METHOD FOR EXCHANGING MESSAGES AND VERIFYING THE AUTHENTICITY OF THE MESSAGES IN AN AD HOC NETWORK
First Claim
1. A method for exchanging messages containing reliable information between nodes in an ad hoc network comprising the steps of:
- (a) providing a public key for a PKI encrypted certificate authority signature to all nodes,(b) providing a private key PKI encrypted certificate authority signature to all nodes known to transmit reliable information,(c) each node transmitting a signal containing node identification information and the PKI encrypted certificate authority signature associated with that node,(d) each node receiving said signals from the other nodes,(e) each node decrypting the certificate authority signatures received from the other nodes by using the public key to ascertain the authenticity of the received certificate authority signatures,(f) thereafter said nodes receiving and authenticating messages with a TESLA encrypted signature only with nodes identified to have an authentic certificate authority signature until the occurrence of a subsequent predefined event.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for exchanging messages containing reliable information between nodes in an ad hoc network, such as a vehicle ad hoc network. The method includes the steps of providing a public key for a PKI encrypted certificate authority signature to all nodes known to transmit reliable information. Each node transmits a signal containing node identification information and the PKI encrypted certificate authority signature associated with that node. Each node also receives like signals from other nodes and then decrypts the certificate authority signatures from the received signals by using the certificate authority public key to ascertain the authenticity of the received certificate authority signatures and the reliability of the received message. Thereafter, the nodes receive and accept messages with a TESLA encrypted signature only with nodes identified to have authentic certificate authority signatures until the occurrence of a subsequent predefined event, such as a new node in the network or the elapse of a predetermined time period.
54 Citations
19 Claims
-
1. A method for exchanging messages containing reliable information between nodes in an ad hoc network comprising the steps of:
-
(a) providing a public key for a PKI encrypted certificate authority signature to all nodes, (b) providing a private key PKI encrypted certificate authority signature to all nodes known to transmit reliable information, (c) each node transmitting a signal containing node identification information and the PKI encrypted certificate authority signature associated with that node, (d) each node receiving said signals from the other nodes, (e) each node decrypting the certificate authority signatures received from the other nodes by using the public key to ascertain the authenticity of the received certificate authority signatures, (f) thereafter said nodes receiving and authenticating messages with a TESLA encrypted signature only with nodes identified to have an authentic certificate authority signature until the occurrence of a subsequent predefined event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for exchanging messages containing reliable information between nodes in an ad hoc network in which each node is provided with a public key for a PKI encrypted certificate authority signature and in which each node known to transmit reliable information is provided with a private key PKI encrypted certificate authority signature, said method comprising the steps of:
-
(a) each node transmitting a signal containing node identification information and the PKI encrypted certificate authority signature associated with that node, (b) each node receiving said signals from the other nodes, (c) each node decrypting the certificate authority signatures received from the other nodes by using the public key to ascertain the authenticity of the received certificate authority signatures, (d) thereafter said nodes receiving and authenticating messages with a TESLA encrypted signature only with nodes identified to have an authentic certificate authority signature until the occurrence of a subsequent predefined event. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification