摘要 |
In a wireless network, secure synchronization may be achieved with two messages. A beacon initiator (10c) may provide a beacon timestamp field (16) and a beacon nonce (17) to devices (10a, 10b) in the network. A device (10) in the network that wishes to synchronize with another device (10) may send a message containing a variety of parameters including the beacon timestamp field (16) and the nonce (17). Upon receipt, the receiving device (10) can check a key included in the message, the beacon timestamp field (16) and the more (17) to determine, not only that the sender has a valid key, but that the message has a valid time so that one can be reasonably sure that the message was not simply copied. The receiving device (10) then sends a message response which contains verifiable parameters to enable the message sender (10) to be sure that the sender (10) is communicating with a valid receiver (10). |