【24h】

Countering Flood Attacks and Routing Misbehavior in DTN

机译:反洪水攻击和DTN的路由不当行为

获取原文

摘要

Disruption-tolerant networks are prone to flood attacks in which an attacker floods the network by forwarding as many packets into the network or forwarding replica of packets into network for selfish or malicious purpose. Also selfish or malicious nodes may drop received packets intentionally even when their buffer is not full. Such routing misbehavior reduces the packet delivery ratio and wastes system resources. The proposed approach provides measures to detect flood attack using a method called claim construction. For detecting routing misbehavior, it is required that a node keeps a few signed contact logs of its previous contacts. This signed contact log consists of information of number of packets in node’s buffer before this contact. Based on this contact log, the next contacted node can detect whether this node has dropped any packet.
机译:破坏性宽容网络易于泛滥攻击,其中攻击者通过将多个数据包转发到网络中的许多数据包或将数据包转发到网络中的自私或恶意目的。即使在缓冲区未满时,自私或恶意节点也可能会故意删除收到的数据包。这种路由不端行为降低了分组传递比率并废弃系统资源。所提出的方法提供了使用称为索赔结构的方法来检测洪水攻击的措施。为了检测到路由不端行为,需要一个节点保留其先前联系人的一些签名的联系日志。此签名的联系日志包括在此联系人之前节点缓冲区中的数据包数量的信息。基于此接触日志,下一个联系人节点可以检测此节点是否丢弃了任何数据包。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号