Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes
First Claim
1. A method of accessing authentication information regarding a peer mobile network node in support of establishing a secure peer-to-peer communications context via ad-hoc networking, the method comprising:
- a. obtaining the mobile network node identification of the peer mobile network node;
b. authenticating with a wireless infrastructure serving network;
c. requesting information for authenticating the peer mobile network node based on the peer mobile network node identification obtained; and
d. receiving the authentication information at a mobile network node with which the peer mobile network node is to establish the secure peer-to-peer communications context, the authentication information received directly from a home environment associated with the peer mobile network node.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods for authenticating peer mobile network nodes for establishing a secure peer-to-peer communications context in an ad-hoc network are presented. The methods include accessing wireless infrastructure network entities at low bandwidth and for a short time duration to obtain cryptographic information regarding a peer mobile network node for the purpose of establishing secure peer-to-peer communications therewith ad-hoc network. Having received cryptographic information regarding a peer mobile network node, the method further includes challenging the peer network node with a challenge phrase derived from the cryptographic information received, receiving a response, and establishing a secure communications context to the peer mobile network node based on the validity of the received response. Advantages are derived from addressing security threats encountered in provisioning ad-hoc networking, by leveraging wireless infrastructure network security architecture, exemplary deployed in UMTS/GSM infrastructure networks, enabling seamless mobile network node authentication through the existing UMTS and/or GSM authentication infrastructure, while pervasively communicating with peer mobile network nodes in an ad-hoc network.
48 Citations
11 Claims
-
1. A method of accessing authentication information regarding a peer mobile network node in support of establishing a secure peer-to-peer communications context via ad-hoc networking, the method comprising:
-
a. obtaining the mobile network node identification of the peer mobile network node; b. authenticating with a wireless infrastructure serving network; c. requesting information for authenticating the peer mobile network node based on the peer mobile network node identification obtained; and d. receiving the authentication information at a mobile network node with which the peer mobile network node is to establish the secure peer-to-peer communications context, the authentication information received directly from a home environment associated with the peer mobile network node. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of establishing a secure peer-to-peer communications context in an ad-hoc network between a pair of mobile network nodes comprising:
-
a. each mobile network node retrieving information for authenticating a peer mobile network node directly from a home environment associated with the peer mobile network node; b. the pair of mobile network nodes challenging each other based on the authentication information; and c. responsive to a successful cross-authentication, establishing the secure peer-to-peer context between the wireless network nodes employing ad-hoc networking techniques. - View Dependent Claims (8, 9, 10, 11)
-
Specification