Attacks against Rplin Iot: A Survey
The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood at...
Uložené v:
| Vydané v: | Annals of the Romanian society for cell biology Ročník 25; číslo 4; s. 9767 - 9786 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Arad
"Vasile Goldis" Western University Arad, Romania
01.01.2021
|
| Predmet: | |
| ISSN: | 2067-3019, 2067-8282 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Shrnutí: | The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood attack, wormhole attack, clone ID and Sybil attack were described, checked and implemented using Contiki and Cooja simulator. 2.2Sinkhole attack In [44], intrusion detection system was designed to detect sinkhole attack at edge level internet of thing environment. In the algorithm, a node will send the control message to the main base station before sending its data to its base station. [14] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based intrusion detection and key management. |
|---|---|
| Bibliografia: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 2067-3019 2067-8282 |