Abstract
Disruption-tolerant networks are prone to flood attacks in which an attacker floods the network by forwarding as many packets into the network or forwarding replica of packets into network for selfish or malicious purpose. Also selfish or malicious nodes may drop received packets intentionally even when their buffer is not full. Such routing misbehavior reduces the packet delivery ratio and wastes system resources. The proposed approach provides measures to detect flood attack using a method called claim construction. For detecting routing misbehavior, it is required that a node keeps a few signed contact logs of its previous contacts. This signed contact log consists of information of number of packets in node’s buffer before this contact. Based on this contact log, the next contacted node can detect whether this node has dropped any packet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Fall, A delay tolerant network architecture for challenged internets, in Proceedings of SIGCOMM (2003), pp. 27–34
Q. Li, G. Cao, Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans. Inf. Forensics Secur. 7(2), 664–675 (2012)
H. Zhu, X. Lin, R. Lu, X.S. Shen, D. Xing, Z. Cao, An opportunistic batch bundle authentication scheme for energy constrained DTNs, in Proceedings of IEEE INFOCOM (2010)
S. Marti et.al., Mitigating routing misbehavior in mobile adhoc networks, in Mobicom (2000)
K. Liu, J. Deng, P.K. Varshney, K. Balakrishnan, An acknowledgment based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput. 6(5), 536–550 (2007)
Q. Li, W. Gao, S. Zhu, G. Cao, To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secure Comput. 10(3), 168–182 (2013)
B. Raghavan, K. Vishwanath, S. Ramabhadran, K. Yocum, A. Snoeren, Cloud control with distributed rate limiting, in Proceedings of ACM SIGCOMM (2007)
A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc networks, Technical Report CS-200006 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Karunya Priyadarshini, J., Jayarin, P.J., Visumathi, J. (2015). Countering Flood Attacks and Routing Misbehavior in DTN. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_79
Download citation
DOI: https://doi.org/10.1007/978-81-322-2135-7_79
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2134-0
Online ISBN: 978-81-322-2135-7
eBook Packages: EngineeringEngineering (R0)