Advertisement

Survey of Techniques Used for Tolerance of Flooding Attacks in DTN

  • Maitri Shah
  • Pimal KhanparaEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 106)

Abstract

A delay-tolerant network is a network which is designed to operate efficiently over extreme distances such as those in space communications. In these environments, latency is the major factor affecting the quality of the network. Delay-tolerant network is the network in which neither the nodes in the network are constantly connected to each other nor any specialized network infrastructure is available for managing the network. Due to this DTNs are already facing some major challenges like communication delay, data dissemination, and routing but another major challenge is to protect the network nodes from the attackers. Existing mechanisms provide security to a good extent but they are using a complex hashing algorithm which takes a significant amount of time ultimately affecting the limited bandwidth and limited battery life of mobile nodes. In this paper, we have presented the survey of three techniques used for preventing flooding attacks along with its advantages and disadvantages.

Keywords

Delay-tolerant networks Flooding attacks Security 

References

  1. 1.
    Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)Google Scholar
  2. 2.
    Li, Q., Gao, W., Zhu, S., Cao, G.: To lie or to comply: Defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secur. Comput. 10(3), 168–182 (2013).  https://doi.org/10.1109/TDSC.2012.84
  3. 3.
    Burgess, J., Bissias, G.D., Corner, M.D., Levine, B.N.: Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 61–70. ACM (2007)Google Scholar
  4. 4.
    Natarajan, V., Yang, Y., Zhu, S.: Resource-misuse attack detection in delay-tolerant networks. In: 2011 IEEE 30th International Conference Performance Computing and Communications Conference (IPCCC), pp. 1–8. IEEE (2011)Google Scholar
  5. 5.
    Ramaraj, K., Vellingiri, J., Saravanabhavan, C., Illayarajaa, A.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)Google Scholar
  6. 6.
    Sailaja, N., Farook, S.M.: Claim-carry-check to defend against flood attacks in disruption tolerant network. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications IJSETR, pp. 118–125. IEEE (2013)Google Scholar
  7. 7.
    Diep, P.T.N., Yeo, C.K.: Detecting flooding attack in delay tolerant networks by piggybacking encounter records. In: 2015 2nd International Conference on Information Science and Security (ICISS), pp. 1–4. IEEE (2015)Google Scholar
  8. 8.
    Kuriakose, D., Daniel, D.: Effective defending against flood attack using stream-check method in tolerant network. In: 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), pp. 1–4. IEEE (2014)Google Scholar
  9. 9.
    Li, Q., Zhu, S., Cao, G.: Routing in socially selfish delay tolerant networks. In: IEEE 2010 Proceedings INFOCOM, pp. 1–9. IEEE (2010)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Institute of TechnologyNirma UniversityAhmedabadIndia

Personalised recommendations