TY - JOUR
T1 - FRID
T2 - Flood attack mitigation using resources efficient intrusion detection techniques in delay tolerant networks
AU - Khalid, Waqar
AU - Ahmed, Naveed
AU - Khalid, Muhammad
AU - Ud Din, Aziz
AU - Khan, Aurangzeb
AU - Arshad, Muhammad
PY - 2019/7/12
Y1 - 2019/7/12
N2 - Delay tolerant networks (DTNs) are a special type of intermittently connected networks (ICN) featured by variable delay, frequent disruption, asymmetric data rates, and high-error rates. The DTNs have been primarily developed for interplanetary networks (IPNs), however, it shows applicability to challenged networks. Thus, solutions devised for security and routing for traditional networks do not apply to DTNs due to its unique nature. Moreover, this paper shows less attention particularly in security and its related strings. In DTNs, malicious nodes launch various attacks that include packet drop, a fake packet, and flood attack. These attacks inevitably overuse scarce resources (bandwidth, buffer, and energy) in DTNs, which leads to low packet delivery ratio and high packet loss ratio. Flood attack is listed in top among the challenging attacks in DTNs. The existing techniques to confront flood attack suffered from high-detection time and low-detection accuracy. This paper proposed novel resources efficient (distributed and intrusion detection system-based) algorithms to mitigate flood attack. The simulation results show considerable improvement in detection time, detection accuracy, and resource consumption, and also show enhanced packet delivery ratio and reduced packet loss ratio.
AB - Delay tolerant networks (DTNs) are a special type of intermittently connected networks (ICN) featured by variable delay, frequent disruption, asymmetric data rates, and high-error rates. The DTNs have been primarily developed for interplanetary networks (IPNs), however, it shows applicability to challenged networks. Thus, solutions devised for security and routing for traditional networks do not apply to DTNs due to its unique nature. Moreover, this paper shows less attention particularly in security and its related strings. In DTNs, malicious nodes launch various attacks that include packet drop, a fake packet, and flood attack. These attacks inevitably overuse scarce resources (bandwidth, buffer, and energy) in DTNs, which leads to low packet delivery ratio and high packet loss ratio. Flood attack is listed in top among the challenging attacks in DTNs. The existing techniques to confront flood attack suffered from high-detection time and low-detection accuracy. This paper proposed novel resources efficient (distributed and intrusion detection system-based) algorithms to mitigate flood attack. The simulation results show considerable improvement in detection time, detection accuracy, and resource consumption, and also show enhanced packet delivery ratio and reduced packet loss ratio.
KW - Delay tolerant networks (DTNs)
KW - flood attack
KW - misbehaving nodes
KW - packet delivery ratio
KW - packet loss ratio and resources consumption
UR - http://www.scopus.com/inward/record.url?scp=85068998656&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2019.2924587
DO - 10.1109/ACCESS.2019.2924587
M3 - Article
AN - SCOPUS:85068998656
SN - 2169-3536
VL - 7
SP - 83740
EP - 83760
JO - IEEE Access
JF - IEEE Access
ER -