System and method for leveraging network topology for enhanced security
First Claim
1. A method for securing communications from unintended access in an ad-hoc communications network, said network including a plurality of nodes for transmitting and receiving signals to and from other nodes in said network, the method comprising:
- determining multiple routes from a source node to a destination node, wherein each of the multiple routes is different from one another based on varying at least one intermediate node with which each of the multiple routes is composed;
establishing a plurality of variable communication paths each comprising one of the multiple routes between the source node and the destination node for at least one data packet transmission;
dividing each data packet into a plurality of data sub-packets; and
communicating each of the plurality of data sub-packets via a unique associated variable communication path, wherein each intermediate node in each of the multiple routes of the associated variable communication paths is prevented from intercepting all of the at least one packet of data.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method for locating and using multiple routes to transmit sub-packets of data from a source node to a destination node in an ad-hoc network, thus preventing intermediate nodes in any one transmission path from intercepting a useful amount of information. The system and method routes communications between a source node and a destination node via multiple routes, selected in a random fashion. Further protection is achieved by breaking data packets into sub-packets requiring reassembly at the destination node.
81 Citations
20 Claims
-
1. A method for securing communications from unintended access in an ad-hoc communications network, said network including a plurality of nodes for transmitting and receiving signals to and from other nodes in said network, the method comprising:
-
determining multiple routes from a source node to a destination node, wherein each of the multiple routes is different from one another based on varying at least one intermediate node with which each of the multiple routes is composed; establishing a plurality of variable communication paths each comprising one of the multiple routes between the source node and the destination node for at least one data packet transmission; dividing each data packet into a plurality of data sub-packets; and communicating each of the plurality of data sub-packets via a unique associated variable communication path, wherein each intermediate node in each of the multiple routes of the associated variable communication paths is prevented from intercepting all of the at least one packet of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for securing communications from unintended access in an ad-hoc communications network, said network including a plurality of nodes for transmitting and receiving signals to and from other nodes in said network, the system comprising:
-
a first node, for determining multiple routes from a source node to a destination node, wherein each of the multiple routes is different from one another based on varying at least one intermediate node with which each of the multiple routes is composed; said first node further for establishing a plurality of variable communication paths each comprising one of the multiple routes between the source node and the destination node for at least one data packet transmission; and said first node further for dividing each data packet into a plurality of data sub-packets and communicating each of the plurality of data sub-packets via a unique associated variable communication path, wherein each intermediate node in each of the multiple routes of the associated variable communication paths is prevented from intercepting all of the at least one packet of data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising;
-
determining multiple routes from a source node to a destination node for at least one data packet transmission, wherein each of the multiple routes is different from one another based on varying at least one intermediary node with which each of the multiple routes is composed; dividing each data packet into a plurality of data sub-packets; selecting a first one of the multiple routes to transmit a first data sub-packet from the source node to the destination node and communicating the first data sub-packet via the first one of the multiple routes; and selecting a second one of the multiple routes to transmit a second data sub-packet from the source node to the destination node and communicating the second data sub-packet via the second one of the multiple routes, thereby preventing an intermediate node in any of the multiple routes from intercepting complete packet of data.
-
-
20. A method comprising:
-
dividing a communication into a plurality of data packets; determining multiple routes from a source node to a destination node for each of the plurality of data packets, wherein each of the multiple routes is different from one another based on varying at least one intermediary node with which each of the multiple routes is composed; dividing each data packet into a plurality of data sub-packets; selecting a first one of the multiple routes to transmit a first series of data sub-packets from the source node to the destination node and communicating the first series of data sub-packets via the first one of the multiple routes; and selecting a second one of the multiple routes to transmit a second series of data sub-packets from the source node to the destination node and communicating the second series of data sub-packets via the second one of the multiple routes, thereby preventing an intermediate node in any of the multiple routes from intercepting complete packet of data.
-
Specification