Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for privacy protection in ad hoc networks

A technology of equipment and characteristics, used in safety devices, electrical components, transmission systems, etc., can solve problems such as limiting the effective time of query

Active Publication Date: 2018-02-27
NOKIA TECH OY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another method that can be used with the first method is to limit the effective time of the query

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for privacy protection in ad hoc networks
  • Method and apparatus for privacy protection in ad hoc networks
  • Method and apparatus for privacy protection in ad hoc networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Embodiments of the present invention, however, recognize that replayed queries outside of the network that originated the query are more difficult to defend against. If the group member is not within the local network from which the query was initiated, it will not recognize that the query has already been asked, and will therefore interpret the query as a new query. For example, if messages are exchanged between members of a political or support group organized into an ad hoc network, an attacker may log queries sent by members of the group. The attacker can then replay the query at corporate headquarters (eg, while relaying the query for rebroadcasting). Devices that responded to the rebroadcast query likely belonged to individuals who were members of the group, but who were not present at the meeting.

[0014] Embodiments of the present invention further recognize that knowledge of where a query is originated can prevent replay attacks in which a query recorded in o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and techniques for wireless communications. User devices belonging to a group of user devices operable as wireless nodes configure area parameters based on their sensing of radio channels (202). The zone parameters are contained in a message readable by members of the group (204). The group member receiving the message determines the zone parameter based on its own sensing of the radio channel (210), and only if within specified limits the zone parameter in the message matches the zone parameter based on the sensing of the radio channel by the receiving member, Only respond to the received message (216).

Description

technical field [0001] The present invention generally relates to wireless communications. More specifically, the present invention relates to improved systems and techniques for preserving privacy for members of an ad hoc ("ad hoc") communication network. Background technique [0002] An easy way to achieve private communications is to organize a group of wireless devices into a flexible network that can accommodate changing membership. The nodes of the ad hoc network may be mobile phones, especially devices such as smartphones capable of simultaneous voice and data communication. Group members may wish to keep their communications private, and may seek to protect both the content of their messages and their sources. Group members may wish to hide the fact that a message is from a particular node, and also wish to hide the fact that the node belongs to the group. Group members can encrypt their traffic using the shared secret key K, and also obscure the group's identifie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W4/08H04L9/40
CPCH04W12/02H04W12/10H04W12/04H04L63/162H04W12/79H04W12/64
Inventor M·卡斯林P·金兹布尔格
Owner NOKIA TECH OY