Secure wireless local area network (WLAN) for data and control traffic
First Claim
Patent Images
1. A method comprising:
- receiving, by a computing device, capability information associated with a next hop device of a wireless local area network (WLAN);
determining, by the computing device and based on the capability information, that the next hop device is capable of implementing a media access control (MAC) security standard and a layer 2 link security standard;
creating, by the computing device and via the MAC security standard, a secure channel with the next hop device after determining that the next hop device is capable of implementing the MAC security standard and the layer 2 link security standard; and
transmitting, by the computing device and after creating the secure channel, an encrypted packet to the next hop device via the secure channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A device receives capability information associated with a next hop device of a wireless local area network (WLAN). The device also determines, based on the capability information, whether the next hop device is capable of implementing security for traffic, where the security includes a media access control (MAC) security standard and a layer 2 link security standard. The device further creates, via the MAC security standard, a secure channel with the next hop device when the next hop device is capable of providing security for traffic.
51 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a computing device, capability information associated with a next hop device of a wireless local area network (WLAN); determining, by the computing device and based on the capability information, that the next hop device is capable of implementing a media access control (MAC) security standard and a layer 2 link security standard; creating, by the computing device and via the MAC security standard, a secure channel with the next hop device after determining that the next hop device is capable of implementing the MAC security standard and the layer 2 link security standard; and transmitting, by the computing device and after creating the secure channel, an encrypted packet to the next hop device via the secure channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device comprising:
-
a memory to store a plurality of instructions; and a processor to execute one or more of the plurality of the instructions to; receive capability information associated with a next hop device of a wireless local area network (WLAN), determine, based on the capability information, that the next hop device is capable of implementing a media access control (MAC) security standard and a layer 2 link security standard, create, via the MAC security standard, a secure channel with the next hop device after determining that the next hop device is capable of implementing the MAC security standard and the layer 2 link security standard, and transmit, to the next hop device and via the secure channel, an encrypted packet after creating the secure channel. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by at least one processor, cause the at least one processor to; receive capability information associated with a next hop device of a wireless local area network (WLAN); determine, based on the capability information, whether the next hop device is capable of implementing a media access control (MAC) security standard and a layer 2 link security standard; create, via the MAC security standard, a secure channel with the next hop device after determining that the next hop device is capable of implementing the MAC security standard and the layer 2 link security standard; and transmit, to the next hop device and via the secure channel, an encrypted packet after creating the secure channel. - View Dependent Claims (20)
Specification