Multiplex communications – Pathfinding or routing – Switching a message which includes an address header
Reexamination Certificate
2011-04-05
2011-04-05
Pham, Chi H (Department: 2471)
Multiplex communications
Pathfinding or routing
Switching a message which includes an address header
C370S395100, C370S395520, C455S041200
Reexamination Certificate
active
07920558
ABSTRACT:
A data network has a number of inter-connected router devices forward received packets of data towards a destination node in accordance with a routing table associated with each router. A trust value is assigned to one or more other router devices, or links between router devices, in the network. A route metric is calculated in respect of one or more paths for forwarding on received data packets for onward transmission towards a specified destination. A next hop destination is selected for onward transmission of each such received packet to be forwarded on the basis of the calculated route metric for each applicable path. Each route metric is calculated in dependence upon the trust value assigned to one or more of the router or routers within each such path.
REFERENCES:
patent: 2002/0069278 (2002-06-01), Forsl
patent: 2004/0220882 (2004-11-01), Suto et al.
patent: 2005/0044478 (2005-02-01), Ali et al.
patent: 2005/0191990 (2005-09-01), Willey et al.
patent: 1 283 630 (2003-12-01), None
patent: WO 03/077498 (2003-09-01), None
patent: WO 03/077498 (2003-09-01), None
Xiaoqi “A trust model based routing protocol for secure ad hoc networks” Aerospace Conference, 2004. Proceedings. IEEE, US, vol. 2, Mar. 6, 2004, pp. 1286-1295, XP010748077 ISBN: 0-780.3-8155-6.
Pirzada, Asad Amir,“Establishing Trust in Pure Ad-hoc Networks” 27TH Australasian Computer Science Conference, Jan. 18, 2004, pp. 47-54, XP002366737 Univ. of Otago, Dunedin, New Zealand.
Zhaoyu Liu et al, “A dynamic trust model for mobile ad hoc networks” Distributed Computing Systems, 2004. Proceedings. FTDCS 2004. IOTH IEEE International Workshop on Future Trends of Suzhou, China May 26-28, 2004, Piscataway, NJ, USA,IEEE, May 26, 2004, pp. 80-85, XP010712148 ISBN: 0-7695-2118-5.
International Search Report for PCT/GB2005/004719 mailed Feb. 20, 2006.
Xiaoqi et al., “A trust model based routing protocol for secure ad hoc networks”, Aerospace Conference 2004 Proceedings, vol. 2, pp. 1286-1295 (2004).
Pirzada et al., “Establishing Trust in Pure Ad-hoc Networks”, 27thAustralian Computer Science Conference, pp. 47-54 (2004).
Zhaoyu et al., “A dynamic trust model for mobile ad-hoc networks”, Distributed Computing Systems 2004 Proceedings, 10thIEEE International Workshop on Future Trends of Suzhou, China, pp. 80-85 (2004).
Yi et al., “A security-aware routing protocol for wireless ad hoc networks”, Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 1-7, (2001) retrieved from the internet: http://www-sal.cs.uiuc.edu/{rhk/pubs/SCI2002.pdf>.
Bahargava et al., “Trusted Routing and Intruder Identification in Mobile Ad Hoc Networks”, Research Proposal for CERIAS 2002, (2002) retrieved from the internet: http://raidlab.cs.purdue.edu/grants/cerias02.pdf>.
Sergio et al., “Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks”, Proceeding of the Sixth Annual International Conference on Mobile Computing and Networking, pp. 255-265 (2000) retrieved from the internet: http://www/hpl.hp.com/personal/Kevin—Lai/projects/adhoc.mitigating.pdf>.
International Search Report mailed Feb. 20, 2006 in International Application No. PCT/GB2005/004719.
UK Search Report dated May 9, 2005 in Application No. GB0428553.2.
Li et al., “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks,” 2004 IEEE Aerospace Conference Proceedings, vol. 2, Mar. 6, 2004, pp. 1286-1295.
Pirzada et al., “Establishing Trust in Pure Ad-Hoc Networks,” 27th Australasian Computer Science Conference, Jan. 18, 2004, pp. 47-54.
Liu et al., “A Dynamic Trust Model for Mobile Ad Hoc Networks,” Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS'04), May 2004, pp. 80-85.
Yi et al., “A Security-Aware Routing Protocol for Wireless Ad Hoc Networks,” Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), 2001, pp. 1-7.
Bhargava et al., “Trusted Routing and Intruder Identification in Mobile Ad Hoc Networks,” Research Proposal for CERIAS 2002, 2002, 12 pages.
Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), 2000, pp. 255-265.
British Telecommunications public limited company
Mohebbi Kouroush
Nixon & Vanderhye P.C.
Pham Chi H
LandOfFree
Method of operating a network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of operating a network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of operating a network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2725361