亞洲知識產權資訊網為知識產權業界提供一個一站式網上交易平台,協助業界發掘知識產權貿易商機,並與環球知識產權業界建立聯繫。無論你是知識產權擁有者正在出售您的知識產權,或是製造商需要購買技術以提高操作效能,又或是知識產權配套服務供應商,你將會從本網站發掘到有用的知識產權貿易資訊。

Optimal Routing Protocol Secure against Malicious Adversary

技術優勢
High end-to-end performance Low Error rate communication High Throughput Rate Highly Secure, Resistant to attacks by malicious adversaries
技術應用
Internet - Secure Banking, Purchasing, Identification and Communication Telephone Networks Transportation Networks Highly Secure Military Communications - Soldier System Network Privacy
詳細技術說明
UCLA scientists have created the first adaptive routing technique for a public key network that accounts for the possibility of malicious nodes. This innovative protocol is resilient to a number of malicious attacks to include: edge failures, malicious nodes, dynamic network changes, and deletion, modification or insertion of false data. This innovative protocol achieves high throughput rate while simultaneously operating with highly efficient processor memory.
*Abstract

Investigators at UCLA have developed a novel secure routing protocol for data transfer that achieves optimal transfer rate with negligible decoding error even if communication nodes are compromised by a malicious adversary. This advancement will vastly improve internet security and communication safety.

*IP Issue Date
Mar 17, 2015
*Principal Investigation

Name: Yair Amir

Department:


Name: Paul Bunn

Department:


Name: Rafail Ostrovsky

Department:

附加資料
Patent Number: US20110016316A1
Application Number: US2010922141A
Inventor: Amir, Yair | Bunn, Paul | Ostrovsky, Rafail
Priority Date: 13 Mar 2008
Priority Number: US20110016316A1
Application Date: 10 Sep 2010
Publication Date: 20 Jan 2011
IPC Current: H04L000900
US Class: 713168 | 726026
Assignee Applicant: The Regents of the University of California | The Johns Hopkins University,Baltimore
Title: AUTHENTICATED ADVERSARIAL ROUTING
Usefulness: AUTHENTICATED ADVERSARIAL ROUTING
Novelty: Method for sending messages from sender node to receiver node, involves identifying intermediate node as malicious based on status report and eliminating identified malicious intermediate node from subsequent transmission attempts
主要類別
信息和通信技術/電信
細分類別
電信
申請號碼
8984297
其他

Background

The Internet has become a ubiquitous tool in many aspects of society, yet remains surprisingly susceptible to attacks. Even a single malicious node along the pathway from sender to receiver can corrupt communication in a meaningful way. Secure routing protocols attempt to verify that packets of data are correctly delivered to their destination. However, the internet is large, heterogeneous, complex in topology, and dynamically changing. Failure localization and path-quality monitoring in the public key setting have therefore become two of the biggest challenges in communication. Current routing protocols such as link-state and distance-vector are susceptible to loops, slow convergence, oscillations, and suffer from high communication overhead. The number of network applications continues to increase, and the need for secure, dynamic routing that is resilient to malicious adversaries is evident.


Related Materials

Amir, Y., Bunn, P., and Ostrovsky, R. Authenticated Adversarial Routing. [more]
Amir, Y., Bunn, P, and Ostrovsky, R. Optimal-rate Coding in Adversarial Networks in the Public-key Setting. March (2008) [more]


Additional Technologies by these Inventors


Tech ID/UC Case

20225/2008-614-0


Related Cases

2008-614-0

國家/地區
美國

欲了解更多信息,請點擊 這裡
移動設備