Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network

Abstract

 Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified

Authors and Affiliations

J. Iswariya*

Keywords

Related Articles

 INVERTERS CURRENT FREQUENCY DEVIATION BASED ISLANDING DETECTION IN GRID CONNECTED PHOTOVOLTAIC SYSTEM

 The protection schemes of distribution systems are usually designed under the assumption that power flows from the substations to the end users.The utility system contains both load and generation in which part of...

 EMI/EMC Analysis and Noise Reduction in High Frequency Devices

 Electromagnetic interference (EMI) or radio frequency interference (RFI) is a type of electric or electronic emission that can degrade the performance of electronic circuit.The effects of electromagnetic interfere...

 Conversion of Thermal Energy to Electrical Energy using NTC

 The basic aim of this paper is to depict the process by which temperature changes in the resistance of NTC can reflect in the output voltage which further can be used to produce various range of voltages. The outp...

Challenges In Computer Science

This paper presents the connection between Computer Science and other fields of Computer Science and it provides

 CHARACTERIZATION OF CHLOROFORM EXTRACT OF CORDIA MACLEODII LEAF FOR POSSIBLE APPLICATION IN DYE SENSITIZED SOLAR CELL

 Dye synthesized solar cells have received intensified research efforts in the past decades in both academia and industry, due to the increasing demand for sustainable clean energy. Dyes play an important role in t...

Download PDF file
  • EP ID EP89786
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

J. Iswariya* (30).  Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network. International Journal of Engineering Sciences & Research Technology, 3(6), 40-45. https://europub.co.uk./articles/-A-89786