Excising compromised routers from an ad-hoc network

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S034000, C713S153000, C713S176000, C380S002000, C709S221000, C709S229000

Reexamination Certificate

active

09596009

ABSTRACT:
A method of operating a network (120) is provided in a communications system for communications among a plurality of routers in the network. The network receives verifiable information identifying at least one compromised router (D). The method includes a step to excise the compromised router (D) from the network. The method also includes steps to verify that messages transmitted between routers (A, B, C, D, E and F) are from non-compromised routers (A, B, C, E and F), and to reinstate the compromised router (D) when it becomes non-compromised.

REFERENCES:
patent: 4718002 (1988-01-01), Carr
patent: 4947430 (1990-08-01), Chaum
patent: 5093824 (1992-03-01), Coan et al.
patent: 5243592 (1993-09-01), Perlman et al.
patent: 5473599 (1995-12-01), Li et al.
patent: 5541912 (1996-07-01), Choudhury et al.
patent: 5621884 (1997-04-01), Beshears et al.
patent: 5649119 (1997-07-01), Kondoh et al.
patent: 5850592 (1998-12-01), Ramanathan
patent: 5881246 (1999-03-01), Crawley et al.
patent: 5913921 (1999-06-01), Tosey et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 5974327 (1999-10-01), Agrawal et al.
patent: 5987011 (1999-11-01), Toh
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6000011 (1999-12-01), Freerksen et al.
patent: 6028857 (2000-02-01), Poor
patent: 6047330 (2000-04-01), Stracke, Jr.
patent: 6049834 (2000-04-01), Khabardar et al.
patent: 6067301 (2000-05-01), Aatresh
patent: 6094435 (2000-07-01), Hoffman et al.
patent: 6134587 (2000-10-01), Okanoue
patent: 6272567 (2001-08-01), Pal et al.
patent: 6282577 (2001-08-01), Okanoue et al.
patent: 6304556 (2001-10-01), Haas
patent: 6397260 (2002-05-01), Wils et al.
patent: 6424629 (2002-07-01), Rubino et al.
patent: 6425004 (2002-07-01), Hardjono
patent: 6456599 (2002-09-01), Elliott
patent: 6529515 (2003-03-01), Raz et al.
patent: 6535498 (2003-03-01), Larsson et al.
patent: 6577634 (2003-06-01), Tsukakoshi et al.
patent: 6580981 (2003-06-01), Masood et al.
patent: 6618377 (2003-09-01), Miriyala
patent: 6662229 (2003-12-01), Passman et al.
patent: 6683874 (2004-01-01), Nagami et al.
patent: 6721273 (2004-04-01), Lyon
patent: 6754220 (2004-06-01), Lamberton et al.
patent: 6977895 (2005-12-01), Shi et al.
patent: 7035223 (2006-04-01), Burchfiel et al.
Schneier, Bruce, Applied Cryptography, J1996, ohn Wiley & Sons Inc., Second Edition, pp. 461-462.
Ramanujan et al, Intrusion-Resistant Ad Hoc Wireless Networks, 2002, IEEE pp. 890-894.
Bhandare et al, Comparison of two wireless ad hoc routing protocols on a hardware test-bed, 2003, IEEE, pp. 1168-1173.
Dewan et al, Trusting Routers and Relays in Ad Hoc Networks, 2003, IEEE, pp. 1-8.
Gonzales et al, Let's Go Wireless, Nov. 2003, Tech Directions, pp. 30-35.
Vijayan, Jaikumar, Network Routers Vulnerable to denial-of-service attacks, 2001, Computerworld, p. 8.
Fulp et al, Preventing Denial of Service Attacks on Quality of Service, 2001, IEEE, pp. 159-172.
Zhao et al, Detection of Invalid Routing Annoucement in the Internet, 2002, IEEE, pp. 1-10.
Paruchuri et al, Authenticated Autonomous System Traceback, 2004, IEEE, pp. 406-413.
“Link-State Routing,” John Moy, Ch. 5, “Routing in Communications Networks,” ed. Martha Steenstrup, Prentice Hall, 1995.
“Packet Radio Routing,” Gregory S. Lauer, Ch. 11, “Routing in Communications Networks,” ed. Martha Steenstrup, Prentice Hall, 1995.
“Packet Radio Network Routing Algorithms: A Survey,” J.J. Hahn et al., IEEE Communications Magazine, vol. 22, No. 11, Nov. 1984, pp. 41-47.
“The Organization of Computer Resources into a Packet Radio Network,” R.E. Kahn, IEEE Trans. On Communications vol. COM-25, No. 1, Jan. 1977, pp. 169-178.
“Analysis of Routing Strategies for Packet Radio Networks,” J.J. Garcia Lune Acves et al., Proc. Of the IEEE INFOCOM '85, Washington, DC, Mar. 1985, 292-302.
“The DARPA Packet Radio Network Protocols,” J. Jubin et al., Proc. Of the IEEE, vol. 75, N .1, Jan. 1987, pp. 21-32.
“Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C,” Bruce Schneier, John Wiley & Sons, Inc. (1996), Chapters 2-4, 8 and 18-23.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Excising compromised routers from an ad-hoc network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Excising compromised routers from an ad-hoc network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Excising compromised routers from an ad-hoc network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3846068

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.