×
Sep 1, 2017 · In this paper, we propose flooding detection based on encounter records (FDER) to detect flooding attack and yet allow legitimate burst traffic ...
In this paper, we propose FDER to detect flooding attack and yet allow legitimate burst traffic simultaneously. Nodes exchange their histories of encounter ...
Due to limited connectivity, DTN is vulnerable to flooding attack in which malicious nodes flood the network with superfluous data to deplete the network ...
Delay/disruption tolerant network (DTN) is a rising communication criterion distinguished by intermittent connectivity. Routing algorithms in DTN are developed ...
Pham Thi Ngoc Diep, Chai Kiat Yeo : Detecting flooding attack while accommodating burst traffic in delay tolerant networks. WTS 2017: 1-7.
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to limited connectivity, DTN is ...
Detecting flooding attack and accommodating burst traffic in delay-tolerant networks. TND Pham, CK Yeo, N Yanai, T Fujiwara. IEEE Transactions on Vehicular ...
The Delay Tolerant Network is more vulnerable to different kinds of attacks like flooding attack, blackhole and greyhole attacks, due to limited connectivity.
For mitigation of flooding attacks, a gateway node keeps track of the number of messages generated by each node in a time interval and the number of copies of ...
People also ask
DTN is distinguished as long delay and intermittent connectivity. The Delay Tolerant Network is more vulnerable to different kinds of attacks like flooding ...