Method and apparatus for detecting and correcting malicious data in an ad-hoc network
First Claim
1. A method for detecting malicious data in an ad-hoc network, comprising:
- receiving data at a node in the ad-hoc network, the data having purportedly been sensed by other nodes in the ad-hoc network,wherein a given node senses data associated with itself and with proximate nodes in the ad-hoc network, whereby proximate nodes in the ad-hoc network can redundantly sense data about each other,wherein the received data was redundantly communicated to the node by the other nodes in the ad-hoc network;
determining, at the node, if the received data, along with data sensed locally by the node, is consistent; and
if not, using a model which accounts for malicious nodes to determine an explanation for the inconsistency.
7 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system that detects malicious data in an ad-hoc network. During operation, the system receives data at a node in the ad-hoc network, wherein the data was sensed and redundantly communicated to the node by other nodes in the ad-hoc network. Note that in this ad-hoc network, a given node senses data associated with itself and with proximate nodes in the ad-hoc network. In this way, proximate nodes in the ad-hoc network can redundantly sense data about each other. Next, the system determines at the node if the received data, along with data sensed locally by the node, is consistent. If not, the system uses a model which accounts for malicious nodes to determine an explanation for the inconsistency.
-
Citations
22 Claims
-
1. A method for detecting malicious data in an ad-hoc network, comprising:
-
receiving data at a node in the ad-hoc network, the data having purportedly been sensed by other nodes in the ad-hoc network, wherein a given node senses data associated with itself and with proximate nodes in the ad-hoc network, whereby proximate nodes in the ad-hoc network can redundantly sense data about each other, wherein the received data was redundantly communicated to the node by the other nodes in the ad-hoc network; determining, at the node, if the received data, along with data sensed locally by the node, is consistent; and if not, using a model which accounts for malicious nodes to determine an explanation for the inconsistency. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for detecting malicious data in an ad-hoc network, the method comprising:
-
receiving data at a node in the ad-hoc network, the data having purportedly been sensed by other nodes in the ad-hoc network, wherein a given node senses data associated with itself and with proximate nodes in the ad-hoc network, whereby proximate nodes in the ad-hoc network can redundantly sense data about each other, wherein the received data was redundantly communicated to the node by the other nodes in the ad-hoc network; determining, at the node, if the received data, along with data sensed locally by the node, is consistent; and if not, using a model which accounts for malicious nodes to determine an explanation for the inconsistency. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An apparatus that detects malicious data in an ad-hoc network, comprising:
-
a receiving mechanism at a node in the ad-hoc network, which is configured to receive data purportedly been sensed by other nodes in the ad-hoc network, wherein a given node senses data associated with itself and with proximate nodes in the ad-hoc network, whereby proximate nodes in the ad-hoc network can redundantly sense data about each other, wherein the received data was redundantly communicated to the node by the other nodes in the ad-hoc network; a determination mechanism at the node configured to determine if the received data, along with data sensed locally by the node, is consistent; and wherein if not, the determination mechanism is configured to use a model which accounts for malicious nodes to determine an explanation for the inconsistency. - View Dependent Claims (22)
-
Specification