Mechanism for detecting intrusion and jamming attempts in a shared media based communications network
First Claim
1. A method of detecting intrusion attempts by an imposter in a communications network, said method comprising the steps of:
- at a victim node, determining that a received packet comprises an address corresponding to said victim node; and
in response thereto,transmitting an emergency packet;
at a destination node, receiving said emergency packet and, in response thereto, generating an intrusion attempt indication;
at a destination node, detecting a carrier signal not followed by receipt of said emergency packet, and in response thereto transmitting an emergency packet request; and
at said victim node, resending said emergency packet in response to receipt of said emergency packet request.
2 Assignments
0 Petitions
Accused Products
Abstract
A novel and useful mechanism for detecting intrusion and jamming attempts by an imposter node. A time window defined as an emergency window is reserved after the end of a packet and before an acknowledgement window. Nodes that detect the presence of an intruder transmit an emergency packet during the emergency time window to inform the receive node that the packet it received was sent from an imposter node. Attempts to jam the transmission of the emergency packet from the victim node to the receive node are detected by listening during the emergency window time period for carrier signal that indicates that an emergency packet is trying to be sent. An emergency packet request message is sent by the receive node in response which causes the victim node to resend the emergency packet.
-
Citations
47 Claims
-
1. A method of detecting intrusion attempts by an imposter in a communications network, said method comprising the steps of:
-
at a victim node, determining that a received packet comprises an address corresponding to said victim node; and
in response thereto,transmitting an emergency packet; at a destination node, receiving said emergency packet and, in response thereto, generating an intrusion attempt indication; at a destination node, detecting a carrier signal not followed by receipt of said emergency packet, and in response thereto transmitting an emergency packet request; and at said victim node, resending said emergency packet in response to receipt of said emergency packet request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of detecting intrusion attempts by an imposter for use in a victim node in a communications network, said method comprising the steps of:
-
determining that a received packet comprises a source address corresponding to itself; and
in response thereto,transmitting an emergency packet to a destination node; and resending said emergency packet in response to receipt of an emergency packet request transmitted from said destination node. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for use in a destination node of detecting intrusion attempts by an imposter in a communications network, said method comprising the steps of:
-
receiving a packet transmitted over said communications network; listening during an emergency window for the presence of carrier signal; if carrier signal is detected during said emergency window and an emergency packet is received subsequent thereto, generating an intrusion attempt indication; and if carrier signal is detected during said emergency window and no emergency packet is received subsequent thereto, transmitting an emergency packet request and repeating said step of listening. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. An Application Specific Integrated Circuit (ASIC) for use in a node for detecting intrusion attempts by an imposter in a communications network, said ASIC comprising:
-
means for determining that a received packet comprises an address corresponding to said node; means for transmitting an emergency packet following the end of said received packet if said node determines said received packet comprises the address of itself; means for receiving said emergency packet and generating an intrusion attempt indication, in response thereto; means for detecting a carrier signal without subsequent receipt of said emergency packet and transmitting an emergency packet request, in response thereto; and means for resending said emergency packet in response to receipt of said emergency packet request. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
-
36. A communications station for transmitting and receiving signals to and from other stations connected over a shared communications media based network, comprising:
-
a coupling circuit for generating a receive signal received over said network and for outputting a transmit signal onto said network; a transmitter adapted to modulate a synchronization sequence and data to be transmitted in accordance with a modulation scheme so as to generate said transmit signal therefrom, said synchronization sequence comprising a plurality of symbols wherein each symbol is separated by a time delay in accordance with a predetermined synchronization sequence time delay template; a receiver adapted to demodulate said receive signal in accordance with said modulation scheme so as to generate a receive data signal therefrom; a media access control (MAC) circuit adapted to interface an application processor to said shared communications media, said MAC circuit comprising; means for determining that a received packet comprises an address corresponding to said station; means for transmitting an emergency packet following the end of said received packet if said station determines said received packet comprises the address of itself; means for receiving said emergency packet and generating an intrusion attempt indication, in response thereto; means for detecting a carrier signal without subsequent receipt of said emergency packet and transmitting an emergency packet request, in response thereto; means for resending said emergency packet in response to receipt of said emergency packet request; and said application processor adapted to control the operation of said transmitter, receiver and MAC and to provide an interface between said MAC and an external host. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A computer program product for use in communications station, said computer program product comprising:
-
a computer useable medium having computer readable program code means embodied in said medium for detecting intrusion attempts by an imposter in a communications network, said computer program product comprising; computer readable program code means for determining that a received packet comprises an address corresponding to said node; computer readable program code means for transmitting an emergency packet following the end of said received packet if said node determines said received packet comprises the address of itself; computer readable program code means for receiving said emergency packet and generating an intrusion attempt indication, in response thereto; computer readable program code means for detecting a carrier signal without subsequent receipt of said emergency packet and transmitting an emergency packet request, in response thereto; and computer readable program code means for resending said emergency packet in response to receipt of said emergency packet request.
-
Specification