METHOD AND SYSTEM FOR RESILIENT PACKET TRACEBACK IN WIRELESS MESH AND SENSOR NETWORKS
    1.
    发明申请
    METHOD AND SYSTEM FOR RESILIENT PACKET TRACEBACK IN WIRELESS MESH AND SENSOR NETWORKS 审中-公开
    无线网络和传感器网络中的回复分组跟踪的方法和系统

    公开(公告)号:WO2008119672A2

    公开(公告)日:2008-10-09

    申请号:PCT/EP2008053325

    申请日:2008-03-19

    CPC classification number: H04L63/1458 H04L63/1466 H04L2463/146 H04W84/20

    Abstract: A system and method for packet traceback in a network includes maintaining an identity number (ID) for each node in a network and generating a signature (e.g., a message authentication code (MAC)) using a secret key shared between each node on a forwarding path and a sink. Each forwarding node leaves a mark by appending its ID and a signature in the packet, either in a deterministic manner or with a probability. Upon receiving a packet at the sink, correctness of the signatures included in each packet is verified in the reverse order by which these signatures were appended. A last valid MAC is determined in the forwarding path to determine the locations of compromised nodes that collude in false data injection attacks.

    Abstract translation: 用于网络中的数据包追溯的系统和方法包括维护网络中每个节点的身份号码(ID),并使用转发上的每个节点之间共享的密钥生成签名(例如,消息认证码(MAC)) 路径和水槽。 每个转发节点通过以确定性方式或以概率将其ID和签名附加在分组中来留下标记。 在接收器处接收到分组时,以附加这些签名的相反顺序来验证每个分组中包括的签名的正确性。 在转发路径中确定最后一个有效MAC,以确定在虚假数据注入攻击中并发的受损节点的位置。

    METHOD AND SYSTEM FOR RESILIENT PACKET TRACEBACK IN WIRELESS MESH AND SENSOR NETWORKS
    2.
    发明申请
    METHOD AND SYSTEM FOR RESILIENT PACKET TRACEBACK IN WIRELESS MESH AND SENSOR NETWORKS 审中-公开
    用于无线网格和传感器网络中的恢复分组跟踪的方法和系统

    公开(公告)号:WO2008119672A4

    公开(公告)日:2009-03-26

    申请号:PCT/EP2008053325

    申请日:2008-03-19

    CPC classification number: H04L63/1458 H04L63/1466 H04L2463/146 H04W84/20

    Abstract: A system and method for packet traceback in a network includes maintaining an identity number (ID) for each node in a network and generating a signature (e.g., a message authentication code (MAC)) using a secret key shared between each node on a forwarding path and a sink. Each forwarding node leaves a mark by appending its ID and a signature in the packet, either in a deterministic manner or with a probability. Upon receiving a packet at the sink, correctness of the signatures included in each packet is verified in the reverse order by which these signatures were appended. A last valid MAC is determined in the forwarding path to determine the locations of compromised nodes that collude in false data injection attacks.

    Abstract translation: 用于网络中的分组追踪的系统和方法包括:维护网络中的每个节点的身份号码(ID),并使用在转发中的每个节点之间共享的秘密密钥来生成签名(例如,消息认证码(MAC)) 路径和水槽。 每个转发节点通过以确定性方式或以概率在分组中附加其ID和签名来留下标记。 在接收器处接收到数据包后,每个数据包中包含的签名的正确性按照附加这些签名的相反顺序进行验证。 在转发路径中确定最后一个有效MAC,以确定在虚假数据注入攻击中共谋的被破坏节点的位置。

    A METHOD AND SYSTEM FOR FEDERATED RESOURCE DISCOVERY SERVICE IN DISTRIBUTED SYSTEMS
    4.
    发明申请
    A METHOD AND SYSTEM FOR FEDERATED RESOURCE DISCOVERY SERVICE IN DISTRIBUTED SYSTEMS 审中-公开
    分布式系统中联合资源发现服务的方法与系统

    公开(公告)号:WO2007149701A3

    公开(公告)日:2008-11-06

    申请号:PCT/US2007070544

    申请日:2007-06-06

    CPC classification number: G06F17/30545

    Abstract: Methods and systems are provided for identifying and allocating resources disposed within a plurality of distributed and autonomous computing systems, each of which may have its own legacy resource discovery service. Resource identification servers disposed within each one of the distributed computing systems communicate resource attribute data to a tree hierarchy of dedicated servers. The resource attribute data are maintained in native formats within the distributed computing systems and are mapped to a common format provided by the dedicated servers. The resource attribute data are aggregated at each node within the tree hierarchy, communicated up through the tree hierarchy to one or more root nodes and replicated down through all of the nodes. Additional system robustness is provided through period resource checks and resource attribute data updates. Resource allocation queries are submitted to any level node within the hierarchy and forwarded to the proper computing system for processing.

    Abstract translation: 提供了用于识别和分配布置在多个分布式和自主计算系统内的资源的方法和系统,每个计算系统可以具有其自己的传统资源发现服务。 布置在分布式计算系统的每一个内的资源识别服务器将资源属性数据传送到专用服务器的树层。 资源属性数据以分布式计算系统内的本机格式进行维护,并映射到由专用服务器提供的通用格式。 资源属性数据在树层次结构中的每个节点进行聚合,通过树层次结构传递到一个或多个根节点,并通过所有节点进行复制。 通过周期资源检查和资源属性数据更新来提供额外的系统稳健性。 资源分配查询被提交到层次结构中的任何级节点,并转发到正确的计算系统进行处理。

    5.
    发明专利
    未知

    公开(公告)号:BRPI0808619A2

    公开(公告)日:2014-08-12

    申请号:BRPI0808619

    申请日:2008-03-19

    Applicant: IBM

    Abstract: A system and method for packet traceback in a network includes maintaining an identity number (ID) for each node in a network and generating a signature (e.g., a message authentication code (MAC)) using a secret key shared between each node on a forwarding path and a sink. Each forwarding node leaves a mark by appending its ID and a signature in the packet, either in a deterministic manner or with a probability. Upon receiving a packet at the sink, correctness of the signatures included in each packet is verified in the reverse order by which these signatures were appended. A last valid MAC is determined in the forwarding path to determine the locations of compromised nodes that collude in false data injection attacks.

    6.
    发明专利
    未知

    公开(公告)号:AT511295T

    公开(公告)日:2011-06-15

    申请号:AT08718046

    申请日:2008-03-19

    Applicant: IBM

    Abstract: A system and method for packet traceback in a network includes maintaining an identity number (ID) for each node in a network and generating a signature (e.g., a message authentication code (MAC)) using a secret key shared between each node on a forwarding path and a sink. Each forwarding node leaves a mark by appending its ID and a signature in the packet, either in a deterministic manner or with a probability. Upon receiving a packet at the sink, correctness of the signatures included in each packet is verified in the reverse order by which these signatures were appended. A last valid MAC is determined in the forwarding path to determine the locations of compromised nodes that collude in false data injection attacks.

    METHOD AND SYSTEM FOR RESILIENT PACKET TRACEBACK IN WIRELESSMESH AND SENSOR NETWORKS

    公开(公告)号:CA2672696A1

    公开(公告)日:2008-10-09

    申请号:CA2672696

    申请日:2008-03-19

    Applicant: IBM

    Abstract: A system and method for packet traceback in a network includes maintainin g an identity number (ID) for each node in a network and generating a signat ure (e.g., a message authentication code (MAC)) using a secret key shared be tween each node on a forwarding path and a sink. Each forwarding node leaves a mark by appending its ID and a signature in the packet, either in a deter ministic manner or with a probability. Upon receiving a packet at the sink, correctness of the signatures included in each packet is verified in the rev erse order by which these signatures were appended. A last valid MAC is dete rmined in the forwarding path to determine the locations of compromised node s that collude in false data injection attacks.

    System and method for providing quality of service in wide-area messaging fabric

    公开(公告)号:GB2489140A

    公开(公告)日:2012-09-19

    申请号:GB201210971

    申请日:2010-10-18

    Applicant: IBM

    Abstract: Techniques for transmitting data according to at least one quality of service requirement. A message path is calculated specifying a sequence of broker computers selected from a network of interconnected broker computers. The message path is statistically estimated to fulfill the at least one quality of service requirement. Quality of service metrics are received about the network of interconnected broker computers. If the message path is determined not to fulfill the quality of service requirement, a new message path is calculated specifying a new sequence of broker computers selected from the network of interconnected broker computers. The new message path is statistically estimated to fulfill the at least one quality of service requirement.

    Verfahren und System zur Erkennung der Rahmengrenze eines in der Vorwärtsfehlerkorrekturschicht im Ethernet empfangenen Datenstroms

    公开(公告)号:DE112010003445B4

    公开(公告)日:2013-07-11

    申请号:DE112010003445

    申请日:2010-07-29

    Applicant: IBM

    Abstract: Verfahren zur Erkennung der Rahmengrenze eines in der Vorwärtsfehlerkorrekturschicht (Forward Error Correction (FEC) layer) im Ethernet empfangenen Datenstroms, wobei das Verfahren Folgendes umfasst: Abtrennen von Daten mit der Länge eines Rahmens vom Datenstrom; Durchführen einer Gültigkeitsprüfung der FEC-Prüfung für die Daten mit der Länge eines Rahmens von der Startposition der Daten mit der Länge eines Rahmens; falls die FEC-Prüfung für die Daten mit der Länge eines Rahmens nicht korrekt ist, Annehmen der vom nächsten Bit der Endposition der Daten mit der Länge eines Rahmens um sbn Bit weitergesprungenen Datenstromposition als Startposition des nächsten abzutrennenden Datenrahmens, wobei sbn eine ganze Zahl ist, die größer als die Pipeline-Verzögerung der Hardware-Schaltung in der FEC-Schicht im Ethernet und teilerfremd mit der Länge des Rahmens ist. Zurückkehren zum Abtrennschritt; falls die FEC-Prüfung für die Daten mit der Länge eines Rahmens korrekt ist, Festlegen der Startposition der aktuellen Daten mit der Länge eines Rahmens als Rahmengrenzenposition des Datenstroms.

    Verfahren und System zur Erkennung der Rahmengrenze eines in der Vorwärtsfehlerkorrekturschicht im Ethernet empfangenen Datenstroms

    公开(公告)号:DE112010003445T5

    公开(公告)日:2012-11-29

    申请号:DE112010003445

    申请日:2010-07-29

    Applicant: IBM

    Abstract: Die vorliegende Erfindung offenbart ein Verfahren und ein System zur Erkennung der Rahmengrenze eines in der Vorwärtsfehlerkorrekturschicht im Ethernet empfangenen Datenstroms. Das Verfahren umfasst Folgendes: Abtrennen von Daten mit der Länge eines Rahmens vom Datenstrom; Gültigkeitsprüfung der FEC-Prüfung für die Daten mit der Länge eines Rahmens von der Startposition der Daten mit der Länge eines Rahmens; falls die FEC-Prüfung für die Daten mit der Länge eines Rahmens nicht korrekt ist, Annehmen der vom nächsten Bit der Endposition der Daten mit der Länge eines Rahmens um sbn Bit weitergesprungenen Datenstromposition als Startposition des nächsten abzutrennenden Datenrahmens, wobei sbn eine ganze Zahl ist, die größer als die Pipeline-Verzögerung der Hardware-Schaltung und teilerfremd mit der Länge des Rahmen ist; Zurückkehren zum Abtrennschritt; falls die FEC-Prüfung für die Daten mit der Länge eines Rahmens korrekt ist, wird die Startposition der Daten mit der Länge eines Rahmens als Rahmengrenzenposition des Datenstroms festgelegt. Die vorliegende Erfindung kann die Geschwindigkeit der Rahmengrenzenerkennung und die Geschwindigkeit der Rahmensynchronisation erhöhen, ohne den Hardware-Aufwand zu vergrößern.

Patent Agency Ranking