Method for misbehaviour detection in secure wireless mesh networks
First Claim
1. A method for secure data transmission in a wireless mesh network a sending node sends at least one packet to at least one forwarding node, the at least one forwarding node receives the at least one packet from the sending node and forwarding the at least one packet to one or more receiving nodes, and a destination node receives the at least one packet from the at least one receiving node, the method comprising the steps of:
- a transmitter of the sending node, being a challenging node, transmitting a challenge to a forwarding node,the forwarding node, being a challenged node executing computer-readable instructions stored in non-transitory media to;
generate a response for each of the sending node and the at least one receiving node, wherein both the response for the sending node and the response for the at least one receiving node include transformed information about one or more of the at least one packet which have been sent form the sending node to the destination node via the at least one forwarding node and the at least one receiving node, andtransmit the respective responses to the sending node and the at least one receiving node, andat each of the sending node and the at least one receiving node, executing computer-readable instructions stored in non-transitory media to process the respective response to find out whether the forwarding node is misbehaving or not by verifying whether the same transformed information in the respective response is equal to an information which can be or has been derived from the requested packet/packets, wherein the processing is carried out both by the sending node and the at least one receiving node,wherein the transformed information is a hash sum for the requested packet/packets in the challenge, the hash sum being generated by a logic operation from hash values of respective packets.
1 Assignment
0 Petitions
Accused Products
Abstract
In a method for secure data transmission in a wireless mesh network, a sending node sends at least one packet to at least one forwarding node which receives the packet from the sending node and forwards the packet to one or more receiving nodes. A destination node receives the packet. A challenge is transmitted from the sending node to the forwarding node causing the forwarding node to reply both to the sending and the receiving node with a response which has transformed information about one or more of the packet/packets. The response is processed to find out whether the forwarding node is misbehaving or not by verifying whether the transformed information is equal to an information which can be or has been derived from the requested packet/packets, wherein the processing is carried out both by the sending node and the receiving node.
-
Citations
21 Claims
-
1. A method for secure data transmission in a wireless mesh network a sending node sends at least one packet to at least one forwarding node, the at least one forwarding node receives the at least one packet from the sending node and forwarding the at least one packet to one or more receiving nodes, and a destination node receives the at least one packet from the at least one receiving node, the method comprising the steps of:
-
a transmitter of the sending node, being a challenging node, transmitting a challenge to a forwarding node, the forwarding node, being a challenged node executing computer-readable instructions stored in non-transitory media to; generate a response for each of the sending node and the at least one receiving node, wherein both the response for the sending node and the response for the at least one receiving node include transformed information about one or more of the at least one packet which have been sent form the sending node to the destination node via the at least one forwarding node and the at least one receiving node, and transmit the respective responses to the sending node and the at least one receiving node, and at each of the sending node and the at least one receiving node, executing computer-readable instructions stored in non-transitory media to process the respective response to find out whether the forwarding node is misbehaving or not by verifying whether the same transformed information in the respective response is equal to an information which can be or has been derived from the requested packet/packets, wherein the processing is carried out both by the sending node and the at least one receiving node, wherein the transformed information is a hash sum for the requested packet/packets in the challenge, the hash sum being generated by a logic operation from hash values of respective packets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 19, 20, 21)
-
-
17. A node in a wireless mesh network comprising a sending node sending at least one packet to at least one forwarding node, the at least one forwarding node receiving the at least one packet from the sending node and forwarding the at least one packet to one or more receiving nodes, and a destination node receiving the at least one packet from the at least one receiving node,
wherein the node, being a challenging node, comprises: -
a transmitter for transmitting a challenge to the at least one forwarding node causing the at least one forwarding node, being a challenged node, to reply both to the challenging node and the at least one receiving node with a response, wherein both the response for the sending node and the response for the at least one receiving node include the same transformed information about one or more of the at least one packet/packets which has/have been sent form the challenging node to the destination node via the at least one forwarding node and the at least one receiving node, and a processor for processing the response to determine whether the at least one forwarding node is misbehaving or not by verifying whether the transformed information received in the response from the at least one forwarding node is equal to an information which can be or has been derived from the requested packet/packets, wherein the same transformed information is similarly used by the at least one receiving node to determine whether the at least one forwarding node is misbehaving or not, wherein the transformed information is a hash sum for the requested packet/packets in the challenge, and wherein the node comprises further means for generating the hash sum by a logic operation from hash values of respective packets.
-
-
18. A node in a wireless mesh network comprising a sending node sending at least one packet to at least one forwarding node, the at least one forwarding node receiving the at least one packet from the sending node and forwarding the at least one packet to one or more receiving nodes, and a destination node receiving the at least one packet from the at least one receiving node,
wherein the node, being a challenged node, comprises a computer program stored in non-transitory media and executable to: -
receive a challenge from the sending node, being a challenging node, and in response to receiving the challenge; generate a response for each of the sending node and the at least one receiving node, wherein both the response for the sending node and the response for the at least one receiving node include transformed information about one or more of the at least one packet which have been sent form the sending node to the destination node via the at least one forwarding node and the at least one receiving node, and transmit the respective responses to the sending node and the at least one receiving node, such that both the sending node and the at least one receiving node are able to determine whether the node is misbehaving or not based at least on the same transformed information received from the node, wherein the transformed information is a hash sum for the requested packet/packets in the challenge, and wherein the node comprises further means for generating the hash sum by a logic operation from hash values of respective packets.
-
Specification