Results 1 -
2 of
2
To lie or to comply: Defending against flood attacks in disruption tolerant networks
- IEEE Trans. Dependable and Secure Comput
, 2013
"... Abstract—Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
(Show Context)
Abstract—Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In this paper, we employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit over the number of packets that it can generate in each time interval and a limit over the number of replicas that it can generate for each packet. We propose a distributed scheme to detect if a node has violated its rate limits. To address the challenge that it is difficult to count all the packets or replicas sent by a node due to lack of communication infrastructure, our detection adopts claim-carry-and-check: Each node itself counts the number of packets or replicas that it has sent and claims the count to other nodes; the receiving nodes carry the claims when they move, and cross-check if their carried claims are inconsistent when they contact. The claim structure uses the pigeonhole principle to guarantee that an attacker will make inconsistent claims which may lead to detection. We provide rigorous analysis on the probability of detection, and evaluate the effectiveness and efficiency of our scheme with extensive trace-driven simulations. Index Terms—DTN, security, flood attack, detection I.
Incentive-Driven and Freshness-Aware Content Dissemination in Selfish Opportunistic Mobile Networks
"... Abstract—Recently, the content-based publish/subscribe (pub/sub) paradigm is gaining popularity in opportunistic mobile networks (OppNets) for its flexibility and adaptability. Since nodes in OppNets is controlled by humans, they often behave selfishly with an aim to maximize their own revenues with ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—Recently, the content-based publish/subscribe (pub/sub) paradigm is gaining popularity in opportunistic mobile networks (OppNets) for its flexibility and adaptability. Since nodes in OppNets is controlled by humans, they often behave selfishly with an aim to maximize their own revenues without considering the performance of others. Therefore, stimulating nodes in OppNets to collect, store, and share content efficiently is one of the key challenges under this scheme. Meanwhile, guaranteeing the freshness of content is also a big problem for content dissemination in OppNets. In this paper, in order to solve these problems, we propose an incentive-driven and freshness-aware pub/sub content dissemination scheme, called ConDis (Content Dissemination), for selfish OppNets. In ConDis, the Tit-For-Tat (TFT) scheme is employed to deal with selfish behaviors of nodes in OppNets. ConDis also implements a novel content exchange protocol when nodes are in contact. Specifically, during each contact, the exchange order is determined by the content utility, which is calculated by the direct subscribed value and the indirect subscribed value, and the objective of nodes is to maximize the utility of the content inventory stored in their buffer. Extensive realistic trace-driven simulation results show that ConDis is superior to other existing schemes in terms of total freshness value, total delivered contents, and total transmission cost. Index Terms—Publish/subscribe; content dissemination; opportunistic mobile networks; selfish behavior; freshness. I.