摘要 |
PROBLEM TO BE SOLVED: To allow even a terminal with low computing power to appropriately protect radio communication against attacks.SOLUTION: Radio stations 10 each obtain the signal strength of a signal transmitted by a communication device, a normal communication object, and each create a secret key on the basis of the obtained signal strength. The radio stations 10 each generate a communication frame on the basis of the created secret key, and transmit the communication frame to each other. Then, if the radio stations 10 receive a communication frame generated on the basis of the secret key, they authenticate and see if a communication device which is the transmission source of the communication frame is a normal communication object on the basis of the received communication frame.SELECTED DRAWING: Figure 2 |