Method and system for lightweight key distribution in a wireless network
First Claim
1. A lightweight key distribution method for a backbone node of a wireless network, the method comprising:
- receiving a connection request message from a new node intending to join the wireless network;
sending an identification (ID) to allocate to the new node and a certificate to verify the ID to the new node as a response to the receiving of the connection request message;
receiving a key request message from the new node, the key request message including the allocated ID and the certificate;
generating a session key as a result of the receiving of the key request message;
calculating a second intermediate value by applying a first concatenated value to a hash function, the first concatenated value being acquired by concatenating the session key and a first intermediate value that corresponds to respective partial keys included in a key pool;
generating an encryption key using the calculated second intermediate value, the generating of the encryption key comprising;
extracting a common key index from a key index of the backbone node; and
applying a second concatenated value to a hash function, the applying of the second concatenated value comprising acquiring the second concatenated value, the acquiring of the second concatenated value comprising concatenating the calculated second intermediate value corresponding to the extracted common key index;
encrypting a partial key corresponding to the common key index with the generated encryption key, the common key index including commonalities existing between the key index of the backbone node and a key index of the new node; and
sending a key part that includes the encrypted partial key and the second intermediate value to the new node.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for lightweight key distribution in a wireless network comprises calculating a second intermediate value using a first intermediate value which corresponds to respective partial keys included in a key pool; generating an encryption key using the second intermediate value and encrypting a partial key corresponding to a key index in common with a new node with the encryption key; and sending a key part which contains the encrypted partial key and the second intermediate value. Therefore, if a new node joins the wireless network, the key set can be allocated to the new node using its ID while the key sets allocated to the existing nodes of the network are retained.
-
Citations
18 Claims
-
1. A lightweight key distribution method for a backbone node of a wireless network, the method comprising:
-
receiving a connection request message from a new node intending to join the wireless network; sending an identification (ID) to allocate to the new node and a certificate to verify the ID to the new node as a response to the receiving of the connection request message; receiving a key request message from the new node, the key request message including the allocated ID and the certificate; generating a session key as a result of the receiving of the key request message; calculating a second intermediate value by applying a first concatenated value to a hash function, the first concatenated value being acquired by concatenating the session key and a first intermediate value that corresponds to respective partial keys included in a key pool; generating an encryption key using the calculated second intermediate value, the generating of the encryption key comprising; extracting a common key index from a key index of the backbone node; and applying a second concatenated value to a hash function, the applying of the second concatenated value comprising acquiring the second concatenated value, the acquiring of the second concatenated value comprising concatenating the calculated second intermediate value corresponding to the extracted common key index; encrypting a partial key corresponding to the common key index with the generated encryption key, the common key index including commonalities existing between the key index of the backbone node and a key index of the new node; and sending a key part that includes the encrypted partial key and the second intermediate value to the new node. - View Dependent Claims (2, 3, 4)
-
-
5. A key acquisition method for a new node intending to join a wireless network, the method comprising:
-
sending a connection request message to a backbone node of the wireless network; receiving, from the backbone node in response to the sending of the connection request message, an identification (ID) allocated from the backbone node and a certificate to verify the ID; sending a key request message including the allocated ID and the certificate to the backbone node; receiving a key part from the backbone node that includes an encrypted partial key and a second intermediate value, the encrypted partial key corresponding to a common key index that includes commonalities existing between a key index of the backbone node and a key index of the new node, the second intermediate value being generated based on an application of a first concatenated value to a hash function, the first concatenated value being based on a concatenation of a session key and a first intermediate value corresponding to respective partial keys included in a key pool, the encrypted partial key being encrypted using an encryption key that is generated by extracting the common key index from the key index of the backbone node, and applying a second concatenated value to a hash function, the applying of the second concatenated value comprising acquiring the second concatenated value, the acquiring of the second concatenated value comprising concatenating the second intermediate value corresponding to the extracted common key index; generating a decryption key using the second intermediate value; and decrypting the encrypted partial key with the decryption key. - View Dependent Claims (6, 7, 8)
-
-
9. A system for lightweight key distribution in a wireless network, the system comprising:
-
a backbone node of the wireless network, the backbone node comprising; an identification sending unit to send, to a new node intending to join the wireless network, an identification (ID) to allocate to the new node and a certificate to verify the ID, the ID and the certificate being sent to the new node in response to a connection request message received from the new node; a receiving unit to receive; the connection request message from the new node; and a key request message from the new node, the key request message including the allocated ID and the certificate; a session key generator to generate a session key as a result of the receiving unit receiving the key request message; a calculator to apply a first concatenated value to a hash function to calculate a second intermediate value, the first concatenated value being acquired by concatenating the session key and a first intermediate value that corresponds to respective partial keys included in a key pool; an encryption key generator to; generate an encryption key using the second intermediate value; and encrypt a partial key corresponding to a common key index with the generated encryption key, the common key index including commonalities existing between a key index of the backbone node and a key index of the new node; and a key sending unit to send a key part that includes the encrypted partial key and the second intermediate value to the new node, wherein; the encryption key generator comprises a key index extractor to extract the common key index from the key index of the backbone node; and the encryption key generator generates the encryption key by applying a second concatenated value to a hash function, the second concatenated value being acquired by concatenating the second intermediate value corresponding to the common key index. - View Dependent Claims (10, 11, 12)
-
-
13. A system for lightweight key acquisition in a wireless network, the system comprising:
a new node intending to join the wireless network, the new node comprising; a identification receiving unit to receive, from a backbone node of the wireless network in response to a sending of a connection request message by the new node, an identification (ID) allocated from the backbone node and a certificate to verify the ID; a sending unit to send; the connection request message to the backbone node; and a key request message to the backbone node, the key request message including the allocated ID and the certificate; a key part receiver unit to receive a key part from the backbone node that includes an encrypted partial key and a second intermediate value, the encrypted partial key corresponding to a common key index, the common key index comprising commonalities existing between a key index of the backbone node and a key index of the new node, the second intermediate value being generated based on an application of a first concatenated value to a hash function, the first concatenated value being based on a concatenation of a session key and a first intermediate value corresponding to respective partial keys included in a key pool, the encrypted partial key being encrypted based on an encryption key that is based on an extraction of the common key index from the key index of the backbone node, and an application of a second concatenated value to a hash function, the application of the second concatenated value being based on a concatenation of the second intermediate value corresponding to the extraction of the common key index; and a decryption key generator to; generate a decryption key using the second intermediate value; and decrypt the encrypted partial key with the decryption key. - View Dependent Claims (14, 15, 16)
-
17. A non-transitory computer-readable recording medium storing a program for lightweight key distribution in a wireless network, comprising:
-
a first set of instructions configured to control a backbone node of the wireless network to send, to a new node intending to join the wireless network, an identification (ID) to allocate to the new node and a certificate to verify the ID, the ID and the certificate being sent to the new node in response to a connection request message received from the new node; a second set of instructions configured to control the backbone node to receive; the connection request message from the new node; and a key request message from the new node, the key request message including the allocated ID and the certificate; a third set of instructions configured to control the backbone node to generate a session key as a result of the receiving of the key request message from the new node; a fourth set of instructions configured to control the backbone node to calculate a second intermediate value by applying a first concatenated value to a hash function, the first concatenated value being acquired by concatenating the session key and a first intermediate value that corresponds to respective partial keys included in a key pool; a fifth set of instructions configured to control the backbone node to; generate an encryption key using the calculated second intermediate value, the generating of the encryption key comprising; extracting a common key index from a key index of the backbone node; and applying a second concatenated value to a hash function, the applying of the second concatenated value comprising acquiring the second concatenated value, the acquiring of the second concatenated value comprising concatenating the calculated second intermediate value corresponding to the extracted common key index; and encrypt a partial key corresponding to the common key index with the generated encryption key, the common key index including commonalities existing between the key index of the backbone node and a key index of the new node; and a sixth set of instructions configured to control the backbone node to send a key part that includes the encrypted partial key and the second intermediate value to the new node.
-
-
18. A non-transitory computer-readable recording medium storing a program for lightweight key acquisition in a wireless network, comprising:
-
a first set of instructions configured to control a new node intending to join the wireless network to receive, from a backbone node of the wireless network in response to a sending of a connection request message by the new node, an identification (ID) allocated from the backbone node and a certificate to verify the ID; a second set of instructions configured to control the new node to send; the connection request message to the backbone node; and a key request message to the backbone node, the key request message including the allocated ID and the certificate; a third set of instructions configured to control the new node to receive a key part from the backbone node that includes an encrypted partial key and a second intermediate value, the encrypted partial key corresponding to a common key index, the common key index comprising commonalities existing between a key index of the backbone node and a key index of the new node, the second intermediate value being generated based on an application of a first concatenated value to a hash function, the first concatenated value being based on a concatenation of a session key and a first intermediate value corresponding to respective partial keys included in a key pool, the encrypted partial key being encrypted using an encryption key that is generated by extracting the common key index from the key index of the backbone node, and applying a second concatenated value to a hash function, the applying of the second concatenated value comprising acquiring the second concatenated value, the acquiring of the second concatenated value comprising concatenating the second intermediate value corresponding to the extracted common key index; a fourth set of instructions configured to control the new node to generate a decryption key using the second intermediate value; and a fifth set of instructions configured to control the new node to decrypt the encrypted partial key with the decryption key.
-
Specification