Context-free protocol for enforcing data forwarding in wireless ad hoc networks
First Claim
1. A method for enforcing data forwarding in a wireless ad hoc network, the method comprising:
- encrypting, by a processor, data in a data packet based on a packet key;
encrypting the packet key based on a plurality of node keys, corresponding to a plurality of nodes;
transmitting the data packet with the encrypted packet key through a predetermined path to a destination node; and
making the packet key available to the destination node only after the destination node forwards the data packet to at least one neighboring node, so as to enable the destination node to decrypt the data in the data packet encrypted by the packet key.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein is a context-free protocol (i.e., the COFFEE protocol) for stimulating cooperation among selfish nodes. Various embodiments have the ability to transmit a packet over the path successfully without the dependency on the information of other packets'"'"' transmissions. It is assumed that every node in the network is rational, and therefore during the packet forwarding stage, if the intermediate nodes can not clearly tell whether the packet is destined to them or not, they do not simply drop the packet. Thus, in the COFFEE protocol, by introducing several techniques, for a packet received by a node, the node thinks the packet could potentially be destined to itself and forwards the packet to find out the answer. Detailed analysis and performance evaluations have been conducted to demonstrate the effectiveness of the COFFEE protocol.
13 Citations
17 Claims
-
1. A method for enforcing data forwarding in a wireless ad hoc network, the method comprising:
-
encrypting, by a processor, data in a data packet based on a packet key; encrypting the packet key based on a plurality of node keys, corresponding to a plurality of nodes; transmitting the data packet with the encrypted packet key through a predetermined path to a destination node; and making the packet key available to the destination node only after the destination node forwards the data packet to at least one neighboring node, so as to enable the destination node to decrypt the data in the data packet encrypted by the packet key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for enforcing forwarding of a data packet in a wireless ad hoc network, wherein the data packet has a first portion encrypted based on a key and a second portion carrying the key, the method comprising:
-
receiving the data packet at a destination node at a first time; modifying, by a processor, the second portion of the data packet; transmitting the data packet to at least one of a plurality of intermediate nodes; receiving the data packet at the destination node at a second time later than the first time; and determining, at the destination node, the key from the second portion of the data packet so as to enable the destination node to decrypt the first portion of the data packet. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method for enforcing data forwarding in a wireless ad hoc network, the method comprising:
-
encrypting data in a data packet based on a key; transmitting the data packet with the key from a source node to a destination node by way of a predetermined path including a plurality of intermediate nodes, wherein the predetermined path includes transmission of the data packet with the key from the destination node to at least one neighboring node and transmission of the data packet back to the destination node after the transmission of the data packet with the key from the destination node to the at least one neighboring node; and decrypting the data in the data packet at the destination node based on the key after the data packet has been transmitted through the predetermined path. - View Dependent Claims (16, 17)
-
Specification