Brokered communication protocol using information theoretic coding for security
First Claim
1. A method, comprising:
- receiving, at a network device, an enrollment request from a first device to enroll in a brokered communication protocol, for communicating with at least one second device;
transmitting, from the network device to the first device, a test vector and a measurement request;
receiving, from the first device responsive to the measurement request, a measurement of at least one of a bit-error-rate (BER) or a signal-to-noise ratio (SNR) based on receipt of the test vector at the first device;
determining if the first device is vulnerable to message interception or eavesdropping based on the measurement of the at least one of the BER or the SNR; and
denying, by the network device, access to the brokered communication protocol by the first device based on whether the first device is determined to be vulnerable to message interception or eavesdropping.
1 Assignment
0 Petitions
Accused Products
Abstract
A network device receives an enrollment request from a first device to enroll in a brokered communication protocol for communicating with at least one second device. The network device transmits, to the first device, a test vector and a measurement request, and receives, from the first device responsive to the measurement request, a measurement of at least one of a bit-error-rate (BER) and/or a signal-to-noise ratio (SNR) based on receipt of the test vector at the first device. The network device determines if the first device is vulnerable to message interception or eavesdropping based on the measurement of the BER and/or the SNR, and denies the first device access, by the network device, to the brokered communication protocol based on whether the first device is determined to be vulnerable to message interception or eavesdropping.
16 Citations
20 Claims
-
1. A method, comprising:
-
receiving, at a network device, an enrollment request from a first device to enroll in a brokered communication protocol, for communicating with at least one second device; transmitting, from the network device to the first device, a test vector and a measurement request; receiving, from the first device responsive to the measurement request, a measurement of at least one of a bit-error-rate (BER) or a signal-to-noise ratio (SNR) based on receipt of the test vector at the first device; determining if the first device is vulnerable to message interception or eavesdropping based on the measurement of the at least one of the BER or the SNR; and denying, by the network device, access to the brokered communication protocol by the first device based on whether the first device is determined to be vulnerable to message interception or eavesdropping. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network device, comprising:
-
a transceiver connected to a network; and a processing unit to; receive an enrollment request from a first device to enroll in a brokered communication protocol for communicating with at least one second device, transmit, from the network device to the first device via the transceiver, a test vector and a measurement request, receive, from the first device responsive to the measurement request via the transceiver, a measurement of at least one of a bit-error-rate (BER) or a signal-to-noise ratio (SNR) based on receipt of the test vector at the first device, determine if the first device is vulnerable to message interception or eavesdropping based on the measurement of the at least one of the BER or the SNR, and deny access to the brokered communication protocol by the first device based on whether the first device is determined to be vulnerable to message interception or eavesdropping. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory storage medium storing instructions executable by a network device, wherein the instructions comprise instructions to cause the network device to:
-
receive an enrollment request from a first device to enroll in a brokered communication protocol for communicating with at least one second device; transmit, from the network device to the first device, a test vector and a measurement request; receive, from the first device responsive to the measurement request, a measurement of at least one of a bit-error-rate (BER) or a signal-to-noise ratio (SNR) based on receipt of the test vector at the first device; determine if the first device is vulnerable to message interception or eavesdropping based on the measurement of the at least one of the BER or the SNR; and deny access to the brokered communication protocol by the first device based on whether the first device is determined to be vulnerable to message interception or eavesdropping. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification