Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5957
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharma, Akhil | - |
dc.contributor.author | Malik, Vishwas | - |
dc.contributor.author | Kumar, Arvind [Guided by] | - |
dc.date.accessioned | 2022-08-23T04:38:36Z | - |
dc.date.available | 2022-08-23T04:38:36Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5957 | - |
dc.description.abstract | Internet of Things (IoT) has been a very trending research topic in the recent times, where physical objects interconnect as a result of conjunction of various existing technologies. IoT is rapidly developing, but there have been uncertainties about its security and privacy which can affect its sustainability. The network layer which is both wired or wireless is exposed to many kinds of attacks. Because of the openness of these wireless channels, communications can be easily monitored. In this project we introduce a DAO Inconsistency Attack in RPL networks in which an attacker makes malicious node which uses the "F" flag to make RPL routers remove legitimate downward routes and thus isolates nodes from DODAG Graph. This F flag is present in the rpl-extension-header.c and by modifying this flag this attack is implemented. Mainly we modified the functions update_header_empty() and verify_header() to implement this attack. In this project, a Low power and lossy Network is to be constructed, and analyze the results from the simulation of the DAO inconsistency by using the cooja simulator. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Internet of things | en_US |
dc.subject | DODAG graph | en_US |
dc.title | Analysis and Implementation of DAO Inconsistency Attack in RPL | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Analysis and Implementation of DAO Inconsistency Attack in RPL.pdf | 2.62 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.