Combating Intra-Region DoS Attacks in Delay Tolerant Networks using Energy-Efficient Mechanisms
Keywords:Security, Resource exhaustion, DTN-Cookie, Denial of Service Attack
AbstractDenial of Service (DoS) attacks have been amajor threat in the Internet and in other emerging networks including DelayTolerant Networks (DTNs). A DTN is characterized by limited bandwidth, longqueuing delays, low data rate, low power and intermittent connectivity. Most ofthe proposed DoS mitigation schemes for wired and wireless networks are highlyinteractive requiring several protocol rounds. They are also resourceconsuming, complex and assume intermittent connectivity. These features makethe applicability of proposed schemes unsuitable in a DTN scenario. An attackercan exploit the DTN message forwarding mechanism to inject fake bundles intothe network. The attackerâ€™s overall objective is to deplete node and linkresources such as CPU processing cycles, battery power, memory and bandwidth.In this paper, we propose a proactive DoS-Resilient Authentication Mechanism(DoSRAM). The proposed mechanism uses three message authenticator variantscalled DTN-Cookies to minimize computational and communication costs. Theproposed mechanism has been verified through simulations using theOpportunistic Network Environment (ONE) simulator. Results show that DoSRAMoutperforms solutions which are based on RSA-Digital Signatures in terms ofthroughput, energy and bandwidth efficiency. DoSRAM can accurately detect andfilter out DoS traffic.
K. Fall, â€œA Message-Switched Architecture for Challenged Internets,â€ Technical Report IRB-TR-02-010, Intel
Research, Berkeley California, USA, 2002.
P. Ferguson, â€œNetwork Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address
Spoofing,â€ IETF Network Working Group, RFC 2267, 1998.
F. De Rango, M. Tropea, G. Laratta and S. Marano, â€œHop-by-hop Local Flow Control Over InterPlanetary Networks Based on DTN Architecture,â€ in IEEE International Conference on Communications, Glasgow, Scotland, 2008.
T. Killalea, â€œRecommended Internet Service Provider Security Services and Procedures,â€ 2000.
The International Telegraph and Telephone Consultative Committee (CCITT), â€œSecurity Architecture for Open
Systems Interconnection for CCITT Applications,â€ 1991.
S. Symington, S. Farrell, H. Weiss and P. Lovell, â€œBundle Security Protocol Specification,â€ Network Research
Group, Draft-irft-dtnrg-bundle-security-17, 2010.
K. Fall and S. Farrell, â€œDTN: An Architectural Retrospective,â€ IEEE Journal on Selected Areas in
Communications, vol. 26, no. 5, pp. 828 - 836, June 2005.
T. Small and Z.J. Haas, â€œThe Shared Wireless Infostation Model: A New Ad hoc Networking Paradigm (Or Where There is a Whale, There is a Way),â€ in ACM MobiHoc'03, Annapolis, Maryland, USA, 2003.
A. S. Wander, N. Gura, H. Eberle, V. Gupta and S.C. Shantz, â€œ Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks,â€ in 3rd IEEE International Conference on Pervasive Computing and Communications, 2005.
O. Arazi, H. Qi and D. Rose, â€œA Public Key Cryptographic Method for Denial of Service Mitigation in Wireless
Sensor Networks,â€ in 4th Annual IEEE Communications Conference on Sensor, Mesh and Ad hoc Communications
and Networks, San Diego, CA , 2007.
K. Ren, S. Yu, W. Lou and Y. Zhang, â€œMulti-user Broadcast Authentication in Wireless Sensor Networks,â€ IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 223 - 232 , October 2009.
M. Belware et al., â€œKeying Hash Functions for Message Authentication,â€ in Advances in Cryptology-CRYPTO'96, 1996.
A. KerÃ¤nen, J. Ott, and T. KÃ¤rkkÃ¤inen, â€œThe ONE Simulator for DTN Protocol Evaluation,â€ in 2nd International
Conference on Simulation Tools and Techniques(SIMUTools'2009), Rome, Italy, 2009.
TKK/COMNET, â€œProject page of the ONE Simulator,â€ 2008. [Online]
Available: http://www.netlab.tkk.fi/tutkimus/dtn/theone. [Accessed 12 May 2011].
A. KerÃ¤nen, â€œOpportunistic Network Environment Simulator,â€ Special Assignment Report, Helsinki University of
Technology, Department of Communications and Networking, Helsinki, Finland, 2008.
A. Lindgren, A. Doria and O. SchelÃ©n, Probabilistic Routing in Intermittently Connected Networks, Vols. 3126 239-
, Lecture Notes of Computer Science, 2004.
H. Jun, M.H. Ammar and E.W. Zegura, â€œPower Management in Delay Tolerant Networks: a framework and
Knowledge-Based Mechanism,â€ in 2nd IEEE Communications Society Conference on Sensor and Ad hoc Communications and Networks, 2005.
How to Cite
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.