Attacks against Rplin Iot: A Survey
The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood at...
Uloženo v:
| Vydáno v: | Annals of the Romanian society for cell biology Ročník 25; číslo 4; s. 9767 - 9786 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Arad
"Vasile Goldis" Western University Arad, Romania
01.01.2021
|
| Témata: | |
| ISSN: | 2067-3019, 2067-8282 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood attack, wormhole attack, clone ID and Sybil attack were described, checked and implemented using Contiki and Cooja simulator. 2.2Sinkhole attack In [44], intrusion detection system was designed to detect sinkhole attack at edge level internet of thing environment. In the algorithm, a node will send the control message to the main base station before sending its data to its base station. [14] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based intrusion detection and key management. |
|---|---|
| Bibliografie: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 2067-3019 2067-8282 |