DocumentCode :
1583801
Title :
Secure interoperable architecture construction for overlay networks
Author :
Jyothirmai, P. ; Raj, Jennifer S.
Author_Institution :
Dept. of E.C.E, Karunya Univ., Coimbatore, India
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space. In Disruption Tolerant Networks packets storage exists when there is any link breakage between the nodes in the network so delay is tolerable in this type of network during the data transmission. But this delay is not tolerable in wireless network for voice packet transmission. This evokes the use of wireless networks. Different wireless networks are interoperating with each other so the communication across the network is called overlay network. This network is vulnerable to attacks due to mobile behaviour of nodes. One of these is the wormhole attack. It is a critical threat to normal operation in wireless networks which results in the degradation of the network performance. It can be identified by using a technique called forbidden topology. The proposed recovery algorithm will increase the performance of the network. The performance metrics such as throughput, packet delivery ratio and delay are evaluated.
Keywords :
computer network security; data communication; delay tolerant networks; open systems; overlay networks; radio links; telecommunication network topology; DTN; computer network architecture; data transmission; delay tolerant networking; disruption tolerant network; forbidden topology; overlay network; secure interoperable architecture construction; voice packet transmission; wireless network; wormhole attack; Delays; Network topology; Overlay networks; Security; Throughput; Topology; Wireless networks; Interoperable; Overlay Networks; Security; Wireless Networks; Wormhole Attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-6817-6
Type :
conf
DOI :
10.1109/ICIIECS.2015.7193261
Filename :
7193261
Link To Document :
بازگشت