Electrical computers and digital processing systems: multicomput – Computer conferencing – Priority based messaging
Reexamination Certificate
2006-12-08
2011-11-29
Arani, Taghi (Department: 2438)
Electrical computers and digital processing systems: multicomput
Computer conferencing
Priority based messaging
C709S204000, C709S205000, C709S224000, C726S022000, C726S023000, C726S024000, C380S044000, C370S241000, C370S252000
Reexamination Certificate
active
08069216
ABSTRACT:
A method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system is provided herein. Particularly, a method and apparatus for distributing an alert message to nodes surrounding a recently discovered malicious node is provided. This alert technique further leverages mobility to distribute the alert message to a large majority of nodes in the ad hoc wireless network within a reasonable amount of time.
REFERENCES:
patent: 2002/0191584 (2002-12-01), Korus et al.
patent: 2003/0163729 (2003-08-01), Buchegger
patent: 2003/0204742 (2003-10-01), Gupta et al.
patent: 2004/0111632 (2004-06-01), Halperin
patent: 2004/0158455 (2004-08-01), Spivack et al.
patent: 2005/0141706 (2005-06-01), Regli et al.
patent: 2006/0133289 (2006-06-01), Golle et al.
patent: 2007/0094494 (2007-04-01), Banerjee et al.
patent: 2007/0277242 (2007-11-01), Baker et al.
Kirk A. Bradley, Steven Cheung, Nick Puketza, Biswanath Mukherjee, and Ronald A. Olsson. Detecting disruptive routers: A distributed network monitoring approach, Proceedings of the IEEE Symposium on Research in Security and Privacy (S & P 1998), pp. 115-124, May 1998.
John R. Hughes, Tuomas Aura, and Matt Bishop, “Using conservation of flow as a security mechanism in network protocols,” Proceedings of the IEEE Symposium on Research in Security and Privacy (S & P 2000), pp. 131-132, May 14-17, 2000.
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Mobicom 2000.
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, JoonSang Park, Jun Liu, Mario Gerla, “A Secure Adhoc Routing Approach using Localized Selfhealing Communities,” Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Jun. 2005.
Brad Williams and Tracy Camp, “Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks,” MOBIHOC 2002.
Q. Li and D. Rus. “Sending messages to mobile users in disconnected ad-hoc wireless networks”. In ACM MOBICOM, Aug. 2000.
R. Shah, S. Roy, S. Jain, and W. Brunette. “Data MULEs: Modeling a three-tier architecture for sparse sensor networks,” IEEE SNPA Workshop, 2003.
Wenrui Zhao, Mostafa Ammar and Ellen Zegura. “A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks,” ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2004.
PCT/US07/81713—PCT International Search Report with Written Opinion mailed Jun. 5, 2008—9 pages.
He Wenbo
Huang Ying
Lee Whay Chiou
Nahrstedt Klara
Arani Taghi
Karpinia Randi L.
Lee Jason
Motorola Solutions, Inc.
LandOfFree
Method and apparatus for alerting nodes of a malicious node... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for alerting nodes of a malicious node..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for alerting nodes of a malicious node... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4269566