Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5958
Title: Analysis and Implementation of Sinkhole Attack in RPL
Authors: Singh, Mehul
Kumar, Arvind [Guided by]
Keywords: RPL
Sinkhole Attack
Issue Date: 2017
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: The routing protocol for low power and lossy networks (RPL) is recommended by internet engineering task force (IETF) for IPv6 based Low power personal area network (6LowPAN). RPL is proactive routing protocol for internet of things that has applications in smart homes, smart cities and smart world. RPL creates directed acyclic graphs (DAG) of the network topology. In this project we introduce a sinkhole attack in which the attacker’s aim is to attract more traffic from a particular area through a compromised node. In RPL this attack can be easily performed through the manipulation of the rank. By falsifying (decreasing) the rank of a node one can make it attract more traffic and thus sinkhole attack can be implemented. Because of this falsified advertisement, the malicious node is more frequently chosen as parent by the other nodes. Then we have analyzed the topology, average power, average radio duty cycle and the power history of the malicious node. From the analysis we conclude that the power and radio duty cycle due to malicious node increases.
URI: http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5958
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Analysis and Implementation of Sinkhole Attack in RPL.pdf964.64 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.