Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5957
Title: | Analysis and Implementation of DAO Inconsistency Attack in RPL |
Authors: | Sharma, Akhil Malik, Vishwas Kumar, Arvind [Guided by] |
Keywords: | Internet of things DODAG graph |
Issue Date: | 2017 |
Publisher: | Jaypee University of Information Technology, Solan, H.P. |
Abstract: | Internet of Things (IoT) has been a very trending research topic in the recent times, where physical objects interconnect as a result of conjunction of various existing technologies. IoT is rapidly developing, but there have been uncertainties about its security and privacy which can affect its sustainability. The network layer which is both wired or wireless is exposed to many kinds of attacks. Because of the openness of these wireless channels, communications can be easily monitored. In this project we introduce a DAO Inconsistency Attack in RPL networks in which an attacker makes malicious node which uses the "F" flag to make RPL routers remove legitimate downward routes and thus isolates nodes from DODAG Graph. This F flag is present in the rpl-extension-header.c and by modifying this flag this attack is implemented. Mainly we modified the functions update_header_empty() and verify_header() to implement this attack. In this project, a Low power and lossy Network is to be constructed, and analyze the results from the simulation of the DAO inconsistency by using the cooja simulator. |
URI: | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5957 |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Analysis and Implementation of DAO Inconsistency Attack in RPL.pdf | 2.62 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.