Abstract
A delay-tolerant network is a network which is designed to operate efficiently over extreme distances such as those in space communications. In these environments, latency is the major factor affecting the quality of the network. Delay-tolerant network is the network in which neither the nodes in the network are constantly connected to each other nor any specialized network infrastructure is available for managing the network. Due to this DTNs are already facing some major challenges like communication delay, data dissemination, and routing but another major challenge is to protect the network nodes from the attackers. Existing mechanisms provide security to a good extent but they are using a complex hashing algorithm which takes a significant amount of time ultimately affecting the limited bandwidth and limited battery life of mobile nodes. In this paper, we have presented the survey of three techniques used for preventing flooding attacks along with its advantages and disadvantages.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)
Li, Q., Gao, W., Zhu, S., Cao, G.: To lie or to comply: Defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secur. Comput. 10(3), 168–182 (2013). https://doi.org/10.1109/TDSC.2012.84
Burgess, J., Bissias, G.D., Corner, M.D., Levine, B.N.: Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 61–70. ACM (2007)
Natarajan, V., Yang, Y., Zhu, S.: Resource-misuse attack detection in delay-tolerant networks. In: 2011 IEEE 30th International Conference Performance Computing and Communications Conference (IPCCC), pp. 1–8. IEEE (2011)
Ramaraj, K., Vellingiri, J., Saravanabhavan, C., Illayarajaa, A.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)
Sailaja, N., Farook, S.M.: Claim-carry-check to defend against flood attacks in disruption tolerant network. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications IJSETR, pp. 118–125. IEEE (2013)
Diep, P.T.N., Yeo, C.K.: Detecting flooding attack in delay tolerant networks by piggybacking encounter records. In: 2015 2nd International Conference on Information Science and Security (ICISS), pp. 1–4. IEEE (2015)
Kuriakose, D., Daniel, D.: Effective defending against flood attack using stream-check method in tolerant network. In: 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), pp. 1–4. IEEE (2014)
Li, Q., Zhu, S., Cao, G.: Routing in socially selfish delay tolerant networks. In: IEEE 2010 Proceedings INFOCOM, pp. 1–9. IEEE (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shah, M., Khanpara, P. (2019). Survey of Techniques Used for Tolerance of Flooding Attacks in DTN. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-13-1742-2_60
Download citation
DOI: https://doi.org/10.1007/978-981-13-1742-2_60
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1741-5
Online ISBN: 978-981-13-1742-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)