Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes
First Claim
1. A method of accessing authentication information regarding a peer mobile network node in support of establishing a secure peer-to-peer communications context via ad-hoc networking, the method comprising:
- a. obtaining the mobile network node identification of the peer mobile network node;
b. authenticating with a wireless infrastructure serving network;
c. requesting information for authenticating the peer mobile network node based on the peer mobile network node identification obtained; and
d. receiving the authentication information.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods for authenticating peer mobile network nodes for establishing a secure peer-to-peer communications context in an ad-hoc network are presented. The methods include accessing wireless infrastructure network entities at low bandwidth and for a short time duration to obtain cryptographic information regarding a peer mobile network node for the purpose of establishing secure peer-to-peer communications therewith ad-hoc network. Having received cryptographic information regarding a peer mobile network node, the method further includes challenging the peer network node with a challenge phrase derived from the cryptographic information received, receiving a response, and establishing a secure communications context to the peer mobile network node based on the validity of the received response. Advantages are derived from addressing security threats encountered in provisioning ad-hoc networking, by leveraging wireless infrastructure network security architecture, exemplary deployed in UMTS/GSM infrastructure networks, enabling seamless mobile network node authentication through the existing UMTS and/or GSM authentication infrastructure, while pervasively communicating with peer mobile network nodes in an ad-hoc network.
81 Citations
18 Claims
-
1. A method of accessing authentication information regarding a peer mobile network node in support of establishing a secure peer-to-peer communications context via ad-hoc networking, the method comprising:
-
a. obtaining the mobile network node identification of the peer mobile network node;
b. authenticating with a wireless infrastructure serving network;
c. requesting information for authenticating the peer mobile network node based on the peer mobile network node identification obtained; and
d. receiving the authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of establishing a secure peer-to-peer communications context in an ad-hoc network between a pair of mobile network nodes comprising:
-
a. each mobile network node retrieving information for authenticating peer mobile network node;
b. the pair of mobile network nodes challenging each other based on the authentication information; and
c. responsive to a successful cross-authentication, establishing the secure peer-to-peer context between the wireless network nodes employing ad-hoc networking techniques. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A mobile network node adhering to a first wireless communications protocol for connection to a peer mobile network node in an ad-hoc network, the mobile network node comprising:
-
a. peer mobile network node identifier retrieval means for obtaining the identification of a peer mobile network node for establishing a secure peer-to-peer communications session therewith;
b. authentication information retrieval means for retrieving authentication information regarding the peer mobile network node;
c. authentication means for authenticating the peer mobile network node; and
d. encryption means for encrypting content exchanged in an ad-hoc networking context with the peer mobile network node in provisioning the secure peer-to-peer communications context therebetween. - View Dependent Claims (15, 16, 17)
-
-
18. A mobile network node adhering to a wireless communications protocol for connection to a peer mobile network node in an ad-hoc network, the mobile network node comprising:
-
a. an authentication information cache for caching authentication information regarding a plurality of mobile network nodes; and
b. authentication information serving means for serving a pair of mobile network nodes of the plurality of mobile network nodes with authentication information for establishing at least one cross-authenticated secure peer-to-peer communications context between the pair of mobile network nodes.
-
Specification