Advertisement

Mitigating Denial of Service Attacks in Delay-and Disruption-Tolerant Networks

  • Godwin Ansa
  • Enyenihi Johnson
  • Haitham Cruickshank
  • Zhili Sun
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 43)

Abstract

There is a growing interest in providing communications to “Challenged” environments which have been hitherto isolated and disconnected due to the lack of communications infrastructure. These are regions which lie at the edge of the current Internet. Confidentiality, integrity and availability are the three major security requirements of any secured system or network. This paper presents our work on Denial of Service mitigation in Delay-and Disruption-Tolerant Networks. We propose three examples of a light-weight bundle authenticator (DTN-cookie) based on XOR and HMAC operations to thwart DoS attacks that lead to resource exhaustion.

Keywords

DTN Denial of Service Protocol Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Warthman, F.: Delay Tolerant Networks (DTNs): A tutorial.v1.1 (2003)Google Scholar
  2. 2.
    Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets. In: ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34 (2003)Google Scholar
  3. 3.
    Wood, L., Eddy, W., Holliday, P.: A Bundle of Problems. In: IEEE Aerospace Conference, Big Sky Montana (2009)Google Scholar
  4. 4.
    Farrell, S., Cahill, V., Geraghty, D., Humphreys, I., MacDonald, P.: When TCP Breaks: Delay-and Disruption-Tolerant Networking. IEEE Internet Computing 10(4), 72–78 (2006)CrossRefGoogle Scholar
  5. 5.
    Fall, K.: A Message-Switched Architecture for Challenged Internets. Intel Research Berkeley. IRB-TR-02-010 (2002)Google Scholar
  6. 6.
    Cerf, V., et al.: Delay-Tolerant Networking Architecture. RFC 4838, Network Working Group (2007)Google Scholar
  7. 7.
    Cerf, V.G.: An Interplanetary Internet. Space Operations Communicator 5(4) (2008)Google Scholar
  8. 8.
    Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Satellite and Sensor Networks. In: IWSSC 2009, Siena Italy (2009)Google Scholar
  9. 9.
    Meadows, C.: A Formal Framework and Evaluation Method for Network Denial of Service. In: Proc. IEEE Computer Security Foundations Workshop (1999)Google Scholar
  10. 10.
    Farrell, S., et al.: Delay Tolerant Networking Security Overview. DTN Research Group, Internet Draft (draft-irtf-dtnrg-sec-overview-06) (2009)Google Scholar
  11. 11.
    Franck, L.: Delay Tolerant Networking with Satellites: Overview and Research Directions. In: COST272 - 7th MCM, Telecom Paris (2004)Google Scholar
  12. 12.
    Onen, M., Molva, R.: Denial of Service Prevention in Satellite Networks. In: IEEE International Conference on Communications, vol. 7, pp. 4387–4391 (2004)Google Scholar
  13. 13.
    Dwork, C., Naor, M.: Pricing via Processing or Combating Junk Mails. Springer, Heidelberg (1998)zbMATHGoogle Scholar
  14. 14.
    Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: Proc. Network and Distributed Systems Security Symposium, pp. 151–165 (1999)Google Scholar
  15. 15.
    Aura, T., Nikander, P., Leiwo, J.: DoS-resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 178–181. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  16. 16.
    Feng, Q., Lutz, R.: Assessing the Effect of Software Failures on Trust Assumptions. In: 19th Int’l Symposium on Software Reliability Engineering, pp. 291–292 (2008)Google Scholar
  17. 17.
    Arkinson, R.: Security Architecture for the Internet Protocol. RFC 1825 (1995)Google Scholar
  18. 18.
    Gong, L., Syverson, P.: Fail-stop Protocols: An Approach to Designing Secure Protocols. In: Proc. of IFIP DCCA-5, Illinois (1995)Google Scholar
  19. 19.
    Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • Godwin Ansa
    • 1
  • Enyenihi Johnson
    • 1
  • Haitham Cruickshank
    • 1
  • Zhili Sun
    • 1
  1. 1.Centre for Communications Systems ResearchUniversity of SurreyGuildfordUK

Personalised recommendations