Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 6)Publication Date: 2014-06-30
Authors : J.Iswariya;
Page : 40-45
Keywords : Disruption-Tolerant Networks (DTNs); Flooding attack; Hash based Message Authentication Code algorithm (HMAC); Rate limit certificate.;
Abstract
Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified
Other Latest Articles
- Electing the Query Directory Using PSO in DCIM
- Electing the Query Directory Using PSO in DCIM
- Palm Biometrics: Testimony of Security
- Numerically Analysis of Corrosion Resistance and Control Plate
- Optimization of Functional Food Ingredients and Their Processing Levels for Preparation of Vermicelli Using RSM
Last modified: 2014-06-19 16:42:18