2019
DOI: 10.1109/access.2019.2924587
|View full text |Cite
|
Sign up to set email alerts
|

FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks

Abstract: Delay tolerant networks (DTNs) are a special type of intermittently connected networks (ICN) featured by variable delay, frequent disruption, asymmetric data rates, and high-error rates. The DTNs have been primarily developed for interplanetary networks (IPNs), however, it shows applicability to challenged networks. Thus, solutions devised for security and routing for traditional networks do not apply to DTNs due to its unique nature. Moreover, this paper shows less attention particularly in security and its r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 47 publications
(71 reference statements)
0
12
0
Order By: Relevance
“…Consider an attack scenario in which malicious nodes overloaded the buffer of the TA by flooding attacks [8], [9]. In this case, the TA will not detect attacks because our proposed algorithm FAPMIC detects attacks when the TA collects encounter history from all nodes (TA buffer is full, which cannot collects encounter history information (Single point of failure, all centralized based algorithms have this issue) this attack is quite possible (in the future we will propose an algorithm which handles this issue).…”
Section: B: Attack Scenariomentioning
confidence: 99%
See 4 more Smart Citations
“…Consider an attack scenario in which malicious nodes overloaded the buffer of the TA by flooding attacks [8], [9]. In this case, the TA will not detect attacks because our proposed algorithm FAPMIC detects attacks when the TA collects encounter history from all nodes (TA buffer is full, which cannot collects encounter history information (Single point of failure, all centralized based algorithms have this issue) this attack is quite possible (in the future we will propose an algorithm which handles this issue).…”
Section: B: Attack Scenariomentioning
confidence: 99%
“…Due to the specific characteristics of DTNs mentioned earlier in this article, DTNs face huge number of challenges [9]. These challenges includes, scarce-network-resources [8], bundle-routing [9], privacy [10], bundle-reliability [11], key management [12], packet-synchronization [9], bundlesecurity [9], and misbehaving-nodes [8], [9] particularly. Even though bundle-forwarding protocols in DTNs have been investigated adequately [13].…”
Section: Introductionmentioning
confidence: 97%
See 3 more Smart Citations