University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation.

Asuquo, Philip, Cruickshank, Haitham, Sun, Zhili and Chandrasekaran, Ganesh (2016) Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, 2015-09-09 - 2015-09-11, Cardiff, UK.

Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation.pdf - Version of Record
Available under License Creative Commons Attribution.

Download (628kB) | Preview
Text (licence)
Available under License : See the attached licence file.

Download (33kB) | Preview


In the event of a disaster, there is a severe damage/destruction to physical infrastructures such as telecommunication and power lines which result in the disruption of communication in this areas. For such scenarios, Delay Tolerant Network (DTN) provides an alternative means of communication. In Delay Tolerant Networks (DTNs), a message from a source node may be delivered to the destination node despite the non-existence of an infrastructure and an end-to-end connectivity. However DTNs are susceptible to security threats such as DoS attacks targeted at disrupting relayed packets or dropping critical packets during a disaster rescue operation. DoS attacks consist of blackhole, grayhole, wormhole, packet flooding attacks etc. The scope of this paper is to study the impacts of blackhole and packet flooding attacks in a post disaster communication network using DTN. Various performance metrics in DTN have been used to study the impacts of different DoS attacks in DTN and a comprehensive analysis is presented.

Item Type: Conference or Workshop Item (Conference Paper)
Subjects : Electronic Engineering
Divisions : Faculty of Engineering and Physical Sciences > Electronic Engineering
Authors :
Date : 7 January 2016
DOI : 10.1109/NGMAST.2015.65
Copyright Disclaimer : © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Contributors :
ContributionNameEmailORCID, K, N,
Uncontrolled Keywords : Wormhole, Delay Tolerant Networks, Denial of Service attacks, Blackhole, Grayhole
Depositing User : Symplectic Elements
Date Deposited : 07 Dec 2016 15:27
Last Modified : 16 Jan 2019 17:10

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800