Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

Abstract

 Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified

Authors and Affiliations

J. Iswariya*

Keywords

Related Articles

 Differential Protection of Three Phase Power Transformer Using Wavelet Packet Transform

 This paper shows the use of a new & innovatory wavelet packet transform (WPT) based method to sensitize the transients resulting from inrush current, CT saturation and fault currents in electric power transfor...

 A COMPARATIVE STUDY AND ANALYSIS OF FULL ADDER

 In Electronics adders are used widely. An adder performance is analysed using trems delay and power comsumption. This paper contains various adders simulated using Mentor graphics in180 nm technology and their comp...

 REVIEW ON MANAGING AND MINING WEB MULTIMEDIA DATABASE

 The huge amount of unstructured data available on the web and the multimedia manages and storage technologies have led to incredible growth in very large and detailed multimedia database. Multimedia mining has pro...

Design of High Throughput K-Best For MIMO Detector

Multiple -Input -Multiple -Output(MIMO) wireless system have been widely used in next generation wireless systems like 802.11n, Long Term Evolution(LTE) and WIMAX. Next generation wireless system has the demand of high...

 Human Identification Based On Scleral Vasculature

 The blood vessel patterns of sclera show rich and unique details. To date, sclera is relatively less studied and little is known regarding its usefulness and performance. Here, sclera recognition for human identif...

Download PDF file
  • EP ID EP89786
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

J. Iswariya* (30).  Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network. International Journal of Engineering Sciences & Research Technology, 3(6), 40-45. https://europub.co.uk/articles/-A-89786