Research Article
An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks
@ARTICLE{10.4108/trans.ubienv.2012.e6, author={G. Ansa and H. Cruickshank and Z. Sun}, title={An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks}, journal={EAI Endorsed Transactions on Ubiquitous Environments}, volume={1}, number={1}, publisher={ICST}, journal_a={UE}, year={2012}, month={3}, keywords={Denial of service, attacker, delay tolerant network, resource exhaustion, network performance.}, doi={10.4108/trans.ubienv.2012.e6} }
- G. Ansa
H. Cruickshank
Z. Sun
Year: 2012
An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks
UE
ICST
DOI: 10.4108/trans.ubienv.2012.e6
Abstract
Delay tolerant networks (DTN) are highly constrained networking environments low in resources such as memory, bandwidth, battery and processing power. In opportunistic DTNs, nodes cooperatively forward packets for each other through the carry-store-and-forward paradigm. Opportunistic data forwarding can be abused by an adversary by injecting bogus packets in order to waste the resources of the network. To guard against such attacks, it is important to authenticate packets at intermediate nodes. Packet authentication in itself comes with overheads such as computation cost and energy consumption which can be exploited by an attacker to mount denial of service (DOS) attacks. We propose the use of light-weight DTN-cookies to protect this vital security service from such malicious exploitation.
Copyright © 2011 Ansa et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.