Reducing security protocol overhead in low data rate applications over a wireless link

A technology for wirelessly sending and securing data, applied in the security field of wireless communication networks, and can solve problems such as unauthorized use of resources

Inactive Publication Date: 2009-08-05
NOKIA CORP
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Yet another threat is that unauthorized devices can try to address the device and gain unauthorized use of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reducing security protocol overhead in low data rate applications over a wireless link
  • Reducing security protocol overhead in low data rate applications over a wireless link
  • Reducing security protocol overhead in low data rate applications over a wireless link

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the following description of various example embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which are shown by way of illustration various embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present invention.

[0026] Such as figure 2 As shown in , the communication module 201 includes an interface 203 between a host layer or unit 205 and a MAC layer 207 . It is also shown that the communications module 201 includes registers 209 and a memory space 211 . In one embodiment, the registers 249 and memory 251 of the communications module 241 can be accessed through the air interface 215 without the presence or action of a host layer in the module. The host layer or unit 205 of the communication module 201 may handle the functions of the air interface 215 for the ho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A wireless communication module to provide security at a baseband layer is disclosed. A payload of plaintext may be divided into partitions. The module may use a block cipher such as the Advanced Encryption Standard (AES) algorithm to process a unique initiation vector (IV) for each partition so that each partition may be XORed with a key stream based on a respective IV, the result providing ciphertext. The IV may include a nonce, an upper level packet counter, a packet counter and a block counter. The state of the counters may be incremented in a predetermined pattern so as to provide a unique IV for use with each partition. The ciphertext may be transmitted in a packet with a security bit indicating that the payload is encrypted but omitting the nonce. Encrypted packets may include an integrity check value (ICV) to provide for integrity of the encrypted message.

Description

technical field [0001] The present invention relates to security in wireless communication networks, in particular to providing security at the baseband level. Background technique [0002] In full operation mode, the low-rate radio communication module needs to communicate with a host module that controls operations and data flow between the host module and the low-rate radio communication module. The host interface is typically implemented as a serial interface, such as a serial peripheral interface (SPI), universal asynchronous receiver / transmitter (UART), or other similar interfaces. In some cases, however, the communication module may also operate without any control from the host module. In such cases, the data flow and / or mode of operation is somewhat restricted compared to the full mode of operation. For example, the data sent by the communication module can be constant so that no data flow from the host module to the communication module is required. In addition,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/40
CPCH04L2209/80H04L9/065H04L63/162H04L9/18H04L9/06H04L2209/08H04W12/02H04W12/033
Inventor J·E·埃克伯格A·拉佩特莱南
Owner NOKIA CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products