Skip to main content

Countering Flood Attacks and Routing Misbehavior in DTN

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 325))

Abstract

Disruption-tolerant networks are prone to flood attacks in which an attacker floods the network by forwarding as many packets into the network or forwarding replica of packets into network for selfish or malicious purpose. Also selfish or malicious nodes may drop received packets intentionally even when their buffer is not full. Such routing misbehavior reduces the packet delivery ratio and wastes system resources. The proposed approach provides measures to detect flood attack using a method called claim construction. For detecting routing misbehavior, it is required that a node keeps a few signed contact logs of its previous contacts. This signed contact log consists of information of number of packets in node’s buffer before this contact. Based on this contact log, the next contacted node can detect whether this node has dropped any packet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Fall, A delay tolerant network architecture for challenged internets, in Proceedings of SIGCOMM (2003), pp. 27–34

    Google Scholar 

  2. Q. Li, G. Cao, Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans. Inf. Forensics Secur. 7(2), 664–675 (2012)

    Google Scholar 

  3. H. Zhu, X. Lin, R. Lu, X.S. Shen, D. Xing, Z. Cao, An opportunistic batch bundle authentication scheme for energy constrained DTNs, in Proceedings of IEEE INFOCOM (2010)

    Google Scholar 

  4. S. Marti et.al., Mitigating routing misbehavior in mobile adhoc networks, in Mobicom (2000)

    Google Scholar 

  5. K. Liu, J. Deng, P.K. Varshney, K. Balakrishnan, An acknowledgment based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput. 6(5), 536–550 (2007)

    Article  Google Scholar 

  6. Q. Li, W. Gao, S. Zhu, G. Cao, To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secure Comput. 10(3), 168–182 (2013)

    Google Scholar 

  7. B. Raghavan, K. Vishwanath, S. Ramabhadran, K. Yocum, A. Snoeren, Cloud control with distributed rate limiting, in Proceedings of ACM SIGCOMM (2007)

    Google Scholar 

  8. A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc networks, Technical Report CS-200006 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Karunya Priyadarshini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Karunya Priyadarshini, J., Jayarin, P.J., Visumathi, J. (2015). Countering Flood Attacks and Routing Misbehavior in DTN. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_79

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2135-7_79

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2134-0

  • Online ISBN: 978-81-322-2135-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics