A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks

نویسنده

  • A. Viswanathan
چکیده

Denial of Service (DoS) attack is one of the major problem in today's Internet. It constitutes the hardest security problems nowadays. Particularly Distributed Denial of Service (DDoS) attack have severe impact. The main aim of a DoS is the disruption of services by attempting to control access to a system or service instead of overthrowing the service itself. Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Malicious nodes within a DTN may attempt to delay or destroy data in transit to its destination. Such attacks include dropping data, flooding the network with extra messages, corrupting routing tables, and counterfeiting network acknowledgments. Packet dropping in DTNs can be detected in a distributed way by observing signed contact records. To mitigate such routing misbehavior a scheme is proposed in which the number of packets forwarded to the misbehaving nodes is limited. When one or more nodes are malicious, they may prevent correct message routing. Alternate routing paths can be used to circumvent them. In this paper attacks aimed at preventing correct message delivery in structured peerto-peer overlays and defenses to these attacks are discussed. This survey entitles the above mentioned problem and solutions proposed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic...

متن کامل

Probabilistic Misbehaviour Detection and Optimization in Delay Tolerant Network

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment.. In this paper, we propose ant colo...

متن کامل

Congestion Control Approaches Applied to Wireless Sensor Networks: A Survey

Wireless Sensor Networks (WSNs) are a specific category of wireless ad-hoc networks where their performance is highly affected by application, life time, storage capacity, processing power, topology changes, the communication medium and bandwidth. These limitations necessitate an effective data transport control in WSNs considering quality of service, energy efficiency, and congestion control. ...

متن کامل

A Misbehavior Detection System for Vehicular Delay Tolerant Networks

In vehicular networks, many vehicles participate in the network and transfer messages for each other. At least for the next years, i.e., until a high rate of vehicles equipped with according network technology has been reached, we believe that delay-tolerant methods are useful in such networks, leading to Vehicular Delay Tolerant Networks. However, in such a cooperative system malicious or self...

متن کامل

An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay Tolerant Network

Delay tolerant networks (DTNs) exploit the intermittent connectivity between mobile nodes to transfer data. Due to a lack of consistent connectivity, two nodes exchange data only when they move into the transmission range of nodes In DTNs, a node may misbehave by dropping packets even when it has sufficient buffers. Routing misbehavior can be caused by selfish nodes that are unwilling to spend ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012