Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

Abstract

 Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified

Authors and Affiliations

J. Iswariya*

Keywords

Related Articles

 Removal of Cyclic Prefix in Adaptive OFDM for Dynamic Spectrum Access using DWT and WT

 Spectrum has valuable resource in wireless communication. In wireless communication some spectrum is waste due to uses of cyclic prefix (cp) in FFT multicarrier sampling. In place of FFT used DFT and wavelet tran...

 A Novel Method for Road Extraction from Satellite Images

 Extended Kalman filter (EKF) has previously been used to extract road maps in satellite images. The extended Kalman filter in general is not an optimal estimator, if the measurement and the state transition model...

 Implementation on Quality Analysis in Web Applications to Develop Specification and Duplication Mining

  We propose an approach to Analysis of modern web applications and detect duplicated blocks of code to quality improvement and specification in Web sites and on the analysis of both the page structure, implemented...

 INDENTATION OF SANDWICHES USING A LAYERWISE MODEL WITH FIXED DEGREES OF FREEDOM

 A zig-zag plate model with variable kinematics and fixed degrees of freedom recently developed by the authors is applied to study indentation of sandwiches with honeycomb/foam core, with the aim of reducing the co...

 Psychology Vs Computer Science

 This paper presents selected solutions and remarks about mutual relations between psychology and computer science. Actually these two areas are considered different in Education point of view. But, it Computer Sc...

Download PDF file
  • EP ID EP89786
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

J. Iswariya* (30).  Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network. International Journal of Engineering Sciences & Research Technology, 3(6), 40-45. https://europub.co.uk/articles/-A-89786