4.1 KDi,BS Establishment
As described in Fig. 2, the base station BS generates a seed SBS, sends it to the devices in the
first row, the message is determined as a message of level L1 since it belongs to the BS, which
represents the head of the network.
A device Di that receives this message will keep the seed, increment the level L of the received
message and make it as its level, so if the first message that is generated by the base station
equal to 1. The first devices that receive this message will have L2 , and so on, each node that
receives this message for the first time will increment its level. Thus, it records the sender
address of this message as its gateway to the BS. Thereafter, each node will send the received
seed to other devices, in this case: if a node has already received the seed, it will check the level
of the sender, if it is less than or equal to its level, it will reject it, otherwise it will record the sender
address as its second gateway. If a device receives the message for the first time, it will proceed
as cited before.
So on, until all the devices in the network receives the seed SBS. This way, each device will use
the seed with its own ID to generate the secret key to encrypt its communications with the BS.
Since the base station has the seed and all devices IDs in its database, it will generate for each
one its appropriate security key. Upon receiving an encrypted message, it will check the address
of the sender to know its key that will use to decrypt the message.
4.1 KDi,BS Establishment
As described in Fig. 2, the base station BS generates a seed SBS, sends it to the devices in the
first row, the message is determined as a message of level L1 since it belongs to the BS, which
represents the head of the network.
A device Di that receives this message will keep the seed, increment the level L of the received
message and make it as its level, so if the first message that is generated by the base station
equal to 1. The first devices that receive this message will have L2 , and so on, each node that
receives this message for the first time will increment its level. Thus, it records the sender
address of this message as its gateway to the BS. Thereafter, each node will send the received
seed to other devices, in this case: if a node has already received the seed, it will check the level
of the sender, if it is less than or equal to its level, it will reject it, otherwise it will record the sender
address as its second gateway. If a device receives the message for the first time, it will proceed
as cited before.
So on, until all the devices in the network receives the seed SBS. This way, each device will use
the seed with its own ID to generate the secret key to encrypt its communications with the BS.
Since the base station has the seed and all devices IDs in its database, it will generate for each
one its appropriate security key. Upon receiving an encrypted message, it will check the address
of the sender to know its key that will use to decrypt the message.
การแปล กรุณารอสักครู่..
4.1 KDi,BS Establishment
As described in Fig. 2, the base station BS generates a seed SBS, sends it to the devices in the
first row, the message is determined as a message of level L1 since it belongs to the BS, which
represents the head of the network.
A device Di that receives this message will keep the seed, increment the level L of the received
message and make it as its level, so if the first message that is generated by the base station
equal to 1. The first devices that receive this message will have L2 , and so on, each node that
receives this message for the first time will increment its level. Thus, it records the sender
address of this message as its gateway to the BS. Thereafter, each node will send the received
seed to other devices, in this case: if a node has already received the seed, it will check the level
of the sender, if it is less than or equal to its level, it will reject it, otherwise it will record the sender
address as its second gateway. If a device receives the message for the first time, it will proceed
as cited before.
So on, until all the devices in the network receives the seed SBS. This way, each device will use
เมล็ดพันธุ์ด้วย ID ของตัวเองเพื่อสร้างกุญแจลับเข้ารหัสการสื่อสารกับ BS .
ตั้งแต่สถานีฐานมีเมล็ดและรหัสอุปกรณ์ทั้งหมดในฐานข้อมูลของ มัน จะสร้าง สำหรับแต่ละหนึ่งของการรักษาความปลอดภัยที่เหมาะสม
คีย์ เมื่อได้รับข้อความที่เข้ารหัสลับ ก็จะตรวจสอบที่อยู่ของผู้ส่งจัก
ของคีย์ที่จะใช้ในการถอดรหัสข้อความ
การแปล กรุณารอสักครู่..