Reduced authentication times in constrained computer networks
First Claim
1. A method, comprising:
- monitoring an authentication time for one or more nodes in a low power and lossy network (LLN);
dynamically correlating the authentication time with a location of the one or more nodes in the LLN to identify one or more authentication-delayed nodes;
selecting, based on the location of the one or more authentication-delayed nodes, one or more key-delegation nodes to receive one or more network keys for localized authentication of one or more of the authentication-delayed nodes;
distributing the one or more network keys to the one or more key-delegation nodes; and
authenticating one or more authentication delayed nodes via the one or more key delegation nodes.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node may dynamically correlate the authentication time with the location of the one or more nodes in the LLN in order to identify one or more authentication-delayed nodes. The node may then select, based on the location of the one or more authentication-delayed nodes, one or more key-delegation nodes to receive one or more network keys so that the key-delegation nodes may perform localized authentication of one or more of the authentication-delayed nodes. The capable node may then distribute the one or more network keys to the one or more key-delegation nodes.
-
Citations
13 Claims
-
1. A method, comprising:
-
monitoring an authentication time for one or more nodes in a low power and lossy network (LLN); dynamically correlating the authentication time with a location of the one or more nodes in the LLN to identify one or more authentication-delayed nodes; selecting, based on the location of the one or more authentication-delayed nodes, one or more key-delegation nodes to receive one or more network keys for localized authentication of one or more of the authentication-delayed nodes;
distributing the one or more network keys to the one or more key-delegation nodes; andauthenticating one or more authentication delayed nodes via the one or more key delegation nodes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, comprising:
-
one or more network interfaces to communicate with a low power and lossy network (LLN); and a processor coupled to the network interfaces and adapted to execute one or more processes; a memory configured to store a process executable by the processor, the process when executed operable to; monitor an authentication time for one or more nodes in a low power and lossy network (LLN); dynamically correlate the authentication time with a location of the one or more nodes in the LLN to identify one or more authentication-delayed nodes; select, based on the location of the one or more authentication-delayed nodes, one or more key-delegation nodes to receive one or more network keys for localized authentication of one or more of the authentication-delayed nodes; distribute the one or more network keys to the one or more key-delegation nodes; and authenticating one or more authentication delayed nodes via the one or more key delegation nodes. - View Dependent Claims (11, 12, 13)
-
Specification