Personal Satellite Services. Third International ICST Conference, PSATS 2011, Malaga, Spain, February 17-18, 2011, Revised Selected Papers

Research Article

A Proactive DOS Filter Mechanism for Delay Tolerant Networks

Download
321 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23825-3_20,
        author={Godwin Ansa and Haitham Cruickshank and Zhili Sun},
        title={A Proactive DOS Filter Mechanism for Delay Tolerant Networks},
        proceedings={Personal Satellite Services. Third International ICST Conference, PSATS 2011, Malaga, Spain, February 17-18, 2011, Revised Selected Papers},
        proceedings_a={PSATS},
        year={2012},
        month={5},
        keywords={Denial of service attacker delay tolerant network resource exhaustion DTN-cookie},
        doi={10.1007/978-3-642-23825-3_20}
    }
    
  • Godwin Ansa
    Haitham Cruickshank
    Zhili Sun
    Year: 2012
    A Proactive DOS Filter Mechanism for Delay Tolerant Networks
    PSATS
    Springer
    DOI: 10.1007/978-3-642-23825-3_20
Godwin Ansa1,*, Haitham Cruickshank1,*, Zhili Sun1,*
  • 1: University of Surrey
*Contact email: g.ansa@surrey.ac.uk, h.cruickshank@surrey.ac.uk, z.sun@surrey.ac.uk

Abstract

Denial of Service (DOS) attacks are a major threat faced by all types of networks. The effect of DOS in a delay tolerant network (DTN) is even more aggravated due to the scarcity of resources. Perpetrators of DOS attacks in DTN-like environments look beyond the objective of rendering a target node useless. The aim of an attacker is to cause a network-wide degradation of resources, service and performance. This can easily be achieved by exhausting node or link resources and partitioning the network. In this paper we seek to provide a proactive approach in making the DTN authentication process robust against DOS. Our aim is to make security protocols which provide mandatory DTN security services resilient to DOS attacks. The overall objective is to make it hard to launch a DOS attack and ensure the availability of DTN services. A DTN-cookie mechanism has been proposed to quickly identify and filter out illegitimate traffic.