Method and system for lightweight key distribution in a wireless network

AV Urivskiy, AL Chmora - US Patent 8,582,777, 2013 - Google Patents
A method and system for lightweight key distribution in a wireless network comprises
calculating a second intermediate value using a first intermediate value which corresponds …

Method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system

W He, Y Huang, K Nahrstedt, WC Lee - US Patent 8,069,216, 2011 - Google Patents
(57) ABSTRACT A method and apparatus for alerting nodes of a malicious node in a mobile
ad-hoc communication system is provided herein. Particularly, a method and apparatus for …

Enhanced node b configuration with a universal integrated circuit card

P Wang, U Olvera-Hernandez, J Miller - US Patent App. 11/866,612, 2008 - Google Patents
A method for configuring an enhanced Node B (eNB) in a long term evolution (LTE) wireless
communication network includes providing information to the eNB, wherein the eNB can …

Systems and methods for security in a wireless utility network

M StJohns, R Vaswani, A Dubey - US Patent 8,756,675, 2014 - Google Patents
BACKGROUND Ensuring security in a wireless utility network poses diffi cult and unique
challenges. Meters and other devices in the utility network can have lifetimes of over twenty …

Tracking network resources

I Cubic, M Johansson, L Skorin-Kapov… - US Patent …, 2014 - Google Patents
A method and apparatus for tracking resources in a communication network. A central
resource tracking function receives a request to track a resource from a location application …

Trusted peer-based information verification system

P Khaitan - US Patent 9,083,696, 2015 - Google Patents
BACKGROUND The Internet may provide users with an abundance of readily accessible
information, Such as the documents of the World Wide Web. However, due to the ease at …

Techniques and architectures for preventing sybil attacks

RK Pandey - US Patent App. 12/403,684, 2010 - Google Patents
Techniques and architectures for preventing Sybil attacks are provided. A node
authenticates to a local certificate authority associated with a social networking group. The …

Methods and apparatus for reducing the effectiveness of chosen location attacks in a peer-to-peer overlay network

ETL Hardie, LR Dondeti, RS Jayaram… - US Patent …, 2016 - Google Patents
US9288216B2 - Methods and apparatus for reducing the effectiveness of chosen location
attacks in a peer-to-peer overlay network - Google Patents US9288216B2 - Methods and …

Peer enrollment method, route updating method, communication system, and relevant devices

GU Yingjie, X Jiang, H Song - US Patent 8,910,252, 2014 - Google Patents
Embodiments of the present invention disclose a peer enrollment method, a route updating
method, a communication system, and relevant devices to improve security of a peer-to-peer …

Interactive selection of identity informatoin satisfying policy constraints

C Binding, A Bussani, J Camenisch… - US Patent App. 12 …, 2010 - Google Patents
US20100100926A1 - Interactive selection of identity informatoin satisfying policy constraints -
Google Patents US20100100926A1 - Interactive selection of identity informatoin satisfying …