Pseudorandom communications routing
10091092 ยท 2018-10-02
Assignee
Inventors
Cpc classification
G10L15/02
PHYSICS
H04L2209/12
ELECTRICITY
G06F21/79
PHYSICS
G06F21/32
PHYSICS
H04L9/002
ELECTRICITY
International classification
Abstract
This invention provides systems and methods to make communication networks more resilient, stealthier and robust. This invention discloses systems and methods wherein either a communications user equipment (UE) with multiple types of wireless links, potentially operating in different frequency bands, or an apparatus which performs communications routing functions, changes the communications routing in pseudo-random manner.
Claims
1. A networked communications apparatus, comprising: a user terminal; at least two radios, each in cooperation with said user terminal; and a non-transitory storage medium having instructions stored thereon which, when said instructions are executed by said user terminal cause said user terminal to generate pseudo-random numbers as a function of a specified clock rate; create network routing tables containing randomized network routes to network destinations as a function of each said pseudo-random number as it is generated; and cause said at least two said radios to establish networked communications according to said network routing table; initialize a pseudo-random number generator; wait for a trigger to generate a pseudo-random number; wait to detect whether a packet or frame has been received; determine whether the packet or frame has been received; transmit said packet or frame when received; determine whether the trigger has occurred; generate a pseudo-random number when said trigger has occurred; map said pseudo-random number to said network routing tables; and establish said mapped network routing table as a currently active network routing table.
2. A security method for application to a networked communications apparatus, comprising: providing a user terminal and at least two radios in cooperation with said user terminal; generating pseudo-random numbers as a function of a specified clock rate; creating network routing tables containing randomized network routes to network destinations as a function of each said pseudo-random number as it is generated; and causing said at least two said radios to establish networked communications according to said network routing table; initializing a random number generator; waiting for a trigger to generate a random number; waiting to detect whether a packet or frame has been received; determining whether the packet or frame has been received; transmitting said packet or frame when received; determining whether the trigger has occurred; generating a random number when said trigger has occurred; mapping said random number to said network routing tables; and establishing said mapped network routing table as a currently active network routing table.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
(6) Referring to
(7) Referring to
(8) Another embodiment of the invention contemplates performing a mapping which maps a number generated by a PRNG to an available route which could be used to transmit the packet. Unique to this particular embodiment, the entries in the routing table would be updated only if the route to be used to transmit the next packet is different than the previous route used to transmit the packet.
(9) Referring to
(10) A simplified representation of the pseudo-random generator based route mapping process performed by the present invention is shown in
(11) Still referring to
(12) Similarly, in OSI layer 2, the forwarding decisions are done by checking the packet against a set of forwarding table entries which form a forwarding table. A forwarding table is comprised of forwarding table entries and these encode the rules to decide where a received packet will be forwarded.
(13) In a network where multiple paths are available to reach a destination, the routing table or the forwarding table determines which path a particular packet or frame would take. A different routing/forwarding table with different routing/forwarding table entries would result in a packet/frame taking a different path to reach its destination.
(14) In OSI layer 3 router, the routing decisions are done by checking the packet against a set of routing table entries which form a routing table. A routing table is comprised of routing table entries and these encode the rules to decide where a received packet will be routed. In order for a packet/frame to take a different path to reach its destination, a different routing/forwarding table with different routing/forwarding table entries would need to be built. The present invention addresses this need in a randomized manner.
(15) Still referring to
DETAILED DESCRIPTION OF AN ALTERNATE EMBODIMENT
(16) Referring to
(17) Referring to
(18) Having described preferred embodiments of the invention with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope or spirit of the invention as defined in the appended claims.
ADVANTAGES AND NEW FEATURES
(19) In the current state-of-the-art the routing table in a user equipment (UE) or in a router is pre-configured and it does not change for the duration of the operations. Also, in the emerging software defined networking technology some mechanisms are provided to update and change the routing tables. However, the routing tables are changed only when external environmental changes, the mission requirements change or the policy governing the network operation changes.
(20) In contrast, it is disclosed in the present invention that the routing tables be updated regularly during the normal course of operation based on a PRNG. This mode of operation makes it difficult for adversaries to discover or disrupt communications. There would be less opportunities for an adversary to make sense of communications by listening on one type of radio. Even in the case if one particular radio interface is compromised an adversary would not have complete picture as the data flow would be distributed over all the available links. The transmission of data over all the available links would also increase robustness as communication issues on any one of the available links would not affect all the traffic flowing through the node.