Method and apparatus for alerting nodes of a malicious node...

Electrical computers and digital processing systems: multicomput – Computer conferencing – Priority based messaging

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S204000, C709S205000, C709S224000, C726S022000, C726S023000, C726S024000, C380S044000, C370S241000, C370S252000

Reexamination Certificate

active

08069216

ABSTRACT:
A method and apparatus for alerting nodes of a malicious node in a mobile ad-hoc communication system is provided herein. Particularly, a method and apparatus for distributing an alert message to nodes surrounding a recently discovered malicious node is provided. This alert technique further leverages mobility to distribute the alert message to a large majority of nodes in the ad hoc wireless network within a reasonable amount of time.

REFERENCES:
patent: 2002/0191584 (2002-12-01), Korus et al.
patent: 2003/0163729 (2003-08-01), Buchegger
patent: 2003/0204742 (2003-10-01), Gupta et al.
patent: 2004/0111632 (2004-06-01), Halperin
patent: 2004/0158455 (2004-08-01), Spivack et al.
patent: 2005/0141706 (2005-06-01), Regli et al.
patent: 2006/0133289 (2006-06-01), Golle et al.
patent: 2007/0094494 (2007-04-01), Banerjee et al.
patent: 2007/0277242 (2007-11-01), Baker et al.
Kirk A. Bradley, Steven Cheung, Nick Puketza, Biswanath Mukherjee, and Ronald A. Olsson. Detecting disruptive routers: A distributed network monitoring approach, Proceedings of the IEEE Symposium on Research in Security and Privacy (S & P 1998), pp. 115-124, May 1998.
John R. Hughes, Tuomas Aura, and Matt Bishop, “Using conservation of flow as a security mechanism in network protocols,” Proceedings of the IEEE Symposium on Research in Security and Privacy (S & P 2000), pp. 131-132, May 14-17, 2000.
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Mobicom 2000.
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, JoonSang Park, Jun Liu, Mario Gerla, “A Secure Adhoc Routing Approach using Localized Selfhealing Communities,” Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Jun. 2005.
Brad Williams and Tracy Camp, “Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks,” MOBIHOC 2002.
Q. Li and D. Rus. “Sending messages to mobile users in disconnected ad-hoc wireless networks”. In ACM MOBICOM, Aug. 2000.
R. Shah, S. Roy, S. Jain, and W. Brunette. “Data MULEs: Modeling a three-tier architecture for sparse sensor networks,” IEEE SNPA Workshop, 2003.
Wenrui Zhao, Mostafa Ammar and Ellen Zegura. “A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks,” ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2004.
PCT/US07/81713—PCT International Search Report with Written Opinion mailed Jun. 5, 2008—9 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for alerting nodes of a malicious node... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for alerting nodes of a malicious node..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for alerting nodes of a malicious node... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4269566

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.