Abstract:
A method for security authentication within a wireless network is disclosed. A method within an adhoc mesh network for two devices to quickly determine roles (i.e. which is the authenticator and which is the supplicant) while establishing a security association is provided for. The invention further provides for the inclusion of cached key information in the role negotiation process and the application of role negotiation to a shortened three-way handshake.
Abstract:
Techniques are provided for determining a position of a node. For example, the node receives first position data from a first reference node and second position data from a second reference node. The second position data includes second position measurement information and a precision indicator which indicates accuracy of the second position measurement information. The node generates a timestamp which indicates when the second position data was received by node, and storing the second position data and associated timestamp. Upon receiving updated first position data at the node from the first reference node, the node determines whether updated second position data has been received from the second reference node, and if not, generates aged second position data based on the stored second position data and the associated timestamp. The node can then determine its position based on the aged second position data and the updated first position data.
Abstract:
Techniques are provided for determining a position of a node. For example, the node receives first position data from a first reference node and second position data from a second reference node. The second position data includes second position measurement information and a precision indicator which indicates accuracy of the second position measurement information. The node generates a timestamp which indicates when the second position data was received by node, and storing the second position data and associated timestamp. Upon receiving updated first position data at the node from the first reference node, the node determines whether updated second position data has been received from the second reference node, and if not, generates aged second position data based on the stored second position data and the associated timestamp. The node can then determine its position based on the aged second position data and the updated first position data.
Abstract:
A method is provided for a particular multi-radio meshed node to discover a route to a peer multi-radio meshed node in a wireless multi-hop network including a plurality of multi-radio meshed nodes. Each of the multi-radio meshed nodes each includes a plurality of radio modules, and each radio module comprises an interface. The particular multi-radio meshed node transmits route request (RREQ) messages from each interface of a particular multi-radio meshed node. When a particular recipient multi-radio meshed node receives at least one of the route request (RREQ) messages, it generates a reverse route to the particular multi-radio meshed node. A peer-to-peer route is established when the particular multi-radio meshed node receives a route reply (RREP) message and can then be used to forward traffic to and from the destination node.
Abstract:
A multi-radio meshed node is provided which includes a first radio module, a second radio module, and a single routing manager module that is common to or shared by the first radio module and the second radio module. The multi-radio meshed node has a node MAC address associated therewith which uniquely identifies the multi-radio meshed node. The first radio module includes a first interface. The second radio module is designed to communicate simultaneously when the first radio module is communicating. The second radio module includes a second interface. The first radio module has a first interface MAC address associated therewith, and the second radio module has a second interface MAC address associated therewith. The single routing manager module determines which one of the first interface and the second interface is to be used for routing of a particular packet.
Abstract:
A method for security authentication within a wireless network is disclosed. A method within an adhoc mesh network for two devices to quickly determine roles (i.e. which is the authenticator and which is the supplicant) while establishing a security association is provided for. The invention further provides for the inclusion of cached key information in the role negotiation process and the application of role negotiation to a shortened three-way handshake.