2013
DOI: 10.1109/tdsc.2012.84
|View full text |Cite
|
Sign up to set email alerts
|

To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
50
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(51 citation statements)
references
References 31 publications
1
50
0
Order By: Relevance
“…The proposed CS_DDoS system offers a solution to securing stored records by classifying the incoming packets and making a decision based on the classification results. Qinghua Li [2], proposed a distributed scheme to detect if a node has violated its rate limits. It provide rigorous analysis on the probability of detection, and evaluate the effectiveness and efficiency of our scheme with extensive trace-driven simulations.…”
Section: Literature Surveymentioning
confidence: 99%
“…The proposed CS_DDoS system offers a solution to securing stored records by classifying the incoming packets and making a decision based on the classification results. Qinghua Li [2], proposed a distributed scheme to detect if a node has violated its rate limits. It provide rigorous analysis on the probability of detection, and evaluate the effectiveness and efficiency of our scheme with extensive trace-driven simulations.…”
Section: Literature Surveymentioning
confidence: 99%
“…When considering internal attacks such as flooding attacks, authentication of packets does not guarantee delivery to the destination nodes thus making bundle flooding in DTN an open issue [20]. A few techniques [21], [22] have been proposed to mitigate flooding attacks in DTNs.…”
Section: ) Packet Dropping Attacks In Dtnsmentioning
confidence: 99%
“…The proposed protocol was an improvement over earlier techniques in terms of energy efficiency and resilience to attack. Li et al [15] addressed flood network attacks by malicious insiders though a distributed protocol of enforced rate limits. Some WPAN nodes cannot support even relatively efficient bit-layer security protocols, so Yang et al [16] detected and localized spoofing attackers by analyzing received signal strength (RSS).…”
Section: Related Workmentioning
confidence: 99%
“…Data confidentiality, message integrity, and device authentication are all important security considerations for wireless networks, given the vulnerable Manuscript 15.4 specification includes optional protection using the Advanced Encryption Standard (AES) for data confidentiality, message integrity codes (MICs), or both. Sensitive information such as utility billing, patient data, and control messages should all be encrypted while traversing a WPAN, yet research finds that AES Counter Mode (encryption without MIC) must be avoided because an attacker can modify the cyphertext and the unprotected cyclic redundancy check such that unauthorized packets are accepted [6].…”
Section: Introductionmentioning
confidence: 99%