Combating Intra-Region DoS Attacks in Delay Tolerant Networks using Energy-Efficient Mechanisms

Authors

  • Godwin Ansa Akwa Ibom State University Ikot Akpaden, Mkpat Enin Akwa Ibom State
  • Haitham Cruickshank Institute for Communications Systems University of Surrey, Guildford Surrey
  • Zhili Sun Institute for Communications Systems University of Surrey, Guildford Surrey
  • Feda Alshahwan Public Authority for Applied Education and Training, College of Technological Studies, Electronics Engineering Department, Computer Section, Kuwait University

Keywords:

Security, Resource exhaustion, DTN-Cookie, Denial of Service Attack

Abstract

Denial of Service (DoS) attacks have been amajor threat in the Internet and in other emerging networks including DelayTolerant Networks (DTNs). A DTN is characterized by limited bandwidth, longqueuing delays, low data rate, low power and intermittent connectivity. Most ofthe proposed DoS mitigation schemes for wired and wireless networks are highlyinteractive requiring several protocol rounds. They are also resourceconsuming, complex and assume intermittent connectivity. These features makethe applicability of proposed schemes unsuitable in a DTN scenario. An attackercan exploit the DTN message forwarding mechanism to inject fake bundles intothe network. The attacker’s overall objective is to deplete node and linkresources such as CPU processing cycles, battery power, memory and bandwidth.In this paper, we propose a proactive DoS-Resilient Authentication Mechanism(DoSRAM). The proposed mechanism uses three message authenticator variantscalled DTN-Cookies to minimize computational and communication costs. Theproposed mechanism has been verified through simulations using theOpportunistic Network Environment (ONE) simulator. Results show that DoSRAMoutperforms solutions which are based on RSA-Digital Signatures in terms ofthroughput, energy and bandwidth efficiency. DoSRAM can accurately detect andfilter out DoS traffic.

Author Biography

  • Godwin Ansa, Akwa Ibom State University Ikot Akpaden, Mkpat Enin Akwa Ibom State
    Department of Computer Science

References

K. Fall, “A Message-Switched Architecture for Challenged Internets,†Technical Report IRB-TR-02-010, Intel

Research, Berkeley California, USA, 2002.

P. Ferguson, “Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address

Spoofing,†IETF Network Working Group, RFC 2267, 1998.

F. De Rango, M. Tropea, G. Laratta and S. Marano, “Hop-by-hop Local Flow Control Over InterPlanetary Networks Based on DTN Architecture,†in IEEE International Conference on Communications, Glasgow, Scotland, 2008.

T. Killalea, “Recommended Internet Service Provider Security Services and Procedures,†2000.

The International Telegraph and Telephone Consultative Committee (CCITT), “Security Architecture for Open

Systems Interconnection for CCITT Applications,†1991.

S. Symington, S. Farrell, H. Weiss and P. Lovell, “Bundle Security Protocol Specification,†Network Research

Group, Draft-irft-dtnrg-bundle-security-17, 2010.

K. Fall and S. Farrell, “DTN: An Architectural Retrospective,†IEEE Journal on Selected Areas in

Communications, vol. 26, no. 5, pp. 828 - 836, June 2005.

T. Small and Z.J. Haas, “The Shared Wireless Infostation Model: A New Ad hoc Networking Paradigm (Or Where There is a Whale, There is a Way),†in ACM MobiHoc'03, Annapolis, Maryland, USA, 2003.

A. S. Wander, N. Gura, H. Eberle, V. Gupta and S.C. Shantz, “ Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks,†in 3rd IEEE International Conference on Pervasive Computing and Communications, 2005.

O. Arazi, H. Qi and D. Rose, “A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless

Sensor Networks,†in 4th Annual IEEE Communications Conference on Sensor, Mesh and Ad hoc Communications

and Networks, San Diego, CA , 2007.

K. Ren, S. Yu, W. Lou and Y. Zhang, “Multi-user Broadcast Authentication in Wireless Sensor Networks,†IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 223 - 232 , October 2009.

M. Belware et al., “Keying Hash Functions for Message Authentication,†in Advances in Cryptology-CRYPTO'96, 1996.

A. Keränen, J. Ott, and T. Kärkkäinen, “The ONE Simulator for DTN Protocol Evaluation,†in 2nd International

Conference on Simulation Tools and Techniques(SIMUTools'2009), Rome, Italy, 2009.

TKK/COMNET, “Project page of the ONE Simulator,†2008. [Online]

Available: http://www.netlab.tkk.fi/tutkimus/dtn/theone. [Accessed 12 May 2011].

A. Keränen, “Opportunistic Network Environment Simulator,†Special Assignment Report, Helsinki University of

Technology, Department of Communications and Networking, Helsinki, Finland, 2008.

A. Lindgren, A. Doria and O. Schelén, Probabilistic Routing in Intermittently Connected Networks, Vols. 3126 239-

, Lecture Notes of Computer Science, 2004.

H. Jun, M.H. Ammar and E.W. Zegura, “Power Management in Delay Tolerant Networks: a framework and

Knowledge-Based Mechanism,†in 2nd IEEE Communications Society Conference on Sensor and Ad hoc Communications and Networks, 2005.

Downloads

Published

2016-10-16

How to Cite

Combating Intra-Region DoS Attacks in Delay Tolerant Networks using Energy-Efficient Mechanisms. (2016). Asian Journal of Computer and Information Systems, 4(5). https://ajouronline.com/index.php/AJCIS/article/view/4042

Similar Articles

1-10 of 25

You may also start an advanced similarity search for this article.