About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ue 12(1): e6

Research Article

An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks

Download1060 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/trans.ubienv.2012.e6,
        author={G. Ansa and H. Cruickshank and Z. Sun},
        title={An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks},
        journal={EAI Endorsed Transactions on Ubiquitous Environments},
        volume={1},
        number={1},
        publisher={ICST},
        journal_a={UE},
        year={2012},
        month={3},
        keywords={Denial of service, attacker, delay tolerant network, resource exhaustion, network performance.},
        doi={10.4108/trans.ubienv.2012.e6}
    }
    
  • G. Ansa
    H. Cruickshank
    Z. Sun
    Year: 2012
    An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks
    UE
    ICST
    DOI: 10.4108/trans.ubienv.2012.e6
G. Ansa1,*, H. Cruickshank1, Z. Sun1
  • 1: Centre for Communication Systems Research, University of Surrey, Guildford, United Kingdom
*Contact email: g.ansa@surrey.ac.uk

Abstract

Delay tolerant networks (DTN) are highly constrained networking environments low in resources such as memory, bandwidth, battery and processing power. In opportunistic DTNs, nodes cooperatively forward packets for each other through the carry-store-and-forward paradigm. Opportunistic data forwarding can be abused by an adversary by injecting bogus packets in order to waste the resources of the network. To guard against such attacks, it is important to authenticate packets at intermediate nodes. Packet authentication in itself comes with overheads such as computation cost and energy consumption which can be exploited by an attacker to mount denial of service (DOS) attacks. We propose the use of light-weight DTN-cookies to protect this vital security service from such malicious exploitation.

Keywords
Denial of service, attacker, delay tolerant network, resource exhaustion, network performance.
Received
2011-09-08
Accepted
2012-01-05
Published
2012-03-29
Publisher
ICST
http://dx.doi.org/10.4108/trans.ubienv.2012.e6

Copyright © 2011 Ansa et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL