Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5957
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharma, Akhil-
dc.contributor.authorMalik, Vishwas-
dc.contributor.authorKumar, Arvind [Guided by]-
dc.date.accessioned2022-08-23T04:38:36Z-
dc.date.available2022-08-23T04:38:36Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5957-
dc.description.abstractInternet of Things (IoT) has been a very trending research topic in the recent times, where physical objects interconnect as a result of conjunction of various existing technologies. IoT is rapidly developing, but there have been uncertainties about its security and privacy which can affect its sustainability. The network layer which is both wired or wireless is exposed to many kinds of attacks. Because of the openness of these wireless channels, communications can be easily monitored. In this project we introduce a DAO Inconsistency Attack in RPL networks in which an attacker makes malicious node which uses the "F" flag to make RPL routers remove legitimate downward routes and thus isolates nodes from DODAG Graph. This F flag is present in the rpl-extension-header.c and by modifying this flag this attack is implemented. Mainly we modified the functions update_header_empty() and verify_header() to implement this attack. In this project, a Low power and lossy Network is to be constructed, and analyze the results from the simulation of the DAO inconsistency by using the cooja simulator.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectInternet of thingsen_US
dc.subjectDODAG graphen_US
dc.titleAnalysis and Implementation of DAO Inconsistency Attack in RPLen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Analysis and Implementation of DAO Inconsistency Attack in RPL.pdf2.62 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.