Skip to main content

2015 | OriginalPaper | Buchkapitel

Countering Flood Attacks and Routing Misbehavior in DTN

verfasst von : J. Karunya Priyadarshini, P. Jesu Jayarin, J. Visumathi

Erschienen in: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Disruption-tolerant networks are prone to flood attacks in which an attacker floods the network by forwarding as many packets into the network or forwarding replica of packets into network for selfish or malicious purpose. Also selfish or malicious nodes may drop received packets intentionally even when their buffer is not full. Such routing misbehavior reduces the packet delivery ratio and wastes system resources. The proposed approach provides measures to detect flood attack using a method called claim construction. For detecting routing misbehavior, it is required that a node keeps a few signed contact logs of its previous contacts. This signed contact log consists of information of number of packets in node’s buffer before this contact. Based on this contact log, the next contacted node can detect whether this node has dropped any packet.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat K. Fall, A delay tolerant network architecture for challenged internets, in Proceedings of SIGCOMM (2003), pp. 27–34 K. Fall, A delay tolerant network architecture for challenged internets, in Proceedings of SIGCOMM (2003), pp. 27–34
2.
Zurück zum Zitat Q. Li, G. Cao, Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans. Inf. Forensics Secur. 7(2), 664–675 (2012) Q. Li, G. Cao, Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans. Inf. Forensics Secur. 7(2), 664–675 (2012)
3.
Zurück zum Zitat H. Zhu, X. Lin, R. Lu, X.S. Shen, D. Xing, Z. Cao, An opportunistic batch bundle authentication scheme for energy constrained DTNs, in Proceedings of IEEE INFOCOM (2010) H. Zhu, X. Lin, R. Lu, X.S. Shen, D. Xing, Z. Cao, An opportunistic batch bundle authentication scheme for energy constrained DTNs, in Proceedings of IEEE INFOCOM (2010)
4.
Zurück zum Zitat S. Marti et.al., Mitigating routing misbehavior in mobile adhoc networks, in Mobicom (2000) S. Marti et.al., Mitigating routing misbehavior in mobile adhoc networks, in Mobicom (2000)
5.
Zurück zum Zitat K. Liu, J. Deng, P.K. Varshney, K. Balakrishnan, An acknowledgment based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput. 6(5), 536–550 (2007)CrossRef K. Liu, J. Deng, P.K. Varshney, K. Balakrishnan, An acknowledgment based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput. 6(5), 536–550 (2007)CrossRef
6.
Zurück zum Zitat Q. Li, W. Gao, S. Zhu, G. Cao, To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secure Comput. 10(3), 168–182 (2013) Q. Li, W. Gao, S. Zhu, G. Cao, To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secure Comput. 10(3), 168–182 (2013)
7.
Zurück zum Zitat B. Raghavan, K. Vishwanath, S. Ramabhadran, K. Yocum, A. Snoeren, Cloud control with distributed rate limiting, in Proceedings of ACM SIGCOMM (2007) B. Raghavan, K. Vishwanath, S. Ramabhadran, K. Yocum, A. Snoeren, Cloud control with distributed rate limiting, in Proceedings of ACM SIGCOMM (2007)
8.
Zurück zum Zitat A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc networks, Technical Report CS-200006 (2000) A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc networks, Technical Report CS-200006 (2000)
Metadaten
Titel
Countering Flood Attacks and Routing Misbehavior in DTN
verfasst von
J. Karunya Priyadarshini
P. Jesu Jayarin
J. Visumathi
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2135-7_79

Premium Partner