Handling Big Data Protection and Detection of Flood Attacks in Disruption Tolerant Networks

Download Now
Provided by: International Journal of Computer & Organization Trends(IJCOT)
Topic: Security
Format: PDF
Disruption Tolerant Networks (DTNs) use the mobile nodes and opportunistic contacts among nodes for data communication. There is a limitation in bandwidth and buffer space, DTNs is vulnerable to flood attacks. Attackers send many packets or replicas to the network, to reduce the limited network resource. So rate limit is used to secure against flood attacks in DTNs, such that each node in a network has a limit over the number of packets that it can generate in each time interval and limit over the number of replicas that it can generate for each packet.
Download Now

Find By Topic