Abstract:
The present disclosure provides a method for performing initial setup with a connection acceptance device by a connection request device, the method comprising the operations of: performing an association procedure with a configurator; transmitting a first probe request message to the configurator; receiving a first probe response message including information required for a connection to the connection acceptance device from the configurator; driving a timer and transmitting a second probe request message to the connection acceptance device; receiving a second probe response message from the connection acceptance device; and starting a secure connection to the connection acceptance device when the second probe request message is received before the timer has expired, and information included in the second probe response message coincides with the information required for the connection, which is included in the first probe response message.
Abstract:
A method for communicating between devices is presented. The method includes dividing a first public key of a first device into at least two partial keys, transmitting the at least two partial keys through at least two communication channels having different physical characteristics, receiving a second public key of a second device through at least one of the at least two communication channels, authenticating the second device based on the received second public key, and performing secure communication with the second device using a public key generated based on the received second public key.
Abstract:
Disclosed are a communication scheme and a system thereof for converging an IoT technology and a 5G communication system for supporting a high data transmission rate beyond that of a 4G system. A method and an apparatus for configuring a connection with a second device, which provides access to a network, by a first device in a communication system, is provided. The method includes discovering the second device supporting a neighbor awareness network (NAN) and located within a predetermined range from the first device, exchanging an ephemeral key of the first device for identifying the first device and an ephemeral key of the second device for identifying the second device, and performing a secure connection between the first device and the second device.