ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Defending Against Attack in Heterogeneous Networks?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 3)

Publication Date:

Authors : ;

Page : 134-138

Keywords : DTN; security; flood attack; DDR; CCC; detection;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In Disruption Tolerant Network flood attack is occur when the packets or packet replicas are send continuously from source to destination. Flood attack normally cause packet loss and inconsistency in packets. In order to overcome flood attack rate limit has been set in each node so the nodes only accept the particular limit of data’s. Our detection adopts Claim-carryand check in which each node itself counts the number of packets or replicas that it has sent and claims the count to other nodes. When the node violates its rate limits, it will be detected and its data traffic will be filtered by the way the amount of traffic has to be reduce. The receiving nodes carry the claims when they move and cross-check if their carried claims are inconsistent when they contact. To avoid this data loss we propose a technique Distributed Dynamic Routing Algorithm. This algorithm provides the best path in a network to perform effective communication dynamically. The Distributed Dynamic Routing Algorithm chooses a best path to transmit data from source to destination through intermediate nodes randomly. Here the network posse’s parallel communication so the transmission time is very low. Since the protocol transmits data randomly data transmission is more secure. Since the data’s send dynamically the communication is efficient without any malicious activity.

Last modified: 2014-03-13 00:59:18