Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

Provided by: International Journal of Engineering Sciences & Research Technology (IJESRT)
Topic: Security
Format: PDF
Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure.

Find By Topic