FRID: Flood attack mitigation using resources efficient intrusion detection techniques in delay tolerant networks

Waqar Khalid, Naveed Ahmed, Muhammad Khalid*, Aziz Ud Din, Aurangzeb Khan, Muhammad Arshad

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Citations (Scopus)
16 Downloads (Pure)

Abstract

Delay tolerant networks (DTNs) are a special type of intermittently connected networks (ICN) featured by variable delay, frequent disruption, asymmetric data rates, and high-error rates. The DTNs have been primarily developed for interplanetary networks (IPNs), however, it shows applicability to challenged networks. Thus, solutions devised for security and routing for traditional networks do not apply to DTNs due to its unique nature. Moreover, this paper shows less attention particularly in security and its related strings. In DTNs, malicious nodes launch various attacks that include packet drop, a fake packet, and flood attack. These attacks inevitably overuse scarce resources (bandwidth, buffer, and energy) in DTNs, which leads to low packet delivery ratio and high packet loss ratio. Flood attack is listed in top among the challenging attacks in DTNs. The existing techniques to confront flood attack suffered from high-detection time and low-detection accuracy. This paper proposed novel resources efficient (distributed and intrusion detection system-based) algorithms to mitigate flood attack. The simulation results show considerable improvement in detection time, detection accuracy, and resource consumption, and also show enhanced packet delivery ratio and reduced packet loss ratio.

Original languageEnglish
Pages (from-to)83740-83760
Number of pages21
JournalIEEE Access
Volume7
Early online date24 Jun 2019
DOIs
Publication statusPublished - 12 Jul 2019

Keywords

  • Delay tolerant networks (DTNs)
  • flood attack
  • misbehaving nodes
  • packet delivery ratio
  • packet loss ratio and resources consumption

Fingerprint

Dive into the research topics of 'FRID: Flood attack mitigation using resources efficient intrusion detection techniques in delay tolerant networks'. Together they form a unique fingerprint.

Cite this