Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURE DEVICE MANAGEMENT
Document Type and Number:
WIPO Patent Application WO/2022/232647
Kind Code:
A1
Abstract:
Techniques are described for managing devices (120, 122, 124, 126, 128, 130, 132, 140, 142, 144, 146, 148, 150, 152) using multiple virtual personal area networks VPANs (110, 112). A border router (102) receives a first request to join a network (100) from a first device. The first device is assigned to a first virtual personal area network VPAN (110), which has an associated first group temporal key GTK. The first GTK is distributed to the first virtual device. The border router (102) also receives a second request to join the network (110) from a second device. The second device is assigned to a second VPAN (112), which has an associated second GTK. The second GTK is distributed to the second virtual device.

Inventors:
ZHANG LELE (US)
ZHAO LI (US)
DONG HAIBO (US)
DAI YIHUA (US)
Application Number:
PCT/US2022/027135
Publication Date:
November 03, 2022
Filing Date:
April 29, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CISCO TECH INC (US)
International Classes:
H04L9/40; H04L67/12; H04W4/70; H04W12/00; H04W12/0431; H04W12/12; H04W12/55; H04W12/76; H04W12/06; H04W12/61
Domestic Patent References:
WO2019084340A12019-05-02
Foreign References:
EP2731292A12014-05-14
US20110040969A12011-02-17
Attorney, Agent or Firm:
VANDENBURG, Eric, P. et al. (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A border router comprising: one or more processors; and one or more non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising: receiving a first request to join a network from a first device; assigning the first device to a first virtual personal area network (VP AN), wherein the first

VP AN has an associated first group temporal key (GTK); distributing the first GTK to the first device; receiving a second request to join the network from a second device; assigning the second device to a second VP AN, wherein the second VP AN has an associated second GTK; and distributing the second GTK to the second device.

2. The border router of claim 1, the operations further comprising: assigning a first sub-SSID (Service Set Identifier) to the first VP AN; and assigning a second sub-SSID to the second VP AN, wherein the second sub-SSID is different from the first sub-SSID.

3. The border router of claim 1 or 2, wherein: the first VP AN is associated with a first category of devices; and the second VP AN is associated with a second category of devices, wherein the second category of devices is different from the first category of devices.

4. The border router of claim 3, wherein the first category of devices includes at least one of a device type, a device security level, a device manufacturer, a device owner, or a device location.

5. The border router of any of claims 1 to 4, the operations further comprising: authenticating the first device by communicating with an authentication, authorization, and accounting (AAA) server, wherein assigning the first device to a first VP AN is performed responsive to authentication of the first device by the AAA server.

6. The border router of any of claims 1 to 5, wherein the first GTK is a temporary GTK that is valid for a limited time period and allows the first device to communicate with the second device during the limited time period.

7. The border router of any of claims 1 to 6, wherein the second device is coupled to the border router and the first device communicates with the border router through the second device.

8. The border router of claim 7, the operations further comprising: receiving a request to join the network from a third device; assigning the third device to the first VP AN; connecting the third device to the border router; and coupling the first device to communicate with the border router through the third device.

9. The border router of any of claims 1 to 8, the operations further comprising: recognizing a failed connection between the first device in the first VP AN and a third device in the first VP AN; identifying a fourth device in a third VP AN that is located proximate the first device and the third device; and configuring the fourth device to communicate data packets between the first device and the third device.

10. A method performed at least partly by a border router, the method comprising: receiving, at a border router, a first request to join a network from a first device; assigning the first device to a first virtual personal area network (VP AN), wherein the first VP AN has an associated first group temporal key (GTK); distributing the first GTK to the first device; receiving, at the border router, a second request to join the network from a second device; assigning the second device to a second VP AN, wherein the second VP AN has an associated second GTK; and distributing the second GTK to the second device.

11. The method of claim 10, further comprising: assigning a first sub-SSID (Service Set Identifier) to the first VP AN; and assigning a second sub-SSID to the second VP AN, wherein the second sub-SSID is different from the first sub-SSID.

12. The method of claim 10 or 11, wherein: the first VP AN is associated with a first category of devices; and the second VP AN is associated with a second category of devices, wherein the second category of devices is different from the first category of devices.

13. The method of claim 12, wherein the first category of devices includes at least one of a device type, a device security level, a device manufacturer, a device owner, or a device location.

14. The method of any of claims 10 to 13, further comprising: authenticating the first device by an authentication, authorization, and accounting (AAA) server, wherein assigning the first device to a first VP AN is performed responsive to authentication of the first device by the AAA server.

15. The method of any of claims 10 to 14, wherein the first GTK is a temporary GTK that is valid for a limited time period and allows the first device to communicate with the second device during the limited time period.

16. One or more non-transitory computer-readable media storing instructions that, when executed, cause one or more processors to perform operations comprising: receiving a first request to join a network from a first device; assigning the first device to a first virtual personal area network (VP AN), wherein the first VP AN has an associated first group temporal key (GTK), and wherein a first sub-SSID (Service Set Identifier) is associated with the first VP AN; distributing the first GTK to the first device; receiving a second request to join the network from a second device; assigning the second device to a second VP AN, wherein the second VP AN has an associated second GTK, and wherein a second sub-SSID is associated with the second VP AN; and distributing the second GTK to the second device.

17. The one or more non-transitory computer-readable media of claim 16, wherein: the first VP AN is associated with a first category of devices; and the second VP AN is associated with a second category of devices, wherein the second category of devices is different from the first category of devices.

18. The one or more non-transitory computer-readable media of claim 17, wherein the first category of devices includes at least one of a device type, a device security level, a device manufacturer, a device owner, or a device location.

19. The one or more non-transitory computer-readable media of any of claims 16 to 18, wherein the second device is coupled to a border router and the first device communicates with the border router through the second device.

20. The one or more non-transitory computer-readable media of claim 19, wherein the operations further comprise: receiving a request to join the network from a third device; assigning the third device to the first VP AN; connecting the third device to the border router; and coupling the first device to communicate with the border router through the third device.

21. A border router comprising: means for receiving a first request to join a network from a first device; means for assigning the first device to a first virtual personal area network (VP AN), wherein the first VP AN has an associated first group temporal key (GTK); means for distributing the first GTK to the first device; means for receiving a second request to join the network from a second device; means for assigning the second device to a second VP AN, wherein the second VP AN has an associated second GTK; and means for distributing the second GTK to the second device.

22. The border router according to claim 21 further comprising means for implementing the method according to any of claims 11 to 15.

23. The border router of claim 21 or 22, wherein the second device is coupled to the border router and the first device communicates with the border router through the second device, the border router optionally further comprising means for implementing the operations of claim 8 or 9.

24. A computer program, computer program product or computer readable medium comprising instructions which, when executed by a computer, cause the computer to carry out the steps of the method of any of claims 10 to 15.

Description:
SECURE DEVICE MANAGEMENT

CROSS REFERENCE TO RELATED APPLICATIONS

[0001] This application claims priority to U.S. Patent Application No. 17/246,301, filed April 30, 2021, the entire contents of which are incorporated herein by reference.

TECHNICAL FIELD

[0002] The present disclosure relates generally to secure group management of devices using multiple virtual personal area networks.

BACKGROUND

[0003] In some network environments, multiple types of devices manufactured by multiple vendors may access the same network. For example, multiple devices may be coupled to the same network and connected to the same border router associated with the network. The network can be a personal area network (PAN) that connects one or more smart lighting devices, one or more door security devices, and the like.

[0004] The PAN may use a common security key, such as a group temporal key (GTK), for all devices coupled to the network. The common security key is used to encrypt and decrypt data based on one or more protocols. For example, a lighting device and a door security device may use the same security key associated with the PAN. In some situations, the lighting device and the door security device have different levels of security protection. For example, the lighting device may have a lower level of security protection than the door security device because hacking into a lighting device poses minimal risk. In contrast, hacking into a door security device poses significant risk by allowing unauthorized people to access a building, or a specific part of a building, that contains valuable items or critical information.

[0005] When devices with different levels of security protection are coupled to the same PAN and use the same security key, it presents a security risk for the PAN. In the above example, a person attempting to illicitly access a door security device (or any other device in the PAN) may first hack into the lighting device that has a lower level of security protection. Once the person has hacked into the lighting device and obtained the security key from the lighting device, the same security key may be used to access the door security device and any other device in the PAN. Thus, the lighting device provides a weak link in the security of all devices coupled to the same PAN, which are using the same security key.

BRIEF DESCRIPTION OF THE DRAWINGS

[0006] The detailed description is set forth below with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical items. The systems depicted in the accompanying figures are not to scale and components within the figures may be depicted not to scale with each other.

[0007] FIG. 1 illustrates a system-architecture diagram of an example network containing multiple devices, servers, and a border router.

[0008] FIG. 2 illustrates a flow diagram of an example method for operating the network shown in FIG. 1. [0009] FIG. 3 illustrates another system -architecture diagram of an example network containing multiple devices, servers, and a border router.

[0010] FIG. 4 illustrates a flow diagram of an example method for operating the network shown in FIG. 3. [0011] FIG. 5 illustrates another system -architecture diagram of an example network containing multiple devices, servers, and a border router.

[0012] FIG. 6 illustrates a flow diagram of an example method for operating the network shown in FIG. 5. [0013] FIG. 7 illustrates another system -architecture diagram of an example network containing multiple devices, servers, and a border router.

[0014] FIG. 8 illustrates a flow diagram of an example method for operating the network shown in FIG. 7. [0015] FIG. 9 is a computer architecture diagram showing an illustrative computer hardware architecture for implementing a computing device that can be utilized to implement aspects of the various technologies presented herein.

DESCRIPTION OF EXAMPLE EMBODIMENTS OVERVIEW

[0016] Aspects of the invention are set out in the independent claims and preferred features are set out in the dependent claims. Features of one aspect may be applied to each aspect alone or in combination with other aspects.

[0017] This disclosure describes techniques for providing secure remote access to network devices based on a virtual personal access network (VP AN) architecture. In some embodiments, a method, implemented at least partially by a border router, receives a first request to join a network from a first device. The method assigns the first device to a first VP AN, where the first VP AN has an associated first group temporal key (GTK). The method distributes the GTK to the first device. The method also receives, at the border router, a second request to join the network from a second device. The second device is assigned to a second VP AN, where the second VP AN has an associated second GTK. The method continues by distributing the second GTK to the second device. Additionally, the method may assign a first sub-SSID (Service Set Identifier) to the first VP AN and assign a second sub-SSID to the second VP AN. In particular embodiments, the first VP AN may be associated with a first category of devices and the second VP AN may be associated with a second category of devices, where the first category of devices is different from the second category of devices. The first and second categories of devices may include a device type, a device security level, a device manufacturer, a device owner, or a device location. The method may further include authenticating the first device by an authentication, authorization, and accounting server. In some embodiments, the first GTK is a temporary GTK that is valid for a limited period of time.

[0018] Additionally, the techniques described herein may be performed by a system and/or device having non-transitory computer-readable media storing computer-executable instructions that, when executed by one or more processors, performs the method described above.

EXAMPLE EMBODIMENTS

[0019] The use of IoT (Internet of Things) devices, and other connected systems, is growing rapidly. IoT devices may include physical objects that can be embedded in sensors, controllers, monitors, and other systems. These IoT devices may communicate with one another via the Internet or other data communication network. In some embodiments, multiple IoT devices are coupled to communicate with one another via a wireless network, such as a personal area network (PAN).

[0020] This disclosure describes systems and methods for secure management in, for example, multi-hop and channel hopping wireless mesh networks, such as CG-Mesh (Connected Grid Mesh) or Wi-SUN (Wireless Smart Utility Network). Existing multi-hop and channel hopping wireless mesh networks are vulnerable to attack due to the open nature of the wireless medium. The systems and methods discussed herein provide a more secure environment by dividing a physical border router or mesh node into multiple virtual personal area networks (VPANs), where each VP AN uses an independent group temporal key (GTK). Thus, if one VP AN is hacked to obtain the GTK associated with the VP AN, the other VPANs remain secure because they use different GTKs. As discussed herein, the systems and methods include an independent authentication, authorization, accounting (AAA) system to secure the networks and simplify deployment of the network devices.

[0021] Although the systems and methods described herein are discussed with respect to one or more VPANs, these systems and methods may be used with any type of network (including multiple different networks). Further, although particular examples are discussed with reference to IoT devices, alternate embodiments may use other types of devices that communicate with one another and may communicate with a border router, as described herein.

[0022] Certain implementations and embodiments of the disclosure will now be described more fully below with reference to the accompanying figures, in which various aspects are shown. However, the various aspects may be implemented in many different forms and should not be construed as limited to the implementations set forth herein. The disclosure encompasses variations of the embodiments, as described herein. Like numbers refer to like elements throughout.

[0023] FIG. 1 illustrates a system-architecture diagram of an example network 100 containing multiple devices, servers, and a border router. Network 100 includes a border router 102 coupled to an AAA server 104, a smart lighting server 106, and a smoke sensor server 108. Border router 102 is a router that may be located between two networks, such as an enterprise network and a service provider network. AAA server 104 may control access to one or more networks, such as network 100 shown in FIG. 1. AAA server 104 may perform various functions related to authenticating devices, authorizing activities, and tracking the usage of resources. For example, AAA server 104 may authenticate devices that communicate (e.g., broadcast) a request to join a network. Smart lighting server 106 may control and monitor any number of lighting devices associated with one or more networks, as discussed herein. Smoke sensor server 108 may control and monitor any number of smoke sensors associated with one or more networks, as discussed herein.

[0024] FIG. 1 also illustrates a first VP AN 110 (labeled VPAN1) that has an associated first GTK (labeled GTK1) and a second VP AN 112 (labeled VPAN2) that has an associated second GTK (labeled GTK2). First VP AN 110 includes multiple devices (also referred to as “nodes”) 120, 122, 124, 126, 128, 130, and 132). Second VP AN 112 also includes multiple devices 140, 142, 144, 146, 148, 150, and 152). In some embodiments, one or more of devices 120-132 andl40-152 are IoT devices.

[0025] As shown in FIG. 1, first VP AN 110 and second VP AN 112 are coupled to border router 102. Thus, devices 120-132 and 140-152 can communicate with border router 102 directly or via another device. For example, devices 120, 122, and 140 can communicate with border router 102 directly. The remaining devices (124-132 and 142-152) can communicate with border router 102 through another device. For example, device 130 communicates with border router 102 by communicating through device 126 and 120. These communications by one device through another device may be referred to as hops.

[0026] As shown in FIG. 1, devices 120-132 are labeled “A” to distinguish the devices in first VP AN 110 from devices 140-152 labeled “B” in second VP AN 112. In some examples, each device 120-132 and 140- 152 is assigned an SSID (Service Set Identifier) when the device is deployed (e.g., installed in a network). In some embodiments, an SSID is an ASCII string of characters.

[0027] The systems and methods described herein allow a single border router to support multiple different sub-SSIDs, where each sub-SSID identifies a different VP AN. As discussed herein, each VP AN uses a different GTK for improved security. In some embodiments, the SSID field is composed of two ASCII strings: a main-SSID and a sub-SSID. All devices in the same VP AN have the same main-SSID (e.g., ciscoabcl2), but different devices may have different sub-SSIDs. For example, devices related to lighting devices may have a sub-SSID of “lighting,” devices related to smoke detection may have a sub-SSID of “smoke,” and devices related to utility meters may have a sub-SSID of “meter.”

[0028] In the example of FIG. 1, border router 102 uses a main-SSID of “ciscoabcl2” for all devices 120- 132 and 140-152. The group of devices 120-132 associated with the first VP AN 110 are lighting devices and have a sub-SSID of “lighting.” Thus, devices 120-132 have a full SSID of ciscoabc 12-lighting. Devices 120- 132 use a first GTK associated with the first VP AN 110.

[0029] The group of devise 140-152 associated with the second VP AN 112 are smoke sensor devices and have a sub-SSID of “smoke.” Thus, devices 140-152 have a full SSID of ciscoabc 12-smoke. Devices 140- 152 use a second GTK associated with the second VP AN 112. [0030] Thus, the configuration of FIG. 1 allows devices in the first VP AN 110 to have different SSIDs and different GTKs from the devices in the second VP AN 112. If a person or system is able to hack into one VP AN and access the GTK for that VP AN, they are still prevented from accessing devices in the other VP AN that has a different GTK. Therefore, hacking into one of the lighting devices 120-132 does not provide access to smoke detection devices 140-152.

[0031] In some examples, a device may prefer to join a VP AN with the same sub-SSID, which provides increased security. But, in particular situations, a device may join a VP AN with a different sub-SSID if permitted by a proxy device or AAA server 104.

[0032] In some implementations, sub-SSIDs may be used for particular types of devices, such as lighting devices, smoke sensor devices, utility meters, door security devices, and the like. As discussed herein, grouping the same types of devices in a VP AN with the same sub-SSID improves security by using a common GTK. In other implementations, sub-SSIDs can be used to group devices associated with a particular vendor or manufacturer. In these situations, the particular vendor or manufacturer may not want their devices sharing information and the GTK with devices from other vendors or manufacturers.

[0033] In other implementations, sub-SSIDs can be associated with a particular installation location, such as a particular campus, building, or portion of a building. In some examples, different sub-SSIDs are associated with different security levels. For example, high-security devices may be associated with a first sub-SSID and low-security devices may be associated with a second sub-SSID. As discussed herein, each sub-SSID has its own GTK. This use of multiple sub-SSIDs (with different GTKs) for different security levels reduces the likelihood that a person or system can hack into a low-security device in an attempt to gain access to a higher security device.

[0034] The configuration of FIG. 1 allows a single border router 102 to support multiple groups of devices, where each group of devices has an associated sub-SSID and GTK. This configuration reduces cost by allowing border router 102 to support multiple groups of devices instead of providing a separate border router for each group of devices. The configuration of FIG. 1 also simplifies the overall system by eliminating the need for multiple border routers. In some embodiments, border router 102 may support any number of sub- SSIDs and any number of GTKs to support the multiple sub-SSIDs.

[0035] The above-noted example is merely illustrative, and various changes may be made to achieve similar or the same results. For example, each VP AN 110 and 112 may include any number of devices. Additionally, a particular network 100 may include any number of VPANs 110, 112 and any number of other devices, servers, and systems.

[0036] FIG. 2 illustrates a flow diagram of an example method 200 for operating the network shown in FIG. 1. The operations described herein with respect to the method 200 may be performed by various components and systems, such as the components illustrated in FIG. 1.

[0037] At operation 202 of method 200, the process may receive a first request to join a network from a first device, such as an IoT device. For example, the first request to join a network may be received by border router 102 directly from the first device or via one or more intermediary devices (e.g., via “hops”). In some implementations, the first request may be authorized by AAA server 104 or other system.

[0038] At operation 204, the process may assign the first device to a first VP AN such that the first VP AN has an associated first GTK and an associated first sub-SSID. In some embodiments, the first device may be assigned to a particular VP AN based on a device type, a device vendor, a device manufacturer, a device security level, and the like.

[0039] At operation 206, the process may distribute the first GTK to the first device. In some embodiments, the first GTK may be distributed directly to the first device or distributed via one or more intermediary devices. [0040] At operation 208, the process may receive a second request to join the network from a second device. As discussed with respect to operation 202, the second request to join the network may be received by border router 102 directly from the second device or via one or more intermediary devices. In some implementations, the second request may be authorized by AAA server 104 or other system.

[0041] At operation 210, the process may assign the second device to a second VP AN such that the second VP AN has an associated second GTK and an associated second sub-SSID. In implementations, the second GTK is different from the first GTK and the second sub-SSID is different from the first sub-SSID. In some embodiments, the second device may be assigned to a particular VP AN based on a device type, a device vendor, a device manufacturer, a device security level, and the like.

[0042] At operation 212, the process may distribute the second GTK to the second device. In some embodiments, the second GTK may be distributed directly to the second device or distributed via one or more intermediary devices.

[0043] In some device deployment situations, it may be difficult to ensure that there is a reliable existing device with the same sub-SSID as the new device being deployed. In this situation, a proxy device can provide a joining function for a different VP AN. The AAA server will manage the authorization and accounting of the new device being deployed. This approach provides value in various situations.

[0044] For example, a first utility company in a particular geographic region may have a network of utility meters. If a second utility company wants to use the existing network of utility meters, the first utility company may resist due to the potential security risk. This security concern can be alleviated by creating a VP AN for the utility meters of the second utility company. This approach keeps the utility meters of the first utility company separated from the utility meters of the second utility company.

[0045] FIG. 3 illustrates another system -architecture diagram of an example network 300 containing multiple devices, servers, and a border router. In the example of FIG. 3, a new device wants to join a VP AN by proxy.

[0046] Network 300 includes border router 102 and AAA server 104 as discussed above with respect to FIG. 1. Network 300 also includes a meter application server 320 and a gas application server 322. Meter application server 320 may control and monitor any number of meter devices, as discussed herein. Gas application server 322 may control and monitor any number of gas meter devices associated with one or more networks, as discussed herein. [0047] Additionally, network 300 includes first VP AN 110 and second VP AN 112, but the two VPANs 110 and 112 have different associated devices. First VP AN 110 includes associated devices 120, 124, 126, 128, 130, 132, 302, and 304. Second VP AN 112 includes associated devices 310, 312, 314, and 316. As discussed above with respect to FIG. 1, first VP AN 110 may have a first associated GTK and second VP AN 112 may have a second associated GTK.

[0048] In some embodiments, devices 120, 124, 126, 128, 130, 132, 302, and 304 are meter devices controlled and monitored by meter application server 320. And, in some embodiments, devices 310, 312, 314, and 316 are gas meter devices controlled and monitored by gas application server 322.

[0049] In the example of FIG. 3, the devices 310, 312, 314, and 316 do not have a connection to border router 102. In this situation, one of the devices in second VP AN 112, such as device 310, may communicate with device 302 in VP AN 110. Since device 302 is already connected with border router 102, it may provide a joining proxy for the second VP AN 112. For example, device 302 may receive a request from device 310 to access border router 102 (e.g., requesting to connect with border router 102). Device 302 may forward the request from device 310 to border router 102 for processing. If approved by AAA server 104, a temporary GTK 318 may be generated and communicated to devices 302 and 310, thereby allowing devices in second VP AN 112 to communicate with router 102 via device 302. In some implementations, the temporary GTK 318 allows device 302 to merely forward messages received from device 310 to border router 102. Device 302 does not typically decrypt the data received from device 310. Thus, device 302 can use a different GTK than second VP AN 112 since it is not attempting to decrypt the data.

[0050] In some embodiments, temporary GTK 318 has a specific “lifetime” as determined by AAA server 104 and/or border router 102. An example lifetime for temporary GTK 318 may be a few minutes, a few hours, or a few days depending on the situation and the time period for which second VP AN 112 needs to access border router 102. When temporary GTK 318 is active, network 300 shown in FIG. 1 includes the first GTK associated with the first VP AN 110, a second GTK associated with the second VP AN 112, and the temporary GTK 318 (e.g., a third GTK).

[0051] FIG. 4 illustrates a flow diagram of an example method 400 for operating the network shown in FIG. 3. The operations described herein with respect to the method 400 may be performed by various components and systems, such as the components illustrated in FIGs. 1 and 3.

[0052] At operation 402 of method 400, the process may include a first device in a first VP AN contacting a second device in a second VP AN, where the first device requests access to a border router with which the second device is already communicating. As discussed above with respect to FIG. 3, the first device may not have an existing connection to the border router.

[0053] At operation 404, the process may include the first device being authorized by an AAA server. If the first device is authorized by the AAA server, a temporary GTK is generated by the AAA server, such that the temporary GTK is valid for a limited time period.

[0054] At operation 406, the process may include communicating the temporary GTK from the AAA server to the second device. In this situation, the second device may support a temporary communication of data between the first device and the border router during the limited time period associated with the temporary GTK.

[0055] At operation 408, the process may include the first device communicating with the border router (via the second device) using the temporary GTK during the limited time period.

[0056] FIG. 5 illustrates another system-architecture diagram of an example network 500 containing multiple devices, servers, and a border router. Network 500 is similar to network 300 discussed above with respect to FIG. 3 and includes many of the same components, servers, and systems. In network 500, a new device 502 becomes available in second VP AN 112. For example, the new device 502 may be newly installed or it may be an existing device that comes back online. As shown in FIG. 5, new device 502 establishes a connection with border router 102. New device 502 has the same sub-SSID and GTK as the other devices in second VP AN 112.

[0057] In this situation, device 310 can stop communicating with device 302 using the temporary GTK 318 to connect with border router 102. For example, device 310 may terminate the communication with device 302 and establish a new connection with new device 502, which provides a connection to border router 102. In some implementations, it is preferable to use the new device 502 for communicating with border router 102 instead of using the temporary connection with device 302 because communicating through new device 502 is more secure due to a more secure GTK that is associated with second VP AN 112.

[0058] FIG. 6 illustrates a flow diagram of an example method 600 for operating the network shown in FIG. 5. The operations described herein with respect to the method 600 may be performed by various components and systems, such as the components illustrated in FIGs. 1, 3, and 5.

[0059] At operation 602 of method 600, the process may include a first device in a first VP AN communicating with a border router through a second device in a second VP AN, where the second device is connected to the border router. At operation 604, the process may include a third device becoming active (e.g., a newly installed device or an existing device that comes back online) in the first VP AN.

[0060] At operation 606, the process may include the third device establishing a connection with the border router. At operation 608, the process may include the first device terminating its communication with the second device and establishing a connection with the third device to communicate with the border router. [0061] FIG. 7 illustrates another system-architecture diagram of an example network 700 containing multiple devices, servers, and a border router. Network 700 includes border router 102, AAA server 104, smart lighting server 106, and smoke sensor server 108 as discussed above with respect to FIG. 1.

[0062] FIG. 7 also illustrates a first portion of a VP AN 702 that has an associated GTK and a second portion of VP AN 702 that has the same associated GTK. VP AN 702 includes multiple devices 706, 708, and 710 in the first portion and multiple devices 714, 716, and 718 in the second portion. In some embodiments, one or more of devices 706-710 and 714-718 are IoT devices.

[0063] As shown in FIG. 7, a device 712 is separate from both the first portion of VP AN 702 and the second portion of VP AN 702. Device 712 is a common neighbor of the two portions of VP AN 702. [0064] In some embodiments, device 714 was previously connected to device 706 to establish a connection with border router 102. But, as shown in FIG. 7, that connection between devices 714 and 706 was broken or terminated (or otherwise not functioning properly). To reestablish a connection between device 714 and border router 102, the border router 102 may recognize that device 712 can act as a bridge between devices 714 and 706. Border router 102 then establishes that bridge so device 714 can communicate with border router 102 via device 712 and 706. In some implementations, device 712 merely forwards messages between devices 714 and 706. Device 712 does not typically decrypt the data received from either device 714 or 706. Thus, device 712 can use a different GTK than VP AN 702 since it is not attempting to decrypt the data.

[0065] In some embodiments, border router 102 may detect the failed connection between devices 706 and 714, and may determine that device 712 is connected to both devices 706 and 714. Based on this determination, border router 102 may configure device 712 as a bridge between devices 706 and 714.

[0066] FIG. 8 illustrates a flow diagram of an example method 800 for operating the network shown in FIG. 7. The operations described herein with respect to the method 800 may be performed by various components and systems, such as the components illustrated in FIG. 7.

[0067] At operation 802 of method 800, the process may include a first device communicating with a border router via a connection with a second device in the same VP AN. At operation 804, the process may include the border router recognizing that the first device lost its connection with the second device.

[0068] At operation 806, the process may include the border router recognizing that a third device in a different VP AN is a common neighbor device of the first device and the second device.

[0069] At operation 808, the process may include the border router configuring the third device to act as a bridge between the first device and the second device. At operation 810, the process may include the third device communicating data (e.g., data packets) between the first device and the second device.

[0070] FIG. 9 shows an example computer architecture for a computer 900 capable of executing program components for implementing the functionality described herein. The computer architecture shown in FIG. 9 illustrates a conventional server computer, workstation, desktop computer, laptop, tablet, network appliance, e-reader, smartphone, or other computing device, and can be utilized to execute any of the software components presented herein. The computer 900 may, in some examples, correspond to any of the servers, routers, or devices discussed herein. In some embodiments, computer 900 may include networked devices such as servers, switches, routers, hubs, bridges, gateways, modems, repeaters, access points, etc. Additionally, in some implementations, the programs or software discussed herein may be configured to perform operations performed by any of the devices.

[0071] The computer 900 includes a baseboard 902, or “motherboard,” which is a printed circuit board to which a multitude of components or devices can be connected by way of a system bus or other electrical communication paths. In one illustrative configuration, one or more central processing units (“CPUs”) 904 operate in conjunction with a chipset 906. The CPUs 904 can be standard programmable processors that perform arithmetic and logical operations necessary for the operation of the computer 900.

[0072] The CPUs 904 perform operations by transitioning from one discrete, physical state to the next through the manipulation of switching elements that differentiate between and change these states. Switching elements generally include electronic circuits that maintain one of two binary states, such as flip-flops, and electronic circuits that provide an output state based on the logical combination of the states of one or more other switching elements, such as logic gates. These basic switching elements can be combined to create more complex logic circuits, including registers, adders-subtractors, arithmetic logic units, floating-point units, and the like.

[0073] The chipset 906 provides an interface between the CPUs 904 and the remainder of the components and devices on the baseboard 902. The chipset 906 can provide an interface to a RAM 908, used as the main memory in the computer 900. The chipset 906 can further provide an interface to a computer-readable storage medium such as a read-only memory (“ROM”) 910 or non-volatile RAM (“NVRAM”) for storing basic routines that help to startup the computer 900 and to transfer information between the various components and devices. The ROM 910 or NVRAM can also store other software components necessary for the operation of the computer 900 in accordance with the configurations described herein.

[0074] The computer 900 can operate in a networked environment using logical connections to remote computing devices and computer systems through a network, such as the network 924. The chipset 906 can include functionality for providing network connectivity through a Network Interface Controller (NIC) 912, such as a gigabit Ethernet adapter. The NIC 912 is capable of connecting the computer 900 to other computing devices over the network 924. It should be appreciated that multiple NICs 912 can be present in the computer 900, connecting the computer to other types of networks and remote computer systems.

[0075] The computer 900 can be connected to a storage device 918 that provides non-volatile storage for the computer. The storage device 918 can store an operating system 920, programs 922, and data, which have been described in greater detail herein. The storage device 918 can be connected to the computer 900 through a storage controller 914 connected to the chipset 906. The storage device 918 can consist of one or more physical storage units. The storage controller 914 can interface with the physical storage units through a serial attached SCSI (“ S AS”) interface, a serial advanced technology attachment (“ SAT A”) interface, a fiber channel (“FC”) interface, or other type of interface for physically connecting and transferring data between computers and physical storage units.

[0076] The computer 900 can store data on the storage device 918 by transforming the physical state of the physical storage units to reflect the information being stored. The specific transformation of physical state can depend on various factors, in different embodiments of this description. Examples of such factors can include, but are not limited to, the technology used to implement the physical storage units, whether the storage device 918 is characterized as primary or secondary storage, and the like.

[0077] For example, the computer 900 can store information to the storage device 918 by issuing instructions through the storage controller 914 to alter the magnetic characteristics of a particular location within a magnetic disk drive unit, the reflective or refractive characteristics of a particular location in an optical storage unit, or the electrical characteristics of a particular capacitor, transistor, or other discrete component in a solid-state storage unit. Other transformations of physical media are possible without departing from the scope and spirit of the present description, with the foregoing examples provided only to facilitate this description. The computer 900 can further read information from the storage device 918 by detecting the physical states or characteristics of one or more particular locations within the physical storage units.

[0078] In addition to the mass storage device 918 described above, the computer 900 can have access to other computer-readable storage media to store and retrieve information, such as program modules, data structures, or other data. It should be appreciated by those skilled in the art that computer-readable storage media is any available media that provides for the non-transitory storage of data and that can be accessed by the computer 900. In some examples, the operations performed by devices in the distributed application architecture 102, and or any components included therein, may be supported by one or more devices similar to computer 900. Stated otherwise, some or all of the operations performed by the distributed application architecture 102, and or any components included therein, may be performed by one or more computer devices 900 operating in a cloud-based arrangement.

[0079] By way of example, and not limitation, computer-readable storage media can include volatile and non-volatile, removable and non-removable media implemented in any method or technology. Computer- readable storage media includes, but is not limited to, RAM, ROM, erasable programmable ROM (“EPROM”), electrically-erasable programmable ROM (“EEPROM”), flash memory or other solid-state memory technology, compact disc ROM (“CD-ROM”), digital versatile disk (“DVD”), high definition DVD (“HD- DVD”), BLU-RAY, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information in a non- transitory fashion.

[0080] As mentioned briefly above, the storage device 918 can store an operating system 920 utilized to control the operation of the computer 900. According to one embodiment, the operating system comprises the LINUX operating system. According to another embodiment, the operating system comprises the WINDOWS® SERVER operating system from MICROSOFT Corporation of Redmond, Washington. According to further embodiments, the operating system can comprise the UNIX operating system or one of its variants. It should be appreciated that other operating systems can also be utilized. The storage device 918 can store other system or application programs and data utilized by the computer 900.

[0081] In one embodiment, the storage device 918 or other computer-readable storage media is encoded with computer-executable instructions which, when loaded into the computer 900, transform the computer from a general-purpose computing system into a special-purpose computer capable of implementing the embodiments described herein. These computer-executable instructions transform the computer 900 by specifying how the CPUs 904 transition between states, as described above. According to one embodiment, the computer 900 has access to computer-readable storage media storing computer-executable instructions which, when executed by the computer 900, perform the various processes described herein. The computer 900 can also include computer-readable storage media having instructions stored thereupon for performing any of the other computer-implemented operations described herein.

[0082] The computer 900 can also include one or more input/output controllers 916 for receiving and processing input from a number of input devices, such as a keyboard, a mouse, a touchpad, a touch screen, an electronic stylus, or other type of input device. Similarly, an input/output controller 916 can provide output to a display, such as a computer monitor, a flat-panel display, a digital projector, a printer, or other type of output device. It will be appreciated that the computer 900 might not include all of the components shown in FIG. 9, can include other components that are not explicitly shown in FIG. 9, or might utilize an architecture completely different than that shown in FIG. 9.

[0083] As described herein, the computer 900 may comprise one or more of a router, a border router, and/or a server. The computer 900 may include one or more hardware processors 904 (processors) configured to execute one or more stored instructions. The processor(s) 904 may comprise one or more cores. Further, the computer 900 may include one or more network interfaces configured to provide communications between the computer 900 and other devices, such as the communications described herein. The network interfaces may include devices configured to couple to personal area networks (PANs), wired and wireless local area networks (LANs), wired and wireless wide area networks (WANs), and so forth. For example, the network interfaces may include devices compatible with Ethernet, Wi-Fi™, and so forth.

[0084] In summary, techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VP AN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VP AN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.

[0085] While the invention is described with respect to the specific examples, it is to be understood that the scope of the invention is not limited to these specific examples. Since other modifications and changes varied to fit particular operating requirements and environments will be apparent to those skilled in the art, the invention is not considered limited to the example chosen for purposes of disclosure, and covers all changes and modifications which do not constitute departures from the true spirit and scope of this invention.

[0086] Although the application describes embodiments having specific structural features and/or methodological acts, it is to be understood that the claims are not necessarily limited to the specific features or acts described. Rather, the specific features and acts are merely illustrative some embodiments that fall within the scope of the claims of the application.