US 12,267,682 B2
Malicious black hole node detection and circumvention
Lele Zhang, Shanghai (CN); Yajun Xia, Shanghai (CN); Chuanwei Li, Shanghai (CN); and Li Zhao, Shanghai (CN)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Jul. 17, 2023, as Appl. No. 18/353,772.
Application 18/353,772 is a continuation of application No. 17/011,792, filed on Sep. 3, 2020, granted, now 11,706,625.
Prior Publication US 2023/0362654 A1, Nov. 9, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/122 (2021.01); G16Y 30/10 (2020.01); H04L 9/40 (2022.01); H04L 43/0829 (2022.01); H04L 43/16 (2022.01); H04W 4/70 (2018.01); H04W 24/08 (2009.01); H04W 64/00 (2009.01); H04W 84/18 (2009.01)
CPC H04W 12/122 (2021.01) [G16Y 30/10 (2020.01); H04L 43/0829 (2013.01); H04L 43/16 (2013.01); H04L 63/1416 (2013.01); H04W 4/70 (2018.02); H04W 24/08 (2013.01); H04W 64/00 (2013.01); H04L 2463/143 (2013.01); H04W 84/18 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A device comprising:
one or more processors; and
one or more non-transitory computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network;
based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node;
based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node;
receiving second location information indicating a second location of a second node;
determining a distance threshold based at least in part on a second distance determined using the second location information;
based at least in part on a first distance to the device calculated based on coordinate information provided by the first node being larger than the distance threshold, identifying that the first node is a malicious node; and
ending communications with the first node.