Gayatri Rani et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.10, October- 2014, pg. 511-516
© 2014, IJCSMC All Rights Reserved 511
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IJCSMC, Vol. 3, Issue. 10, October 2014, pg.511 – 516
RESEARCH ARTICLE
Defending against Flood Attacks in
Disruption Tolerant Networks
Gayatri Rani, B.Tech, (M.Tech), K Santosh Kumar, B.Tech, M.Tech
Computer Science and Engineering, Computer Science and Engineering, JNTU, Hyderabad, India
k.gayatri.r@gmail.com
ABSTRACT- Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic
contacts among nodes for data communications. Due to the limitation in network resources such as contact
opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets
or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In
this paper, we employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit
over the number of packets that it can generate in each time interval and a limit over the number of replicas
that it can generate for each packet. We propose a distributed scheme to detect if a node has violated its rate
limits. To address the challenge that it is difficult to count all the packets or replicas sent by a node due to
lack of communication infrastructure, our detection adopts claim-carry-and check: each node itself counts
the number of packets or replicas that it has sent and claims the count to other nodes; the receiving nodes
carry the claims when they move, and cross-check if their carried claims are inconsistent when they contact.
The claim structure uses the pigeonhole principle to guarantee that an attacker will make inconsistent claims
which may lead to detection. We provide rigorous analysis on the probability of detection, and evaluate the
effectiveness and efficiency of our scheme with extensive trace driven simulations.
I. INTRODUCTION
Disruption Tolerant Networks (DTNs) consist of mobile nodes carried by human beings, vehicles, etc.
DTNs enable data transfer when mobile nodes are only intermittently connected, making them appropriate for
applications where no communication infrastructure is available such as military scenarios and rural areas. Due
to lack of consistent connectivity, two nodes can only exchange data when they move into the transmission
range of each other (which is called a contact between them). DTNs employ such contact opportunity for data
forwarding with “store-carry-and-forward”; i.e., when a node receives some packets, it stores these packets in its
buffer, carries them around until it contacts another node, and then forwards them. Since the contacts between
nodes are opportunistic and the duration of a contact may be short because of mobility, the usable bandwidth
which is only available during the opportunistic contacts is a limited resource. Also, mobile nodes may have
limited buffer space. Due to the limitation in bandwidth and buffer space, DTNs are vulnerable to flood attacks.
In flood attacks, maliciously or selfishly motivated attackers inject as many packets as possible into the network,