×

Secure end-to-end communication in mobile ad hoc networks

  • US 20040025018A1
  • Filed: 01/23/2003
  • Published: 02/05/2004
  • Est. Priority Date: 01/23/2002
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for secure discovery of a communication transmission route between nodes in a multiple node ad hoc network, said network including a source node, a destination node and one or more intermediate nodes, said method comprising the steps of:

  • providing a secret encryption key only to said source and said destination nodes in said network;

    generating a route discovery request at said source node, said request including a source node identifier, a destination node identifier, a sequence number identifier for said request and a first message authentication code that is generated by applying a predetermined mathematical formula using said source node identifier, destination node identifier, sequence number identifier and said secret key as arguments;

    broadcasting said route discovery request from said source node to any of said intermediate nodes in said ad hoc network that are in range to receive said broadcast;

    for each of said intermediate nodes that receives said request, relaying said request to additional ones of said nodes in said network;

    upon said request being received by said destination node, verifying the authenticity of said route request using said secret key and said message authentication code;

    if the authenticity of said route request is verified by said destination node, generating a reply to said route discovery request, said reply including a source node identifier, a destination node identifier, a sequence number identifier for said reply and a second message authentication code that is generated by said destination node by applying said predetermined mathematical formula using said source node identifier, destination node identifier, sequence number identifier and said secret key as arguments;

    transmitting said reply from said destination node to said source node using the same route used for transmitting said route discovery request from said source node to said destination node; and

    upon receipt of said reply by said source node, verifying the authenticity of said reply using said secret key and said second message authentication code, said authenticity also inherently verifying both that the reply was generated by said destination node and was transmitted over a discovered route from said source node to said destination node, whereby, said source node can use said reply information to send messages to said destination node over said discovered route.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×