Skip to main content

Survey of Techniques Used for Tolerance of Flooding Attacks in DTN

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 106))

Abstract

A delay-tolerant network is a network which is designed to operate efficiently over extreme distances such as those in space communications. In these environments, latency is the major factor affecting the quality of the network. Delay-tolerant network is the network in which neither the nodes in the network are constantly connected to each other nor any specialized network infrastructure is available for managing the network. Due to this DTNs are already facing some major challenges like communication delay, data dissemination, and routing but another major challenge is to protect the network nodes from the attackers. Existing mechanisms provide security to a good extent but they are using a complex hashing algorithm which takes a significant amount of time ultimately affecting the limited bandwidth and limited battery life of mobile nodes. In this paper, we have presented the survey of three techniques used for preventing flooding attacks along with its advantages and disadvantages.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)

    Google Scholar 

  2. Li, Q., Gao, W., Zhu, S., Cao, G.: To lie or to comply: Defending against flood attacks in disruption tolerant networks. IEEE Trans. Dependable Secur. Comput. 10(3), 168–182 (2013). https://doi.org/10.1109/TDSC.2012.84

  3. Burgess, J., Bissias, G.D., Corner, M.D., Levine, B.N.: Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 61–70. ACM (2007)

    Google Scholar 

  4. Natarajan, V., Yang, Y., Zhu, S.: Resource-misuse attack detection in delay-tolerant networks. In: 2011 IEEE 30th International Conference Performance Computing and Communications Conference (IPCCC), pp. 1–8. IEEE (2011)

    Google Scholar 

  5. Ramaraj, K., Vellingiri, J., Saravanabhavan, C., Illayarajaa, A.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)

    Google Scholar 

  6. Sailaja, N., Farook, S.M.: Claim-carry-check to defend against flood attacks in disruption tolerant network. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications IJSETR, pp. 118–125. IEEE (2013)

    Google Scholar 

  7. Diep, P.T.N., Yeo, C.K.: Detecting flooding attack in delay tolerant networks by piggybacking encounter records. In: 2015 2nd International Conference on Information Science and Security (ICISS), pp. 1–4. IEEE (2015)

    Google Scholar 

  8. Kuriakose, D., Daniel, D.: Effective defending against flood attack using stream-check method in tolerant network. In: 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), pp. 1–4. IEEE (2014)

    Google Scholar 

  9. Li, Q., Zhu, S., Cao, G.: Routing in socially selfish delay tolerant networks. In: IEEE 2010 Proceedings INFOCOM, pp. 1–9. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pimal Khanpara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shah, M., Khanpara, P. (2019). Survey of Techniques Used for Tolerance of Flooding Attacks in DTN. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-13-1742-2_60

Download citation

Publish with us

Policies and ethics