Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5957
Title: Analysis and Implementation of DAO Inconsistency Attack in RPL
Authors: Sharma, Akhil
Malik, Vishwas
Kumar, Arvind [Guided by]
Keywords: Internet of things
DODAG graph
Issue Date: 2017
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: Internet of Things (IoT) has been a very trending research topic in the recent times, where physical objects interconnect as a result of conjunction of various existing technologies. IoT is rapidly developing, but there have been uncertainties about its security and privacy which can affect its sustainability. The network layer which is both wired or wireless is exposed to many kinds of attacks. Because of the openness of these wireless channels, communications can be easily monitored. In this project we introduce a DAO Inconsistency Attack in RPL networks in which an attacker makes malicious node which uses the "F" flag to make RPL routers remove legitimate downward routes and thus isolates nodes from DODAG Graph. This F flag is present in the rpl-extension-header.c and by modifying this flag this attack is implemented. Mainly we modified the functions update_header_empty() and verify_header() to implement this attack. In this project, a Low power and lossy Network is to be constructed, and analyze the results from the simulation of the DAO inconsistency by using the cooja simulator.
URI: http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5957
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Analysis and Implementation of DAO Inconsistency Attack in RPL.pdf2.62 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.