×

Method for misbehaviour detection in secure wireless mesh networks

  • US 8,543,809 B2
  • Filed: 09/03/2008
  • Issued: 09/24/2013
  • Est. Priority Date: 09/06/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for secure data transmission in a wireless mesh network a sending node sends at least one packet to at least one forwarding node, the at least one forwarding node receives the at least one packet from the sending node and forwarding the at least one packet to one or more receiving nodes, and a destination node receives the at least one packet from the at least one receiving node, the method comprising the steps of:

  • a transmitter of the sending node, being a challenging node, transmitting a challenge to a forwarding node,the forwarding node, being a challenged node executing computer-readable instructions stored in non-transitory media to;

    generate a response for each of the sending node and the at least one receiving node, wherein both the response for the sending node and the response for the at least one receiving node include transformed information about one or more of the at least one packet which have been sent form the sending node to the destination node via the at least one forwarding node and the at least one receiving node, andtransmit the respective responses to the sending node and the at least one receiving node, andat each of the sending node and the at least one receiving node, executing computer-readable instructions stored in non-transitory media to process the respective response to find out whether the forwarding node is misbehaving or not by verifying whether the same transformed information in the respective response is equal to an information which can be or has been derived from the requested packet/packets, wherein the processing is carried out both by the sending node and the at least one receiving node,wherein the transformed information is a hash sum for the requested packet/packets in the challenge, the hash sum being generated by a logic operation from hash values of respective packets.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×