Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020112287 - DETECTION OF SECURITY THREATS IN A MESH NETWORK

Publication Number WO/2020/112287
Publication Date 04.06.2020
International Application No. PCT/US2019/058500
International Filing Date 29.10.2019
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04W 12/10 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
10Integrity
H04W 12/12 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
12Fraud detection
H04W 84/18 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
84Network topologies
18Self-organising networks, e.g. ad hoc networks or sensor networks
H04W 4/80 2018.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
80Services using short range communication, e.g. near-field communication , radio-frequency identification or low energy communication
CPC
H04L 63/1416
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1408by monitoring network traffic
1416Event detection, e.g. attack signature detection
H04L 63/1466
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1441Countermeasures against malicious traffic
1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
H04W 12/0013
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
001Protecting confidentiality, e.g. by encryption or ciphering
0013of user plane, e.g. user traffic
H04W 12/0401
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0401Key generation or derivation
H04W 12/04071
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0407without using a trusted network node as anchor
04071Key exchange, e.g. between nodes
H04W 12/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
06Authentication
Applicants
  • QUALCOMM INCORPORATED [US]/[US]
Inventors
  • JANA, Sourabh
  • KHARVAR, Chirag Manojkumar
  • SHEKHAR, Ravi
  • BAMIDI, Ravi Kiran
Agents
  • CHEATHAM, Kevin T.
Priority Data
16/203,57228.11.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) DETECTION OF SECURITY THREATS IN A MESH NETWORK
(FR) DÉTECTION DE MENACES DE SÉCURITÉ DANS UN RÉSEAU MAILLÉ
Abstract
(EN)
Disclosed are techniques for detecting a security threat in a wireless mesh network. In an aspect, a monitoring device in the wireless mesh network detects a first message transmitted by a source node in the wireless mesh network to a destination node in the wireless mesh network via at least one relay node in the wireless mesh network, collects information from the first message as it is transmitted in the wireless mesh network, determines that the first message has been corrupted based on analysis of the information from the first message, and detects the security threat in the wireless mesh network based on the first message being corrupted.
(FR)
L'invention concerne des techniques de détection d'une menace de sécurité dans un réseau maillé sans fil. Selon un aspect, un dispositif de surveillance dans le réseau maillé sans fil détecte un premier message transmis par un nœud source dans le réseau maillé sans fil à un nœud de destination dans le réseau maillé sans fil par l'intermédiaire d'au moins un nœud relais dans le réseau maillé sans fil, collecte des informations issues du premier message à mesure qu'il est transmis dans le réseau maillé sans fil, détermine que le premier message a été corrompu sur la base d'une analyse des informations issues du premier message, et détecte la menace de sécurité dans le réseau maillé sans fil sur la base du fait que le premier message est corrompu.
Also published as
Latest bibliographic data on file with the International Bureau