Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 6
Abstract
Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmit the data to its destination. In this paper, the flooding attack is focused and provides possible solutions for secure communication. . A rate limit certificate process is presented to check for authenticated user. Claim carry and check technique is used to overcome the difficulties in existing to count all the packets or replicas sent by a node due to the lack of communication infrastructure. Using Rate limit certificate only the flood attacker who exceeds the rate limit was identified. To overcome this proposed approach uses key. Key will be generated for the node who wishes to send packets less than the rate limit. The key Generation based on Hash based Message Authentication Code (HMAC) algorithm..Based on keys, attackers who sends packet within the rate limit can also Be easily identified
Authors and Affiliations
J. Iswariya*
Speech Operated System using DSP: A Review
Speech is the most basic, common and efficient form of communication method for people to interact with each other. Today, speech technologies are commercially available for an unlimited but interesting range of t...
EFFECTOF CONSTRUCTION EQUIPMENT ON PRODUCTION IN BUILDING COSTRUCTION PROJECT
The contractor’s equipment policy and equipment management system have a great impact on the profitability of a firm, especially for contractors with large investment in equipment. The cost of equipment in civil engi...
A Review of Routing Protocols for Wireless Sensor Network
Wireless sensor network has come out as a useful add-on to the modern wireless communication networks. The saving of energy consumption results in increase of network lifetime of Wireless Sensor Networks. Many ro...
COMPARATIVE STUDY OF SEISMIC ZONES ON G+9 STRUCTURE ON DIFFERENT GROUND SLOPES CONSIDERING DIFFERENT SOILS.
The execution of a multi-story surrounded working amid strong seismic tremor movements relies on upon the dispersion of mass, solidness, and quality in both the even and vertical planes of the building. In multi-storeye...
Enhanced Technique for Protecting Web Service Composition from Privacy Attack
Web service composition is a web technology that combines information from more than one source into a single web application. This technique provides a special type of composition application that aims at integra...