device may detect a second device, such as when a user physically attaches the second device to the first device or when the second device wireless communicates with the first device. A component of the first device and/or an authentication entity may then determine to authenticate the second device. In some instances, the component determines to authenticate the second device using information associated with an environment of the second device. To authenticate the second device, the authentication entity may send a request to a user, receive a response from the user, and then verity the response. After the authentication, the first device may determine that the second device includes a trusted device and establish a connection with the second device.
Abstract:
In one embodiment, a network node provides a time slotted channel hopping (TSCH) schedule to one or more child nodes of the network node. The TSCH schedule includes one or more mandatory routing protocol report time slots. The network node receives routing protocol reports from the one or more child nodes according to the TSCH schedule. The network node aggregates the received routing protocol reports into an aggregated routing protocol report. The network node provides the aggregated routing protocol report to a parent of the network node during a time slot that is subsequent to the one or more mandatory time slots for the one or more child nodes.
Abstract:
In one embodiment, a particular node operates a distributed routing protocol in a shared-media communication network, and distributes timeslot allocations using the routing protocol, where the particular node as a parent node allocates a pool of timeslots available to child nodes of the parent node. The parent node specifically allocates particular timeslots from the pool to particular child nodes according to particular flows from a source to a target in the shared-media communication network in order to meet a defined time budget for a resultant time- synchronized path from the source to the target.
Abstract:
One embodiment includes: forwarding a particular packet through an Available Routing Construct (ARC) chain topology network. In one embodiment, this forwarding includes: sending the particular packet by each particular non-edge node on an arc of the plurality of arcs receiving the particular packet to each sibling on the arc that did not send the particular packet to said particular non-edge node, while not sending the particular packet if it was received from both siblings of said particular edge node; and sending the particular packet to a respective child node on a second arc of the plurality of arcs by each particular edge node of two edge nodes on the arc after receiving the particular packet. In one embodiment, the network is a wireless deterministic network with pre-assigned time slots for receiving and subsequently sending a same particular packet by each node of the network.
Abstract:
Mobile routers establish a tree-based network topology in an ad hoc mobile network, the tree-based network topology having a single clusterhead and attached mobile routers. Each attached mobile router has a default egress interface configured for sending messages toward the clusterhead, and ingress interfaces configured for receiving messages from attached network nodes that are away from the clusterhead. A neighbor advertisement message received from an ingress interface away from a clusterhead is used by the attached mobile router to identify specified network prefixes that are reachable via the source of the neighbor advertisement message. The attached mobile router outputs on its default upstream interface a second neighbor advertisement message that specifies the network prefix used by the attached mobile router, and the specified network prefixes from the neighbor advertisement message received on the ingress interface. Hence, connectivity is established with minimal routing overhead.
Abstract:
A source IPv6 mobile node is configured for forwarding an IPv6 packet via an IPv4 connection with a destination IPv6 router. The IPv4 packet includes IPv4 source and destination addresses, a UDP source port and UDP destination port, and a synthetic tag address in the IPv6 destination address field. The synthetic tag address, a valid (routable) IPv6 care of address, has an address prefix routed to the IPv6 router. The address prefix specifies a forwarding protocol, the IPv4 destination address for the IPv6 router, and a site-level aggregation identifier. An address suffix for the synthetic tag address specifies the IPv4 source address, the UDP source port and UDP destination port. Hence, the synthetic tag address enables the destination IPv6 router to send an IPv6 reply packet back to the source IPv6 mobile node via the IPv4 network.
Abstract:
This disclosure describes techniques for authenticating a user device for a session. For instance, an authentication entity may authenticate a user device using single sign-on authentication and/or multi-factor authentication. The authentication entity may then determine a duration for which the user device is authenticated for the session. For example, the authentication entity may receive information representing a state of an environment of the user device. The authentication entity may then use the information to identify one or more transitions associated with the environment between the session and a previous session. Using the one or more transitions, the authentication entity may determine the duration for the session by increasing or decreasing a previous duration associated with the previous session.
Abstract:
Disclosed are systems, methods, and computer-readable media for integrating deterministic packet transmissions scheduling of short range local area networks (e.g., 6TiSCH networks) with deterministic packet transmission scheduling for wireless networks such as LTE/4G/5G networks. In one aspect, a wireless communication network includes a plurality of first nodes configured to communicate using a first communication protocol; and a second node configured to communicate with the plurality of first nodes using the first communication protocol and configured to communicate with a third node using a second communication protocol, the second node being further configured to map corresponding transmission schedule of the first communication protocol to a second transmission schedule for the second communication protocol.
Abstract:
In one embodiment, a device determines that a latency between a receive timeslot of a channel hopping schedule of the device and a transmit timeslot of the channel hopping schedule is greater than a latency threshold for a particular traffic flow to be received during the receive timeslot. The device requests an additional transmit timeslot for the channel hopping schedule from a parent node of the device in the network. The device receives an indication of a newly allocated transmit timeslot for the channel hopping schedule from the parent node. The device maps the receive timeslot to one of the transmit timeslots of the channel hopping schedule, wherein the particular traffic flow is to be forwarded to a second device during the mapped transmit timeslot.
Abstract:
In one embodiment, a device (e.g., path computation device) informs a network management device of a plurality of possible probing profiles, where nodes of a computer network receive the plurality of possible probing profiles from the network management device. Based on determining that particular information is desired from one or more particular nodes of the nodes of the computer network, the device may then select one or more particular probing profiles of the plurality of possible probing profiles based on the particular information, and instructs the one or more particular nodes to probe one or more particular destination nodes according to the one or more particular probing profiles.