ue 12(1): e6

Research Article

An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks

Download167 downloads
  • @ARTICLE{10.4108/trans.ubienv.2012.e6,
        author={G. Ansa and H. Cruickshank and Z. Sun},
        title={An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks},
        journal={EAI Endorsed Transactions on Ubiquitous Environments},
        volume={1},
        number={1},
        publisher={ICST},
        journal_a={UE},
        year={2012},
        month={3},
        keywords={Denial of service, attacker, delay tolerant network, resource exhaustion, network performance.},
        doi={10.4108/trans.ubienv.2012.e6}
    }
    
  • G. Ansa
    H. Cruickshank
    Z. Sun
    Year: 2012
    An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks
    UE
    ICST
    DOI: 10.4108/trans.ubienv.2012.e6
G. Ansa1,*, H. Cruickshank1, Z. Sun1
  • 1: Centre for Communication Systems Research, University of Surrey, Guildford, United Kingdom
*Contact email: g.ansa@surrey.ac.uk

Abstract

Delay tolerant networks (DTN) are highly constrained networking environments low in resources such as memory, bandwidth, battery and processing power. In opportunistic DTNs, nodes cooperatively forward packets for each other through the carry-store-and-forward paradigm. Opportunistic data forwarding can be abused by an adversary by injecting bogus packets in order to waste the resources of the network. To guard against such attacks, it is important to authenticate packets at intermediate nodes. Packet authentication in itself comes with overheads such as computation cost and energy consumption which can be exploited by an attacker to mount denial of service (DOS) attacks. We propose the use of light-weight DTN-cookies to protect this vital security service from such malicious exploitation.