Preserving Flood Attack on Delay Tolerant Network

Provided by: International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Topic: Security
Format: PDF
Disruption Tolerant Networks (DTN) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In this paper, the authors employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit over the number of packets that it can generate in each time interval and a limit over the number of replicas that it can generate for each packet.

Find By Topic