Processing

Please wait...

Settings

Settings

Goto Application

1. WO2011007301 - METHOD FOR SECURELY BROADCASTING SENSITIVE DATA IN A WIRELESS NETWORK

Publication Number WO/2011/007301
Publication Date 20.01.2011
International Application No. PCT/IB2010/053144
International Filing Date 09.07.2010
IPC
H04W 12/10 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
10Integrity
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
G06F 21/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
H04W 84/18 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
84Network topologies
18Self-organising networks, e.g. ad hoc networks or sensor networks
CPC
H04L 2209/38
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
38Chaining, e.g. hash chain or certificate chain
H04L 2209/805
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
80Wireless
805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
H04L 63/123
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
123received data contents, e.g. message integrity
H04L 9/3236
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
H04W 12/0023
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
002Mobile device security; Mobile application security
0023Protecting application or service provisioning, e.g. securing SIM application provisioning
H04W 12/10
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
10Integrity
Applicants
  • KONINKLIJKE PHILIPS ELECTRONICS N.V. [NL]/[NL] (AllExceptUS)
  • GARCIA MORCHON, Oscar [ES]/[DE] (UsOnly)
  • KURSAWE, Klaus [DE]/[NL] (UsOnly)
Inventors
  • GARCIA MORCHON, Oscar
  • KURSAWE, Klaus
Agents
  • KROEZE, Johannes, A.
Priority Data
09305676.015.07.2009EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) METHOD FOR SECURELY BROADCASTING SENSITIVE DATA IN A WIRELESS NETWORK
(FR) PROCÉDÉ PERMETTANT DE DIFFUSER DE FAÇON SÉCURISÉE DES DONNÉES SENSIBLES DANS UN RÉSEAU SANS FIL
Abstract
(EN)
The invention relates to a method for securely broadcasting sensitive data in a wireless sensor networks comprising a central device, called trust center, and a plurality of sensor nodes, the trust center being initialized with a cryptographic hash chain and each node being initialized with a node key and the anchor of the trust center hash chain, the method comprising the following steps: the trust center broadcasting a first secure message to the nodes, each node, after reception of the first message, creating a first acknowledgment message, and transmitting it back to the trust center, the trust center checking whether all the nodes have transmitted respective first acknowledgment message, and in case all messages have been received, the trust center securely broadcasting sensitive data in a third message, the nodes checking, based on elements included in the first message, whether sensitive data actually originates from the trust center.
(FR)
La présente invention se rapporte à un procédé permettant de diffuser de façon sécurisée des données sensibles dans un réseau de capteurs sans fil. Ce réseau comprend un dispositif central, appelé Trust Center, et une pluralité de nœuds capteurs. Le Trust Center est initialisé avec une chaîne de hachage cryptographique, et chaque nœud est initialisé avec une clé de nœud et l'ancre de la chaîne de hachage du Trust Center. Le procédé selon l'invention comprend les étapes suivantes : le Trust Center diffuse un premier message sécurisé à destination des nœuds; après réception du premier message, chaque nœud crée un premier message d'accusé de réception et le renvoie au Trust Center; le Trust Center vérifie si tous les nœuds ont transmis un premier message d'accusé de réception respectif; et, si tous les messages ont été reçus, le Trust Center diffuse de façon sécurisée des données sensibles dans un troisième message, les nœuds vérifiant, sur la base d'éléments contenus dans le premier message, si les données sensibles proviennent effectivement du Trust Center.
Latest bibliographic data on file with the International Bureau