A Proactive DOS Filter Mechanism for Delay Tolerant Networks

  • Godwin Ansa
  • Haitham Cruickshank
  • Zhili Sun
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 71)


Denial of Service (DOS) attacks are a major threat faced by all types of networks. The effect of DOS in a delay tolerant network (DTN) is even more aggravated due to the scarcity of resources. Perpetrators of DOS attacks in DTN-like environments look beyond the objective of rendering a target node useless. The aim of an attacker is to cause a network-wide degradation of resources, service and performance. This can easily be achieved by exhausting node or link resources and partitioning the network. In this paper we seek to provide a proactive approach in making the DTN authentication process robust against DOS. Our aim is to make security protocols which provide mandatory DTN security services resilient to DOS attacks. The overall objective is to make it hard to launch a DOS attack and ensure the availability of DTN services. A DTN-cookie mechanism has been proposed to quickly identify and filter out illegitimate traffic.


Denial of service attacker delay tolerant network resource exhaustion DTN-cookie 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bindra, H., Sangal, A.: Considerations and Open Issues in Delay Tolerant Network’s (DTNs) Security. Wireless Sensor Network Scientific Research Journal, 635–648 (2010)Google Scholar
  2. 2.
    Raymond, D.R., Midkiff, S.F.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defences. IEEE Pervasive Computing 7(1), 74–81 (2008)CrossRefGoogle Scholar
  3. 3.
    Loukas, G., Öke, G.: Protection Against Denial of Service Attacks - A Survey. The Computer Journal 53, 1020–1037 (2010)CrossRefGoogle Scholar
  4. 4.
    Ansa, G., Johnson, E., Cruickshank, H., Sun, Z.: Mitigating Denial of Service Attacks in Delay-and Disruption-Tolerant Networks. In: Sithamparanathan, K., Marchese, M., Ruggieri, M., Bisio, I. (eds.) Psats 2010. LNICST, vol. 43, pp. 221–234. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  5. 5.
    Dwork, C., Naor, M.: Pricing via Processing or Combating Junk Mails. Springer, Heidelberg (1998)zbMATHGoogle Scholar
  6. 6.
    Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: Proc. Network and Distributed Systems Security Symposium, pp. 151–165 (1999)Google Scholar
  7. 7.
    Maughan, G., Schertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP), RFC 2408 (1998)Google Scholar
  8. 8.
    Meadows, C.: A Formal Framework and Evaluation Method for Network Denial of Service. In: Proc. IEEE Computer Security Foundations Workshop (1999)Google Scholar
  9. 9.
    Leiwo, J., Aura, T., Nikander, P.: Towards Network Denial of Service Resistant Protocols. In: Proc. IFIP TC11 Conference Proceedings, vol. 175, pp. 301–310 (2000)Google Scholar
  10. 10.
    Farrell, S., Ramadas, M., Burleigh, S.: RFC5327: Licklider Transmission Protocol – Security Extensions Network Working Group (2008)Google Scholar
  11. 11.
    Symington, S., Farrell, S., Weiss, H., Lovell, P.: Bundle Security Protocol Specification, Draft-irtf-dtnrg-bundle-security-17 (2010)Google Scholar
  12. 12.
    Ivancic, W.D.: Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks. In: IEEE Aerospace Conference, Big Sky Montana (2010)Google Scholar
  13. 13.
    Gong, L., Syverson, P.: Fail-stop Protocols: An Approach to Designing Secure Protocols. In: Proc. of IFIP DCCA-5, Illinois (1995)Google Scholar
  14. 14.
    Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. In: Crypto 1996, pp. 1–15 (1996)Google Scholar
  15. 15.
    Sterbenz, J. P.G., et al.: Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions. In: Proceedings of the 1st ACM Workshop on Wireless Security WISE 2002 (2002)Google Scholar
  16. 16.
    Yang, H., Luo, H., Ye, F., Zhang, L.: Security in Mobile Ad hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1), 38–47 (2004)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2011

Authors and Affiliations

  • Godwin Ansa
    • 1
  • Haitham Cruickshank
    • 1
  • Zhili Sun
    • 1
  1. 1.Centre for Communications Systems ResearchUniversity of SurreyEngland

Personalised recommendations