Method of reducing denial-of-service attacks and a system as...

Multiplex communications – Communication over free space – Having a plurality of contiguous regions served by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C455S436000

Reexamination Certificate

active

07656840

ABSTRACT:
A method and system reduces denial-of-service attacks malicious mobile nodes in a mobile IP environment. The method and system includes maintaining, by each of a plurality of access routers within the mobile IP environment, a cache of neighboring access routers as candidates and their associated access points. The caches are populated in response to actions initiated by mobile nodes. Each cache entry is tagged with the identity of the action initiating mobile node. The identity is based on information that is verifiable by the access routers and which cannot be modified arbitrarily by the mobile node. The total number of entries that can be tagged and thus introduced into a cache by any given node is limited.

REFERENCES:
patent: 6137791 (2000-10-01), Frid et al.
patent: 6370380 (2002-04-01), Norefors et al.
patent: 6418130 (2002-07-01), Cheng et al.
patent: 6553231 (2003-04-01), Karlsson et al.
patent: 7050793 (2006-05-01), Kenward et al.
patent: 7130286 (2006-10-01), Koodli et al.
patent: 2006/0274693 (2006-12-01), Nikander et al.
Candidate Access Router Discovery; Hemant Chaskar; Mar. 2003; IETF Seamoby Working Group; pp. 3,5 and 6.
P. S. Henry and H. Luo, “WiFi: What's next,”IEEE Communications Magazine, vol. 40, No. 12, pp. 66-72, Dec. 2002.
K. El Malki (Editor), “Low latency handoffs in Mobile IPv4,” Tech. Rep. draft-ietf-mobileip-lowlatency-handoffs-v4- *.txt, Internet Engineering Task Force (IETF), Jun. 2002.
R. Koodli (Editor), “Fast handovers for Mobile IPv6,” Tech. Rep. draft-ietf-mobileip-fast-mipv6- *.txt, Internet Engineering Task Force (IETF), Sep. 2002.
J. Kempf (Editor), “Problem description: Reasons for performing context transfers between nodes in an IP access network,” Request for Comments (Informational) 3374, Internet Engineering Task Force (IETF), Sep. 2002.
G. Krishnamurthi (Editor), “Requirements for CAR discovery protocols,” Tech. Rep. draft-ietf-seamoby-card-requirements- *.txt, Internet Engineering Task Force (IETF), Aug. 2002.
R. Koodli and C. Perkins, “Fast handovers and context transfers in mobile networks,”ACM Computer Communication Review, vol. 31, No. 5, pp. 33-47, Oct. 2001.
P. Bhagwat, C. Perkins and S. Tripathi, “Network layer mobility: An architecture and survey,”IEEE Personal Communications, vol. 3, No. 3, pp. 54-64, Jun. 1996.
C. Perkins (Editor), “IP Mobility support in IPv4,” Request For Comments 3344, Internet Engineering Task Force (IETF), Aug. 2002.
D. Johnson, C. Perkins and J. Arkko, “Mobility support in IPv6,” Tech. Rep. draft-ietf-mobileip-ipv6-*.txt, Internet Engineering Task Force (IETF), Jan. 2003.
C. Perkins and D. Johnson, “Mobility support in IPv6,” inProceedings of Mobicom'96, Rye, NY, USA, Nov. 1996.
T. Pagtzis and P. Kirstein, “Proactive mobility for future IP wireless access networks,” inProceedings of 6th IASTED/IEEE International Conference on Wireless and Optical Communications(WOC'02), Banff, Canada, Jul. 2002.
R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang and V. Paxson, “Stream control transmission protocol,” RFC 2960, Internet Engineering Task Force, Oct. 2000.
D. Trossen, G. Krishnamurthi, H. Chaskar, R. Chalmers and E. Shim, “A dynamic protocol for candidate access-router discovery,” Tech. Rep. draft-trossen-seamoby-dycard-00*.txt, Internet Engineering Task Force (IETF), Oct. 2002.
E. Shim, J. P. Redlich and R. Gitlin, “Secure candidate access router discovery,” inProceedings of IEEE Wireless Communications and Networking Conference(WCNC'3), New Orleans, LA, USA, Mar. 2003.
H. Syed, G. Kenward, P. Calhoun, M. Nakhjiri, R. Koodli, K. Atwal, M. Smith and G. Krishnamurthi, “General requirements for context transfer,” Tech. Rep. draft-ietf-seamoby-ct-reqs-*.txt, Internet Engineering Task Force (IETF), Jul. 2002.
CARD Design Team, “Candidate Access Router Discovery”, Tech. Rep. draft-ietf-seamoby-card-protocol-*.txt, Internet Engineering Task Force (IETF), Mar. 2003.
C.E. Perkins, P. Calhoun, “Mobile IPv4 Challenge/Response Extensions”, IETF RFC 3012, Nov. 2000.
E. Shim , J.P. Redlich, R. Gitlin, “Secure Candidate Access-Router Discovery”, Proceedings of IEEE Wireless Communications and Networking Conference, New Orleans, Mar. 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of reducing denial-of-service attacks and a system as... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of reducing denial-of-service attacks and a system as..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of reducing denial-of-service attacks and a system as... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4175401

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.