IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516

This article has now been updated. Please use the final version.

An Energy-Efficient Defense against Message Flooding Attacks in Delay Tolerant Networks
Hiromu ASAHINAKeisuke ARAIShuichiro HARUTAP.Takis MATHIOPOULOSIwao SASASE
Author information
JOURNAL RESTRICTED ACCESS Advance online publication

Article ID: 2020EBP3085

Details
Abstract

Delay Tolerant Networks (DTNs) are vulnerable to message flooding attacks in which a very large number of malicious messages are sent so that network resources are depleted. To address this problem, previous studies mainly focused on constraining the number of messages that nodes can generate per time slot by allowing nodes to monitor the other nodes' communication history. Since the adversaries may hide their attacks by claiming a false history, nodes exchange their communication histories and detect an attacker who has presented an inconsistent communication history. However, this approach increases node energy consumption since the number of communication histories increases every time a node communicates with another node. To deal with this problem, in this paper, we propose an energy-efficient defense against such message flooding attacks. The main idea of the proposed scheme is to time limit the communication history exchange so as to reduce the volume while ensuring the effective detection of inconsistencies. The advantage of this approach is that, by removing communication histories after they have revealed such inconsistencies, the energy consumption is reduced. To estimate such expiration time, analytical expressions based upon a Markov chain based message propagation model, are derived for the probability that a communication history reveals such inconsistency in an arbitrary time. Extensive performance evaluation results obtained by means of computer simulations and several performance criteria verify that the proposed scheme successfully improves the overall energy efficiency. For example, these performance results have shown that, as compared to other previously known defenses against message flooding attacks, the proposed scheme extends by at least 22% the battery lifetime of DTN nodes, while maintaining the same levels of protection.

Content from these authors
© 2020 The Institute of Electronics, Information and Communication Engineers
feedback
Top