Countering Flood Attacks and Routing Misbehavior in DTN

  • J. Karunya Priyadarshini
  • P. Jesu Jayarin
  • J. Visumathi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)

Abstract

Disruption-tolerant networks are prone to flood attacks in which an attacker floods the network by forwarding as many packets into the network or forwarding replica of packets into network for selfish or malicious purpose. Also selfish or malicious nodes may drop received packets intentionally even when their buffer is not full. Such routing misbehavior reduces the packet delivery ratio and wastes system resources. The proposed approach provides measures to detect flood attack using a method called claim construction. For detecting routing misbehavior, it is required that a node keeps a few signed contact logs of its previous contacts. This signed contact log consists of information of number of packets in node’s buffer before this contact. Based on this contact log, the next contacted node can detect whether this node has dropped any packet.

Keywords

DTN Flood attacks Packet dropping Routing Selfish nodes 

References

  1. 1.
    K. Fall, A delay tolerant network architecture for challenged internets, in Proceedings of SIGCOMM (2003), pp. 27–34Google Scholar
  2. 2.
    Q. Li, G. Cao, Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans. Inf. Forensics Secur. 7(2), 664–675 (2012)Google Scholar
  3. 3.
    H. Zhu, X. Lin, R. Lu, X.S. Shen, D. Xing, Z. Cao, An opportunistic batch bundle authentication scheme for energy constrained DTNs, in Proceedings of IEEE INFOCOM (2010)Google Scholar
  4. 4.
    S. Marti et.al., Mitigating routing misbehavior in mobile adhoc networks, in Mobicom (2000)Google Scholar
  5. 5.
    K. Liu, J. Deng, P.K. Varshney, K. Balakrishnan, An acknowledgment based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput. 6(5), 536–550 (2007)CrossRefGoogle Scholar
  6. 6.
    Q. Li, W. Gao, S. Zhu, G. Cao, To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secure Comput. 10(3), 168–182 (2013)Google Scholar
  7. 7.
    B. Raghavan, K. Vishwanath, S. Ramabhadran, K. Yocum, A. Snoeren, Cloud control with distributed rate limiting, in Proceedings of ACM SIGCOMM (2007)Google Scholar
  8. 8.
    A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc networks, Technical Report CS-200006 (2000)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • J. Karunya Priyadarshini
    • 1
  • P. Jesu Jayarin
    • 1
  • J. Visumathi
    • 1
  1. 1.CSE DepartmentJeppiaar Engineering CollegeChennaiIndia

Personalised recommendations