Location-based intrusion detection system
First Claim
1. In an ad-hoc network, a method of detecting messages from an unwanted intruder, the method comprising:
- receiving a first message purporting to be from a mobile communication device in the ad-hoc network, the first message having a first location component incorporated therein;
receiving a second message purporting to be from the mobile communication device, the second message having a second location component incorporated therein;
determining movement based upon the first location component and the second location component; and
determining whether at least one of the first message and the second message is from the intruder by comparing the movement with a distance required for the mobile communication device to change direction, wherein the distance required for the mobile communication device to change direction is determined based on physical movement capabilities of a vehicle or person with which the mobile communication device is associated and the distance required for the mobile communication device to change direction is stored in a database, and wherein determining whether at least one of the first message and the second message is from the intruder comprises determining that at least one of the first message and the second message is from the intruder when the movement and the distance required for the mobile communication device to change direction indicate that the mobile communication device could not have changed direction quickly enough to travel from a location associated with the first location component to a location associated with the second location component.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of detecting messages from an unwanted source in an ad-hoc network is disclosed. According to the method, a first message is received that purports to be from a mobile communication device. The first purported message has a first location component incorporated therein. A second message is received that purports to be from the mobile communication device. The second message has a second location component incorporated therein. The first location component is compared with the second location component. It is determined that one of the first purported message and the second purported message is not from the mobile communication device when the first location component is inconsistent with the second location component.
233 Citations
20 Claims
-
1. In an ad-hoc network, a method of detecting messages from an unwanted intruder, the method comprising:
-
receiving a first message purporting to be from a mobile communication device in the ad-hoc network, the first message having a first location component incorporated therein; receiving a second message purporting to be from the mobile communication device, the second message having a second location component incorporated therein; determining movement based upon the first location component and the second location component; and determining whether at least one of the first message and the second message is from the intruder by comparing the movement with a distance required for the mobile communication device to change direction, wherein the distance required for the mobile communication device to change direction is determined based on physical movement capabilities of a vehicle or person with which the mobile communication device is associated and the distance required for the mobile communication device to change direction is stored in a database, and wherein determining whether at least one of the first message and the second message is from the intruder comprises determining that at least one of the first message and the second message is from the intruder when the movement and the distance required for the mobile communication device to change direction indicate that the mobile communication device could not have changed direction quickly enough to travel from a location associated with the first location component to a location associated with the second location component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of detecting an intruder in a communication network having a plurality of nodes, wherein a position of a first node is determined, the first node being mobile, the method comprising:
-
receiving the position of the first node at a second node in the network; determining movement of the first node; receiving at the second node a message purporting to be from the first node, the message containing a location identifier; and determining whether the message is from the intruder by comparing a location associated with the location identifier with the position of the first node, the movement of the first node, and a distance required for the first node to change direction, wherein the distance required for the first node to change direction is stored in a database and is determined based on physical movement capabilities of a vehicle or person with which the first node is associated, and wherein determining whether the message is from the intruder comprises determining that the message is from the intruder when the movement of the first node and the distance required for the first node to change direction indicate that the first node could not have changed direction quickly enough to travel from the received position of the first node to the location associated with the location identifier of the message. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A communications device configured for use in an ad-hoc communications network, the device comprising:
-
a communicating portion that receives messages from devices in the ad-hoc communications network and sends messages to devices in the ad-hoc communications network, the messages including location information of another device in the network; a processing portion configured to determine whether messages from another device can be trusted based on a plurality of messages received at the communications device that were purportedly sent from said another device, each of the plurality of messages including a location component, wherein the processing portion is configured to compare the location components of at least two of the plurality of messages with a distance required for said another device to change direction, wherein the distance required for said another device to change direction is stored in a database determined based on physical movement capabilities of a vehicle or person with which said another device is associated, and wherein the processing portion is configured to determine that messages from said another device cannot be trusted when the comparison of the location components of the at least two messages and the distance required for said another device to change direction indicates that said another device could not have changed direction quickly enough to travel between locations associated with the location components of the at least two messages. - View Dependent Claims (17, 18, 19, 20)
-
Specification