Deducing Malicious Attacks in Disruption Tolerant Networks

نویسنده

  • S.Baby Lavanya
چکیده

The intermittent connectivity between nodes to transfer data is exploited using Disruption tolerant networks (DTNs).DTNs are susceptible to flood attacks which limits the network resources. A technique to detect a node has violated its rate limits. Although it is easy to detect the violation of rate limit on the internet and in telecommunication networks where the egress router and base station can account each user’s traffic , it is challenging in DTNs due to lack of communication infrastructure and consistent connectivity. A node moves around and may send data to any contacted node; it is very difficult to count the number of packets or replicas sent out by this node. If an attacker floods more packets or replicas than its limit it has to use the same count in more than one claim according to pigeonhole principle , and this inconsistency may lead to detection .The more traffic an attacker floods , the more likely it will be detected. The detection probability can be flexibly adjusted by system parameters that control the amount of claims exchanged in a contact .To overcomes the probability detection; we introduce the new concept of self –adaptive approach, where the link capacity of each packet is calculated using previous history values and then packets

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks

Denial of Service (DoS) attack is one of the major problem in today's Internet. It constitutes the hardest security problems nowadays. Particularly Distributed Denial of Service (DDoS) attack have severe impact. The main aim of a DoS is the disruption of services by attempting to control access to a system or service instead of overthrowing the service itself. Disruption-Tolerant Networks (DTNs...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets

Nodes in disruption-tolerant networks (DTNs) usually exhibit repetitive motions. Several recently proposed DTN routing algorithms have utilized the DTNs’ cyclic properties for predicting future forwarding. The prediction is based on metrics abstracted from nodes’ contact history. However, the robustness of the encounter prediction becomes vital for DTN routing since malicious nodes can provide ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016