US 11,800,360 B2
Cooperative security in wireless sensor networks
Robert Lawson Vaughn, Portland, OR (US); Osvaldo Diaz, Portland, OR (US); Siu Kit Wai, Lam Tin (HK); and Igor Tatourian, Fountain Hills, AZ (US)
Assigned to Intel Corporation, Santa Clara, CA (US)
Filed by Intel Corporation, Santa Clara, CA (US)
Filed on Mar. 22, 2021, as Appl. No. 17/208,257.
Application 17/208,257 is a continuation of application No. 16/418,761, filed on May 21, 2019, granted, now 10,986,503.
Application 16/418,761 is a continuation of application No. 15/470,414, filed on Mar. 27, 2017, granted, now 10,334,442.
Application 15/470,414 is a continuation of application No. 14/577,764, filed on Dec. 19, 2014, granted, now 9,609,517.
Prior Publication US 2021/0385657 A1, Dec. 9, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/12 (2021.01); H04W 4/38 (2018.01); H04L 9/40 (2022.01); H04W 24/04 (2009.01); H04W 24/02 (2009.01); H04W 84/20 (2009.01)
CPC H04W 12/12 (2013.01) [H04L 63/104 (2013.01); H04L 63/14 (2013.01); H04W 4/38 (2018.02); H04W 24/04 (2013.01); H04W 24/02 (2013.01); H04W 84/20 (2013.01)] 30 Claims
OG exemplary drawing
 
1. At least one non-transitory machine-readable storage device comprising instructions, wherein the instructions, when executed by a processing circuitry of a computing device operable as a primary node in a communication network, cause the processing circuitry to perform operations that:
identify configurations associated with a plurality of network devices arranged as secondary nodes within a cluster in the communication network, wherein the primary node and the secondary nodes are arranged to form the cluster based on physical proximity;
populate the configurations to the secondary nodes using at least one device-to-device communication link within the cluster;
monitor behavior of the secondary nodes within the cluster using the at least one device-to-device communication link;
detect a compromised node of the secondary nodes based on monitoring the behavior and detecting a deviation in at least one of the configurations; and
initiate a mitigation action within the cluster based on detecting the deviation in the at least one of the configurations of the compromised node.