Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

Abstract

 Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified

Authors and Affiliations

J. Iswariya*

Keywords

Related Articles

 Cloud-based E-learning System Architecture

 E-learning is the new means which has the potential to support the traditional education system. Now-adays e-learning is very popular and ought to be adopted by every institution. Due to the recent developments in...

 MOSAICING IN VARIOUS IMAGES: A SURVEY

 K-means clustering and watershed are the key techniques used as a combination, Edge detection procedure and region, merging are also used. Merging method based on mean gray values and edge strengths (T1, T2) are u...

 THE APPARENT DEPTH OF OBJECT THROUGH LARGE ANGLE

 New approach to find the apparent depth was carried out in this work, with in mind taking large angle, instead of the usual small angles taken in this condition. Two methods were carried out, the angle taken is a...

 A REVIEW PAPER ON IMPROVED K-MEANS TECHNIQUE FOR OUTLIER DETECTION IN HIGH DIMENSIONAL DATASET

 In many data mining application domain outlier detection is an important task, it can be regard as a binary asymmetric or unbalanced classification of pattern where one class has higher cardinality than the other,...

  ANALYSIS OF AMBIENT AIR QUALITY IN GUWAHATI CITY – A CASE STUDY

 This study reports the analysis of the ambient air quality at six different locations in Guwahati city. It investigates the concentration of the pollutants - Suspended Particulate Matter (SPM), Respirable Suspende...

Download PDF file
  • EP ID EP89784
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

J. Iswariya* (30).  Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network. International Journal of Engineering Sciences & Research Technology, 3(6), 40-45. https://europub.co.uk/articles/-A-89784