Attacks against Rplin Iot: A Survey

The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood at...

Full description

Saved in:
Bibliographic Details
Published in:Annals of the Romanian society for cell biology Vol. 25; no. 4; pp. 9767 - 9786
Main Authors: Stephen, A, Arockiam, L
Format: Journal Article
Language:English
Published: Arad "Vasile Goldis" Western University Arad, Romania 01.01.2021
Subjects:
ISSN:2067-3019, 2067-8282
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The functionalities can be sensing, actuation, sharing information, analyzing and processing the sensed data.Since sensitive data are collected using IoT technology, the communication path should be secured. The attacks against RPL namely selective forwarding attack, sink hole attack, hello flood attack, wormhole attack, clone ID and Sybil attack were described, checked and implemented using Contiki and Cooja simulator. 2.2Sinkhole attack In [44], intrusion detection system was designed to detect sinkhole attack at edge level internet of thing environment. In the algorithm, a node will send the control message to the main base station before sending its data to its base station. [14] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based intrusion detection and key management.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2067-3019
2067-8282