Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5958
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, Mehul | - |
dc.contributor.author | Kumar, Arvind [Guided by] | - |
dc.date.accessioned | 2022-08-23T04:57:49Z | - |
dc.date.available | 2022-08-23T04:57:49Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5958 | - |
dc.description.abstract | The routing protocol for low power and lossy networks (RPL) is recommended by internet engineering task force (IETF) for IPv6 based Low power personal area network (6LowPAN). RPL is proactive routing protocol for internet of things that has applications in smart homes, smart cities and smart world. RPL creates directed acyclic graphs (DAG) of the network topology. In this project we introduce a sinkhole attack in which the attacker’s aim is to attract more traffic from a particular area through a compromised node. In RPL this attack can be easily performed through the manipulation of the rank. By falsifying (decreasing) the rank of a node one can make it attract more traffic and thus sinkhole attack can be implemented. Because of this falsified advertisement, the malicious node is more frequently chosen as parent by the other nodes. Then we have analyzed the topology, average power, average radio duty cycle and the power history of the malicious node. From the analysis we conclude that the power and radio duty cycle due to malicious node increases. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | RPL | en_US |
dc.subject | Sinkhole Attack | en_US |
dc.title | Analysis and Implementation of Sinkhole Attack in RPL | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Analysis and Implementation of Sinkhole Attack in RPL.pdf | 964.64 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.