Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 6
Abstract
Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified
Authors and Affiliations
J. Iswariya*
MAINTAINANCE OF KAPLAN TURBINE TO ENHANCE THE EFFICIENCY
Hydro power plant is the source of renewable energy which leads to reduction in burning of fossil fuels. So the environment is no longer polluted. This project depicts how sediment erosion occurs in Kaplan turbine...
SIMULATION OF ENHANCED PULSE TRIGGERED FLIP FLOP WITH HIGH PERFORMANCE APPLICATIONS
Flip-flops are the major storage elements in all system on chip (SOC) of digital design and one of the most power consumption components. It is important to reduce power dissipation in clock distribution networks...
PERFORMANCE COMPARISON OF REED-SOLOMON CODE USING M-ARY PSK AND FSK MODULATION IN AWGN CHANNEL
The main aim of this paper is to analyze the Bit error rate (BER) performance of Reed Solomon code (RSC) using Mary PSK and FSK modulation techniques in the presence of noisy channel i.e. (Additive White Gaussian...
Experimental Study on Cold Formed Steel Composite Metal Deck Slab
Composite deck slab is the advanced method of casting concrete slab with profile metal decking used in tensile zone. The decking acts composite with the concrete under service loading. The behavior of a composite...
Management, Modelling & Maintenance of water and wastewater Using GIS- A review
Communities are routinely faced with wastewater management decisions with limited data. Local goverments need tools that make the most of available information to manage the sewerage systems. Geographical Informat...