AUTHENTICATION METHOD OF AD HOC NETWORK, AND ITS RADIO COMMUNICATIONS TERMINAL
PROBLEM TO BE SOLVED: To solve the problem, wherein the loads of a processing amount become large when authentication is performed each time connection relation is changed in an ad hoc network, wherein the connection relations among communications terminal equipment are changed rapidly. SOLUTION: Wh...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | PROBLEM TO BE SOLVED: To solve the problem, wherein the loads of a processing amount become large when authentication is performed each time connection relation is changed in an ad hoc network, wherein the connection relations among communications terminal equipment are changed rapidly. SOLUTION: When the pieces of the communications terminal equipment have the same common key, mutual authentication is performed by the common key. When the same common key is not provided, the mutual authentication by a public key is performed. Between the pieces of the communications terminal equipment which have performed the mutual authentication, the common key selected by itself and the common key received from the other communications terminal equipment are exchanged with each other and held. At authentication of the communications terminal equipment, when both do not have the common key, one generates the common key and distributes it to the other. When the one has the common key, the common key is generated and distributed to the other. Also, the common key held by the communications terminal equipment that corresponds to a relay node is broadcasted periodically. COPYRIGHT: (C)2006,JPO&NCIPI |
---|