Identification of the Flood Attackers and effective delivery of Packets in Disruption Tolerant Networks

P. S. Nandhini*, P. Suresh**
* Department of Information Technology, Kongu Engineering College.
** Department of Information Technology, Kongu Engineering College.
Periodicity:November - January'2014
DOI : https://doi.org/10.26634/jcs.3.1.2632

Abstract

Disruption Tolerant Network (DTN) is a networking architecture that is designed to provide communications in the most unstable and stressed environment. DTN is normally be subjected to frequent disruptions. Due to restriction in network resources such as contact opportunity and buffer space, DTNs are exposed to flood attacks. Flooding is a denial of service attack that is designed to bring a network or service down by flooding it with large amount of traffic. In this paper, limiting the rate is used to be defined against flood attacks in DTNs, so that each node limits the number of packets that can be generated in each time interval and the number of replica that can be generated for each packet. It is a distributed scheme to detect the violation of rate limits. The detection scheme uses claim-carry-and-check mechanism. The structure of the claim adopts the pigeonhole principle to detect the attacker. The detection of the attacker and the efficiency of the proposed scheme are determined using the event driven simulations.

Keywords

DTN (Distribution Tolerant Networks), CMN (Connected Mobile Network) PHG (Private Key Generator), Security, Flood Attack, Detection

How to Cite this Article?

Nandhini, P. S., and Suresh, P. (2014). Identification of The Flood Attackers and effective Delivery of Packets in Disruption Tolerant Networks. i-manager’s Journal on Communication Engineering and Systems, 3(1), 9-15. https://doi.org/10.26634/jcs.3.1.2632

References

[1]. Amin Vahdat and David Becker, "Epidemic Routing for Partially Connected AdHoc Networks?, Technical Report on CS-200006, Duke University, 2000.
[2]. Bryan Parno, Adrian Perrig, and Virgil Gligor (2005). “Distributed Detection of Node Replication Attacks in Sensor Networks? IEEE Symposium on Security and Privacy.
[3]. Feng Li, Avinash Srinivasan, and Jie Wu (2009). “Thwarting Blackhole Attacks in Distruption-Tolerant Networks Using Encounter Tickets,? Proceedings of IEEE INFOCOM.
[4]. Jelena Mirkovic, Seven Dietrich, David Dittrich and Peter Reiher (2005). Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall.
[5]. Qinghua Li and Guohong Cao (2012). “Mitigating Routing Misbehavior in Disruption Tolerant Networks”, IEEE Transaction on Information Forensics and Security, Vol. 7, No. 2, pp. 664-675, 2012.
[6]. Qinghua Li and Guohong Cao (2012). “Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing”, IEEE International Conference on Network Protocols.
[7]. Qinghua Li, Wei Gao, Sencun Zhu and Guohong Cao (2011). A Routing Protocol for Socially Selfish Delay Tolerant Networks, Ad Hoc Networks, Vol. 10, No. 8, 2011.
[8]. Qinghua Li, Sencun Zhu and Guohong Cao (2010).Routing in Socially Selfish Delay Tolerant Networks, Proceedings of IEEE INFOCOM.
[9]. Vivek Natarajan, Yi Yang and Sencun Zhu (2011). Resource-Misuse Attack Detection in Delay-Tolerant Networks, International Performance of Computing and Communication Conference (IPCCC).
[10]. Yanzhi Ren, Mooi Choo Chuah, Jie Yang and Yingying Chen (2010). Detecting Wormhole Attacks in
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.