Attacks against Rplin Iot: A Survey

The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood at...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Annals of the Romanian society for cell biology Ročník 25; číslo 4; s. 9767 - 9786
Hlavní autori: Stephen, A, Arockiam, L
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Arad "Vasile Goldis" Western University Arad, Romania 01.01.2021
Predmet:
ISSN:2067-3019, 2067-8282
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood attack, wormhole attack, clone ID and Sybil attack were described, checked and implemented using Contiki and Cooja simulator. 2.2Sinkhole attack In [44], intrusion detection system was designed to detect sinkhole attack at edge level internet of thing environment. In the algorithm, a node will send the control message to the main base station before sending its data to its base station. [14] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based intrusion detection and key management.
Bibliografia:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2067-3019
2067-8282