WO1999059293A1 - Data transfer method with varying packet transmission time interval security protocol - Google Patents
Data transfer method with varying packet transmission time interval security protocol Download PDFInfo
- Publication number
- WO1999059293A1 WO1999059293A1 PCT/SE1999/000686 SE9900686W WO9959293A1 WO 1999059293 A1 WO1999059293 A1 WO 1999059293A1 SE 9900686 W SE9900686 W SE 9900686W WO 9959293 A1 WO9959293 A1 WO 9959293A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- packets
- message packets
- communications
- time interval
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/14—Multichannel or multilink protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/324—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
Definitions
- the present invention relates to a method and system for providing secure communications and, in particular, to a method and system for splitting a sensitive message to be communicated into plural packets (perhaps having variable lengths) and then transmitting the individual packets from a source to a destination with a selected varying time interval between successive packets.
- a message to be communicated over an unsecure communications link is fragmented into a plurality of packets. These individual packets may, if desired, have varying lengths.
- a transmitter module then individually transmits the packets over the unsecure communications link. The transmissions of the individual packets are made by the module in such a fashion as to introduce a varying (perhaps, randomly or pseudo-randomly) selected inter-packet time interval (delay) between successive packets.
- the transmitted packets are received and reassembled to regenerate the original message.
- This protocol for non-timely transmission of the individual message packets serves to make it more difficult for an eavesdropper to capture all of the message packets and reconstruct the transmitted message.
- Enhanced security is provided by not only transmitting the packets in a non-timely manner, but also by either sending the packets over different transmission paths supported by the communications link or disordering the packets in a random or pseudo random manner prior to transmission.
- FIGURE 1 is a block diagram of a communications system implementing a security protocol in accordance with the present invention
- FIGURE 2 is a flow diagram illustrating a method of operation concerning the security protocol of the present invention.
- FIGURE 1 a block diagram of a communications system 10 implementing a security protocol in accordance with the present invention.
- the communications system 10 includes an origination node
- the origination node 12 includes a source 18 for generating message traffic.
- the source 18 generated messages are then handled by a transmitter module 20 for transmission over the communications link 16 towards the destination node 14.
- a receiver module 22 in the destination node 14 receives the transmitted messages, and outputs the messages to a message sink 24.
- the transmitter module 20 includes a first functionality 26 for taking a message received from the source 18 and fragmenting the message into a plurality of individual packets. The fragmenting process may, if desired, generate individual packets of varying, rather than consistent, lengths. The transmitter module 20 then utilizes a second functionality 28 for transmitting the generated individual packets in a non-timely fashion.
- non-timely it is meant that the individual packets are transmitted by the transmitter module 20 over the communications link 16 with a varying inter-packet time interval (delay) between successive packets in the source originated message. This introduced delay between packets may be of either a randomly or pseudo randomly selected duration.
- the introduced varying inter-packet time delay serves to enhance the security of packet transmission over the communications link 16 as a potential eavesdropper does not know when each of the successive packets comprising the complete message are to be transmitted. Delays may be selectively chosen (from packet to packet) in a variable range from as short as - 3 -
- the third functionality 30 further introduces a random or pseudo random disordering of the message packets prior to non-timely transmission over the communications link 16.
- the fourth functionality 32 further introduces the transmission of the individual packets over different ones of a plurality of communications paths 34 supported by the communications link 16.
- the paths 34 may comprise different logical or physical channels within the communications link 16.
- the receiver module 22 includes a message reassembly functionality 36 for receiving the non-timely transmitted packets (perhaps in either or both a disordered manner and/or from different paths 34), and then coordinating the reconstruction of the original message as generated by the source 18. The reconstructed message is then output by the functionality 36 to the sink 24 for further processing and handling.
- the functionality 36 includes appropriate memory (not shown) for temporarily caching received message packets prior to processing and completion of the message reconstruction action.
- the system 10 comprises a telecommunications system
- the origination node 12 sends a message on behalf of a user (such as a user mobile station)
- the destination node 14 comprises a network communications node (such as a mobile switching center or home location register)
- the communications link 16 comprises a signaling network of the telecommunications system.
- the message being communicated in a fragmented, non-timely manner may comprises sensitive telecommunications information such as authentication data.
- the secure transmission protocol of the present invention accordingly provides a level of defense against the interception of this sensitive mobile station information and possible cloning of the mobile station.
- step 100 a message is originated for transmission.
- step 102 that originated message is fragmenting into a plurality of individual packets.
- the fragmenting process of step 102 may, if desired, generate individual packets of - 4 -
- step 104 the generated individual packets are optionally disordered in either a random or a pseudo random manner.
- the generated individual packets are then transmitted in step 106 in a non-timely fashion such that there is introduced between the transmission of individual packets a randomly or pseudo randomly varying inter-packet time interval (delay).
- the non- timely transmission of step 106 may further involve selectively transmitting the individual packets over different ones of a plurality of communications paths (such as plural physical or logical channels).
- step 108 the non- timely transmitted packets are received. Reassembly of the packets back into the original message occurs in step 110. This step of reassembly in step 110 accounts not only for the introduced inter- packet time delay, but also for any optionally introduced variance in packet size, packet disordering or differences in transmission path.
- the regenerated message is then output in step 112.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU44019/99A AU4401999A (en) | 1998-05-13 | 1999-04-27 | Data transfer method with varying packet transmission time interval security protocol |
BR9910423-7A BR9910423A (en) | 1998-05-13 | 1999-04-27 | Communications process and system |
GB0026379A GB2353683A (en) | 1998-05-13 | 1999-04-27 | Data transfer method with varying packet transmission time interval security protocol |
CA002331612A CA2331612A1 (en) | 1998-05-13 | 1999-04-27 | Data transfer method with varying packet transmission time interval security protocol |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US7844798A | 1998-05-13 | 1998-05-13 | |
US09/078,447 | 1998-05-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999059293A1 true WO1999059293A1 (en) | 1999-11-18 |
Family
ID=22144090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE1999/000686 WO1999059293A1 (en) | 1998-05-13 | 1999-04-27 | Data transfer method with varying packet transmission time interval security protocol |
Country Status (7)
Country | Link |
---|---|
CN (1) | CN1300489A (en) |
AR (1) | AR015289A1 (en) |
AU (1) | AU4401999A (en) |
BR (1) | BR9910423A (en) |
CA (1) | CA2331612A1 (en) |
GB (1) | GB2353683A (en) |
WO (1) | WO1999059293A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2362547A (en) * | 2000-01-07 | 2001-11-21 | Motorola Inc | Method for receiving smscb messages during grps/edge data transfer mode |
EP1161040A2 (en) * | 2000-05-08 | 2001-12-05 | Mitsubishi Heavy Industries, Ltd. | Data transmission over a plurality of lines |
DE10214118A1 (en) * | 2002-03-28 | 2003-10-23 | Infineon Technologies Ag | Circuit arrangement with a transmitter and a receiver |
WO2003107562A2 (en) * | 2002-06-18 | 2003-12-24 | Reveo, Inc. | Burst communications system and method |
WO2005011195A2 (en) * | 2003-07-24 | 2005-02-03 | Koninklijke Philips Electronics N.V. | Wireless network security |
KR100557699B1 (en) * | 2001-07-21 | 2006-03-07 | (주)와이즈인터네셔날코리아 | Image transmission device using local network |
US20060106753A1 (en) * | 2004-11-17 | 2006-05-18 | Samsung Electro-Mechanics Co., Ltd. | Method for discovery reply packet transmission in communication network |
WO2009034106A1 (en) * | 2007-09-13 | 2009-03-19 | Viaccess | Method of securing a data stream |
AU2005290963B2 (en) * | 2004-08-13 | 2009-04-23 | Nokia Technologies Oy | WCDMA uplink HARQ operation during the reconfiguration of the TTI length |
US7653393B2 (en) | 2004-08-17 | 2010-01-26 | Samsung Electronics Co., Ltd | Method and system for forming and transmitting/receiving neighbor base station information in a BWA communication system |
KR100943568B1 (en) * | 2006-06-16 | 2010-02-23 | 엔비디아 코포레이션 | Systems and methods for communicating data using multiple types of data connections |
CN113939882A (en) * | 2018-11-20 | 2022-01-14 | 维瑞思健康公司 | Wireless charging, positioning and data communication for implantable vascular access devices |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100334581C (en) * | 2004-04-02 | 2007-08-29 | 明基电通股份有限公司 | Embedded computer system and method for transferring data between multiple microprocessors |
CN103596168A (en) * | 2013-11-18 | 2014-02-19 | 无锡赛思汇智科技有限公司 | Self-adaptive anti-interference message sending and receiving method and device in wireless communication |
DE102018213898B4 (en) * | 2018-08-17 | 2020-03-19 | Continental Automotive Gmbh | Monitoring a network connection for eavesdropping |
CN111698208B (en) * | 2020-05-07 | 2022-08-02 | 北京华云安信息技术有限公司 | Method, apparatus and storage medium for encoding multi-tunnel adaptive data stream |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4761778A (en) * | 1985-04-11 | 1988-08-02 | Massachusetts Institute Of Technology | Coder-packetizer for random accessing in digital communication with multiple accessing |
US5680400A (en) * | 1995-05-31 | 1997-10-21 | Unisys Corporation | System for high-speed transfer of a continuous data stream between hosts using multiple parallel communication links |
WO1998010561A1 (en) * | 1996-09-09 | 1998-03-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
EP0830017A2 (en) * | 1996-09-17 | 1998-03-18 | Nextlevel Systems, Inc. | Delivery and acquisition of data segments with optimized inter-arrival time |
-
1999
- 1999-04-27 CN CN99806123A patent/CN1300489A/en active Pending
- 1999-04-27 AU AU44019/99A patent/AU4401999A/en not_active Abandoned
- 1999-04-27 CA CA002331612A patent/CA2331612A1/en not_active Abandoned
- 1999-04-27 WO PCT/SE1999/000686 patent/WO1999059293A1/en active Application Filing
- 1999-04-27 GB GB0026379A patent/GB2353683A/en not_active Withdrawn
- 1999-04-27 BR BR9910423-7A patent/BR9910423A/en not_active IP Right Cessation
- 1999-05-07 AR ARP990102182A patent/AR015289A1/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4761778A (en) * | 1985-04-11 | 1988-08-02 | Massachusetts Institute Of Technology | Coder-packetizer for random accessing in digital communication with multiple accessing |
US5680400A (en) * | 1995-05-31 | 1997-10-21 | Unisys Corporation | System for high-speed transfer of a continuous data stream between hosts using multiple parallel communication links |
WO1998010561A1 (en) * | 1996-09-09 | 1998-03-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
EP0830017A2 (en) * | 1996-09-17 | 1998-03-18 | Nextlevel Systems, Inc. | Delivery and acquisition of data segments with optimized inter-arrival time |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2362547A (en) * | 2000-01-07 | 2001-11-21 | Motorola Inc | Method for receiving smscb messages during grps/edge data transfer mode |
CN1315305C (en) * | 2000-01-07 | 2007-05-09 | 摩托罗拉公司 | Method for cellular broudcast message of receiving short message service |
EP1161040A2 (en) * | 2000-05-08 | 2001-12-05 | Mitsubishi Heavy Industries, Ltd. | Data transmission over a plurality of lines |
EP1161040A3 (en) * | 2000-05-08 | 2004-05-26 | Mitsubishi Heavy Industries, Ltd. | Data transmission over a plurality of lines |
US6912252B2 (en) | 2000-05-08 | 2005-06-28 | Mitsubishi Heavy Industries, Ltd. | Distributed communicating system, distributed communication data, distributed transmitting means and distributed receiving means |
KR100557699B1 (en) * | 2001-07-21 | 2006-03-07 | (주)와이즈인터네셔날코리아 | Image transmission device using local network |
DE10214118B4 (en) * | 2002-03-28 | 2007-02-22 | Infineon Technologies Ag | Circuit arrangement with a transmitter and a receiver |
DE10214118A1 (en) * | 2002-03-28 | 2003-10-23 | Infineon Technologies Ag | Circuit arrangement with a transmitter and a receiver |
US7457365B2 (en) | 2002-03-28 | 2008-11-25 | Infineon Technologies Ag | Circuit arrangement having a transmitter and a receiver |
WO2003107562A2 (en) * | 2002-06-18 | 2003-12-24 | Reveo, Inc. | Burst communications system and method |
WO2003107562A3 (en) * | 2002-06-18 | 2004-07-29 | Reveo Inc | Burst communications system and method |
WO2005011195A2 (en) * | 2003-07-24 | 2005-02-03 | Koninklijke Philips Electronics N.V. | Wireless network security |
WO2005011195A3 (en) * | 2003-07-24 | 2005-05-19 | Koninkl Philips Electronics Nv | Wireless network security |
AU2005290963B2 (en) * | 2004-08-13 | 2009-04-23 | Nokia Technologies Oy | WCDMA uplink HARQ operation during the reconfiguration of the TTI length |
US7653393B2 (en) | 2004-08-17 | 2010-01-26 | Samsung Electronics Co., Ltd | Method and system for forming and transmitting/receiving neighbor base station information in a BWA communication system |
EP1659759A1 (en) | 2004-11-17 | 2006-05-24 | Samsung Electro-Mechanics Co., Ltd. | Method for packet transmission in a sensor network |
US20060106753A1 (en) * | 2004-11-17 | 2006-05-18 | Samsung Electro-Mechanics Co., Ltd. | Method for discovery reply packet transmission in communication network |
US7660860B2 (en) | 2004-11-17 | 2010-02-09 | Samsung Electro-Mechanics Co., Ltd | Method for discovery reply packet transmission in communication network |
CN1777111B (en) * | 2004-11-17 | 2010-11-24 | 三星电机株式会社 | Method for discovery reply packet transmission in communication network |
KR100943568B1 (en) * | 2006-06-16 | 2010-02-23 | 엔비디아 코포레이션 | Systems and methods for communicating data using multiple types of data connections |
US8279893B2 (en) | 2006-06-16 | 2012-10-02 | Nvidia Corporation | System and method for communicating data utilizing multiple types of data connections |
WO2009034106A1 (en) * | 2007-09-13 | 2009-03-19 | Viaccess | Method of securing a data stream |
FR2921173A1 (en) * | 2007-09-13 | 2009-03-20 | Viaccess Sa | METHOD FOR SECURING A DATA STREAM |
CN113939882A (en) * | 2018-11-20 | 2022-01-14 | 维瑞思健康公司 | Wireless charging, positioning and data communication for implantable vascular access devices |
Also Published As
Publication number | Publication date |
---|---|
BR9910423A (en) | 2001-01-09 |
GB0026379D0 (en) | 2000-12-13 |
AU4401999A (en) | 1999-11-29 |
GB2353683A (en) | 2001-02-28 |
AR015289A1 (en) | 2001-04-18 |
CN1300489A (en) | 2001-06-20 |
CA2331612A1 (en) | 1999-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1999059293A1 (en) | Data transfer method with varying packet transmission time interval security protocol | |
Jakobsson et al. | Security weaknesses in Bluetooth | |
US10924462B2 (en) | Cryptanalysis method and system | |
US20020120874A1 (en) | Method and system for secure exchange of messages | |
JPH05227152A (en) | Method and device for establishing privacy communication link | |
WO2000045539A1 (en) | Key management for telephone calls to protect signaling and call packets between cta's | |
EP1190526A1 (en) | Methods and arrangements for secure linking of entity authentication and ciphering key generation | |
TW201004263A (en) | Method and apparatus for data privacy in passive optical networks | |
MXPA06010646A (en) | Efficient transmission of cryptographic information in secure real time protocol. | |
WO2005086950A2 (en) | Method for data encryption in an ethernet passive optical network | |
NL1005523C2 (en) | Point-to-multipoint analogue or digital signal distribution | |
Hajduczenia et al. | On EPON security issues | |
CN114025346A (en) | Safe and effective data transmission method for data between mobile self-set networks | |
GB2379588A (en) | Encrypting/decrypting information in a wireless communication system | |
Meng et al. | Analysis and solutions of security issues in Ethernet PON | |
Kim et al. | The implementation of the link security module in an EPON access network | |
EP1627490B1 (en) | Processor and method for end-to-end encryption synchronisation | |
Mahmood et al. | Analysis and Evaluation of Secure Solutions for Terrestrial Networks | |
EP1634406B1 (en) | Processor, method, transmitter and terminal for use in communications | |
CN104796397B (en) | A kind of method that data encryption is sent | |
CN119135415A (en) | A remote control method and system based on network communication | |
Inácio et al. | Preamble encryption mechanism for enhanced privacy in Ethernet passive optical networks | |
Lee et al. | Lightweight packet authentication in IEEE 802.11 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99806123.9 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 200026379 Country of ref document: GB Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2000/011002 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2331612 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase |