DEVICE-TO-DEVICE COMMUNICATION METHOD INCLUDING DEVICE-TO-DEVICE AUTHENTICATION USING HASH CHAIN
A device-to-device (D2D) communication method is provided. According to an inventive concept, the method comprises, storing, by a first device, first authentication data including a hash chain, which is a sequential concatenation of hash values, and storing, by a second device, second authentication...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A device-to-device (D2D) communication method is provided. According to an inventive concept, the method comprises, storing, by a first device, first authentication data including a hash chain, which is a sequential concatenation of hash values, and storing, by a second device, second authentication data including an initial hash value of the hash chain, transmitting, by the first device, a final hash value of the hash chain to the second device, determining, by the second device, whether authentication between the first and second devices has succeeded by repeatedly hashing the initial hash value stored in the second device until a hash value identical to the final hash value is returned, and if a determination is made that authentication between the first and second devices has succeeded, performing, by the first and second devices, a connection establishment process for establishing a connection between the first and second devices. |
---|