摘要:
A method for processing messages comprises: a first device sending a neighbor solicitation message to a second device, and then creating information of the second device based on a neighbor advertisement message replied by the second device; the first device sending a detection request message to the second device based on the created information of the second device, and determining whether a detection reply message sent by the second device is received in a period of time, and if it is not received, then the first device deleting the created information of the second device. Accordingly, a network device is provided comprising a neighbor solicitation message sending module, a neighbor advertisement message receiving module, an information creating module, a detection request message sending module and a detection reply message receiving module. Additionally, a method for processing messages and a network device are provided. The processing of the neighbor advertisement message by the methods and network devices decreases effects of the neighbor advertisement message with a false link layer address.
摘要:
The invention describes a method for secure data transmission in a wireless mesh network. A sending node (A i ) sends at least one packet (P) to at least one forwarding node (R j ). The at least one forwarding node (R j ) receives the at least one packet from the sending node (Ai) and forwards the at least one packet to one or more receiving nodes (NR k ). A destination node (D l ) receives the at least one packet from the at least one receiving node (NR j ). The invention comprises the step of transmitting a challenge from the sending node (A i ), being a challenging node, to the at least one forwarding node (R i ) causing the at least one forwarding node (R i ), being a challenged node, to reply both to the sending node (A i ) and the at least one receiving node (NR k ) with a response, the response at least comprising transformed information about one or more of the at least one packet/packets which has/have been sent form the sending node (A i ) to the destination node (D l ) via the at least one forwarding node (R j ) and the at least one receiving node (NR k ). The invention further comprises the step of processing the response to find out whether the at least one forwarding node (R j ) is misbehaving or not by verifying whether the transformed information is equal to an information which can be or has been derived from the requested packet/packets, wherein the processing is carried out both by the sending node (A i ) and the at least one receiving node (NR k ).
摘要:
In packet-drop attacks in ad hoc networks, a malicious network node choose to selectively drop packets that are suppose to be forwarded, wich results in adverse impact on application good-put and network stability. A method and system for detection of packet-drop attacks in ad hoc networks requires network nodes to report statistics on IP flow packets originated, received, or forwarded to neighbors. These statistics are analyzed and correlated to determine nodes suspected of dropping packets.
摘要:
Described is a system for detecting attacks on mobile networks. The system includes the relevant hardware and components to perform a variety of operations including continuously measuring time-varying signals at each node in a network. The system determines network flux on the time-varying signals of all nodes in the network and detects a network attack if the network flux exceeds a predetermined threshold. Further, a reactive protocol is initiated if the network flux exceeds the predetermined threshold.
摘要:
The invention describes a method for secure data transmission in a wireless mesh network. A sending node (Ai) sends at least one packet (P) to at least one forwarding node (Rj). The at least one forwarding node (Rj) receives the at least one packet from the sending node (Ai) and forwards the at least one packet to one or more receiving nodes (NRk). A destination node (D1) receives the at least one packet from the at least one receiving node (NRj). The invention comprises the step of transmitting a challenge from the sending node (Ai), being a challenging node, to the at least one forwarding node (Ri) causing the at least one forwarding node (Ri), being a challenged node, to reply both to the sending node (Ai) and the at least one receiving node (NRk) with a response, the response at least comprising transformed information about one or more of the at least one packet/packets which has/have been sent form the sending node (Ai) to the destination node (D1) via the at least one forwarding node (Rj) and the at least one receiving node (NRk). The invention further comprises the step of processing the response to find out whether the at least one forwarding node (Rj) is misbehaving or not by verifying whether the transformed information is equal to an information which can be or has been derived from the requested packet/packets, wherein the processing is carried out both by the sending node (Ai) and the at least one receiving node (NRk).
摘要:
The present invention is directed to a system for and a method of selecting a combination of resources for transmitting data from a remote site to a destination site. The method comprises generating a list of combinations of resources at a regional site and transmitting the list to the remote site. Data is transmitted from the remote site to the regional site using each combination of resources and statistics for each transmission are stored. Metrics, based on the application at hand, are computed for each set of statistics corresponding to each transmission, and a preferred combination of resources is selected at the regional site based on the metrics. The regional site then transmits to the remote site information corresponding to the preferred combination of resources. The remote site is then configured to transmit data to the destination site using the selected combination of resources. Resources include links with a specified bandwidth, VPN and GRE tunnels, and routers configured to perform MPLS switching, type-of-service routing, and source routing.