Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

Abstract

 Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified

Authors and Affiliations

J. Iswariya*

Keywords

Related Articles

 Computer Aided Generalized Method of Synthesis of Four Bar Mechanism

 A new computerised dimensional synthesis method is described in the paper. To synthesis of a four bar mechanism, knowledge of function, path, motion generation method is required. Synthesis of four bar mechanism...

PARAMETRIC STUDY TO UNDERSTAND THE SEISMIC BEHAVIOUR OF INTZE TANK SUPPORTED ON SHAFT

Elevated intze tanks are used to store large quantity of water. They are used to supply water under gravity. Intze tanks are known as modified version of cylindrical tanks. They may be shaft supported or trestle support...

 Simulating Model of UWB System for SUI Channel

 This paper is concerned about the performance of UWB system in the multiuser environment. The existence of several multiuser access can cause a significant performance degradation and hence the transmission rate....

DESIGN AND DEVELOPMENT OF CAR PARKING AND AUTOMATION BILLING SYSTEM

The client uses MS Excel, and also maintains their records, however it is difficult to share the data to number of system in multi user environment, there is lot of duplication of data and chances of mistakes. When the...

 Experimental Analysis of Damping on Layered & Riveted Joint Beam: A Review

 The present investigation highlights the effect of interfacial slip on the damping of layered cantilever beams jointed with rivets undergoing free vibration. The inclusion of mechanical joints bears a strong influ...

Download PDF file
  • EP ID EP89784
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

J. Iswariya* (30).  Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network. International Journal of Engineering Sciences & Research Technology, 3(6), 40-45. https://europub.co.uk./articles/-A-89784