AD-HOC NETWORK KEY MANAGEMENT
First Claim
1. In an ad hoc network comprising a first node, a second node, and a third node and an intermediate node along a communication path between the first node and at least one of the second node and the third node, wherein the first node and the second node share a first shared secret key, wherein the first node and the third node share a second shared secret key, a method for establishing a temporal key shared by the second node and the third node, the method comprising:
- generating a unique key at the first node;
encrypting the unique key with first shared secret key to generate a first encrypted unique key and transmitting the first encrypted unique key to the second node;
encrypting the unique key with second shared secret key to generate a second encrypted unique key and transmitting the second encrypted unique key to the third node;
decrypting the first encrypted unique key at the second node to generate the unique key at the second node;
decrypting the second encrypted unique key at the third node to generate the unique key at the third node; and
using the unique key to establish the temporal key shared only by the second node and the third node, wherein the temporal key is used to protect communications between the second node and the third node.
2 Assignments
0 Petitions
Accused Products
Abstract
An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.
83 Citations
20 Claims
-
1. In an ad hoc network comprising a first node, a second node, and a third node and an intermediate node along a communication path between the first node and at least one of the second node and the third node, wherein the first node and the second node share a first shared secret key, wherein the first node and the third node share a second shared secret key, a method for establishing a temporal key shared by the second node and the third node, the method comprising:
-
generating a unique key at the first node; encrypting the unique key with first shared secret key to generate a first encrypted unique key and transmitting the first encrypted unique key to the second node; encrypting the unique key with second shared secret key to generate a second encrypted unique key and transmitting the second encrypted unique key to the third node; decrypting the first encrypted unique key at the second node to generate the unique key at the second node; decrypting the second encrypted unique key at the third node to generate the unique key at the third node; and using the unique key to establish the temporal key shared only by the second node and the third node, wherein the temporal key is used to protect communications between the second node and the third node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An ad hoc network, comprising:
-
a first node configured to generate a unique key; a second node, wherein the first node and the second node share a first shared secret key; a third node, wherein the first node and the third node share a second shared secret key; and an intermediate node along a communication path between the first node and at least one of the second node and the third node, wherein the first node is further configured to encrypt the unique key with first shared secret key to generate a first encrypted unique key and transmitting the first encrypted unique key to the second node, wherein the first node is further configured to encrypt the unique key with second shared secret key to generate a second encrypted unique key and transmitting the second encrypted unique key to the third node, wherein the second node is further configured to decrypt the encrypted unique key to generate the unique key, wherein the third node is further configured to decrypt the encrypted unique key to generate the unique key, wherein the second node and the third node are further configured to use the unique key to establish a temporal key shared only by the second node and the third node, and wherein the temporal key is used to protect communications between the second node and the third node. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification