Excising compromised routers from an ad-hoc network
DCFirst Claim
1. A communications router for use in a communications network including a plurality of routers controlled by one or more trusted parties and at least one network control computer communicating with said communications router, said communications router comprising:
- a transceiver to transmit and receive messages;
an electronic memory circuit having network information stored therein; and
an electronic processor circuit in communication with the electronic memory circuit and transceiver which (i) evaluates an excising signal received by the transceiver from the network control computer, the excising signal indicating that the network control computer has determined that an untrusted party has gained control of a first functioning router of the plurality of routers and is to be excised from the network;
(ii) determines an authenticity of the excising signal;
(iii) excises the first router when the excising signal is authenticated; and
(iv) reroutes the excising signal to at least a second router of the plurality of routers when the excising signal is authenticated.
13 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A method of operating a network (120) is provided in a communications system for communications among a plurality of routers in the network. The network receives verifiable information identifying at least one compromised router (D). The method includes a step to excise the compromised router (D) from the network. The method also includes steps to verify that messages transmitted between routers (A, B, C, D, E and F) are from non-compromised routers (A, B, C, E and F), and to reinstate the compromised router (D) when it becomes non-compromised.
-
Citations
27 Claims
-
1. A communications router for use in a communications network including a plurality of routers controlled by one or more trusted parties and at least one network control computer communicating with said communications router, said communications router comprising:
-
a transceiver to transmit and receive messages; an electronic memory circuit having network information stored therein; and an electronic processor circuit in communication with the electronic memory circuit and transceiver which (i) evaluates an excising signal received by the transceiver from the network control computer, the excising signal indicating that the network control computer has determined that an untrusted party has gained control of a first functioning router of the plurality of routers and is to be excised from the network;
(ii) determines an authenticity of the excising signal;
(iii) excises the first router when the excising signal is authenticated; and
(iv) reroutes the excising signal to at least a second router of the plurality of routers when the excising signal is authenticated. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. In a communications system for communications among a plurality of routers controlled by one or more trusted parties in a network, at least one network control computer being linked to a first router of the plurality of routers, each of the communications routers including a transceiver to transmit and receive messages, a method of operating the first router comprising the steps of:
-
evaluating an excising signal received by the transceiver from the network control computer, the excising signal indicating that the network control computer has determined that an untrusted party has gained control of a second functioning router of the plurality of routers and is to be excised from the network; determining an authenticity of the excising signal; excising the second router when the excising signal is authentic; and rerouting the excising signal to at least a third router of the plurality of routers. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A mobile communications station which communicates among a plurality of mobile stations controlled by a first of parties in an ad-hoc network in which stations are arranged in clusters of communication member stations, with one member station in each cluster being a head station for the cluster, each member station communicating with the network through at least one cluster head station, a cluster head station communicating with zero or more cluster head stations, a network computer being linked with said mobile communications station, said mobile communications station comprising:
-
a transceiver which transmits signals to and receives signals from other mobile stations in the network, a memory having network information stored thereon; and a processor in communication with the transceiver and the memory which (i) operates said mobile communications station as a cluster head or cluster member station;
(ii) evaluates an excising signal received by the transceiver from the network control computer, the excising signal indicating that the network control computer has determined that an untrusted party has gained control of a first functioning cluster head or cluster member station and is to be excised from the network;
(iii) verifies the authenticity of the excising signal;
(iv) excises the first cluster head or cluster member station when the excising signal is authentic; and
(v) distributes the excising signal to at least a second cluster head or cluster member station.
-
-
17. In a communications system for communications in a network among a plurality of wireless routers controlled by one or more trusted parties, at least one control computer being linked to a first router of the plurality of wireless routers, each of the wireless routers including a transceiver to transmit and receive messages, a method of operating the network comprising the steps of:
-
formulating in the control computer an excise signal indicating that an untrusted party has gained control of at least a second functioning router and is to be excised from the network, providing a digital signature of the control computer on the excise signal and transmitting the excise signal to the first router; verifying the signature on the excise signal in the first router, and when the signature is valid (a) adding the information identifying the second router to information regarding excised routers stored in memory of the first router, (b) removing from the first router routing updates corresponding to the second router, (c) removing information corresponding to the second router from a neighbor table of the first router when the second router is listed therein, and (d) recomputing a forwarding table in the first router; redistributing the excise signal to each of the plurality of routers, except for the second router; and upon receiving a message from another one of the plurality of routers, determining, in each of the plurality of routers, an identifier for the router from which the message is received and processing the message only when the information regarding excised routers does not include the identifier. - View Dependent Claims (18, 19, 20, 21)
-
-
22. In a communications system for communications in a network among a plurality of wireless routers controlled by one or more trusted parties, at least one control computer being linked to a first router of the plurality of routers, each of the routers including a transceiver to transmit and receive messages, a method of operating the network comprising the steps of:
-
formulating in the control computer an excise signal indicating that at least a second functioning router is controlled by an untrusted party and is to be excised from the network, providing a digital signature of the control computer on the excise signal and transmitting the excise signal to the first router; verifying the signature on the excise signal in the first router, and when the signature is valid removing the information identifying the second router from information stored in memory of the first router regarding routers controlled by trusted parties; redistributing the excise signal to each of the plurality of routers, except for the second router; and determining, in each of the plurality of routers when receiving a message from another one of the plurality of routers, an identifier for the router from which the message is received from and processing the message only when the information regarding routers controlled by trusted parties includes the identifier. - View Dependent Claims (23)
-
-
24. A communications router for use in a communications network, the network including a plurality of routers controlled by one or more trusted parties, at least one network control computer communicating with said communications router, said communications router comprising:
-
a transceiver to transmit and receive messages, means for storing network information; means for evaluating an excising signal received by the transceiver from the network control computer, the excising signal indicating that the network control computer has determined that a first functioning router of the plurality of routers is controlled by an untrusted party and is to be excised from the network; means for authenticating the excising signal; means for excising the first router when the excising signal is authentic; and means for rerouting the excising signal to at least a second router of the plurality of routers.
-
-
25. In a communications system for communications among a plurality of routers in a network controlled by one or more trusted parties, at least one computer being linked to a first router of the plurality of routers, a method of operating the network comprising the steps of:
-
authenticating in the first router a cut-off signal received from the control computer, the cut-off signal indicating that the control computer has determined that at least one functioning router is controlled by an untrusted party and is to be cut-off from communicating with the network; preventing the first router from communicating with the at least one cut-off router when the signal is authenticated; redistributing the cut-off signal to each of the plurality of routers, except for the at least one cut-off router, and preventing each of the remaining routers from communicating with the at least one cut-off router, wherein when a router receives a message from one of the plurality of routers, the router determines if the message is from the at least one cut-off router, and processes the message only when the message is not from the at least one cut-off router.
-
-
26. In a communications system for communication among a plurality of routers in a network controlled by one or more trusted parties, at least one computer being linked to a first router of the plurality of routers, a method of operating the network comprising the steps of:
-
authenticating in the first router a cut-off signal received from the control computer, the signal indicating that the control computer has determined that at least one functioning router is controlled by an untrusted party and is to be cut-off from communicating with the network; preventing the first router from communicating with the at least one cut-off router when the signal is authenticated; redistributing the cut-off signal to each of the plurality of routers, except for the at least one cut-off router, and preventing each of the remaining routers from communicating with the at least one cut-off router, wherein when a router receives a message from one of the plurality of routers, the router determines if the message is from a router other than the at least one cut-off router, and processes the message only when the message is from a router other than the at least one cut-off router.
-
-
27. Computer executable code stored on a computer readable medium, the code to operate a communications router in a network having a plurality of routers controlled by one or more trusted parties, at least one computer being linked to the communications router, each of the plurality of routers including a transceiver to transmit and receive messages, said computer executable code comprising:
-
code to excise from the network a functioning router that has become controlled by an untrusted party; code to verify that messages transmitted among the plurality of routers are from routers controlled by trusted parties; and code to reinstate an excised router when a trusted party regains control of the excised router.
-
Specification