Unlock instant, AI-driven research and patent intelligence for your innovation.

Mechanism to avoid double-encryption in mobile networks

一种双重加密、移动节点的技术,应用在通信网络领域,能够解决CPU资源消耗、电池消耗快等问题,达到优化网络性能、高效使用、优化使用的效果

Inactive Publication Date: 2007-04-11
ALCATEL LUCENT SAS
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This results in CPU resource consumption as encryption is a very computationally intensive operation
Said calculations also make the battery drain faster, and as mentioned above, power for mobile devices is at a premium when considering the size and limitations of current battery technology considered acceptable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mechanism to avoid double-encryption in mobile networks
  • Mechanism to avoid double-encryption in mobile networks
  • Mechanism to avoid double-encryption in mobile networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The method of the invention aims at avoiding redundant double encryption in order to optimize the use of network resources in a wireless network with limited bandwidth. The following terms are used in this specification to describe the present invention.

[0050] Any network with unreliable / unauthenticated nodes, such as the Internet, is called an "unreliable network" or "UN". Sensitive traffic passing over unreliable networks must be encrypted and authenticated. All is typically done at L3 (for corporate networks etc.) or L4 (for bank networks etc.) Encryption. An "Access Network" or "AN" is a local area network to which mobile nodes and base stations belong. IEEE 802.11i requires and specifies L2 encryption of datagrams.

[0051] The term "mobile node" or "MN" refers to a device, such as a laptop, PDA (Personal Digital Assistant), cell phone, etc., used to communicate over a wireless network. The term "base station" or "BS" refers here to the gateway (access poin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for enabling a mobile node to transmit encrypted data over a path including a wireless link and an untrusted link, while avoiding double encryption on any link. The data on the end-to-end path is encrypted using an application specific security mechanism, or an L2 mechanism is used for encrypting the data on the wireless link as mandated by the wireless standards, and an application specific security mechanism is used for encrypting the data on the untrusted link. By avoiding redundant double encryption, the method of the invention results in optimizing the use of network resources in bandwidth-limited wireless networks and increases the life of the mobile node battery.

Description

technical field [0001] The present invention relates to communication networks, and in particular to a mechanism for avoiding expensive double encryption in mobile networks. Background technique [0002] Communications in the network must be kept secure at all locations to avoid disclosure of confidential information to unauthorized entities. The difficulty of maintaining network security increases dramatically in wireless communication networks, where the use of an air interface makes the task of an unauthorized eavesdropper easier, since information exchanged over the air can easily be eavesdropped when no encryption is applied. The importance of securing wireless networks varies with wireless devices (cell phones, laptops, personal digital assistants or PDAs, two-way pagers, etc.) and the services (email, text, messaging, video, etc.) , voice) increases. [0003] Various encryption algorithms may be used to maintain data in a secure state over network communication chan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L9/32H04W12/02
CPCH04L63/164H04L63/0272H04W12/02H04L63/0464H04L63/0281H04L63/0471H04W12/037H04W12/033H04W12/03
Inventor C·古斯塔夫V·K·乔伊M·加弗里洛维奇
Owner ALCATEL LUCENT SAS